diff --git a/.gitattributes b/.gitattributes index 1ef325f1b111266a6b26e0196871bd78baa8c2f3..5ed60169beb3f12b1314d3fc061241fc25eb909f 100644 --- a/.gitattributes +++ b/.gitattributes @@ -57,3 +57,220 @@ saved_model/**/* filter=lfs diff=lfs merge=lfs -text # Video files - compressed *.mp4 filter=lfs diff=lfs merge=lfs -text *.webm filter=lfs diff=lfs merge=lfs -text +metaicl/llama/ade_corpus_v2-classification/ade_corpus_v2-classification_16384_100_train.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/ade_corpus_v2-classification/ade_corpus_v2-classification_16_100_test.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/ag_news/ag_news_16384_100_train.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/ag_news/ag_news_16_100_test.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/ai2_arc/ai2_arc_16384_100_train.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/amazon_polarity/amazon_polarity_16384_100_train.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/amazon_polarity/amazon_polarity_16_100_test.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/anli/anli_16384_100_train.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/anli/anli_16_100_test.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/art/art_16384_100_train.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/art/art_16_100_test.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/biomrc/biomrc_16384_100_train.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/biomrc/biomrc_16_100_test.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/blimp-anaphor_number_agreement/blimp-anaphor_number_agreement_16384_100_train.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/blimp-ellipsis_n_bar_2/blimp-ellipsis_n_bar_2_16384_100_train.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/blimp-sentential_negation_npi_licensor_present/blimp-sentential_negation_npi_licensor_present_16384_100_train.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/blimp-sentential_negation_npi_scope/blimp-sentential_negation_npi_scope_16384_100_train.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/boolq/boolq_16384_100_train.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/boolq/boolq_16_100_test.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/circa/circa_16384_100_train.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/circa/circa_16_100_test.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/climate_fever/climate_fever_16384_100_train.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/codah/codah_16384_100_train.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/codah/codah_16_100_test.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/commonsense_qa/commonsense_qa_16384_100_train.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/commonsense_qa/commonsense_qa_16_100_test.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/cosmos_qa/cosmos_qa_16384_100_train.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/cosmos_qa/cosmos_qa_16_100_test.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/crows_pairs/crows_pairs_16384_100_train.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/dbpedia_14/dbpedia_14_16384_100_train.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/dbpedia_14/dbpedia_14_16_100_test.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/discovery/discovery_16384_100_train.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/discovery/discovery_16_100_test.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/dream/dream_16384_100_train.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/dream/dream_16_100_test.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/emo/emo_16384_100_train.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/emo/emo_16_100_test.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/emotion/emotion_16384_100_train.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/emotion/emotion_16_100_test.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/financial_phrasebank/financial_phrasebank_16384_100_train.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/freebase_qa/freebase_qa_16384_100_train.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/freebase_qa/freebase_qa_16_100_test.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/gigaword/gigaword_16384_100_train.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/gigaword/gigaword_16_100_test.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/glue-cola/glue-cola_16384_100_train.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/glue-mnli/glue-mnli_16384_100_train.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/glue-mnli/glue-mnli_16_100_test.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/glue-mrpc/glue-mrpc_16384_100_train.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/glue-mrpc/glue-mrpc_16_100_test.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/glue-qnli/glue-qnli_16384_100_train.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/glue-qnli/glue-qnli_16_100_test.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/glue-qqp/glue-qqp_16384_100_train.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/glue-qqp/glue-qqp_16_100_test.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/glue-rte/glue-rte_16384_100_train.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/glue-sst2/glue-sst2_16384_100_train.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/glue-sst2/glue-sst2_16_100_test.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/glue-wnli/glue-wnli_16384_100_train.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/google_wellformed_query/google_wellformed_query_16384_100_train.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/google_wellformed_query/google_wellformed_query_16_100_test.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/hate_speech18/hate_speech18_16384_100_train.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/hate_speech18/hate_speech18_16_100_test.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/hate_speech_offensive/hate_speech_offensive_16384_100_train.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/hate_speech_offensive/hate_speech_offensive_16_100_test.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/hatexplain/hatexplain_16384_100_train.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/hatexplain/hatexplain_16_100_test.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/health_fact/health_fact_16384_100_train.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/health_fact/health_fact_16_100_test.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/hellaswag/hellaswag_16384_100_train.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/hellaswag/hellaswag_16_100_test.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/hotpot_qa/hotpot_qa_16384_100_train.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/hotpot_qa/hotpot_qa_16_100_test.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/imdb/imdb_16384_100_train.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/imdb/imdb_16_100_test.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/inst:climate_fever/inst:climate_fever_16_100_test.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/kilt_ay2/kilt_ay2_16384_100_train.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/kilt_ay2/kilt_ay2_16_100_test.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/kilt_fever/kilt_fever_16384_100_train.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/kilt_fever/kilt_fever_16_100_test.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/kilt_hotpotqa/kilt_hotpotqa_16384_100_train.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/kilt_hotpotqa/kilt_hotpotqa_16_100_test.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/kilt_nq/kilt_nq_16384_100_train.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/kilt_nq/kilt_nq_16_100_test.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/kilt_trex/kilt_trex_16384_100_train.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/kilt_trex/kilt_trex_16_100_test.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/kilt_zsre/kilt_zsre_16384_100_train.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/kilt_zsre/kilt_zsre_16_100_test.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/lama-conceptnet/lama-conceptnet_16384_100_train.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/lama-conceptnet/lama-conceptnet_16_100_test.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/lama-google_re/lama-google_re_16384_100_train.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/lama-trex/lama-trex_16384_100_train.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/lama-trex/lama-trex_16_100_test.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/liar/liar_16384_100_train.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/liar/liar_16_100_test.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/mc_taco/mc_taco_16384_100_train.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/mc_taco/mc_taco_16_100_test.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/medical_questions_pairs/medical_questions_pairs_16384_100_train.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/medical_questions_pairs/medical_questions_pairs_16_100_test.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/numer_sense/numer_sense_16384_100_train.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/numer_sense/numer_sense_16_100_test.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/onestop_english/onestop_english_16384_100_train.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/onestop_english/onestop_english_16_100_test.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/openbookqa/openbookqa_16384_100_train.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/paws/paws_16384_100_train.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/paws/paws_16_100_test.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/piqa/piqa_16384_100_train.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/piqa/piqa_16_100_test.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/proto_qa/proto_qa_16384_100_train.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/proto_qa/proto_qa_16_100_test.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/qa_srl/qa_srl_16384_100_train.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/qa_srl/qa_srl_16_100_test.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/qasc/qasc_16384_100_train.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/qasc/qasc_16_100_test.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/quail/quail_16384_100_train.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/quail/quail_16_100_test.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/quarel/quarel_16384_100_train.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/quartz-no_knowledge/quartz-no_knowledge_16384_100_train.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/quartz-with_knowledge/quartz-with_knowledge_16384_100_train.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/quoref/quoref_16384_100_train.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/quoref/quoref_16_100_test.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/race-high/race-high_16384_100_train.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/race-high/race-high_16_100_test.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/race-middle/race-middle_16384_100_train.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/race-middle/race-middle_16_100_test.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/ropes/ropes_16384_100_train.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/ropes/ropes_16_100_test.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/rotten_tomatoes/rotten_tomatoes_16384_100_train.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/rotten_tomatoes/rotten_tomatoes_16_100_test.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/sciq/sciq_16384_100_train.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/sciq/sciq_16_100_test.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/scitail/scitail_16384_100_train.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/scitail/scitail_16_100_test.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/search_qa/search_qa_16384_100_train.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/search_qa/search_qa_16_100_test.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/sick/sick_16384_100_train.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/sms_spam/sms_spam_16384_100_train.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/sms_spam/sms_spam_16_100_test.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/social_i_qa/social_i_qa_16384_100_train.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/social_i_qa/social_i_qa_16_100_test.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/spider/spider_16384_100_train.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/spider/spider_16_100_test.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/squad-no_context/squad-no_context_16384_100_train.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/squad-no_context/squad-no_context_16_100_test.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/squad-with_context/squad-with_context_16384_100_train.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/squad-with_context/squad-with_context_16_100_test.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/superglue-multirc/superglue-multirc_16384_100_train.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/superglue-multirc/superglue-multirc_16_100_test.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/superglue-record/superglue-record_16384_100_train.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/superglue-record/superglue-record_16_100_test.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/superglue-rte/superglue-rte_16384_100_train.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/superglue-wic/superglue-wic_16384_100_train.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/superglue-wic/superglue-wic_16_100_test.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/superglue-wsc/superglue-wsc_16384_100_train.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/swag/swag_16384_100_train.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/swag/swag_16_100_test.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/tab_fact/tab_fact_16384_100_train.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/tab_fact/tab_fact_16_100_test.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/trec/trec_16384_100_train.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/trec/trec_16_100_test.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/trec-finegrained/trec-finegrained_16384_100_train.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/trec-finegrained/trec-finegrained_16_100_test.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/tweet_eval-emoji/tweet_eval-emoji_16384_100_train.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/tweet_eval-emoji/tweet_eval-emoji_16_100_test.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/tweet_eval-emotion/tweet_eval-emotion_16384_100_train.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/tweet_eval-hate/tweet_eval-hate_16384_100_train.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/tweet_eval-hate/tweet_eval-hate_16_100_test.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/tweet_eval-irony/tweet_eval-irony_16384_100_train.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/tweet_eval-irony/tweet_eval-irony_16_100_test.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/tweet_eval-offensive/tweet_eval-offensive_16384_100_train.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/tweet_eval-offensive/tweet_eval-offensive_16_100_test.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/tweet_eval-sentiment/tweet_eval-sentiment_16384_100_train.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/tweet_eval-sentiment/tweet_eval-sentiment_16_100_test.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/tweet_qa/tweet_qa_16384_100_train.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/tweet_qa/tweet_qa_16_100_test.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/unifiedqa:ai2_science_middle/unifiedqa:ai2_science_middle_16_100_test.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/unifiedqa:boolq/unifiedqa:boolq_16384_100_train.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/unifiedqa:commonsenseqa/unifiedqa:commonsenseqa_16384_100_train.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/unifiedqa:drop/unifiedqa:drop_16384_100_train.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/unifiedqa:mctest/unifiedqa:mctest_16_100_test.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/unifiedqa:narrativeqa/unifiedqa:narrativeqa_16384_100_train.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/unifiedqa:natural_questions_with_dpr_para/unifiedqa:natural_questions_with_dpr_para_16384_100_train.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/unifiedqa:newsqa/unifiedqa:newsqa_16384_100_train.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/unifiedqa:openbookqa_with_ir/unifiedqa:openbookqa_with_ir_16_100_test.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/unifiedqa:physical_iqa/unifiedqa:physical_iqa_16384_100_train.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/unifiedqa:qasc/unifiedqa:qasc_16_100_test.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/unifiedqa:qasc_with_ir/unifiedqa:qasc_with_ir_16_100_test.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/unifiedqa:quoref/unifiedqa:quoref_16384_100_train.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/unifiedqa:race_string/unifiedqa:race_string_16384_100_train.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/unifiedqa:ropes/unifiedqa:ropes_16384_100_train.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/unifiedqa:social_iqa/unifiedqa:social_iqa_16384_100_train.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/unifiedqa:squad1_1/unifiedqa:squad1_1_16384_100_train.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/unifiedqa:squad2/unifiedqa:squad2_16384_100_train.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/unifiedqa:winogrande_xl/unifiedqa:winogrande_xl_16384_100_train.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/web_questions/web_questions_16384_100_train.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/wiki_qa/wiki_qa_16384_100_train.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/wiki_qa/wiki_qa_16_100_test.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/wikisql/wikisql_16384_100_train.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/wikisql/wikisql_16_100_test.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/wino_grande/wino_grande_16384_100_train.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/wino_grande/wino_grande_16_100_test.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/wiqa/wiqa_16384_100_train.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/wiqa/wiqa_16_100_test.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/xsum/xsum_16384_100_train.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/xsum/xsum_16_100_test.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/yahoo_answers_topics/yahoo_answers_topics_16384_100_train.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/yahoo_answers_topics/yahoo_answers_topics_16_100_test.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/yelp_polarity/yelp_polarity_16384_100_train.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/yelp_polarity/yelp_polarity_16_100_test.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/yelp_review_full/yelp_review_full_16384_100_train.jsonl filter=lfs diff=lfs merge=lfs -text +metaicl/llama/yelp_review_full/yelp_review_full_16_100_test.jsonl filter=lfs diff=lfs merge=lfs -text +sft/sft-v4.jsonl filter=lfs diff=lfs merge=lfs -text +slimpajama/arxiv.json filter=lfs diff=lfs merge=lfs -text +slimpajama/book.json filter=lfs diff=lfs merge=lfs -text +slimpajama/c4.json filter=lfs diff=lfs merge=lfs -text +slimpajama/commoncrawl.json filter=lfs diff=lfs merge=lfs -text +slimpajama/github.json filter=lfs diff=lfs merge=lfs -text +slimpajama/stackexchange.json filter=lfs diff=lfs merge=lfs -text +slimpajama/wiki.json filter=lfs diff=lfs merge=lfs -text diff --git a/deepspeed/stage2.json b/deepspeed/stage2.json new file mode 100644 index 0000000000000000000000000000000000000000..924a0297a98613e42d6c0747dc1f0f8252850e81 --- /dev/null +++ b/deepspeed/stage2.json @@ -0,0 +1,43 @@ +{ + "optimizer": { + "type": "AdamW", + "params": { + "lr": "auto", + "betas": "auto", + "eps": "auto", + "weight_decay": "auto" + } + }, + "scheduler": { + "type": "WarmupDecayLR", + "params": { + "total_num_steps": "auto", + "warmup_min_lr": "auto", + "warmup_max_lr": "auto", + "warmup_num_steps": "auto" + } + }, + "bf16": { + "enabled": "auto", + "loss_scale": 0, + "initial_scale_power": 16, + "loss_scale_window": 1000, + "hysteresis": 2, + "min_loss_scale": 1 + }, + "zero_optimization": { + "stage": 2, + "allgather_partitions": true, + "allgather_bucket_size": 1e9, + "reduce_scatter": true, + "reduce_bucket_size": 1e9, + "overlap_comm": true, + "contiguous_gradients": true + }, + "gradient_accumulation_steps": "auto", + "gradient_clipping": "auto", + "steps_per_print": 2000, + "train_batch_size": "auto", + "train_micro_batch_size_per_gpu": "auto", + "wall_clock_breakdown": false +} \ No newline at end of file diff --git a/metaicl/hr_to_lr.json b/metaicl/hr_to_lr.json new file mode 100644 index 0000000000000000000000000000000000000000..efe5b127602627f6324aab4878a3439527075779 --- /dev/null +++ b/metaicl/hr_to_lr.json @@ -0,0 +1,98 @@ +{ + "train": [ + "piqa", + "hate_speech_offensive", + "google_wellformed_query", + "social_i_qa", + "circa", + "quoref", + "glue-sst2", + "scitail", + "emo", + "cosmos_qa", + "freebase_qa", + "ag_news", + "art", + "paws", + "kilt_ay2", + "glue-qnli", + "quail", + "ade_corpus_v2-classification", + "sciq", + "hatexplain", + "emotion", + "glue-qqp", + "kilt_nq", + "dbpedia_14", + "kilt_zsre", + "hellaswag", + "squad-with_context", + "hotpot_qa", + "glue-mnli", + "ropes", + "squad-no_context", + "kilt_hotpotqa", + "discovery", + "superglue-record", + "race-middle", + "race-high", + "lama-trex", + "swag", + "gigaword", + "amazon_polarity", + "biomrc", + "tab_fact", + "tweet_eval-emoji", + "tweet_eval-offensive", + "tweet_eval-sentiment", + "tweet_qa", + "imdb", + "lama-conceptnet", + "liar", + "anli", + "wiki_qa", + "kilt_trex", + "wikisql", + "wino_grande", + "wiqa", + "search_qa", + "xsum", + "yahoo_answers_topics", + "yelp_polarity", + "yelp_review_full" + ], + "test": [ + "quarel", + "financial_phrasebank", + "openbookqa", + "codah", + "qasc", + "dream", + "sick", + "commonsense_qa", + "medical_questions_pairs", + "quartz-with_knowledge", + "poem_sentiment", + "quartz-no_knowledge", + "glue-mrpc", + "glue-wnli", + "inst:climate_fever", + "ethos-national_origin", + "ethos-race", + "ethos-religion", + "ai2_arc", + "hate_speech18", + "glue-rte", + "superglue-cb", + "superglue-copa", + "tweet_eval-hate", + "tweet_eval-stance_atheism", + "tweet_eval-stance_feminist" + ], + "unseen_domain_test": [ + "financial_phrasebank", + "medical_questions_pairs", + "poem_sentiment", + "inst:climate_fever" + ] +} \ No newline at end of file diff --git a/metaicl/llama/ade_corpus_v2-classification/ade_corpus_v2-classification_16384_100_train.jsonl b/metaicl/llama/ade_corpus_v2-classification/ade_corpus_v2-classification_16384_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e5bd76af08b2bcbd7ef0e2ec195bfad2599e7174 --- /dev/null +++ b/metaicl/llama/ade_corpus_v2-classification/ade_corpus_v2-classification_16384_100_train.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:36bdb454592ec4113b727a425a059445b54e1adfe40377f2d159ef4979ec1ba1 +size 2798393 diff --git a/metaicl/llama/ade_corpus_v2-classification/ade_corpus_v2-classification_16_100_test.jsonl b/metaicl/llama/ade_corpus_v2-classification/ade_corpus_v2-classification_16_100_test.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..056e0161b14012bba5c519df8857d257900c01d0 --- /dev/null +++ b/metaicl/llama/ade_corpus_v2-classification/ade_corpus_v2-classification_16_100_test.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:34c91bc83d105e04006356f6ac073544b429fb21127f6058d7ef6cbb4de17d0f +size 806385 diff --git a/metaicl/llama/ade_corpus_v2-classification/ade_corpus_v2-classification_16_100_train.jsonl b/metaicl/llama/ade_corpus_v2-classification/ade_corpus_v2-classification_16_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8791701db1d6a5e551efc1a0efe58e4208e548ce Binary files /dev/null and b/metaicl/llama/ade_corpus_v2-classification/ade_corpus_v2-classification_16_100_train.jsonl differ diff --git a/metaicl/llama/ade_corpus_v2-classification/ade_corpus_v2-classification_16_13_train.jsonl b/metaicl/llama/ade_corpus_v2-classification/ade_corpus_v2-classification_16_13_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..caeb2844274f680035ba07ec96131775f9cacd50 Binary files /dev/null and b/metaicl/llama/ade_corpus_v2-classification/ade_corpus_v2-classification_16_13_train.jsonl differ diff --git a/metaicl/llama/ade_corpus_v2-classification/ade_corpus_v2-classification_16_21_train.jsonl b/metaicl/llama/ade_corpus_v2-classification/ade_corpus_v2-classification_16_21_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ee1e0901d639ca7eb6cfd301e9403688f220dc90 Binary files /dev/null and b/metaicl/llama/ade_corpus_v2-classification/ade_corpus_v2-classification_16_21_train.jsonl differ diff --git a/metaicl/llama/ade_corpus_v2-classification/ade_corpus_v2-classification_16_42_train.jsonl b/metaicl/llama/ade_corpus_v2-classification/ade_corpus_v2-classification_16_42_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..07d1d9fa7703692b53bfe3cd194f4d4fde660ae9 Binary files /dev/null and b/metaicl/llama/ade_corpus_v2-classification/ade_corpus_v2-classification_16_42_train.jsonl differ diff --git a/metaicl/llama/ade_corpus_v2-classification/ade_corpus_v2-classification_16_87_train.jsonl b/metaicl/llama/ade_corpus_v2-classification/ade_corpus_v2-classification_16_87_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7be7e83a17300d3d8152b3f8184501e8eafc1300 Binary files /dev/null and b/metaicl/llama/ade_corpus_v2-classification/ade_corpus_v2-classification_16_87_train.jsonl differ diff --git a/metaicl/llama/ade_corpus_v2-dosage/ade_corpus_v2-dosage_16384_100_train.jsonl b/metaicl/llama/ade_corpus_v2-dosage/ade_corpus_v2-dosage_16384_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4eea29c434fa3719acb698b756b334779f7c512e Binary files /dev/null and b/metaicl/llama/ade_corpus_v2-dosage/ade_corpus_v2-dosage_16384_100_train.jsonl differ diff --git a/metaicl/llama/ade_corpus_v2-dosage/ade_corpus_v2-dosage_16_100_test.jsonl b/metaicl/llama/ade_corpus_v2-dosage/ade_corpus_v2-dosage_16_100_test.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..837986cf19e7914501df5de8e99d6390f6bd831c Binary files /dev/null and b/metaicl/llama/ade_corpus_v2-dosage/ade_corpus_v2-dosage_16_100_test.jsonl differ diff --git a/metaicl/llama/ade_corpus_v2-dosage/ade_corpus_v2-dosage_16_100_train.jsonl b/metaicl/llama/ade_corpus_v2-dosage/ade_corpus_v2-dosage_16_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..55835ebffc1e077d8894c4c5d7610264203f2e11 Binary files /dev/null and b/metaicl/llama/ade_corpus_v2-dosage/ade_corpus_v2-dosage_16_100_train.jsonl differ diff --git a/metaicl/llama/ade_corpus_v2-dosage/ade_corpus_v2-dosage_16_13_train.jsonl b/metaicl/llama/ade_corpus_v2-dosage/ade_corpus_v2-dosage_16_13_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..00f19b69934a77e6b7e9a66995455560210344c2 Binary files /dev/null and b/metaicl/llama/ade_corpus_v2-dosage/ade_corpus_v2-dosage_16_13_train.jsonl differ diff --git a/metaicl/llama/ade_corpus_v2-dosage/ade_corpus_v2-dosage_16_21_train.jsonl b/metaicl/llama/ade_corpus_v2-dosage/ade_corpus_v2-dosage_16_21_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..20fd379e4dd98c8b5790c41435a6287a3863ce99 Binary files /dev/null and b/metaicl/llama/ade_corpus_v2-dosage/ade_corpus_v2-dosage_16_21_train.jsonl differ diff --git a/metaicl/llama/ade_corpus_v2-dosage/ade_corpus_v2-dosage_16_42_train.jsonl b/metaicl/llama/ade_corpus_v2-dosage/ade_corpus_v2-dosage_16_42_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9fb3a96eb42180ec9a1a148480c058096d5a86e4 Binary files /dev/null and b/metaicl/llama/ade_corpus_v2-dosage/ade_corpus_v2-dosage_16_42_train.jsonl differ diff --git a/metaicl/llama/ade_corpus_v2-dosage/ade_corpus_v2-dosage_16_87_train.jsonl b/metaicl/llama/ade_corpus_v2-dosage/ade_corpus_v2-dosage_16_87_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..dde4c714ef13718ad49c960440162a438a8f1457 Binary files /dev/null and b/metaicl/llama/ade_corpus_v2-dosage/ade_corpus_v2-dosage_16_87_train.jsonl differ diff --git a/metaicl/llama/ag_news/ag_news_16384_100_train.jsonl b/metaicl/llama/ag_news/ag_news_16384_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b8abbf6269d1b12b51e4c0ac30b8c28ff3016ff3 --- /dev/null +++ b/metaicl/llama/ag_news/ag_news_16384_100_train.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:5a90afbbabdacef66347eb6d1f4695601b1b204868a1da30677a6723a5eb50c3 +size 4388367 diff --git a/metaicl/llama/ag_news/ag_news_16_100_test.jsonl b/metaicl/llama/ag_news/ag_news_16_100_test.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..184185c846e897ca109ce923b5669eeee758da36 --- /dev/null +++ b/metaicl/llama/ag_news/ag_news_16_100_test.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:8cc65dd44dfe99fa5db7d30ecb603d5f5b879fefd0d36f9b774223ef46d28832 +size 2026887 diff --git a/metaicl/llama/ag_news/ag_news_16_100_train.jsonl b/metaicl/llama/ag_news/ag_news_16_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d636fba45d5529e6befc5b336f28b9d94e61b939 Binary files /dev/null and b/metaicl/llama/ag_news/ag_news_16_100_train.jsonl differ diff --git a/metaicl/llama/ag_news/ag_news_16_13_train.jsonl b/metaicl/llama/ag_news/ag_news_16_13_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..edb412e16da8b058081327804890d23b7e40c27d Binary files /dev/null and b/metaicl/llama/ag_news/ag_news_16_13_train.jsonl differ diff --git a/metaicl/llama/ag_news/ag_news_16_21_train.jsonl b/metaicl/llama/ag_news/ag_news_16_21_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7f5e4af0f4d1f1b30720e5b84be77c0bf14e553e Binary files /dev/null and b/metaicl/llama/ag_news/ag_news_16_21_train.jsonl differ diff --git a/metaicl/llama/ag_news/ag_news_16_42_train.jsonl b/metaicl/llama/ag_news/ag_news_16_42_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..169cd9a576baec0d51d965ea4bad7e59bdae3b13 Binary files /dev/null and b/metaicl/llama/ag_news/ag_news_16_42_train.jsonl differ diff --git a/metaicl/llama/ag_news/ag_news_16_87_train.jsonl b/metaicl/llama/ag_news/ag_news_16_87_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d438bb0fad2af5f2dfff7d42f381b01948f88771 Binary files /dev/null and b/metaicl/llama/ag_news/ag_news_16_87_train.jsonl differ diff --git a/metaicl/llama/ai2_arc/ai2_arc_16384_100_train.jsonl b/metaicl/llama/ai2_arc/ai2_arc_16384_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..60b46fa759b1fdbe16ef7b1ba3aa8797c6303014 --- /dev/null +++ b/metaicl/llama/ai2_arc/ai2_arc_16384_100_train.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:4fc3e61bbbe3c64bf8772dd8e68eabf004a53f278f7eb5e1730b47f69927c06e +size 274703 diff --git a/metaicl/llama/ai2_arc/ai2_arc_16_100_test.jsonl b/metaicl/llama/ai2_arc/ai2_arc_16_100_test.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..58344bcbee6c43d84f2eed10796495ad8a9d2fd5 Binary files /dev/null and b/metaicl/llama/ai2_arc/ai2_arc_16_100_test.jsonl differ diff --git a/metaicl/llama/ai2_arc/ai2_arc_16_100_train.jsonl b/metaicl/llama/ai2_arc/ai2_arc_16_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..16a3b6a08a61fe73065501c6a39df6d9b5ef724c Binary files /dev/null and b/metaicl/llama/ai2_arc/ai2_arc_16_100_train.jsonl differ diff --git a/metaicl/llama/ai2_arc/ai2_arc_16_13_train.jsonl b/metaicl/llama/ai2_arc/ai2_arc_16_13_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9dbb16e0e04f80bc043eee6846c6514e5b11b47e Binary files /dev/null and b/metaicl/llama/ai2_arc/ai2_arc_16_13_train.jsonl differ diff --git a/metaicl/llama/ai2_arc/ai2_arc_16_21_train.jsonl b/metaicl/llama/ai2_arc/ai2_arc_16_21_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..27cdd24e6cd36bdbd54ab40527e57b57648e865a Binary files /dev/null and b/metaicl/llama/ai2_arc/ai2_arc_16_21_train.jsonl differ diff --git a/metaicl/llama/ai2_arc/ai2_arc_16_42_train.jsonl b/metaicl/llama/ai2_arc/ai2_arc_16_42_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..63356b1bca769955e1032dd5ce2f27f588191243 Binary files /dev/null and b/metaicl/llama/ai2_arc/ai2_arc_16_42_train.jsonl differ diff --git a/metaicl/llama/ai2_arc/ai2_arc_16_87_train.jsonl b/metaicl/llama/ai2_arc/ai2_arc_16_87_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..063bf2cb0ebbf45e6c665cf24e066d9c322646b3 Binary files /dev/null and b/metaicl/llama/ai2_arc/ai2_arc_16_87_train.jsonl differ diff --git a/metaicl/llama/amazon_polarity/amazon_polarity_16384_100_train.jsonl b/metaicl/llama/amazon_polarity/amazon_polarity_16384_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..92e326f67285da6989d7db7421268d5e004d6b5c --- /dev/null +++ b/metaicl/llama/amazon_polarity/amazon_polarity_16384_100_train.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:7d88f74296da4006d9eefc2e1a97dbd76633d794373941ddcae529852e5e8406 +size 3958047 diff --git a/metaicl/llama/amazon_polarity/amazon_polarity_16_100_test.jsonl b/metaicl/llama/amazon_polarity/amazon_polarity_16_100_test.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..73321598522597fa439fbd3e867e4ce268d5a1ea --- /dev/null +++ b/metaicl/llama/amazon_polarity/amazon_polarity_16_100_test.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:db68c82df20960cde880a55ed1a91156b43a3283d1da845ca6166b3336553e09 +size 400599 diff --git a/metaicl/llama/amazon_polarity/amazon_polarity_16_100_train.jsonl b/metaicl/llama/amazon_polarity/amazon_polarity_16_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2daea38e99f2c8da55dd5d083d48b67b3bd20443 Binary files /dev/null and b/metaicl/llama/amazon_polarity/amazon_polarity_16_100_train.jsonl differ diff --git a/metaicl/llama/amazon_polarity/amazon_polarity_16_13_train.jsonl b/metaicl/llama/amazon_polarity/amazon_polarity_16_13_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..504af39b6aec6ac42544022f603ff565aebbf21c Binary files /dev/null and b/metaicl/llama/amazon_polarity/amazon_polarity_16_13_train.jsonl differ diff --git a/metaicl/llama/amazon_polarity/amazon_polarity_16_21_train.jsonl b/metaicl/llama/amazon_polarity/amazon_polarity_16_21_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b9b5c52eae705eab5508b71dba76cbee2e66853f Binary files /dev/null and b/metaicl/llama/amazon_polarity/amazon_polarity_16_21_train.jsonl differ diff --git a/metaicl/llama/amazon_polarity/amazon_polarity_16_42_train.jsonl b/metaicl/llama/amazon_polarity/amazon_polarity_16_42_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0530ed196f53d219a1d1a2618a4dea6468a79fb3 Binary files /dev/null and b/metaicl/llama/amazon_polarity/amazon_polarity_16_42_train.jsonl differ diff --git a/metaicl/llama/amazon_polarity/amazon_polarity_16_87_train.jsonl b/metaicl/llama/amazon_polarity/amazon_polarity_16_87_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..39d02fbbc2b51fccf378f574a740efab0e9500e7 Binary files /dev/null and b/metaicl/llama/amazon_polarity/amazon_polarity_16_87_train.jsonl differ diff --git a/metaicl/llama/anli/anli_16384_100_train.jsonl b/metaicl/llama/anli/anli_16384_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ab4447022548b02d3d85a17090cb8608dc313eae --- /dev/null +++ b/metaicl/llama/anli/anli_16384_100_train.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:8a4f87b7eedfb791e0d5218973a4d6cb5fcc520a3632f59271377f50bead17a5 +size 6807689 diff --git a/metaicl/llama/anli/anli_16_100_test.jsonl b/metaicl/llama/anli/anli_16_100_test.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..38a8cac9e000fc910d472580a28c058831185fd6 --- /dev/null +++ b/metaicl/llama/anli/anli_16_100_test.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:17d32509e89016e533dbb0ee9a70a4cd966ce99146e67c371dc2e467237ca9b3 +size 420225 diff --git a/metaicl/llama/anli/anli_16_100_train.jsonl b/metaicl/llama/anli/anli_16_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f351ce2463ed84c0d310ff51418fd22fd2cdeaf7 Binary files /dev/null and b/metaicl/llama/anli/anli_16_100_train.jsonl differ diff --git a/metaicl/llama/anli/anli_16_13_train.jsonl b/metaicl/llama/anli/anli_16_13_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1d99cc7c95e7f16b40d5a87aee4a3b75f0986ced Binary files /dev/null and b/metaicl/llama/anli/anli_16_13_train.jsonl differ diff --git a/metaicl/llama/anli/anli_16_21_train.jsonl b/metaicl/llama/anli/anli_16_21_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7074cfe459de662d31677fd5a225928392099fee Binary files /dev/null and b/metaicl/llama/anli/anli_16_21_train.jsonl differ diff --git a/metaicl/llama/anli/anli_16_42_train.jsonl b/metaicl/llama/anli/anli_16_42_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0c13c1f0adbcb4e1b28383f3c15379c44b988e0e Binary files /dev/null and b/metaicl/llama/anli/anli_16_42_train.jsonl differ diff --git a/metaicl/llama/anli/anli_16_87_train.jsonl b/metaicl/llama/anli/anli_16_87_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..aa08e713b9aec9ddb124d041bcb945d1e30640ec Binary files /dev/null and b/metaicl/llama/anli/anli_16_87_train.jsonl differ diff --git a/metaicl/llama/art/art_16384_100_train.jsonl b/metaicl/llama/art/art_16384_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9b115e0062c523a7aea5bd64d313ff6059944692 --- /dev/null +++ b/metaicl/llama/art/art_16384_100_train.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:dba76cda499cec09dffb7c7462a56d57369d1c8c01008d855bedc9a17283a542 +size 4713543 diff --git a/metaicl/llama/art/art_16_100_test.jsonl b/metaicl/llama/art/art_16_100_test.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..03033d1095464861c586962e7bc6ef0defcaf0c2 --- /dev/null +++ b/metaicl/llama/art/art_16_100_test.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:2bcda4e0be16be404c44f6445ff51d55f986158b9dca54282207e58ad0704914 +size 444607 diff --git a/metaicl/llama/art/art_16_100_train.jsonl b/metaicl/llama/art/art_16_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b3a7c3e533e645e5568e7085ad4a1cceaa537767 Binary files /dev/null and b/metaicl/llama/art/art_16_100_train.jsonl differ diff --git a/metaicl/llama/art/art_16_13_train.jsonl b/metaicl/llama/art/art_16_13_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..11eeb4f7bd07100abf4b50fce7f2a31bee243ba1 Binary files /dev/null and b/metaicl/llama/art/art_16_13_train.jsonl differ diff --git a/metaicl/llama/art/art_16_21_train.jsonl b/metaicl/llama/art/art_16_21_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b7b7d289281bdb2315b942d9dfab662af29de40b Binary files /dev/null and b/metaicl/llama/art/art_16_21_train.jsonl differ diff --git a/metaicl/llama/art/art_16_42_train.jsonl b/metaicl/llama/art/art_16_42_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3ca21bd51b1b32adcb124d1980d348b81588dea2 Binary files /dev/null and b/metaicl/llama/art/art_16_42_train.jsonl differ diff --git a/metaicl/llama/art/art_16_87_train.jsonl b/metaicl/llama/art/art_16_87_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..04b670b002aeb70d798618257b4560b18d1ddc4a Binary files /dev/null and b/metaicl/llama/art/art_16_87_train.jsonl differ diff --git a/metaicl/llama/biomrc/biomrc_16384_100_train.jsonl b/metaicl/llama/biomrc/biomrc_16384_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5c71eb1d00feee26e6961fd42f60a20a11cdb222 --- /dev/null +++ b/metaicl/llama/biomrc/biomrc_16384_100_train.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:cf7ecd5c5f317d9ab30e6463610482258068417c27ad8dc7b02e53ef0c2849b1 +size 30723149 diff --git a/metaicl/llama/biomrc/biomrc_16_100_test.jsonl b/metaicl/llama/biomrc/biomrc_16_100_test.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3c9bea7b5d7b5505782996678bdc3a2fe99bd551 --- /dev/null +++ b/metaicl/llama/biomrc/biomrc_16_100_test.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:bca235633b25c19477f2981bfad5c2625fb82e1783ed397d1f80760b9051e8d7 +size 9551685 diff --git a/metaicl/llama/biomrc/biomrc_16_100_train.jsonl b/metaicl/llama/biomrc/biomrc_16_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..dfb0e831461990d46e6b096f728f1735a81915d8 Binary files /dev/null and b/metaicl/llama/biomrc/biomrc_16_100_train.jsonl differ diff --git a/metaicl/llama/biomrc/biomrc_16_13_train.jsonl b/metaicl/llama/biomrc/biomrc_16_13_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9d3334ae634b95ac3bc8be0645f88098306dfb24 Binary files /dev/null and b/metaicl/llama/biomrc/biomrc_16_13_train.jsonl differ diff --git a/metaicl/llama/biomrc/biomrc_16_21_train.jsonl b/metaicl/llama/biomrc/biomrc_16_21_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..dcfbd97905c52af6c4096f3236554bebb017d211 Binary files /dev/null and b/metaicl/llama/biomrc/biomrc_16_21_train.jsonl differ diff --git a/metaicl/llama/biomrc/biomrc_16_42_train.jsonl b/metaicl/llama/biomrc/biomrc_16_42_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0eae544f4bc25e20c1d8990e6d59210af89f27d5 Binary files /dev/null and b/metaicl/llama/biomrc/biomrc_16_42_train.jsonl differ diff --git a/metaicl/llama/biomrc/biomrc_16_87_train.jsonl b/metaicl/llama/biomrc/biomrc_16_87_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..267c5f85eb9103a014208ef09fe2a90c68af86c7 Binary files /dev/null and b/metaicl/llama/biomrc/biomrc_16_87_train.jsonl differ diff --git a/metaicl/llama/blimp-anaphor_number_agreement/blimp-anaphor_number_agreement_16384_100_train.jsonl b/metaicl/llama/blimp-anaphor_number_agreement/blimp-anaphor_number_agreement_16384_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..229346481bbf8468dbe8ce6d99a24c554d50dada --- /dev/null +++ b/metaicl/llama/blimp-anaphor_number_agreement/blimp-anaphor_number_agreement_16384_100_train.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:64464a7a8949a26a143c0c69feb9b352a4f43456d812b894979e7d24ab6261e9 +size 119485 diff --git a/metaicl/llama/blimp-anaphor_number_agreement/blimp-anaphor_number_agreement_16_100_test.jsonl b/metaicl/llama/blimp-anaphor_number_agreement/blimp-anaphor_number_agreement_16_100_test.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..78426a9d3754a3b976668186b0831c36decf3387 Binary files /dev/null and b/metaicl/llama/blimp-anaphor_number_agreement/blimp-anaphor_number_agreement_16_100_test.jsonl differ diff --git a/metaicl/llama/blimp-anaphor_number_agreement/blimp-anaphor_number_agreement_16_100_train.jsonl b/metaicl/llama/blimp-anaphor_number_agreement/blimp-anaphor_number_agreement_16_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..89982dd1f55c8e693f96598bab00ed78e53e3587 Binary files /dev/null and b/metaicl/llama/blimp-anaphor_number_agreement/blimp-anaphor_number_agreement_16_100_train.jsonl differ diff --git a/metaicl/llama/blimp-anaphor_number_agreement/blimp-anaphor_number_agreement_16_13_train.jsonl b/metaicl/llama/blimp-anaphor_number_agreement/blimp-anaphor_number_agreement_16_13_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6e77e57d4438288eee72feaedfe35b046710e594 Binary files /dev/null and b/metaicl/llama/blimp-anaphor_number_agreement/blimp-anaphor_number_agreement_16_13_train.jsonl differ diff --git a/metaicl/llama/blimp-anaphor_number_agreement/blimp-anaphor_number_agreement_16_21_train.jsonl b/metaicl/llama/blimp-anaphor_number_agreement/blimp-anaphor_number_agreement_16_21_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ea0eba2ed5ec479a5cceccfba5090bcbb765181a Binary files /dev/null and b/metaicl/llama/blimp-anaphor_number_agreement/blimp-anaphor_number_agreement_16_21_train.jsonl differ diff --git a/metaicl/llama/blimp-anaphor_number_agreement/blimp-anaphor_number_agreement_16_42_train.jsonl b/metaicl/llama/blimp-anaphor_number_agreement/blimp-anaphor_number_agreement_16_42_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c33f0b5e1144ee3fa341b86dd7128d40c88a522d Binary files /dev/null and b/metaicl/llama/blimp-anaphor_number_agreement/blimp-anaphor_number_agreement_16_42_train.jsonl differ diff --git a/metaicl/llama/blimp-anaphor_number_agreement/blimp-anaphor_number_agreement_16_87_train.jsonl b/metaicl/llama/blimp-anaphor_number_agreement/blimp-anaphor_number_agreement_16_87_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..bcee2a4ea001edf9b3e2d322afe7ef68e6b8a1a0 Binary files /dev/null and b/metaicl/llama/blimp-anaphor_number_agreement/blimp-anaphor_number_agreement_16_87_train.jsonl differ diff --git a/metaicl/llama/blimp-ellipsis_n_bar_2/blimp-ellipsis_n_bar_2_16384_100_train.jsonl b/metaicl/llama/blimp-ellipsis_n_bar_2/blimp-ellipsis_n_bar_2_16384_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..477e1108ecaca178f03089eba168e200239c1237 --- /dev/null +++ b/metaicl/llama/blimp-ellipsis_n_bar_2/blimp-ellipsis_n_bar_2_16384_100_train.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:7b7b55c13c8ba6083a2fe81b95d3454f2a27717d744f1131837b00d56177b374 +size 191021 diff --git a/metaicl/llama/blimp-ellipsis_n_bar_2/blimp-ellipsis_n_bar_2_16_100_test.jsonl b/metaicl/llama/blimp-ellipsis_n_bar_2/blimp-ellipsis_n_bar_2_16_100_test.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..16327617500996841fbb5bdb69f398d6a8c28e2c Binary files /dev/null and b/metaicl/llama/blimp-ellipsis_n_bar_2/blimp-ellipsis_n_bar_2_16_100_test.jsonl differ diff --git a/metaicl/llama/blimp-ellipsis_n_bar_2/blimp-ellipsis_n_bar_2_16_100_train.jsonl b/metaicl/llama/blimp-ellipsis_n_bar_2/blimp-ellipsis_n_bar_2_16_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a73ccb27b1350330f9c4d9a841932486ed2aeaac Binary files /dev/null and b/metaicl/llama/blimp-ellipsis_n_bar_2/blimp-ellipsis_n_bar_2_16_100_train.jsonl differ diff --git a/metaicl/llama/blimp-ellipsis_n_bar_2/blimp-ellipsis_n_bar_2_16_13_train.jsonl b/metaicl/llama/blimp-ellipsis_n_bar_2/blimp-ellipsis_n_bar_2_16_13_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..52d1831a3dfe4fbd9cb80462fdf6d7214c016668 Binary files /dev/null and b/metaicl/llama/blimp-ellipsis_n_bar_2/blimp-ellipsis_n_bar_2_16_13_train.jsonl differ diff --git a/metaicl/llama/blimp-ellipsis_n_bar_2/blimp-ellipsis_n_bar_2_16_21_train.jsonl b/metaicl/llama/blimp-ellipsis_n_bar_2/blimp-ellipsis_n_bar_2_16_21_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f0a640c1767341ff14aefec63b15860defd67559 Binary files /dev/null and b/metaicl/llama/blimp-ellipsis_n_bar_2/blimp-ellipsis_n_bar_2_16_21_train.jsonl differ diff --git a/metaicl/llama/blimp-ellipsis_n_bar_2/blimp-ellipsis_n_bar_2_16_42_train.jsonl b/metaicl/llama/blimp-ellipsis_n_bar_2/blimp-ellipsis_n_bar_2_16_42_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..eb38279f156d61f3a0238fc03408d16f5e14895a Binary files /dev/null and b/metaicl/llama/blimp-ellipsis_n_bar_2/blimp-ellipsis_n_bar_2_16_42_train.jsonl differ diff --git a/metaicl/llama/blimp-ellipsis_n_bar_2/blimp-ellipsis_n_bar_2_16_87_train.jsonl b/metaicl/llama/blimp-ellipsis_n_bar_2/blimp-ellipsis_n_bar_2_16_87_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..179bf32735803dddd592e92cee48e1d46e9020d5 Binary files /dev/null and b/metaicl/llama/blimp-ellipsis_n_bar_2/blimp-ellipsis_n_bar_2_16_87_train.jsonl differ diff --git a/metaicl/llama/blimp-sentential_negation_npi_licensor_present/blimp-sentential_negation_npi_licensor_present_16384_100_train.jsonl b/metaicl/llama/blimp-sentential_negation_npi_licensor_present/blimp-sentential_negation_npi_licensor_present_16384_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f981e0c0a789bdf8bf4c35dfd97fba628223755d --- /dev/null +++ b/metaicl/llama/blimp-sentential_negation_npi_licensor_present/blimp-sentential_negation_npi_licensor_present_16384_100_train.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:acd0847f3bbee0aa0094860433c066ce2896ad9ca3721ac2bf06b4f35a1f4b54 +size 133789 diff --git a/metaicl/llama/blimp-sentential_negation_npi_licensor_present/blimp-sentential_negation_npi_licensor_present_16_100_test.jsonl b/metaicl/llama/blimp-sentential_negation_npi_licensor_present/blimp-sentential_negation_npi_licensor_present_16_100_test.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..fab046e5a9fd14c3286141e9f86aa5a4a14f001f Binary files /dev/null and b/metaicl/llama/blimp-sentential_negation_npi_licensor_present/blimp-sentential_negation_npi_licensor_present_16_100_test.jsonl differ diff --git a/metaicl/llama/blimp-sentential_negation_npi_licensor_present/blimp-sentential_negation_npi_licensor_present_16_100_train.jsonl b/metaicl/llama/blimp-sentential_negation_npi_licensor_present/blimp-sentential_negation_npi_licensor_present_16_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..421e0fffafc377826fc2b2824ad8df15bcd3e29e Binary files /dev/null and b/metaicl/llama/blimp-sentential_negation_npi_licensor_present/blimp-sentential_negation_npi_licensor_present_16_100_train.jsonl differ diff --git a/metaicl/llama/blimp-sentential_negation_npi_licensor_present/blimp-sentential_negation_npi_licensor_present_16_13_train.jsonl b/metaicl/llama/blimp-sentential_negation_npi_licensor_present/blimp-sentential_negation_npi_licensor_present_16_13_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..017c9a6a9f9be8c44b3238dc0d982d74486b4899 Binary files /dev/null and b/metaicl/llama/blimp-sentential_negation_npi_licensor_present/blimp-sentential_negation_npi_licensor_present_16_13_train.jsonl differ diff --git a/metaicl/llama/blimp-sentential_negation_npi_licensor_present/blimp-sentential_negation_npi_licensor_present_16_21_train.jsonl b/metaicl/llama/blimp-sentential_negation_npi_licensor_present/blimp-sentential_negation_npi_licensor_present_16_21_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ac35869055b7c18ed6354ea0dc760192ead143aa Binary files /dev/null and b/metaicl/llama/blimp-sentential_negation_npi_licensor_present/blimp-sentential_negation_npi_licensor_present_16_21_train.jsonl differ diff --git a/metaicl/llama/blimp-sentential_negation_npi_licensor_present/blimp-sentential_negation_npi_licensor_present_16_42_train.jsonl b/metaicl/llama/blimp-sentential_negation_npi_licensor_present/blimp-sentential_negation_npi_licensor_present_16_42_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0412c2c7cd40ddac0030d280c0a4ce70685d4788 Binary files /dev/null and b/metaicl/llama/blimp-sentential_negation_npi_licensor_present/blimp-sentential_negation_npi_licensor_present_16_42_train.jsonl differ diff --git a/metaicl/llama/blimp-sentential_negation_npi_licensor_present/blimp-sentential_negation_npi_licensor_present_16_87_train.jsonl b/metaicl/llama/blimp-sentential_negation_npi_licensor_present/blimp-sentential_negation_npi_licensor_present_16_87_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2e5f3dd2f005b5bfd297d9728d578fc712d7a2ea Binary files /dev/null and b/metaicl/llama/blimp-sentential_negation_npi_licensor_present/blimp-sentential_negation_npi_licensor_present_16_87_train.jsonl differ diff --git a/metaicl/llama/blimp-sentential_negation_npi_scope/blimp-sentential_negation_npi_scope_16384_100_train.jsonl b/metaicl/llama/blimp-sentential_negation_npi_scope/blimp-sentential_negation_npi_scope_16384_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9b6ff4a1f9291f5cadf5c01a46ee8cf1e8f5a168 --- /dev/null +++ b/metaicl/llama/blimp-sentential_negation_npi_scope/blimp-sentential_negation_npi_scope_16384_100_train.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:4bd6e4a4b99815ad2593d4e92cda3c3233d79cecf30b20392177f1454633a756 +size 172679 diff --git a/metaicl/llama/blimp-sentential_negation_npi_scope/blimp-sentential_negation_npi_scope_16_100_test.jsonl b/metaicl/llama/blimp-sentential_negation_npi_scope/blimp-sentential_negation_npi_scope_16_100_test.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..028669f00db4154ebe15554332b72d4f4e5be1eb Binary files /dev/null and b/metaicl/llama/blimp-sentential_negation_npi_scope/blimp-sentential_negation_npi_scope_16_100_test.jsonl differ diff --git a/metaicl/llama/blimp-sentential_negation_npi_scope/blimp-sentential_negation_npi_scope_16_100_train.jsonl b/metaicl/llama/blimp-sentential_negation_npi_scope/blimp-sentential_negation_npi_scope_16_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..257aebd99917adc40d8dafb62555f3886c0e24dd Binary files /dev/null and b/metaicl/llama/blimp-sentential_negation_npi_scope/blimp-sentential_negation_npi_scope_16_100_train.jsonl differ diff --git a/metaicl/llama/blimp-sentential_negation_npi_scope/blimp-sentential_negation_npi_scope_16_13_train.jsonl b/metaicl/llama/blimp-sentential_negation_npi_scope/blimp-sentential_negation_npi_scope_16_13_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..fe120da6837aa16d87d8dd3f33cef48106f6f9f3 Binary files /dev/null and b/metaicl/llama/blimp-sentential_negation_npi_scope/blimp-sentential_negation_npi_scope_16_13_train.jsonl differ diff --git a/metaicl/llama/blimp-sentential_negation_npi_scope/blimp-sentential_negation_npi_scope_16_21_train.jsonl b/metaicl/llama/blimp-sentential_negation_npi_scope/blimp-sentential_negation_npi_scope_16_21_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7fc850eda13ef2e1ac286944775dedbf533dfb5c Binary files /dev/null and b/metaicl/llama/blimp-sentential_negation_npi_scope/blimp-sentential_negation_npi_scope_16_21_train.jsonl differ diff --git a/metaicl/llama/blimp-sentential_negation_npi_scope/blimp-sentential_negation_npi_scope_16_42_train.jsonl b/metaicl/llama/blimp-sentential_negation_npi_scope/blimp-sentential_negation_npi_scope_16_42_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..38be1bc4b5e9ecac8c895aaf18395846a1ea793b Binary files /dev/null and b/metaicl/llama/blimp-sentential_negation_npi_scope/blimp-sentential_negation_npi_scope_16_42_train.jsonl differ diff --git a/metaicl/llama/blimp-sentential_negation_npi_scope/blimp-sentential_negation_npi_scope_16_87_train.jsonl b/metaicl/llama/blimp-sentential_negation_npi_scope/blimp-sentential_negation_npi_scope_16_87_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9e5a9b9ea3edce85dc5369a0ff11d982f263e7cc Binary files /dev/null and b/metaicl/llama/blimp-sentential_negation_npi_scope/blimp-sentential_negation_npi_scope_16_87_train.jsonl differ diff --git a/metaicl/llama/boolq/boolq_16384_100_train.jsonl b/metaicl/llama/boolq/boolq_16384_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..26dca86104c2d86893e5f84bc9495a583bccbb5a --- /dev/null +++ b/metaicl/llama/boolq/boolq_16384_100_train.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:80c1f196ec9e25e988f5191a2aca6d5b59c6c686250482a849741f2312b2a5c6 +size 5029771 diff --git a/metaicl/llama/boolq/boolq_16_100_test.jsonl b/metaicl/llama/boolq/boolq_16_100_test.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..669ef386ed680eaf9cb7de412b64513f6ce1a916 --- /dev/null +++ b/metaicl/llama/boolq/boolq_16_100_test.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:224fd79c58d8d338f73439093e2f93b0910a9041bf9f02da22896f4e8b462bee +size 1736259 diff --git a/metaicl/llama/boolq/boolq_16_100_train.jsonl b/metaicl/llama/boolq/boolq_16_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2adfd7d30926573176df86a4a40394c7f60b8bf9 Binary files /dev/null and b/metaicl/llama/boolq/boolq_16_100_train.jsonl differ diff --git a/metaicl/llama/boolq/boolq_16_13_train.jsonl b/metaicl/llama/boolq/boolq_16_13_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9998d2f8e28320fd6141dc984566ed70aeee48b2 Binary files /dev/null and b/metaicl/llama/boolq/boolq_16_13_train.jsonl differ diff --git a/metaicl/llama/boolq/boolq_16_21_train.jsonl b/metaicl/llama/boolq/boolq_16_21_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d2b750432fc281ca1eb82b6fc0c4f4684832b1d7 Binary files /dev/null and b/metaicl/llama/boolq/boolq_16_21_train.jsonl differ diff --git a/metaicl/llama/boolq/boolq_16_42_train.jsonl b/metaicl/llama/boolq/boolq_16_42_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..53f8961fedd5c58f30fce210a2c3f4435a593b9d Binary files /dev/null and b/metaicl/llama/boolq/boolq_16_42_train.jsonl differ diff --git a/metaicl/llama/boolq/boolq_16_87_train.jsonl b/metaicl/llama/boolq/boolq_16_87_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b4f29e9696fb7b763048ba8f5aa919312abd1802 Binary files /dev/null and b/metaicl/llama/boolq/boolq_16_87_train.jsonl differ diff --git a/metaicl/llama/circa/circa_16384_100_train.jsonl b/metaicl/llama/circa/circa_16384_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c3697fe39bb312a29aa9176f3f8b3581891d6997 --- /dev/null +++ b/metaicl/llama/circa/circa_16384_100_train.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:089f7a684cde6c56a7edcd753d883a0ca270f7f164682a5b48687046628c5a47 +size 4291147 diff --git a/metaicl/llama/circa/circa_16_100_test.jsonl b/metaicl/llama/circa/circa_16_100_test.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1cce7aa597f46fe8750f8bd469bcda8c0b09562a --- /dev/null +++ b/metaicl/llama/circa/circa_16_100_test.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:1212452164052503fba98fa59503123eaeb5804deb62f305f0c2242c92fd9fa8 +size 1756163 diff --git a/metaicl/llama/circa/circa_16_100_train.jsonl b/metaicl/llama/circa/circa_16_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..11b122842c4f171ad50af9649da4ccc8c9ab3a7a Binary files /dev/null and b/metaicl/llama/circa/circa_16_100_train.jsonl differ diff --git a/metaicl/llama/circa/circa_16_13_train.jsonl b/metaicl/llama/circa/circa_16_13_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6e3ca7e02275b239fce86b56805e26453a0fd338 Binary files /dev/null and b/metaicl/llama/circa/circa_16_13_train.jsonl differ diff --git a/metaicl/llama/circa/circa_16_21_train.jsonl b/metaicl/llama/circa/circa_16_21_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..37cdb40563a9c9add20a88d90df9c3da87eb1954 Binary files /dev/null and b/metaicl/llama/circa/circa_16_21_train.jsonl differ diff --git a/metaicl/llama/circa/circa_16_42_train.jsonl b/metaicl/llama/circa/circa_16_42_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8020f4e8cf5c44dc5b2c5b1621b08e92d9852539 Binary files /dev/null and b/metaicl/llama/circa/circa_16_42_train.jsonl differ diff --git a/metaicl/llama/circa/circa_16_87_train.jsonl b/metaicl/llama/circa/circa_16_87_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6553d9f665cda2bda13c41e70996a6a3f99215ff Binary files /dev/null and b/metaicl/llama/circa/circa_16_87_train.jsonl differ diff --git a/metaicl/llama/climate_fever/climate_fever_16384_100_train.jsonl b/metaicl/llama/climate_fever/climate_fever_16384_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d791abcb6f7a5958d1591c3c3d2bacdded2fe1d7 --- /dev/null +++ b/metaicl/llama/climate_fever/climate_fever_16384_100_train.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:6747ae4911d059e04ef54c05daac1b5a0069c2eeb7068e73007de537541983ee +size 226907 diff --git a/metaicl/llama/climate_fever/climate_fever_16_100_test.jsonl b/metaicl/llama/climate_fever/climate_fever_16_100_test.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ca7c7e6dce330b89b218f4473b9b06719e2f4dc6 Binary files /dev/null and b/metaicl/llama/climate_fever/climate_fever_16_100_test.jsonl differ diff --git a/metaicl/llama/climate_fever/climate_fever_16_100_train.jsonl b/metaicl/llama/climate_fever/climate_fever_16_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..31f7896fad59a73c869a0507f92305949697bb84 Binary files /dev/null and b/metaicl/llama/climate_fever/climate_fever_16_100_train.jsonl differ diff --git a/metaicl/llama/climate_fever/climate_fever_16_13_train.jsonl b/metaicl/llama/climate_fever/climate_fever_16_13_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4620282cd95cbe501b827a2ff6d26b2104182945 Binary files /dev/null and b/metaicl/llama/climate_fever/climate_fever_16_13_train.jsonl differ diff --git a/metaicl/llama/climate_fever/climate_fever_16_21_train.jsonl b/metaicl/llama/climate_fever/climate_fever_16_21_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d1aed5c7639eb8aea4f415e4a0623d946fee013d Binary files /dev/null and b/metaicl/llama/climate_fever/climate_fever_16_21_train.jsonl differ diff --git a/metaicl/llama/climate_fever/climate_fever_16_42_train.jsonl b/metaicl/llama/climate_fever/climate_fever_16_42_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d8c15bbea5d413f39b5152be95f9ee4e4124fdb9 Binary files /dev/null and b/metaicl/llama/climate_fever/climate_fever_16_42_train.jsonl differ diff --git a/metaicl/llama/climate_fever/climate_fever_16_87_train.jsonl b/metaicl/llama/climate_fever/climate_fever_16_87_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..75df22e02d151aa0dfba358258b100d92eeb1bc5 Binary files /dev/null and b/metaicl/llama/climate_fever/climate_fever_16_87_train.jsonl differ diff --git a/metaicl/llama/codah/codah_16384_100_train.jsonl b/metaicl/llama/codah/codah_16384_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..bfbd02ec672122644d4567e207970b5e8688dd21 --- /dev/null +++ b/metaicl/llama/codah/codah_16384_100_train.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:4b8924304ef66158254b936e15cde7f373e80c76b641a57ad0cfa6fbb308ff2d +size 347275 diff --git a/metaicl/llama/codah/codah_16_100_test.jsonl b/metaicl/llama/codah/codah_16_100_test.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c3ffa025b3abd7efbce7c7bff97a225114f2671f --- /dev/null +++ b/metaicl/llama/codah/codah_16_100_test.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:23c0cfd8c7240ac5a12c9664445d2c10655674acef67630dc330c08eec4b99df +size 115139 diff --git a/metaicl/llama/codah/codah_16_100_train.jsonl b/metaicl/llama/codah/codah_16_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d19d4c3724251d46b64c5f4426831c139fb0b423 Binary files /dev/null and b/metaicl/llama/codah/codah_16_100_train.jsonl differ diff --git a/metaicl/llama/codah/codah_16_13_train.jsonl b/metaicl/llama/codah/codah_16_13_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..91fbb55fa222860b9a7501386d78c21a9715a1a3 Binary files /dev/null and b/metaicl/llama/codah/codah_16_13_train.jsonl differ diff --git a/metaicl/llama/codah/codah_16_21_train.jsonl b/metaicl/llama/codah/codah_16_21_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1d651ef1627b26f715cfc7d4cbc29223820e7cf9 Binary files /dev/null and b/metaicl/llama/codah/codah_16_21_train.jsonl differ diff --git a/metaicl/llama/codah/codah_16_42_train.jsonl b/metaicl/llama/codah/codah_16_42_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..fffc404cf5ab63e01f5b3c673c6113ad3925e00f Binary files /dev/null and b/metaicl/llama/codah/codah_16_42_train.jsonl differ diff --git a/metaicl/llama/codah/codah_16_87_train.jsonl b/metaicl/llama/codah/codah_16_87_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..fdae96fc400aa684177117ff7b80bcbb72ea9bf8 Binary files /dev/null and b/metaicl/llama/codah/codah_16_87_train.jsonl differ diff --git a/metaicl/llama/commonsense_qa/commonsense_qa_16384_100_train.jsonl b/metaicl/llama/commonsense_qa/commonsense_qa_16384_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4ce130053276a83b6c3cb568255872e002c185b0 --- /dev/null +++ b/metaicl/llama/commonsense_qa/commonsense_qa_16384_100_train.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:b441cfcca3b0492c5616b844d049381f7d53a084a55ffb65a2cc7b53873a96e6 +size 1487901 diff --git a/metaicl/llama/commonsense_qa/commonsense_qa_16_100_test.jsonl b/metaicl/llama/commonsense_qa/commonsense_qa_16_100_test.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0badb1bdc5f9aa268cef08f7168abca1848ed430 --- /dev/null +++ b/metaicl/llama/commonsense_qa/commonsense_qa_16_100_test.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:f6ed252c703a74d939d57c9ed1c293311b3e6e86ae38094ef8edd6cda1fb1abf +size 185429 diff --git a/metaicl/llama/commonsense_qa/commonsense_qa_16_100_train.jsonl b/metaicl/llama/commonsense_qa/commonsense_qa_16_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b03d8b9f105d654899fa84860ebfe756fc96f14b Binary files /dev/null and b/metaicl/llama/commonsense_qa/commonsense_qa_16_100_train.jsonl differ diff --git a/metaicl/llama/commonsense_qa/commonsense_qa_16_13_train.jsonl b/metaicl/llama/commonsense_qa/commonsense_qa_16_13_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6f0a8f0c4eb27cdc4761907d9faded1bcc6a86a0 Binary files /dev/null and b/metaicl/llama/commonsense_qa/commonsense_qa_16_13_train.jsonl differ diff --git a/metaicl/llama/commonsense_qa/commonsense_qa_16_21_train.jsonl b/metaicl/llama/commonsense_qa/commonsense_qa_16_21_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d55f864818c8482a0659cec598b7cd66bb080c41 Binary files /dev/null and b/metaicl/llama/commonsense_qa/commonsense_qa_16_21_train.jsonl differ diff --git a/metaicl/llama/commonsense_qa/commonsense_qa_16_42_train.jsonl b/metaicl/llama/commonsense_qa/commonsense_qa_16_42_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1a37d80d5176cc838d400518fcc1b5dca58b5655 Binary files /dev/null and b/metaicl/llama/commonsense_qa/commonsense_qa_16_42_train.jsonl differ diff --git a/metaicl/llama/commonsense_qa/commonsense_qa_16_87_train.jsonl b/metaicl/llama/commonsense_qa/commonsense_qa_16_87_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ba65e7eab746488f3faa3bf2c4fad9985ad85ae9 Binary files /dev/null and b/metaicl/llama/commonsense_qa/commonsense_qa_16_87_train.jsonl differ diff --git a/metaicl/llama/cosmos_qa/cosmos_qa_16384_100_train.jsonl b/metaicl/llama/cosmos_qa/cosmos_qa_16384_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f284391aa663edb24facba914b4fe09a73a5a31f --- /dev/null +++ b/metaicl/llama/cosmos_qa/cosmos_qa_16384_100_train.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:622d76e4c190451423fdcab56f9d97606875b30ae7e6db9cc561ba4219fc84a0 +size 8040595 diff --git a/metaicl/llama/cosmos_qa/cosmos_qa_16_100_test.jsonl b/metaicl/llama/cosmos_qa/cosmos_qa_16_100_test.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d43fd54cca65838a9b3144fd416529806dd69d7b --- /dev/null +++ b/metaicl/llama/cosmos_qa/cosmos_qa_16_100_test.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:a67e5af55a8d1f15ea787099cefe94240ab4d89f367ed041c53ac35837bccf7e +size 1588619 diff --git a/metaicl/llama/cosmos_qa/cosmos_qa_16_100_train.jsonl b/metaicl/llama/cosmos_qa/cosmos_qa_16_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7b50c18f02ec70263a0412311558b35ebcc108d0 Binary files /dev/null and b/metaicl/llama/cosmos_qa/cosmos_qa_16_100_train.jsonl differ diff --git a/metaicl/llama/cosmos_qa/cosmos_qa_16_13_train.jsonl b/metaicl/llama/cosmos_qa/cosmos_qa_16_13_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..67f171f27b0b27c3d8dc138a67c35bc615d3dfcb Binary files /dev/null and b/metaicl/llama/cosmos_qa/cosmos_qa_16_13_train.jsonl differ diff --git a/metaicl/llama/cosmos_qa/cosmos_qa_16_21_train.jsonl b/metaicl/llama/cosmos_qa/cosmos_qa_16_21_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..bfe12d3705c2c3447b518e39b53e422a9e0e882b Binary files /dev/null and b/metaicl/llama/cosmos_qa/cosmos_qa_16_21_train.jsonl differ diff --git a/metaicl/llama/cosmos_qa/cosmos_qa_16_42_train.jsonl b/metaicl/llama/cosmos_qa/cosmos_qa_16_42_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5a92d9f5f49849414378dc6f15d7041d66c97682 Binary files /dev/null and b/metaicl/llama/cosmos_qa/cosmos_qa_16_42_train.jsonl differ diff --git a/metaicl/llama/cosmos_qa/cosmos_qa_16_87_train.jsonl b/metaicl/llama/cosmos_qa/cosmos_qa_16_87_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7944557e9eeec42997573d0aaf63e1d9f6b68e2b Binary files /dev/null and b/metaicl/llama/cosmos_qa/cosmos_qa_16_87_train.jsonl differ diff --git a/metaicl/llama/crows_pairs/crows_pairs_16384_100_train.jsonl b/metaicl/llama/crows_pairs/crows_pairs_16384_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c2f0c22566c193f0ef7cbc4b15981889fdc47abc --- /dev/null +++ b/metaicl/llama/crows_pairs/crows_pairs_16384_100_train.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:68659326d4033e2723839df4b77b74b8c5506c2f5abc8920971dcd0c94ff712b +size 251927 diff --git a/metaicl/llama/crows_pairs/crows_pairs_16_100_test.jsonl b/metaicl/llama/crows_pairs/crows_pairs_16_100_test.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d89dc1f9fb2164b4e0599ef805dc16fb99a188f3 Binary files /dev/null and b/metaicl/llama/crows_pairs/crows_pairs_16_100_test.jsonl differ diff --git a/metaicl/llama/crows_pairs/crows_pairs_16_100_train.jsonl b/metaicl/llama/crows_pairs/crows_pairs_16_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9334958996e94a26214356416db9f6ceaf4134bf Binary files /dev/null and b/metaicl/llama/crows_pairs/crows_pairs_16_100_train.jsonl differ diff --git a/metaicl/llama/crows_pairs/crows_pairs_16_13_train.jsonl b/metaicl/llama/crows_pairs/crows_pairs_16_13_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..81cee2b7060d9dd6e7ff9d97c4f12a2c0218344a Binary files /dev/null and b/metaicl/llama/crows_pairs/crows_pairs_16_13_train.jsonl differ diff --git a/metaicl/llama/crows_pairs/crows_pairs_16_21_train.jsonl b/metaicl/llama/crows_pairs/crows_pairs_16_21_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..287a17b5a04f9591382b9047a2d2a230352e2a1f Binary files /dev/null and b/metaicl/llama/crows_pairs/crows_pairs_16_21_train.jsonl differ diff --git a/metaicl/llama/crows_pairs/crows_pairs_16_42_train.jsonl b/metaicl/llama/crows_pairs/crows_pairs_16_42_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d424026d8ea1d0242157adc661e95627559276bd Binary files /dev/null and b/metaicl/llama/crows_pairs/crows_pairs_16_42_train.jsonl differ diff --git a/metaicl/llama/crows_pairs/crows_pairs_16_87_train.jsonl b/metaicl/llama/crows_pairs/crows_pairs_16_87_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e4da642de7a0c770591ef03f0371fc91408c45a7 Binary files /dev/null and b/metaicl/llama/crows_pairs/crows_pairs_16_87_train.jsonl differ diff --git a/metaicl/llama/dbpedia_14/dbpedia_14_16384_100_train.jsonl b/metaicl/llama/dbpedia_14/dbpedia_14_16384_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..fe3ec7eed849245d826402672828b337af33cd7c --- /dev/null +++ b/metaicl/llama/dbpedia_14/dbpedia_14_16384_100_train.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:a8fd030c7b89fbb8d68be0caef620134017eca1d73d00ae827d5e8664d04bc45 +size 7331093 diff --git a/metaicl/llama/dbpedia_14/dbpedia_14_16_100_test.jsonl b/metaicl/llama/dbpedia_14/dbpedia_14_16_100_test.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ffc0daa7053cb6ef041e617fbbaf96422295de29 --- /dev/null +++ b/metaicl/llama/dbpedia_14/dbpedia_14_16_100_test.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:6ebbb86746643ca49adac31f4ff677ae5f2e11c7a8a1393e3eadbbf7718eb66b +size 1575693 diff --git a/metaicl/llama/dbpedia_14/dbpedia_14_16_100_train.jsonl b/metaicl/llama/dbpedia_14/dbpedia_14_16_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..205552e88b1c93b504ddd30d29c846086ab5335b Binary files /dev/null and b/metaicl/llama/dbpedia_14/dbpedia_14_16_100_train.jsonl differ diff --git a/metaicl/llama/dbpedia_14/dbpedia_14_16_13_train.jsonl b/metaicl/llama/dbpedia_14/dbpedia_14_16_13_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7e08d0e39179f704d15d1dcd726e7254fff00143 Binary files /dev/null and b/metaicl/llama/dbpedia_14/dbpedia_14_16_13_train.jsonl differ diff --git a/metaicl/llama/dbpedia_14/dbpedia_14_16_21_train.jsonl b/metaicl/llama/dbpedia_14/dbpedia_14_16_21_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4c7d3bbfe6dae55078e70232a9790ed3851de526 Binary files /dev/null and b/metaicl/llama/dbpedia_14/dbpedia_14_16_21_train.jsonl differ diff --git a/metaicl/llama/dbpedia_14/dbpedia_14_16_42_train.jsonl b/metaicl/llama/dbpedia_14/dbpedia_14_16_42_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..01769bbe5be378808d51e121f9c42d46866d6000 Binary files /dev/null and b/metaicl/llama/dbpedia_14/dbpedia_14_16_42_train.jsonl differ diff --git a/metaicl/llama/dbpedia_14/dbpedia_14_16_87_train.jsonl b/metaicl/llama/dbpedia_14/dbpedia_14_16_87_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0b85dd8254657d94f3b68b9947626a224465ab30 Binary files /dev/null and b/metaicl/llama/dbpedia_14/dbpedia_14_16_87_train.jsonl differ diff --git a/metaicl/llama/discovery/discovery_16384_100_train.jsonl b/metaicl/llama/discovery/discovery_16384_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1200108993c6dc138b34d25295954b7644b4b21c --- /dev/null +++ b/metaicl/llama/discovery/discovery_16384_100_train.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:e95639241a019b5294316ab22419df123d28a2af9c3e39ab0a50e0b0cd9d9800 +size 49131155 diff --git a/metaicl/llama/discovery/discovery_16_100_test.jsonl b/metaicl/llama/discovery/discovery_16_100_test.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..77b4bac51c667843a12888981904356ad08286ed --- /dev/null +++ b/metaicl/llama/discovery/discovery_16_100_test.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:1ee1039b99915d28eabd4857d91770bd1e8fdf5558f2d4e2eced2295e434fd46 +size 26088331 diff --git a/metaicl/llama/discovery/discovery_16_100_train.jsonl b/metaicl/llama/discovery/discovery_16_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..afb0bf94fcc114e5a51112cef71ee15415a9482e Binary files /dev/null and b/metaicl/llama/discovery/discovery_16_100_train.jsonl differ diff --git a/metaicl/llama/discovery/discovery_16_13_train.jsonl b/metaicl/llama/discovery/discovery_16_13_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9c418cd680b8895d0db1c224ae63f49f2840993a Binary files /dev/null and b/metaicl/llama/discovery/discovery_16_13_train.jsonl differ diff --git a/metaicl/llama/discovery/discovery_16_21_train.jsonl b/metaicl/llama/discovery/discovery_16_21_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..10b5ae05b06e32833d0a0c0910a16168954d2ff0 Binary files /dev/null and b/metaicl/llama/discovery/discovery_16_21_train.jsonl differ diff --git a/metaicl/llama/discovery/discovery_16_42_train.jsonl b/metaicl/llama/discovery/discovery_16_42_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7d466ef3e4f798b5ec7f8a9b98ca5830fe0b37e1 Binary files /dev/null and b/metaicl/llama/discovery/discovery_16_42_train.jsonl differ diff --git a/metaicl/llama/discovery/discovery_16_87_train.jsonl b/metaicl/llama/discovery/discovery_16_87_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e865d9005605fbee6c57b263d39de86013b11adf Binary files /dev/null and b/metaicl/llama/discovery/discovery_16_87_train.jsonl differ diff --git a/metaicl/llama/dream/dream_16384_100_train.jsonl b/metaicl/llama/dream/dream_16384_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..fa447a9af1d963fb994ffe859cf9121a106ffe72 --- /dev/null +++ b/metaicl/llama/dream/dream_16384_100_train.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:828b3a7d84b3c7f8ffa02abd464fa231dd507f521d6956e72c38027f848022fd +size 4137035 diff --git a/metaicl/llama/dream/dream_16_100_test.jsonl b/metaicl/llama/dream/dream_16_100_test.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5afa4bc4c38e257dac871128534955138532e995 --- /dev/null +++ b/metaicl/llama/dream/dream_16_100_test.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:f841db42e972a7fa167a5f3eae982d5ccb55a4eda4b6f312c00db2b8cf9778e0 +size 1336323 diff --git a/metaicl/llama/dream/dream_16_100_train.jsonl b/metaicl/llama/dream/dream_16_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4a98ad2aac942bffbcde8ee57cd0dcb142aa968a Binary files /dev/null and b/metaicl/llama/dream/dream_16_100_train.jsonl differ diff --git a/metaicl/llama/dream/dream_16_13_train.jsonl b/metaicl/llama/dream/dream_16_13_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..cfa57359884d69df8ab16fe517ef50b765d797de Binary files /dev/null and b/metaicl/llama/dream/dream_16_13_train.jsonl differ diff --git a/metaicl/llama/dream/dream_16_21_train.jsonl b/metaicl/llama/dream/dream_16_21_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..769a7914e46433f175c6e3cd8763c49e6b0c6e68 Binary files /dev/null and b/metaicl/llama/dream/dream_16_21_train.jsonl differ diff --git a/metaicl/llama/dream/dream_16_42_train.jsonl b/metaicl/llama/dream/dream_16_42_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c1b42eb9077adeacfc36f96b9b6649eddffa3419 Binary files /dev/null and b/metaicl/llama/dream/dream_16_42_train.jsonl differ diff --git a/metaicl/llama/dream/dream_16_87_train.jsonl b/metaicl/llama/dream/dream_16_87_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..60068c3784d80e352fb0addbe4e9b1b1672d70c0 Binary files /dev/null and b/metaicl/llama/dream/dream_16_87_train.jsonl differ diff --git a/metaicl/llama/emo/emo_16384_100_train.jsonl b/metaicl/llama/emo/emo_16384_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..486d786b15a6116300f93788e6ebf32e50d44682 --- /dev/null +++ b/metaicl/llama/emo/emo_16384_100_train.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:f3a8cac96b3af998ae9115260ebf8cc9ff364f5cb075cbd6f1b96f29dcae5ea8 +size 2028871 diff --git a/metaicl/llama/emo/emo_16_100_test.jsonl b/metaicl/llama/emo/emo_16_100_test.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4e5ef183538263d44ed21462570e383a89bd2ae3 --- /dev/null +++ b/metaicl/llama/emo/emo_16_100_test.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:5cdc192adbb694a30e1459a8c4e4f7a600dbe5cf2e420276ad6c2cb0b9f75755 +size 655871 diff --git a/metaicl/llama/emo/emo_16_100_train.jsonl b/metaicl/llama/emo/emo_16_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7d477c3c4df6406d59a1bce1d627dfb2a386b2a3 Binary files /dev/null and b/metaicl/llama/emo/emo_16_100_train.jsonl differ diff --git a/metaicl/llama/emo/emo_16_13_train.jsonl b/metaicl/llama/emo/emo_16_13_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c1da47a3cd55ccb65ba865588db15199b357c0f7 Binary files /dev/null and b/metaicl/llama/emo/emo_16_13_train.jsonl differ diff --git a/metaicl/llama/emo/emo_16_21_train.jsonl b/metaicl/llama/emo/emo_16_21_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9bce9b67c066936c0aa0976598346dea398071be Binary files /dev/null and b/metaicl/llama/emo/emo_16_21_train.jsonl differ diff --git a/metaicl/llama/emo/emo_16_42_train.jsonl b/metaicl/llama/emo/emo_16_42_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5660fd6c818c40db2d3fbee6fb3a53621dd4c7fe Binary files /dev/null and b/metaicl/llama/emo/emo_16_42_train.jsonl differ diff --git a/metaicl/llama/emo/emo_16_87_train.jsonl b/metaicl/llama/emo/emo_16_87_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..807b7fd3b4aec6fe154cebb553f73c500bea3d85 Binary files /dev/null and b/metaicl/llama/emo/emo_16_87_train.jsonl differ diff --git a/metaicl/llama/emotion/emotion_16384_100_train.jsonl b/metaicl/llama/emotion/emotion_16384_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8d993d0bd9a45e8dd747e5e265b39fb18c63e731 --- /dev/null +++ b/metaicl/llama/emotion/emotion_16384_100_train.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:4c83fd0177770ffd263689141f0acf1b1eb06e6780b944dec61eb969091958dc +size 2550671 diff --git a/metaicl/llama/emotion/emotion_16_100_test.jsonl b/metaicl/llama/emotion/emotion_16_100_test.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6da5b4bc450666337baec4a30d196c16a5e8d67d --- /dev/null +++ b/metaicl/llama/emotion/emotion_16_100_test.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:94e5f746d091ad20e013752b3aa4875cba64913f9471f32f55b6a569421a2288 +size 316551 diff --git a/metaicl/llama/emotion/emotion_16_100_train.jsonl b/metaicl/llama/emotion/emotion_16_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..70783511df3d26f72ffe1767fd0c6fea258af4a6 Binary files /dev/null and b/metaicl/llama/emotion/emotion_16_100_train.jsonl differ diff --git a/metaicl/llama/emotion/emotion_16_13_train.jsonl b/metaicl/llama/emotion/emotion_16_13_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..682d22a5deb27cbd5be1093a33d33fb1b9bc41f5 Binary files /dev/null and b/metaicl/llama/emotion/emotion_16_13_train.jsonl differ diff --git a/metaicl/llama/emotion/emotion_16_21_train.jsonl b/metaicl/llama/emotion/emotion_16_21_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..17026781aabb25b678ba04347902b0a822494b3b Binary files /dev/null and b/metaicl/llama/emotion/emotion_16_21_train.jsonl differ diff --git a/metaicl/llama/emotion/emotion_16_42_train.jsonl b/metaicl/llama/emotion/emotion_16_42_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..aa4081743b546e83ea9e2d24e937117632df19fc Binary files /dev/null and b/metaicl/llama/emotion/emotion_16_42_train.jsonl differ diff --git a/metaicl/llama/emotion/emotion_16_87_train.jsonl b/metaicl/llama/emotion/emotion_16_87_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a42c43e0416f292cda1eab8013f22680fa962f18 Binary files /dev/null and b/metaicl/llama/emotion/emotion_16_87_train.jsonl differ diff --git a/metaicl/llama/ethos-directed_vs_generalized/ethos-directed_vs_generalized_16384_100_train.jsonl b/metaicl/llama/ethos-directed_vs_generalized/ethos-directed_vs_generalized_16384_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..97f221411d559ee313796fffa8e8e646d3dfa4c7 Binary files /dev/null and b/metaicl/llama/ethos-directed_vs_generalized/ethos-directed_vs_generalized_16384_100_train.jsonl differ diff --git a/metaicl/llama/ethos-directed_vs_generalized/ethos-directed_vs_generalized_16_100_test.jsonl b/metaicl/llama/ethos-directed_vs_generalized/ethos-directed_vs_generalized_16_100_test.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d8a35e2e53ed2215e9fba546adc41b3aa587ed0f Binary files /dev/null and b/metaicl/llama/ethos-directed_vs_generalized/ethos-directed_vs_generalized_16_100_test.jsonl differ diff --git a/metaicl/llama/ethos-directed_vs_generalized/ethos-directed_vs_generalized_16_100_train.jsonl b/metaicl/llama/ethos-directed_vs_generalized/ethos-directed_vs_generalized_16_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9119b2af788a7e12c1d9b434f3098d06fb1cec22 Binary files /dev/null and b/metaicl/llama/ethos-directed_vs_generalized/ethos-directed_vs_generalized_16_100_train.jsonl differ diff --git a/metaicl/llama/ethos-directed_vs_generalized/ethos-directed_vs_generalized_16_13_train.jsonl b/metaicl/llama/ethos-directed_vs_generalized/ethos-directed_vs_generalized_16_13_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..df1849df68023d482b30decf86e9209fb90fc397 Binary files /dev/null and b/metaicl/llama/ethos-directed_vs_generalized/ethos-directed_vs_generalized_16_13_train.jsonl differ diff --git a/metaicl/llama/ethos-directed_vs_generalized/ethos-directed_vs_generalized_16_21_train.jsonl b/metaicl/llama/ethos-directed_vs_generalized/ethos-directed_vs_generalized_16_21_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d79c180fac970e1e3102bf9ab82d719fadd63420 Binary files /dev/null and b/metaicl/llama/ethos-directed_vs_generalized/ethos-directed_vs_generalized_16_21_train.jsonl differ diff --git a/metaicl/llama/ethos-directed_vs_generalized/ethos-directed_vs_generalized_16_42_train.jsonl b/metaicl/llama/ethos-directed_vs_generalized/ethos-directed_vs_generalized_16_42_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..cca278a8c3678fa4fcb5e66af51749591551ab7a Binary files /dev/null and b/metaicl/llama/ethos-directed_vs_generalized/ethos-directed_vs_generalized_16_42_train.jsonl differ diff --git a/metaicl/llama/ethos-directed_vs_generalized/ethos-directed_vs_generalized_16_87_train.jsonl b/metaicl/llama/ethos-directed_vs_generalized/ethos-directed_vs_generalized_16_87_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6a0adee5f6013f6fca32984f06e13f3950017b21 Binary files /dev/null and b/metaicl/llama/ethos-directed_vs_generalized/ethos-directed_vs_generalized_16_87_train.jsonl differ diff --git a/metaicl/llama/ethos-disability/ethos-disability_16384_100_train.jsonl b/metaicl/llama/ethos-disability/ethos-disability_16384_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c882b3968e401f6e36bb14770436a9b4e691b586 Binary files /dev/null and b/metaicl/llama/ethos-disability/ethos-disability_16384_100_train.jsonl differ diff --git a/metaicl/llama/ethos-disability/ethos-disability_16_100_test.jsonl b/metaicl/llama/ethos-disability/ethos-disability_16_100_test.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..31067798b7d69b1c7e91531425d165a4bd0312a6 Binary files /dev/null and b/metaicl/llama/ethos-disability/ethos-disability_16_100_test.jsonl differ diff --git a/metaicl/llama/ethos-disability/ethos-disability_16_100_train.jsonl b/metaicl/llama/ethos-disability/ethos-disability_16_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9909efab5ae7d5e57b189d4c016dc93c6d1d277e Binary files /dev/null and b/metaicl/llama/ethos-disability/ethos-disability_16_100_train.jsonl differ diff --git a/metaicl/llama/ethos-disability/ethos-disability_16_13_train.jsonl b/metaicl/llama/ethos-disability/ethos-disability_16_13_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7fe8084f7d52c24c98d83440482df044b63eb6fc Binary files /dev/null and b/metaicl/llama/ethos-disability/ethos-disability_16_13_train.jsonl differ diff --git a/metaicl/llama/ethos-disability/ethos-disability_16_21_train.jsonl b/metaicl/llama/ethos-disability/ethos-disability_16_21_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9323315b6186774cc3b922f1eb3efd5ec0ee1220 Binary files /dev/null and b/metaicl/llama/ethos-disability/ethos-disability_16_21_train.jsonl differ diff --git a/metaicl/llama/ethos-disability/ethos-disability_16_42_train.jsonl b/metaicl/llama/ethos-disability/ethos-disability_16_42_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a67d198ec9be9e91209f7debb80f08dfdf7e2910 Binary files /dev/null and b/metaicl/llama/ethos-disability/ethos-disability_16_42_train.jsonl differ diff --git a/metaicl/llama/ethos-disability/ethos-disability_16_87_train.jsonl b/metaicl/llama/ethos-disability/ethos-disability_16_87_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..814ee7cc5f6788521cfc930c4aa17bc0347ac5de Binary files /dev/null and b/metaicl/llama/ethos-disability/ethos-disability_16_87_train.jsonl differ diff --git a/metaicl/llama/ethos-gender/ethos-gender_16384_100_train.jsonl b/metaicl/llama/ethos-gender/ethos-gender_16384_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9a247920686fcb50cfd304ac7ac19ba77b162fde Binary files /dev/null and b/metaicl/llama/ethos-gender/ethos-gender_16384_100_train.jsonl differ diff --git a/metaicl/llama/ethos-gender/ethos-gender_16_100_test.jsonl b/metaicl/llama/ethos-gender/ethos-gender_16_100_test.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b69d70369d16b70086475ba12bf43bb4b5ed1243 Binary files /dev/null and b/metaicl/llama/ethos-gender/ethos-gender_16_100_test.jsonl differ diff --git a/metaicl/llama/ethos-gender/ethos-gender_16_100_train.jsonl b/metaicl/llama/ethos-gender/ethos-gender_16_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d687bb4c84287ba87d9d2813662307e4a7498284 Binary files /dev/null and b/metaicl/llama/ethos-gender/ethos-gender_16_100_train.jsonl differ diff --git a/metaicl/llama/ethos-gender/ethos-gender_16_13_train.jsonl b/metaicl/llama/ethos-gender/ethos-gender_16_13_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3fd7798fc4e925e3d85f849e4ff6480e9a51e826 Binary files /dev/null and b/metaicl/llama/ethos-gender/ethos-gender_16_13_train.jsonl differ diff --git a/metaicl/llama/ethos-gender/ethos-gender_16_21_train.jsonl b/metaicl/llama/ethos-gender/ethos-gender_16_21_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..cfb30cde743cfa0f14de9eb1e1f98421155ca862 Binary files /dev/null and b/metaicl/llama/ethos-gender/ethos-gender_16_21_train.jsonl differ diff --git a/metaicl/llama/ethos-gender/ethos-gender_16_42_train.jsonl b/metaicl/llama/ethos-gender/ethos-gender_16_42_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f1bfd6d0a35fe06a43d679f8aa5cd8e0d6619cb3 Binary files /dev/null and b/metaicl/llama/ethos-gender/ethos-gender_16_42_train.jsonl differ diff --git a/metaicl/llama/ethos-gender/ethos-gender_16_87_train.jsonl b/metaicl/llama/ethos-gender/ethos-gender_16_87_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..849613d123bf0c9c8f6434cec70395df16486b14 Binary files /dev/null and b/metaicl/llama/ethos-gender/ethos-gender_16_87_train.jsonl differ diff --git a/metaicl/llama/ethos-national_origin/ethos-national_origin_16384_100_train.jsonl b/metaicl/llama/ethos-national_origin/ethos-national_origin_16384_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..36b30318494ff5e9e90d9027b8253e214e4f4260 Binary files /dev/null and b/metaicl/llama/ethos-national_origin/ethos-national_origin_16384_100_train.jsonl differ diff --git a/metaicl/llama/ethos-national_origin/ethos-national_origin_16_100_test.jsonl b/metaicl/llama/ethos-national_origin/ethos-national_origin_16_100_test.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0be41a989598879d9fbedd70d2549e362e603be3 Binary files /dev/null and b/metaicl/llama/ethos-national_origin/ethos-national_origin_16_100_test.jsonl differ diff --git a/metaicl/llama/ethos-national_origin/ethos-national_origin_16_100_train.jsonl b/metaicl/llama/ethos-national_origin/ethos-national_origin_16_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1c447cee94cff4aa865438f1b3c6e0073b53a06a Binary files /dev/null and b/metaicl/llama/ethos-national_origin/ethos-national_origin_16_100_train.jsonl differ diff --git a/metaicl/llama/ethos-national_origin/ethos-national_origin_16_13_train.jsonl b/metaicl/llama/ethos-national_origin/ethos-national_origin_16_13_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6916ffa6228893d645f28ef6969d9d58c089293b Binary files /dev/null and b/metaicl/llama/ethos-national_origin/ethos-national_origin_16_13_train.jsonl differ diff --git a/metaicl/llama/ethos-national_origin/ethos-national_origin_16_21_train.jsonl b/metaicl/llama/ethos-national_origin/ethos-national_origin_16_21_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..cf26fe604e4494a33fde1725459e2e37e6740b44 Binary files /dev/null and b/metaicl/llama/ethos-national_origin/ethos-national_origin_16_21_train.jsonl differ diff --git a/metaicl/llama/ethos-national_origin/ethos-national_origin_16_42_train.jsonl b/metaicl/llama/ethos-national_origin/ethos-national_origin_16_42_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d052064608812fd856d9b989378901d00a6990eb Binary files /dev/null and b/metaicl/llama/ethos-national_origin/ethos-national_origin_16_42_train.jsonl differ diff --git a/metaicl/llama/ethos-national_origin/ethos-national_origin_16_87_train.jsonl b/metaicl/llama/ethos-national_origin/ethos-national_origin_16_87_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e9020a9f9065eb646d951dea3cdd4e8ba72ad354 Binary files /dev/null and b/metaicl/llama/ethos-national_origin/ethos-national_origin_16_87_train.jsonl differ diff --git a/metaicl/llama/ethos-race/ethos-race_16384_100_train.jsonl b/metaicl/llama/ethos-race/ethos-race_16384_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..876b8d694bf6822584e56b9fe90e90cbb2edfe9e Binary files /dev/null and b/metaicl/llama/ethos-race/ethos-race_16384_100_train.jsonl differ diff --git a/metaicl/llama/ethos-race/ethos-race_16_100_test.jsonl b/metaicl/llama/ethos-race/ethos-race_16_100_test.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..77475232c4fde32aca12905ddf1a0ece4dadcbb6 Binary files /dev/null and b/metaicl/llama/ethos-race/ethos-race_16_100_test.jsonl differ diff --git a/metaicl/llama/ethos-race/ethos-race_16_100_train.jsonl b/metaicl/llama/ethos-race/ethos-race_16_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f6c172dffd68544a4aefbae7ac8cf54a3ee6c56f Binary files /dev/null and b/metaicl/llama/ethos-race/ethos-race_16_100_train.jsonl differ diff --git a/metaicl/llama/ethos-race/ethos-race_16_13_train.jsonl b/metaicl/llama/ethos-race/ethos-race_16_13_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f4b36bfbc35492a60134d1769bff0c7bfead2a5f Binary files /dev/null and b/metaicl/llama/ethos-race/ethos-race_16_13_train.jsonl differ diff --git a/metaicl/llama/ethos-race/ethos-race_16_21_train.jsonl b/metaicl/llama/ethos-race/ethos-race_16_21_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..261d33db1eaeda7addc955705b2648e73fd4a3f7 Binary files /dev/null and b/metaicl/llama/ethos-race/ethos-race_16_21_train.jsonl differ diff --git a/metaicl/llama/ethos-race/ethos-race_16_42_train.jsonl b/metaicl/llama/ethos-race/ethos-race_16_42_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c8eff62f26feab4ecffa3c5b3585a5b27615534a Binary files /dev/null and b/metaicl/llama/ethos-race/ethos-race_16_42_train.jsonl differ diff --git a/metaicl/llama/ethos-race/ethos-race_16_87_train.jsonl b/metaicl/llama/ethos-race/ethos-race_16_87_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ece98f13f5c9cd1b9c58cdcbfc728026bcc4b5cf Binary files /dev/null and b/metaicl/llama/ethos-race/ethos-race_16_87_train.jsonl differ diff --git a/metaicl/llama/ethos-religion/ethos-religion_16384_100_train.jsonl b/metaicl/llama/ethos-religion/ethos-religion_16384_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..bfef7d170b4c9e81b8cf049cd172c696f84c1ee9 Binary files /dev/null and b/metaicl/llama/ethos-religion/ethos-religion_16384_100_train.jsonl differ diff --git a/metaicl/llama/ethos-religion/ethos-religion_16_100_test.jsonl b/metaicl/llama/ethos-religion/ethos-religion_16_100_test.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..bc4a44647919f95c480dfbf033814d201327d3a0 Binary files /dev/null and b/metaicl/llama/ethos-religion/ethos-religion_16_100_test.jsonl differ diff --git a/metaicl/llama/ethos-religion/ethos-religion_16_100_train.jsonl b/metaicl/llama/ethos-religion/ethos-religion_16_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8037c9c43819f7a0a422749dc9ab4c2805e48df3 Binary files /dev/null and b/metaicl/llama/ethos-religion/ethos-religion_16_100_train.jsonl differ diff --git a/metaicl/llama/ethos-religion/ethos-religion_16_13_train.jsonl b/metaicl/llama/ethos-religion/ethos-religion_16_13_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a8f904c8094c2957556d88ccabb340c191938190 Binary files /dev/null and b/metaicl/llama/ethos-religion/ethos-religion_16_13_train.jsonl differ diff --git a/metaicl/llama/ethos-religion/ethos-religion_16_21_train.jsonl b/metaicl/llama/ethos-religion/ethos-religion_16_21_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ace259239dfb1dc247ad523b4888a44e2c0ee69b Binary files /dev/null and b/metaicl/llama/ethos-religion/ethos-religion_16_21_train.jsonl differ diff --git a/metaicl/llama/ethos-religion/ethos-religion_16_42_train.jsonl b/metaicl/llama/ethos-religion/ethos-religion_16_42_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..82febafab83977944bca21b6c0cb19c6d5e98dec Binary files /dev/null and b/metaicl/llama/ethos-religion/ethos-religion_16_42_train.jsonl differ diff --git a/metaicl/llama/ethos-religion/ethos-religion_16_87_train.jsonl b/metaicl/llama/ethos-religion/ethos-religion_16_87_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..38f1724bcf83db609a186b9cd1ec58a99c39ddc6 Binary files /dev/null and b/metaicl/llama/ethos-religion/ethos-religion_16_87_train.jsonl differ diff --git a/metaicl/llama/ethos-sexual_orientation/ethos-sexual_orientation_16384_100_train.jsonl b/metaicl/llama/ethos-sexual_orientation/ethos-sexual_orientation_16384_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b6ccf396a38f01f1c34573f8deddd1c45fbae013 Binary files /dev/null and b/metaicl/llama/ethos-sexual_orientation/ethos-sexual_orientation_16384_100_train.jsonl differ diff --git a/metaicl/llama/ethos-sexual_orientation/ethos-sexual_orientation_16_100_test.jsonl b/metaicl/llama/ethos-sexual_orientation/ethos-sexual_orientation_16_100_test.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e4d2a259dc21b9914f733d5ee901b73a78135cc4 Binary files /dev/null and b/metaicl/llama/ethos-sexual_orientation/ethos-sexual_orientation_16_100_test.jsonl differ diff --git a/metaicl/llama/ethos-sexual_orientation/ethos-sexual_orientation_16_100_train.jsonl b/metaicl/llama/ethos-sexual_orientation/ethos-sexual_orientation_16_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7d506957669237f7e2738da8433b5ca02f64ec10 Binary files /dev/null and b/metaicl/llama/ethos-sexual_orientation/ethos-sexual_orientation_16_100_train.jsonl differ diff --git a/metaicl/llama/ethos-sexual_orientation/ethos-sexual_orientation_16_13_train.jsonl b/metaicl/llama/ethos-sexual_orientation/ethos-sexual_orientation_16_13_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f995d57275d4a9bd609fab14d5735e973f219557 Binary files /dev/null and b/metaicl/llama/ethos-sexual_orientation/ethos-sexual_orientation_16_13_train.jsonl differ diff --git a/metaicl/llama/ethos-sexual_orientation/ethos-sexual_orientation_16_21_train.jsonl b/metaicl/llama/ethos-sexual_orientation/ethos-sexual_orientation_16_21_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..19f5c1cff0a04ebe4ebd368ce179cc28d9f5c25b Binary files /dev/null and b/metaicl/llama/ethos-sexual_orientation/ethos-sexual_orientation_16_21_train.jsonl differ diff --git a/metaicl/llama/ethos-sexual_orientation/ethos-sexual_orientation_16_42_train.jsonl b/metaicl/llama/ethos-sexual_orientation/ethos-sexual_orientation_16_42_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6061dfd4c8f38c5907c21bc3d06b4816e96e99d0 Binary files /dev/null and b/metaicl/llama/ethos-sexual_orientation/ethos-sexual_orientation_16_42_train.jsonl differ diff --git a/metaicl/llama/ethos-sexual_orientation/ethos-sexual_orientation_16_87_train.jsonl b/metaicl/llama/ethos-sexual_orientation/ethos-sexual_orientation_16_87_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a3ac6c6447b6f6c670287813c59e3fa3685c75ec Binary files /dev/null and b/metaicl/llama/ethos-sexual_orientation/ethos-sexual_orientation_16_87_train.jsonl differ diff --git a/metaicl/llama/financial_phrasebank/financial_phrasebank_16384_100_train.jsonl b/metaicl/llama/financial_phrasebank/financial_phrasebank_16384_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..83007025eff315b728264db937b37d029e49e19c --- /dev/null +++ b/metaicl/llama/financial_phrasebank/financial_phrasebank_16384_100_train.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:ba72f1744b4854d710fe94ff8da45e6ebb9811a790a0315a5fbd9e65fe0e7f4f +size 294505 diff --git a/metaicl/llama/financial_phrasebank/financial_phrasebank_16_100_test.jsonl b/metaicl/llama/financial_phrasebank/financial_phrasebank_16_100_test.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..15611290ecde496842ebcecf876484e128b79c40 Binary files /dev/null and b/metaicl/llama/financial_phrasebank/financial_phrasebank_16_100_test.jsonl differ diff --git a/metaicl/llama/financial_phrasebank/financial_phrasebank_16_100_train.jsonl b/metaicl/llama/financial_phrasebank/financial_phrasebank_16_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..be8540076799991c93b6fd6551665303413d52fe Binary files /dev/null and b/metaicl/llama/financial_phrasebank/financial_phrasebank_16_100_train.jsonl differ diff --git a/metaicl/llama/financial_phrasebank/financial_phrasebank_16_13_train.jsonl b/metaicl/llama/financial_phrasebank/financial_phrasebank_16_13_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7a4755b4ec1e4840ca1794e7213cf4c2f21c1109 Binary files /dev/null and b/metaicl/llama/financial_phrasebank/financial_phrasebank_16_13_train.jsonl differ diff --git a/metaicl/llama/financial_phrasebank/financial_phrasebank_16_21_train.jsonl b/metaicl/llama/financial_phrasebank/financial_phrasebank_16_21_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..23af493f56a4aefcfc456f2a55c84909841e16fb Binary files /dev/null and b/metaicl/llama/financial_phrasebank/financial_phrasebank_16_21_train.jsonl differ diff --git a/metaicl/llama/financial_phrasebank/financial_phrasebank_16_42_train.jsonl b/metaicl/llama/financial_phrasebank/financial_phrasebank_16_42_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b03447884e68872a1c15392f834d43d2456df8cc Binary files /dev/null and b/metaicl/llama/financial_phrasebank/financial_phrasebank_16_42_train.jsonl differ diff --git a/metaicl/llama/financial_phrasebank/financial_phrasebank_16_87_train.jsonl b/metaicl/llama/financial_phrasebank/financial_phrasebank_16_87_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0a271bd091a9cc7d35dcd5744756a9c474d3c79d Binary files /dev/null and b/metaicl/llama/financial_phrasebank/financial_phrasebank_16_87_train.jsonl differ diff --git a/metaicl/llama/freebase_qa/freebase_qa_16384_100_train.jsonl b/metaicl/llama/freebase_qa/freebase_qa_16384_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..bef1466c1b43c96fb5b46687de03ababd3e16bd9 --- /dev/null +++ b/metaicl/llama/freebase_qa/freebase_qa_16384_100_train.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:3f277c61de6aba4b506f7cfa16a4bd5f434748c4f7f577fb7bbef06be7765193 +size 1497879 diff --git a/metaicl/llama/freebase_qa/freebase_qa_16_100_test.jsonl b/metaicl/llama/freebase_qa/freebase_qa_16_100_test.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..341988ef9a0e9dc0bbc0517122c6ff82d3a1f412 --- /dev/null +++ b/metaicl/llama/freebase_qa/freebase_qa_16_100_test.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:a89fa62ba6ea5a3cd35553cdf901c8c1520dfd169c962ac8e2d9d5f606e562c7 +size 364495 diff --git a/metaicl/llama/freebase_qa/freebase_qa_16_100_train.jsonl b/metaicl/llama/freebase_qa/freebase_qa_16_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..24cbdbdffb486289d1d43f3d783614bbb79aa943 Binary files /dev/null and b/metaicl/llama/freebase_qa/freebase_qa_16_100_train.jsonl differ diff --git a/metaicl/llama/freebase_qa/freebase_qa_16_13_train.jsonl b/metaicl/llama/freebase_qa/freebase_qa_16_13_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8b4f54751b191e4738a5f07ae8fa2453a1341fc6 Binary files /dev/null and b/metaicl/llama/freebase_qa/freebase_qa_16_13_train.jsonl differ diff --git a/metaicl/llama/freebase_qa/freebase_qa_16_21_train.jsonl b/metaicl/llama/freebase_qa/freebase_qa_16_21_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d97fc5a0d1c3e774c247fffe33581ed228d2f680 Binary files /dev/null and b/metaicl/llama/freebase_qa/freebase_qa_16_21_train.jsonl differ diff --git a/metaicl/llama/freebase_qa/freebase_qa_16_42_train.jsonl b/metaicl/llama/freebase_qa/freebase_qa_16_42_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a7d7a57508a07eaac13b920bf615c547ec6c8072 Binary files /dev/null and b/metaicl/llama/freebase_qa/freebase_qa_16_42_train.jsonl differ diff --git a/metaicl/llama/freebase_qa/freebase_qa_16_87_train.jsonl b/metaicl/llama/freebase_qa/freebase_qa_16_87_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6e2afb8d32453dc2356a4529c3ce75e3f0ec17cd Binary files /dev/null and b/metaicl/llama/freebase_qa/freebase_qa_16_87_train.jsonl differ diff --git a/metaicl/llama/gigaword/gigaword_16384_100_train.jsonl b/metaicl/llama/gigaword/gigaword_16384_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..286eff41d45a371bf898a09417898d1b09b9df48 --- /dev/null +++ b/metaicl/llama/gigaword/gigaword_16384_100_train.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:6c9b17b279da32e1bf7b7a0dc71c754f97fe89cbe6e20d7d05fc795c6ffc36de +size 3241105 diff --git a/metaicl/llama/gigaword/gigaword_16_100_test.jsonl b/metaicl/llama/gigaword/gigaword_16_100_test.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..13ee5a4ad2c0070b0e88d7f6a36a3c63bb04922e --- /dev/null +++ b/metaicl/llama/gigaword/gigaword_16_100_test.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:ee36b2182d5e70da5a0d3afa8d4dfcc81f3d8a0ec90f3d4434c2fd8b3384e500 +size 37632585 diff --git a/metaicl/llama/gigaword/gigaword_16_100_train.jsonl b/metaicl/llama/gigaword/gigaword_16_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..07e4c6b3e18ddb5cbd9800574d48a168001df450 Binary files /dev/null and b/metaicl/llama/gigaword/gigaword_16_100_train.jsonl differ diff --git a/metaicl/llama/gigaword/gigaword_16_13_train.jsonl b/metaicl/llama/gigaword/gigaword_16_13_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d43e500e963b1d985087c6f825974f425be70476 Binary files /dev/null and b/metaicl/llama/gigaword/gigaword_16_13_train.jsonl differ diff --git a/metaicl/llama/gigaword/gigaword_16_21_train.jsonl b/metaicl/llama/gigaword/gigaword_16_21_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f01c70244772f90de4cda717b157a6ee0bb25e88 Binary files /dev/null and b/metaicl/llama/gigaword/gigaword_16_21_train.jsonl differ diff --git a/metaicl/llama/gigaword/gigaword_16_42_train.jsonl b/metaicl/llama/gigaword/gigaword_16_42_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..fbb5a52c05f74ddae02714ddff1e7e819a48127f Binary files /dev/null and b/metaicl/llama/gigaword/gigaword_16_42_train.jsonl differ diff --git a/metaicl/llama/gigaword/gigaword_16_87_train.jsonl b/metaicl/llama/gigaword/gigaword_16_87_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..55d0c7570b95944aa899ba4fa582f6b5fa7f0ce4 Binary files /dev/null and b/metaicl/llama/gigaword/gigaword_16_87_train.jsonl differ diff --git a/metaicl/llama/glue-cola/glue-cola_16384_100_train.jsonl b/metaicl/llama/glue-cola/glue-cola_16384_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2472c421b2e1154781c078f5e2eba009127ca841 --- /dev/null +++ b/metaicl/llama/glue-cola/glue-cola_16384_100_train.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:808b6221c93707d1b68dd1d47c3937bd9d88da276208c8c983cf62102a8ee584 +size 755475 diff --git a/metaicl/llama/glue-cola/glue-cola_16_100_test.jsonl b/metaicl/llama/glue-cola/glue-cola_16_100_test.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..95b002e5ada037c3ca88e8540553c4c3ca2aa31f Binary files /dev/null and b/metaicl/llama/glue-cola/glue-cola_16_100_test.jsonl differ diff --git a/metaicl/llama/glue-cola/glue-cola_16_100_train.jsonl b/metaicl/llama/glue-cola/glue-cola_16_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..56c0e8f44882f092cb0a3bd0d060e0d991780d56 Binary files /dev/null and b/metaicl/llama/glue-cola/glue-cola_16_100_train.jsonl differ diff --git a/metaicl/llama/glue-cola/glue-cola_16_13_train.jsonl b/metaicl/llama/glue-cola/glue-cola_16_13_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b2c1a8a318d515be4cf68ebe869a1dd785eccef0 Binary files /dev/null and b/metaicl/llama/glue-cola/glue-cola_16_13_train.jsonl differ diff --git a/metaicl/llama/glue-cola/glue-cola_16_21_train.jsonl b/metaicl/llama/glue-cola/glue-cola_16_21_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..fa491c1800a1c6003a76cb43c54b6a74c8de166b Binary files /dev/null and b/metaicl/llama/glue-cola/glue-cola_16_21_train.jsonl differ diff --git a/metaicl/llama/glue-cola/glue-cola_16_42_train.jsonl b/metaicl/llama/glue-cola/glue-cola_16_42_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..97960e2d5fe45175c258665129cd56a5e2614805 Binary files /dev/null and b/metaicl/llama/glue-cola/glue-cola_16_42_train.jsonl differ diff --git a/metaicl/llama/glue-cola/glue-cola_16_87_train.jsonl b/metaicl/llama/glue-cola/glue-cola_16_87_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..817e4e1df2952848e7c68f0cf005a5f0c6d256fe Binary files /dev/null and b/metaicl/llama/glue-cola/glue-cola_16_87_train.jsonl differ diff --git a/metaicl/llama/glue-mnli/glue-mnli_16384_100_train.jsonl b/metaicl/llama/glue-mnli/glue-mnli_16384_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9ea7c934f2c4b2db912cacdc0112b57df06edcc5 --- /dev/null +++ b/metaicl/llama/glue-mnli/glue-mnli_16384_100_train.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:ee3909e07f60b2250b79d2b6cfde2e04565ae47698e92b8f401b21a922857184 +size 3580115 diff --git a/metaicl/llama/glue-mnli/glue-mnli_16_100_test.jsonl b/metaicl/llama/glue-mnli/glue-mnli_16_100_test.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ec0eeaafbe9401ed961c55cba7fca21adf3ded89 --- /dev/null +++ b/metaicl/llama/glue-mnli/glue-mnli_16_100_test.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:83100fdaf8089e91d48291add43c74ade20e282136774e1dcfc64495b132843c +size 2127499 diff --git a/metaicl/llama/glue-mnli/glue-mnli_16_100_train.jsonl b/metaicl/llama/glue-mnli/glue-mnli_16_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f84f8004c05900028d40cc54d3f9ea1b429dd8fd Binary files /dev/null and b/metaicl/llama/glue-mnli/glue-mnli_16_100_train.jsonl differ diff --git a/metaicl/llama/glue-mnli/glue-mnli_16_13_train.jsonl b/metaicl/llama/glue-mnli/glue-mnli_16_13_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..596627539ebb8f2ada22ed47b22029daecbbc27c Binary files /dev/null and b/metaicl/llama/glue-mnli/glue-mnli_16_13_train.jsonl differ diff --git a/metaicl/llama/glue-mnli/glue-mnli_16_21_train.jsonl b/metaicl/llama/glue-mnli/glue-mnli_16_21_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c110a5de1a43296629660f8c9d09934df7733d09 Binary files /dev/null and b/metaicl/llama/glue-mnli/glue-mnli_16_21_train.jsonl differ diff --git a/metaicl/llama/glue-mnli/glue-mnli_16_42_train.jsonl b/metaicl/llama/glue-mnli/glue-mnli_16_42_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..49b973c46c0b11cdb064e73676ae13d316a073e3 Binary files /dev/null and b/metaicl/llama/glue-mnli/glue-mnli_16_42_train.jsonl differ diff --git a/metaicl/llama/glue-mnli/glue-mnli_16_87_train.jsonl b/metaicl/llama/glue-mnli/glue-mnli_16_87_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f84ab948a3d3850a9dac235db1ef6e22f1f76b87 Binary files /dev/null and b/metaicl/llama/glue-mnli/glue-mnli_16_87_train.jsonl differ diff --git a/metaicl/llama/glue-mrpc/glue-mrpc_16384_100_train.jsonl b/metaicl/llama/glue-mrpc/glue-mrpc_16384_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3c7e15db63f346c943acfd2be82ffc8a1eecd17f --- /dev/null +++ b/metaicl/llama/glue-mrpc/glue-mrpc_16384_100_train.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:d5321620f99fcea574a48d39fe2b110a8506b7fb1cdb79b1fa669ac17517be39 +size 1016083 diff --git a/metaicl/llama/glue-mrpc/glue-mrpc_16_100_test.jsonl b/metaicl/llama/glue-mrpc/glue-mrpc_16_100_test.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5fc60d0c84517a89d66dc48eac32cc1fa702949e --- /dev/null +++ b/metaicl/llama/glue-mrpc/glue-mrpc_16_100_test.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:a0c849fddae6ed24b3bc8f8996731c44e694a62de2a6311209ab14d9d171436a +size 112203 diff --git a/metaicl/llama/glue-mrpc/glue-mrpc_16_100_train.jsonl b/metaicl/llama/glue-mrpc/glue-mrpc_16_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..915217190c5a4c01555ef38ab8e7e8cb348d6b9a Binary files /dev/null and b/metaicl/llama/glue-mrpc/glue-mrpc_16_100_train.jsonl differ diff --git a/metaicl/llama/glue-mrpc/glue-mrpc_16_13_train.jsonl b/metaicl/llama/glue-mrpc/glue-mrpc_16_13_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..43d7896045cdef4d707be6470427118b28a45fc7 Binary files /dev/null and b/metaicl/llama/glue-mrpc/glue-mrpc_16_13_train.jsonl differ diff --git a/metaicl/llama/glue-mrpc/glue-mrpc_16_21_train.jsonl b/metaicl/llama/glue-mrpc/glue-mrpc_16_21_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ce4ae35d372d3686eb7291392cd4922a14ca1bb7 Binary files /dev/null and b/metaicl/llama/glue-mrpc/glue-mrpc_16_21_train.jsonl differ diff --git a/metaicl/llama/glue-mrpc/glue-mrpc_16_42_train.jsonl b/metaicl/llama/glue-mrpc/glue-mrpc_16_42_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..cfe5430126f4fef0ee740d019e4c930e7241966c Binary files /dev/null and b/metaicl/llama/glue-mrpc/glue-mrpc_16_42_train.jsonl differ diff --git a/metaicl/llama/glue-mrpc/glue-mrpc_16_87_train.jsonl b/metaicl/llama/glue-mrpc/glue-mrpc_16_87_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..733b39df323543cbaebec3efff76f44d5db5c4f3 Binary files /dev/null and b/metaicl/llama/glue-mrpc/glue-mrpc_16_87_train.jsonl differ diff --git a/metaicl/llama/glue-qnli/glue-qnli_16384_100_train.jsonl b/metaicl/llama/glue-qnli/glue-qnli_16384_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9b95915fe0312231125b8fce370b4ec7930b1b89 --- /dev/null +++ b/metaicl/llama/glue-qnli/glue-qnli_16384_100_train.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:535d68a2c7c8c3339ccc9e32a8f2ad4f5e8a83620758d22ff37737ddba63646a +size 4375955 diff --git a/metaicl/llama/glue-qnli/glue-qnli_16_100_test.jsonl b/metaicl/llama/glue-qnli/glue-qnli_16_100_test.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5599d2231a31563e0ce3de2f4675478e0be948d5 --- /dev/null +++ b/metaicl/llama/glue-qnli/glue-qnli_16_100_test.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:2640d5e8e042d46e7fe86f0a696262f0e8eec7b767bc0c8f7e8431632fe3771c +size 1478859 diff --git a/metaicl/llama/glue-qnli/glue-qnli_16_100_train.jsonl b/metaicl/llama/glue-qnli/glue-qnli_16_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c5ef7dc06096d6eb2fa120ae6075d2f63cc2f05e Binary files /dev/null and b/metaicl/llama/glue-qnli/glue-qnli_16_100_train.jsonl differ diff --git a/metaicl/llama/glue-qnli/glue-qnli_16_13_train.jsonl b/metaicl/llama/glue-qnli/glue-qnli_16_13_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6a6be2b4db210f459887e3128cdfc6d1e9edc5e4 Binary files /dev/null and b/metaicl/llama/glue-qnli/glue-qnli_16_13_train.jsonl differ diff --git a/metaicl/llama/glue-qnli/glue-qnli_16_21_train.jsonl b/metaicl/llama/glue-qnli/glue-qnli_16_21_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..813dd2f1fd702cfbb11eae34e484a71bc0366f1a Binary files /dev/null and b/metaicl/llama/glue-qnli/glue-qnli_16_21_train.jsonl differ diff --git a/metaicl/llama/glue-qnli/glue-qnli_16_42_train.jsonl b/metaicl/llama/glue-qnli/glue-qnli_16_42_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7d804ff69bf63dd5555e8ea9d673d86689a17a1f Binary files /dev/null and b/metaicl/llama/glue-qnli/glue-qnli_16_42_train.jsonl differ diff --git a/metaicl/llama/glue-qnli/glue-qnli_16_87_train.jsonl b/metaicl/llama/glue-qnli/glue-qnli_16_87_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..22198f9cba70a068448b036ade13c6611ba30fef Binary files /dev/null and b/metaicl/llama/glue-qnli/glue-qnli_16_87_train.jsonl differ diff --git a/metaicl/llama/glue-qqp/glue-qqp_16384_100_train.jsonl b/metaicl/llama/glue-qqp/glue-qqp_16384_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..bce50772583aa440992f0a5f0e5629d1e89889f6 --- /dev/null +++ b/metaicl/llama/glue-qqp/glue-qqp_16384_100_train.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:90938f8d2ebf4a5995f886d056717175a7401f93b2147359972c5f76e540050d +size 3138193 diff --git a/metaicl/llama/glue-qqp/glue-qqp_16_100_test.jsonl b/metaicl/llama/glue-qqp/glue-qqp_16_100_test.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6cbd7f070d15b36aa44752acc67dacd67754b0ff --- /dev/null +++ b/metaicl/llama/glue-qqp/glue-qqp_16_100_test.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:ebee3455aec54b37c8793e29243b40bb96a41d17cb39b18b1da5c730fb28a1bf +size 7744137 diff --git a/metaicl/llama/glue-qqp/glue-qqp_16_100_train.jsonl b/metaicl/llama/glue-qqp/glue-qqp_16_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c13627b5382aedbf924fce958830ee3475fcde67 Binary files /dev/null and b/metaicl/llama/glue-qqp/glue-qqp_16_100_train.jsonl differ diff --git a/metaicl/llama/glue-qqp/glue-qqp_16_13_train.jsonl b/metaicl/llama/glue-qqp/glue-qqp_16_13_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b719085fb8a98178f81f32f32cb207230f74a251 Binary files /dev/null and b/metaicl/llama/glue-qqp/glue-qqp_16_13_train.jsonl differ diff --git a/metaicl/llama/glue-qqp/glue-qqp_16_21_train.jsonl b/metaicl/llama/glue-qqp/glue-qqp_16_21_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..59f6a558856768b1af53d0296752110bcc08e830 Binary files /dev/null and b/metaicl/llama/glue-qqp/glue-qqp_16_21_train.jsonl differ diff --git a/metaicl/llama/glue-qqp/glue-qqp_16_42_train.jsonl b/metaicl/llama/glue-qqp/glue-qqp_16_42_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..61cece1c371186fd26f9340a109f1367f73533c5 Binary files /dev/null and b/metaicl/llama/glue-qqp/glue-qqp_16_42_train.jsonl differ diff --git a/metaicl/llama/glue-qqp/glue-qqp_16_87_train.jsonl b/metaicl/llama/glue-qqp/glue-qqp_16_87_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c51e12805d70f174923616fa8e346e093d1d1511 Binary files /dev/null and b/metaicl/llama/glue-qqp/glue-qqp_16_87_train.jsonl differ diff --git a/metaicl/llama/glue-rte/glue-rte_16384_100_train.jsonl b/metaicl/llama/glue-rte/glue-rte_16384_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a03e117bbb1726e5e3aa1789a2e8537abd5896c2 --- /dev/null +++ b/metaicl/llama/glue-rte/glue-rte_16384_100_train.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:9c6b937b204fef79c86d49ff67bbd2194182aa00e45d54dbf867d89f1d73734a +size 883217 diff --git a/metaicl/llama/glue-rte/glue-rte_16_100_test.jsonl b/metaicl/llama/glue-rte/glue-rte_16_100_test.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d6fba57b1a139c7f9edba1da4a7d5e0ab94c7b82 Binary files /dev/null and b/metaicl/llama/glue-rte/glue-rte_16_100_test.jsonl differ diff --git a/metaicl/llama/glue-rte/glue-rte_16_100_train.jsonl b/metaicl/llama/glue-rte/glue-rte_16_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7c28cc1197357c0cb17251e7d474f2cf468734f7 Binary files /dev/null and b/metaicl/llama/glue-rte/glue-rte_16_100_train.jsonl differ diff --git a/metaicl/llama/glue-rte/glue-rte_16_13_train.jsonl b/metaicl/llama/glue-rte/glue-rte_16_13_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f5c8cd19ed8ce5e29ad75e79064f2710bc330b5d Binary files /dev/null and b/metaicl/llama/glue-rte/glue-rte_16_13_train.jsonl differ diff --git a/metaicl/llama/glue-rte/glue-rte_16_21_train.jsonl b/metaicl/llama/glue-rte/glue-rte_16_21_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0d9cef9304080e5756b8a301b423df769b32db0f Binary files /dev/null and b/metaicl/llama/glue-rte/glue-rte_16_21_train.jsonl differ diff --git a/metaicl/llama/glue-rte/glue-rte_16_42_train.jsonl b/metaicl/llama/glue-rte/glue-rte_16_42_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0d45cdf2293b8eee27956f37d7e1b04e9d7328b1 Binary files /dev/null and b/metaicl/llama/glue-rte/glue-rte_16_42_train.jsonl differ diff --git a/metaicl/llama/glue-rte/glue-rte_16_87_train.jsonl b/metaicl/llama/glue-rte/glue-rte_16_87_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6902e3c139c6c53f4ccaaec5cf89ef7edf379109 Binary files /dev/null and b/metaicl/llama/glue-rte/glue-rte_16_87_train.jsonl differ diff --git a/metaicl/llama/glue-sst2/glue-sst2_16384_100_train.jsonl b/metaicl/llama/glue-sst2/glue-sst2_16384_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d78222d9b19f23c8d1e7446f8a2953e9984f48a3 --- /dev/null +++ b/metaicl/llama/glue-sst2/glue-sst2_16384_100_train.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:fb2ca8cbde5e72e277611efa5855caf261198fdc68ad62cc1adbfcdcb789f0a5 +size 1514067 diff --git a/metaicl/llama/glue-sst2/glue-sst2_16_100_test.jsonl b/metaicl/llama/glue-sst2/glue-sst2_16_100_test.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..beb82f3f5b548be2b3542feda45ade2848e61fd1 --- /dev/null +++ b/metaicl/llama/glue-sst2/glue-sst2_16_100_test.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:ad9e745c5e520203fa1de043b52296b5f78f4c7ce131b80af479045ef8ffb718 +size 115147 diff --git a/metaicl/llama/glue-sst2/glue-sst2_16_100_train.jsonl b/metaicl/llama/glue-sst2/glue-sst2_16_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..96c4144430e7b971b0eab87a82d34ec53c38d974 Binary files /dev/null and b/metaicl/llama/glue-sst2/glue-sst2_16_100_train.jsonl differ diff --git a/metaicl/llama/glue-sst2/glue-sst2_16_13_train.jsonl b/metaicl/llama/glue-sst2/glue-sst2_16_13_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d7baebdde9848ab311f39bea431aa60066481f20 Binary files /dev/null and b/metaicl/llama/glue-sst2/glue-sst2_16_13_train.jsonl differ diff --git a/metaicl/llama/glue-sst2/glue-sst2_16_21_train.jsonl b/metaicl/llama/glue-sst2/glue-sst2_16_21_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..787276bc6ec2c9f875e26ff7fc09d715a3d32517 Binary files /dev/null and b/metaicl/llama/glue-sst2/glue-sst2_16_21_train.jsonl differ diff --git a/metaicl/llama/glue-sst2/glue-sst2_16_42_train.jsonl b/metaicl/llama/glue-sst2/glue-sst2_16_42_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ca28b6922836805a3abc8f83c335739bb113cf8b Binary files /dev/null and b/metaicl/llama/glue-sst2/glue-sst2_16_42_train.jsonl differ diff --git a/metaicl/llama/glue-sst2/glue-sst2_16_87_train.jsonl b/metaicl/llama/glue-sst2/glue-sst2_16_87_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5b2f6796840d55dde864287d5635460252d7e8ec Binary files /dev/null and b/metaicl/llama/glue-sst2/glue-sst2_16_87_train.jsonl differ diff --git a/metaicl/llama/glue-wnli/glue-wnli_16384_100_train.jsonl b/metaicl/llama/glue-wnli/glue-wnli_16384_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..53bbd15f85ec2ae8a66d14be630dee137af7c9bc --- /dev/null +++ b/metaicl/llama/glue-wnli/glue-wnli_16384_100_train.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:17f4a7d1851d79dd54fda3fa38848de7d47857fc01158f9a20a6a88f76992e64 +size 143315 diff --git a/metaicl/llama/glue-wnli/glue-wnli_16_100_test.jsonl b/metaicl/llama/glue-wnli/glue-wnli_16_100_test.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3430c3d61c0796ca0118ed61993da1688d03a6fd Binary files /dev/null and b/metaicl/llama/glue-wnli/glue-wnli_16_100_test.jsonl differ diff --git a/metaicl/llama/glue-wnli/glue-wnli_16_100_train.jsonl b/metaicl/llama/glue-wnli/glue-wnli_16_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6b731d0afc1fca60938d12afe144f13fe7046e36 Binary files /dev/null and b/metaicl/llama/glue-wnli/glue-wnli_16_100_train.jsonl differ diff --git a/metaicl/llama/glue-wnli/glue-wnli_16_13_train.jsonl b/metaicl/llama/glue-wnli/glue-wnli_16_13_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..31db3575d6c10b4fc081cf03450397304d55f507 Binary files /dev/null and b/metaicl/llama/glue-wnli/glue-wnli_16_13_train.jsonl differ diff --git a/metaicl/llama/glue-wnli/glue-wnli_16_21_train.jsonl b/metaicl/llama/glue-wnli/glue-wnli_16_21_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..13caabd776854e3b2d15855a08d0e6841c138bc4 Binary files /dev/null and b/metaicl/llama/glue-wnli/glue-wnli_16_21_train.jsonl differ diff --git a/metaicl/llama/glue-wnli/glue-wnli_16_42_train.jsonl b/metaicl/llama/glue-wnli/glue-wnli_16_42_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..792284e65e1a34c96e29e040ffb14d6423b2e77c Binary files /dev/null and b/metaicl/llama/glue-wnli/glue-wnli_16_42_train.jsonl differ diff --git a/metaicl/llama/glue-wnli/glue-wnli_16_87_train.jsonl b/metaicl/llama/glue-wnli/glue-wnli_16_87_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..24f418a3e89cbdea92f4277734d8ee47ee608cf8 Binary files /dev/null and b/metaicl/llama/glue-wnli/glue-wnli_16_87_train.jsonl differ diff --git a/metaicl/llama/google_wellformed_query/google_wellformed_query_16384_100_train.jsonl b/metaicl/llama/google_wellformed_query/google_wellformed_query_16384_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6524e6e095ee69403c454ac21d842f5c003c2516 --- /dev/null +++ b/metaicl/llama/google_wellformed_query/google_wellformed_query_16384_100_train.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:8151556ed5e662ac29d529a6990540eb9321ff91cc1f0d46aebcedfc35cf4fbf +size 1634031 diff --git a/metaicl/llama/google_wellformed_query/google_wellformed_query_16_100_test.jsonl b/metaicl/llama/google_wellformed_query/google_wellformed_query_16_100_test.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7facb05fd959f9d7c197e2ce85151fad596c3530 --- /dev/null +++ b/metaicl/llama/google_wellformed_query/google_wellformed_query_16_100_test.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:0cef62cf9b49f4fb9a4ee84d4d51da2863baa0b7dfedae255ec3f2612578dbeb +size 350119 diff --git a/metaicl/llama/google_wellformed_query/google_wellformed_query_16_100_train.jsonl b/metaicl/llama/google_wellformed_query/google_wellformed_query_16_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9a31f6134de3227543a4d3fadd01adfbcf115eef Binary files /dev/null and b/metaicl/llama/google_wellformed_query/google_wellformed_query_16_100_train.jsonl differ diff --git a/metaicl/llama/google_wellformed_query/google_wellformed_query_16_13_train.jsonl b/metaicl/llama/google_wellformed_query/google_wellformed_query_16_13_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3b01bfde9c3ad5fb901d0daf28f89418e54c934f Binary files /dev/null and b/metaicl/llama/google_wellformed_query/google_wellformed_query_16_13_train.jsonl differ diff --git a/metaicl/llama/google_wellformed_query/google_wellformed_query_16_21_train.jsonl b/metaicl/llama/google_wellformed_query/google_wellformed_query_16_21_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c311a3766f5152791fea61efb9e705c29912e217 Binary files /dev/null and b/metaicl/llama/google_wellformed_query/google_wellformed_query_16_21_train.jsonl differ diff --git a/metaicl/llama/google_wellformed_query/google_wellformed_query_16_42_train.jsonl b/metaicl/llama/google_wellformed_query/google_wellformed_query_16_42_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5cdc417c00d4c65defb1d95408739c9cd8a7d5b6 Binary files /dev/null and b/metaicl/llama/google_wellformed_query/google_wellformed_query_16_42_train.jsonl differ diff --git a/metaicl/llama/google_wellformed_query/google_wellformed_query_16_87_train.jsonl b/metaicl/llama/google_wellformed_query/google_wellformed_query_16_87_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9e99575b4c4a491405ef147cba5797bcc59ea17a Binary files /dev/null and b/metaicl/llama/google_wellformed_query/google_wellformed_query_16_87_train.jsonl differ diff --git a/metaicl/llama/hate_speech18/hate_speech18_16384_100_train.jsonl b/metaicl/llama/hate_speech18/hate_speech18_16384_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..58da76de04126f9c2593164944f40a4939bfb658 --- /dev/null +++ b/metaicl/llama/hate_speech18/hate_speech18_16384_100_train.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:b9e1a5120fd75565b0dcbb44f7b60216efb776a279438f2deb640590d00c433f +size 1119323 diff --git a/metaicl/llama/hate_speech18/hate_speech18_16_100_test.jsonl b/metaicl/llama/hate_speech18/hate_speech18_16_100_test.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ca25e6e98ac279f5c852bdfda0d44377ec20d58e --- /dev/null +++ b/metaicl/llama/hate_speech18/hate_speech18_16_100_test.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:64597e0bc0fbd1191b8c06d6717396c264577a1427663bdb4eff531a4f528665 +size 283923 diff --git a/metaicl/llama/hate_speech18/hate_speech18_16_100_train.jsonl b/metaicl/llama/hate_speech18/hate_speech18_16_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..52af7a92fb842b1d0f5d384edd04a3a5ac74859d Binary files /dev/null and b/metaicl/llama/hate_speech18/hate_speech18_16_100_train.jsonl differ diff --git a/metaicl/llama/hate_speech18/hate_speech18_16_13_train.jsonl b/metaicl/llama/hate_speech18/hate_speech18_16_13_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8ab643ccfa3ceae84fbfa7df190e9a771a054027 Binary files /dev/null and b/metaicl/llama/hate_speech18/hate_speech18_16_13_train.jsonl differ diff --git a/metaicl/llama/hate_speech18/hate_speech18_16_21_train.jsonl b/metaicl/llama/hate_speech18/hate_speech18_16_21_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..21355820b89bd32b4aee26236b77eba5e01eaa45 Binary files /dev/null and b/metaicl/llama/hate_speech18/hate_speech18_16_21_train.jsonl differ diff --git a/metaicl/llama/hate_speech18/hate_speech18_16_42_train.jsonl b/metaicl/llama/hate_speech18/hate_speech18_16_42_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3716afaaab32e9b68147892396d4c8646e18ae06 Binary files /dev/null and b/metaicl/llama/hate_speech18/hate_speech18_16_42_train.jsonl differ diff --git a/metaicl/llama/hate_speech18/hate_speech18_16_87_train.jsonl b/metaicl/llama/hate_speech18/hate_speech18_16_87_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e48a4dc37f3e7be57757aaca6f772741174efbf0 Binary files /dev/null and b/metaicl/llama/hate_speech18/hate_speech18_16_87_train.jsonl differ diff --git a/metaicl/llama/hate_speech_offensive/hate_speech_offensive_16384_100_train.jsonl b/metaicl/llama/hate_speech_offensive/hate_speech_offensive_16384_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c5ce4142f21b4cdb9e2f28fedc0ec30a36b2e50c --- /dev/null +++ b/metaicl/llama/hate_speech_offensive/hate_speech_offensive_16384_100_train.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:0f53d7373fe9beb6a97178de7c487acc99fc9d68feac3dfa0e593e075a26c82a +size 2829099 diff --git a/metaicl/llama/hate_speech_offensive/hate_speech_offensive_16_100_test.jsonl b/metaicl/llama/hate_speech_offensive/hate_speech_offensive_16_100_test.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1f307d280529e5cff200c51555728662dd8483e9 --- /dev/null +++ b/metaicl/llama/hate_speech_offensive/hate_speech_offensive_16_100_test.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:98d6ac183063a7a6a31970979b14e7747de8e7c026422c65cecf66379330bb62 +size 848547 diff --git a/metaicl/llama/hate_speech_offensive/hate_speech_offensive_16_100_train.jsonl b/metaicl/llama/hate_speech_offensive/hate_speech_offensive_16_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d82dc6e619ca21ccd93c924a3e767905e8d5f550 Binary files /dev/null and b/metaicl/llama/hate_speech_offensive/hate_speech_offensive_16_100_train.jsonl differ diff --git a/metaicl/llama/hate_speech_offensive/hate_speech_offensive_16_13_train.jsonl b/metaicl/llama/hate_speech_offensive/hate_speech_offensive_16_13_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..70c8c8f5ad70c87ab626ce429097bd07aaaddbd1 Binary files /dev/null and b/metaicl/llama/hate_speech_offensive/hate_speech_offensive_16_13_train.jsonl differ diff --git a/metaicl/llama/hate_speech_offensive/hate_speech_offensive_16_21_train.jsonl b/metaicl/llama/hate_speech_offensive/hate_speech_offensive_16_21_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1763edbbaf4dae1b62c062b09defb28936af5c95 Binary files /dev/null and b/metaicl/llama/hate_speech_offensive/hate_speech_offensive_16_21_train.jsonl differ diff --git a/metaicl/llama/hate_speech_offensive/hate_speech_offensive_16_42_train.jsonl b/metaicl/llama/hate_speech_offensive/hate_speech_offensive_16_42_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..aae99271d8757fff2791f6d7b91f4b1ba7ade539 Binary files /dev/null and b/metaicl/llama/hate_speech_offensive/hate_speech_offensive_16_42_train.jsonl differ diff --git a/metaicl/llama/hate_speech_offensive/hate_speech_offensive_16_87_train.jsonl b/metaicl/llama/hate_speech_offensive/hate_speech_offensive_16_87_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2d7a2644c7eb484465549740a41c8145f2f3a1ec Binary files /dev/null and b/metaicl/llama/hate_speech_offensive/hate_speech_offensive_16_87_train.jsonl differ diff --git a/metaicl/llama/hatexplain/hatexplain_16384_100_train.jsonl b/metaicl/llama/hatexplain/hatexplain_16384_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1a3c3dd629bd757f94eb4c64b408813335ba3bbd --- /dev/null +++ b/metaicl/llama/hatexplain/hatexplain_16384_100_train.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:5f630384315fb93d96213a40ade5f91b549eafd785afde654ce42079b5b20979 +size 2657173 diff --git a/metaicl/llama/hatexplain/hatexplain_16_100_test.jsonl b/metaicl/llama/hatexplain/hatexplain_16_100_test.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5a761db918b3add46e653f4d31356ebb13a1bb06 --- /dev/null +++ b/metaicl/llama/hatexplain/hatexplain_16_100_test.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:1d27f34f2df5a8071b6a06206d66fafa5336bbf44b84cc84c196062dbcd26144 +size 331469 diff --git a/metaicl/llama/hatexplain/hatexplain_16_100_train.jsonl b/metaicl/llama/hatexplain/hatexplain_16_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..42ba469b7a4b7343e13a3b8f5a5efe07d18b9a6c Binary files /dev/null and b/metaicl/llama/hatexplain/hatexplain_16_100_train.jsonl differ diff --git a/metaicl/llama/hatexplain/hatexplain_16_13_train.jsonl b/metaicl/llama/hatexplain/hatexplain_16_13_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ae6fcfffe2a98b2b2fa10e476f085ec6331e0be3 Binary files /dev/null and b/metaicl/llama/hatexplain/hatexplain_16_13_train.jsonl differ diff --git a/metaicl/llama/hatexplain/hatexplain_16_21_train.jsonl b/metaicl/llama/hatexplain/hatexplain_16_21_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7cd29bd583243f411a4c417a4ee76885e6b179bd Binary files /dev/null and b/metaicl/llama/hatexplain/hatexplain_16_21_train.jsonl differ diff --git a/metaicl/llama/hatexplain/hatexplain_16_42_train.jsonl b/metaicl/llama/hatexplain/hatexplain_16_42_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..473e3143158429eb3c0a29a43c3cc1242f88e608 Binary files /dev/null and b/metaicl/llama/hatexplain/hatexplain_16_42_train.jsonl differ diff --git a/metaicl/llama/hatexplain/hatexplain_16_87_train.jsonl b/metaicl/llama/hatexplain/hatexplain_16_87_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0157279f9b3d3e802fb4a9e00f0561f887a8b90b Binary files /dev/null and b/metaicl/llama/hatexplain/hatexplain_16_87_train.jsonl differ diff --git a/metaicl/llama/health_fact/health_fact_16384_100_train.jsonl b/metaicl/llama/health_fact/health_fact_16384_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c2dcc71af4c39c81372d9cf5a3d3e9211aef751c --- /dev/null +++ b/metaicl/llama/health_fact/health_fact_16384_100_train.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:36d8596a5e2fa1a201f92f14a2e33efa64f8787f167ee3147f4ad2d221324afe +size 1393239 diff --git a/metaicl/llama/health_fact/health_fact_16_100_test.jsonl b/metaicl/llama/health_fact/health_fact_16_100_test.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b34cb77f7aa7d486562611eb25e4b85f51a2d441 --- /dev/null +++ b/metaicl/llama/health_fact/health_fact_16_100_test.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:fc246fb8f60ef04d8c484397dc46f17c1974f381c64740e6ee9511cdbc486424 +size 169807 diff --git a/metaicl/llama/health_fact/health_fact_16_100_train.jsonl b/metaicl/llama/health_fact/health_fact_16_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..696ccb49dd0c941cd8df1aa68a3233afaf61026b Binary files /dev/null and b/metaicl/llama/health_fact/health_fact_16_100_train.jsonl differ diff --git a/metaicl/llama/health_fact/health_fact_16_13_train.jsonl b/metaicl/llama/health_fact/health_fact_16_13_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8090ae2132f49e9695f837d31bd4ba557abcc65c Binary files /dev/null and b/metaicl/llama/health_fact/health_fact_16_13_train.jsonl differ diff --git a/metaicl/llama/health_fact/health_fact_16_21_train.jsonl b/metaicl/llama/health_fact/health_fact_16_21_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..39bbcab80e22e9467818d4b0279a0edcd44375e6 Binary files /dev/null and b/metaicl/llama/health_fact/health_fact_16_21_train.jsonl differ diff --git a/metaicl/llama/health_fact/health_fact_16_42_train.jsonl b/metaicl/llama/health_fact/health_fact_16_42_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9c2c1bbbdeed4a0fdcdbf6b645daf233f1febea5 Binary files /dev/null and b/metaicl/llama/health_fact/health_fact_16_42_train.jsonl differ diff --git a/metaicl/llama/health_fact/health_fact_16_87_train.jsonl b/metaicl/llama/health_fact/health_fact_16_87_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2027c77cbae3d77a551377aaa058c1b81ee81402 Binary files /dev/null and b/metaicl/llama/health_fact/health_fact_16_87_train.jsonl differ diff --git a/metaicl/llama/hellaswag/hellaswag_16384_100_train.jsonl b/metaicl/llama/hellaswag/hellaswag_16384_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..eda86c4e56d20e13e994640fee0920953fd3a42f --- /dev/null +++ b/metaicl/llama/hellaswag/hellaswag_16384_100_train.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:73d267d5dbbc53d3e32d1b8e1a9512867abf902380de7c9fe164621f9f69520e +size 11974547 diff --git a/metaicl/llama/hellaswag/hellaswag_16_100_test.jsonl b/metaicl/llama/hellaswag/hellaswag_16_100_test.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..38f26f28bc31bac61b13a156c8184a858ad86d19 --- /dev/null +++ b/metaicl/llama/hellaswag/hellaswag_16_100_test.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:3cf334caf1d3ed5e28f9cce95e64f0f41ec3eb3dd98889404b16833a6f9dfb42 +size 7618763 diff --git a/metaicl/llama/hellaswag/hellaswag_16_100_train.jsonl b/metaicl/llama/hellaswag/hellaswag_16_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..df67d2115f3f88a7ee7d287237be5212d273b53b Binary files /dev/null and b/metaicl/llama/hellaswag/hellaswag_16_100_train.jsonl differ diff --git a/metaicl/llama/hellaswag/hellaswag_16_13_train.jsonl b/metaicl/llama/hellaswag/hellaswag_16_13_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d9c413ed2fc43c14a928094a007d00a23c3ad6bc Binary files /dev/null and b/metaicl/llama/hellaswag/hellaswag_16_13_train.jsonl differ diff --git a/metaicl/llama/hellaswag/hellaswag_16_21_train.jsonl b/metaicl/llama/hellaswag/hellaswag_16_21_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ada6cb6cd7dcbebe547da8c6aaae4aeaac07a165 Binary files /dev/null and b/metaicl/llama/hellaswag/hellaswag_16_21_train.jsonl differ diff --git a/metaicl/llama/hellaswag/hellaswag_16_42_train.jsonl b/metaicl/llama/hellaswag/hellaswag_16_42_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f6f3bcefd28ac01e4a26df1bc49e0e25423b74ad Binary files /dev/null and b/metaicl/llama/hellaswag/hellaswag_16_42_train.jsonl differ diff --git a/metaicl/llama/hellaswag/hellaswag_16_87_train.jsonl b/metaicl/llama/hellaswag/hellaswag_16_87_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d99eb1ebef9cee22d5bf9f0c8520b21e5402212a Binary files /dev/null and b/metaicl/llama/hellaswag/hellaswag_16_87_train.jsonl differ diff --git a/metaicl/llama/hotpot_qa/hotpot_qa_16384_100_train.jsonl b/metaicl/llama/hotpot_qa/hotpot_qa_16384_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..78628b1b9f53a9aa25de16b4f5f2f7b8da29743c --- /dev/null +++ b/metaicl/llama/hotpot_qa/hotpot_qa_16384_100_train.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:2aab6bc85641e8fc7ecc75456b926e32191431424104b83e4652cb003e2ac8cf +size 13359891 diff --git a/metaicl/llama/hotpot_qa/hotpot_qa_16_100_test.jsonl b/metaicl/llama/hotpot_qa/hotpot_qa_16_100_test.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b2470a4d6315b115a8e3fd145af94b732f0cf3c6 --- /dev/null +++ b/metaicl/llama/hotpot_qa/hotpot_qa_16_100_test.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:79886ce56bc51f9f54d03dc51a99818921a9376414f29245c1b7f8bb5d94cc70 +size 6008971 diff --git a/metaicl/llama/hotpot_qa/hotpot_qa_16_100_train.jsonl b/metaicl/llama/hotpot_qa/hotpot_qa_16_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9b16647c4b74313b6f94b265fa337050e1c36a87 Binary files /dev/null and b/metaicl/llama/hotpot_qa/hotpot_qa_16_100_train.jsonl differ diff --git a/metaicl/llama/hotpot_qa/hotpot_qa_16_13_train.jsonl b/metaicl/llama/hotpot_qa/hotpot_qa_16_13_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4487e6feddd7f6aa2ac5a8c8c2236a7fc448b415 Binary files /dev/null and b/metaicl/llama/hotpot_qa/hotpot_qa_16_13_train.jsonl differ diff --git a/metaicl/llama/hotpot_qa/hotpot_qa_16_21_train.jsonl b/metaicl/llama/hotpot_qa/hotpot_qa_16_21_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5147afd66f8a70faa7c566ca7c0750ba44715d99 Binary files /dev/null and b/metaicl/llama/hotpot_qa/hotpot_qa_16_21_train.jsonl differ diff --git a/metaicl/llama/hotpot_qa/hotpot_qa_16_42_train.jsonl b/metaicl/llama/hotpot_qa/hotpot_qa_16_42_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6506853dee2eecbd2c84793a7a1d60b96cb49615 Binary files /dev/null and b/metaicl/llama/hotpot_qa/hotpot_qa_16_42_train.jsonl differ diff --git a/metaicl/llama/hotpot_qa/hotpot_qa_16_87_train.jsonl b/metaicl/llama/hotpot_qa/hotpot_qa_16_87_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ffb629a8f8965e7e2036f82b98cd952d943c1b50 Binary files /dev/null and b/metaicl/llama/hotpot_qa/hotpot_qa_16_87_train.jsonl differ diff --git a/metaicl/llama/imdb/imdb_16384_100_train.jsonl b/metaicl/llama/imdb/imdb_16384_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e8d1fc36f91db15d3ef6effc964486073c8a8956 --- /dev/null +++ b/metaicl/llama/imdb/imdb_16384_100_train.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:c9c590845ea6e62138f0780149f140bc45930e1c7cc2642813eaefc7af68f7e2 +size 17443081 diff --git a/metaicl/llama/imdb/imdb_16_100_test.jsonl b/metaicl/llama/imdb/imdb_16_100_test.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8e9bbef5dcc935618d3cd56af21eb0e95a6263dd --- /dev/null +++ b/metaicl/llama/imdb/imdb_16_100_test.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:a8537514deba2331bfbbccb961187a9144a11780977190875d3adcf6a11561fb +size 25923777 diff --git a/metaicl/llama/imdb/imdb_16_100_train.jsonl b/metaicl/llama/imdb/imdb_16_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..fac6ddf597b163e284b793d35c88a71fa2b6a4e7 Binary files /dev/null and b/metaicl/llama/imdb/imdb_16_100_train.jsonl differ diff --git a/metaicl/llama/imdb/imdb_16_13_train.jsonl b/metaicl/llama/imdb/imdb_16_13_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..462352eb853800c171a322ef67b5e09808168912 Binary files /dev/null and b/metaicl/llama/imdb/imdb_16_13_train.jsonl differ diff --git a/metaicl/llama/imdb/imdb_16_21_train.jsonl b/metaicl/llama/imdb/imdb_16_21_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2d207a47c6320848122a839ad485c18ceea63164 Binary files /dev/null and b/metaicl/llama/imdb/imdb_16_21_train.jsonl differ diff --git a/metaicl/llama/imdb/imdb_16_42_train.jsonl b/metaicl/llama/imdb/imdb_16_42_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3ae81328bd584b5393cafa4d96d6649756363732 Binary files /dev/null and b/metaicl/llama/imdb/imdb_16_42_train.jsonl differ diff --git a/metaicl/llama/imdb/imdb_16_87_train.jsonl b/metaicl/llama/imdb/imdb_16_87_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..681a245b954b658996731dc45b001e5730607133 Binary files /dev/null and b/metaicl/llama/imdb/imdb_16_87_train.jsonl differ diff --git a/metaicl/llama/inst:climate_fever/inst:climate_fever_16_100_test.jsonl b/metaicl/llama/inst:climate_fever/inst:climate_fever_16_100_test.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..dad85480e210ae67aee941e672b799e50c7fa523 --- /dev/null +++ b/metaicl/llama/inst:climate_fever/inst:climate_fever_16_100_test.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:5d1fa9ee61a06b9839f4e4bf0617f022ed53028937750fe39da536df1b7a89e1 +size 126749 diff --git a/metaicl/llama/inst:climate_fever/inst:climate_fever_16_100_train.jsonl b/metaicl/llama/inst:climate_fever/inst:climate_fever_16_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..921176f41673c39af21278a05e92005d0da4dc5e Binary files /dev/null and b/metaicl/llama/inst:climate_fever/inst:climate_fever_16_100_train.jsonl differ diff --git a/metaicl/llama/inst:climate_fever/inst:climate_fever_16_13_train.jsonl b/metaicl/llama/inst:climate_fever/inst:climate_fever_16_13_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ef4bd069d4d2d302cde5dd543f717e1efda5cb85 Binary files /dev/null and b/metaicl/llama/inst:climate_fever/inst:climate_fever_16_13_train.jsonl differ diff --git a/metaicl/llama/inst:climate_fever/inst:climate_fever_16_21_train.jsonl b/metaicl/llama/inst:climate_fever/inst:climate_fever_16_21_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..dec08128e37a2c3abe60145b0c1d2f6a0d19440c Binary files /dev/null and b/metaicl/llama/inst:climate_fever/inst:climate_fever_16_21_train.jsonl differ diff --git a/metaicl/llama/inst:climate_fever/inst:climate_fever_16_42_train.jsonl b/metaicl/llama/inst:climate_fever/inst:climate_fever_16_42_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..36fdb2f677325fab5ac98c4bf42dafef06d4cd8c Binary files /dev/null and b/metaicl/llama/inst:climate_fever/inst:climate_fever_16_42_train.jsonl differ diff --git a/metaicl/llama/inst:climate_fever/inst:climate_fever_16_87_train.jsonl b/metaicl/llama/inst:climate_fever/inst:climate_fever_16_87_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f39b37a93ea325c047f3caac62716e0e8a2e40c4 Binary files /dev/null and b/metaicl/llama/inst:climate_fever/inst:climate_fever_16_87_train.jsonl differ diff --git a/metaicl/llama/kilt_ay2/kilt_ay2_16384_100_train.jsonl b/metaicl/llama/kilt_ay2/kilt_ay2_16384_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5f23b7537288420e55c1aab1dc2155cf37d0f5e1 --- /dev/null +++ b/metaicl/llama/kilt_ay2/kilt_ay2_16384_100_train.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:90365acce6613a0e485ad3a4546e047f3d029b6d4f9d82032c1aa73a52e02f13 +size 30142737 diff --git a/metaicl/llama/kilt_ay2/kilt_ay2_16_100_test.jsonl b/metaicl/llama/kilt_ay2/kilt_ay2_16_100_test.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e2b2a0d4cb1acaab87de01c496cb7739d0fd6a92 --- /dev/null +++ b/metaicl/llama/kilt_ay2/kilt_ay2_16_100_test.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:bd5bf031b1194d414d313d8f6923d82beb488d10fd716da663b4a414fe9d7977 +size 10307017 diff --git a/metaicl/llama/kilt_ay2/kilt_ay2_16_100_train.jsonl b/metaicl/llama/kilt_ay2/kilt_ay2_16_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..80254c5616c9101b7a85d263ae08abcd96a4a096 Binary files /dev/null and b/metaicl/llama/kilt_ay2/kilt_ay2_16_100_train.jsonl differ diff --git a/metaicl/llama/kilt_ay2/kilt_ay2_16_13_train.jsonl b/metaicl/llama/kilt_ay2/kilt_ay2_16_13_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..969b6616f0c7cf50d40ab8d0c069825c143fecc2 Binary files /dev/null and b/metaicl/llama/kilt_ay2/kilt_ay2_16_13_train.jsonl differ diff --git a/metaicl/llama/kilt_ay2/kilt_ay2_16_21_train.jsonl b/metaicl/llama/kilt_ay2/kilt_ay2_16_21_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c6e6729b268fc665d2c57c7e8da363589f653bfa Binary files /dev/null and b/metaicl/llama/kilt_ay2/kilt_ay2_16_21_train.jsonl differ diff --git a/metaicl/llama/kilt_ay2/kilt_ay2_16_42_train.jsonl b/metaicl/llama/kilt_ay2/kilt_ay2_16_42_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4d7c259dd6d979722a323bae136f97138724fcd8 Binary files /dev/null and b/metaicl/llama/kilt_ay2/kilt_ay2_16_42_train.jsonl differ diff --git a/metaicl/llama/kilt_ay2/kilt_ay2_16_87_train.jsonl b/metaicl/llama/kilt_ay2/kilt_ay2_16_87_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ded3590d0663e4d1154cf24aeb75b8e41b876d1f Binary files /dev/null and b/metaicl/llama/kilt_ay2/kilt_ay2_16_87_train.jsonl differ diff --git a/metaicl/llama/kilt_fever/kilt_fever_16384_100_train.jsonl b/metaicl/llama/kilt_fever/kilt_fever_16384_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4f43e8373fb237d1a95e3e4d6218fde04bab0355 --- /dev/null +++ b/metaicl/llama/kilt_fever/kilt_fever_16384_100_train.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:f3fc8a5c5909b3e7f6455ff39291acf9ef2f286a1e6c005689dfe8c68abd23ac +size 1919125 diff --git a/metaicl/llama/kilt_fever/kilt_fever_16_100_test.jsonl b/metaicl/llama/kilt_fever/kilt_fever_16_100_test.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5217dc578ca3235a4758b8d5a17ff6662d97500e --- /dev/null +++ b/metaicl/llama/kilt_fever/kilt_fever_16_100_test.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:56baeac50788b42a987430c04a1201fe0057511120a2011b594f5d7b494782dc +size 1243917 diff --git a/metaicl/llama/kilt_fever/kilt_fever_16_100_train.jsonl b/metaicl/llama/kilt_fever/kilt_fever_16_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..effa97932aff79627c25ec8be4c027a90068bea1 Binary files /dev/null and b/metaicl/llama/kilt_fever/kilt_fever_16_100_train.jsonl differ diff --git a/metaicl/llama/kilt_fever/kilt_fever_16_13_train.jsonl b/metaicl/llama/kilt_fever/kilt_fever_16_13_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4332f7c93fb085bff7980592a7a267a11cc62ac5 Binary files /dev/null and b/metaicl/llama/kilt_fever/kilt_fever_16_13_train.jsonl differ diff --git a/metaicl/llama/kilt_fever/kilt_fever_16_21_train.jsonl b/metaicl/llama/kilt_fever/kilt_fever_16_21_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b1402bfbc0aa346ecc9ddc767a76c9c601cb61dc Binary files /dev/null and b/metaicl/llama/kilt_fever/kilt_fever_16_21_train.jsonl differ diff --git a/metaicl/llama/kilt_fever/kilt_fever_16_42_train.jsonl b/metaicl/llama/kilt_fever/kilt_fever_16_42_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e8dc4b9c4586817c926fd789f3675ba966a50cca Binary files /dev/null and b/metaicl/llama/kilt_fever/kilt_fever_16_42_train.jsonl differ diff --git a/metaicl/llama/kilt_fever/kilt_fever_16_87_train.jsonl b/metaicl/llama/kilt_fever/kilt_fever_16_87_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b4986c6e001bc598febdd8433bebc8442a92cdd3 Binary files /dev/null and b/metaicl/llama/kilt_fever/kilt_fever_16_87_train.jsonl differ diff --git a/metaicl/llama/kilt_hotpotqa/kilt_hotpotqa_16384_100_train.jsonl b/metaicl/llama/kilt_hotpotqa/kilt_hotpotqa_16384_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ee2c2629a164791240434e0765079888d0870059 --- /dev/null +++ b/metaicl/llama/kilt_hotpotqa/kilt_hotpotqa_16384_100_train.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:508a50d5220651939a9e16b4c4b4a6e98c2e1ea8cf4320893fb4895140ec9677 +size 1812891 diff --git a/metaicl/llama/kilt_hotpotqa/kilt_hotpotqa_16_100_test.jsonl b/metaicl/llama/kilt_hotpotqa/kilt_hotpotqa_16_100_test.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..cf283d5ac3e413849b104040d12e920d1611a172 --- /dev/null +++ b/metaicl/llama/kilt_hotpotqa/kilt_hotpotqa_16_100_test.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:75f95750460c97b47d399fa8fcb0c360c444070cd5a29fc370478ea24d42c61e +size 566035 diff --git a/metaicl/llama/kilt_hotpotqa/kilt_hotpotqa_16_100_train.jsonl b/metaicl/llama/kilt_hotpotqa/kilt_hotpotqa_16_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e92373611997c3c7cb3ad8c1cf690e1a56fd81bd Binary files /dev/null and b/metaicl/llama/kilt_hotpotqa/kilt_hotpotqa_16_100_train.jsonl differ diff --git a/metaicl/llama/kilt_hotpotqa/kilt_hotpotqa_16_13_train.jsonl b/metaicl/llama/kilt_hotpotqa/kilt_hotpotqa_16_13_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..04ca09084c19957c387d4414ef987176512c663d Binary files /dev/null and b/metaicl/llama/kilt_hotpotqa/kilt_hotpotqa_16_13_train.jsonl differ diff --git a/metaicl/llama/kilt_hotpotqa/kilt_hotpotqa_16_21_train.jsonl b/metaicl/llama/kilt_hotpotqa/kilt_hotpotqa_16_21_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5abe2dcfd032c33899f181e135c550d220203a21 Binary files /dev/null and b/metaicl/llama/kilt_hotpotqa/kilt_hotpotqa_16_21_train.jsonl differ diff --git a/metaicl/llama/kilt_hotpotqa/kilt_hotpotqa_16_42_train.jsonl b/metaicl/llama/kilt_hotpotqa/kilt_hotpotqa_16_42_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c867ccff411e30536c1b990485e3608111cac227 Binary files /dev/null and b/metaicl/llama/kilt_hotpotqa/kilt_hotpotqa_16_42_train.jsonl differ diff --git a/metaicl/llama/kilt_hotpotqa/kilt_hotpotqa_16_87_train.jsonl b/metaicl/llama/kilt_hotpotqa/kilt_hotpotqa_16_87_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3cdc75658ec6741922bb20f971a9ed464b8e497e Binary files /dev/null and b/metaicl/llama/kilt_hotpotqa/kilt_hotpotqa_16_87_train.jsonl differ diff --git a/metaicl/llama/kilt_nq/kilt_nq_16384_100_train.jsonl b/metaicl/llama/kilt_nq/kilt_nq_16384_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..96abce18b79f17f3e90603619aaed2ef863af67f --- /dev/null +++ b/metaicl/llama/kilt_nq/kilt_nq_16384_100_train.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:1271280e9c77d5b62cef471add085bb95dcef135f014583c1137ef042d10ee32 +size 1093839 diff --git a/metaicl/llama/kilt_nq/kilt_nq_16_100_test.jsonl b/metaicl/llama/kilt_nq/kilt_nq_16_100_test.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..49286b95e3378430a42918b4ea011e4c0b92127f --- /dev/null +++ b/metaicl/llama/kilt_nq/kilt_nq_16_100_test.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:cc333ce4daf4a73863f9cf6e202e4cf7d2ab30d100086634796b3b4a3d517302 +size 187527 diff --git a/metaicl/llama/kilt_nq/kilt_nq_16_100_train.jsonl b/metaicl/llama/kilt_nq/kilt_nq_16_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ae4dfce9de8afd56d6d4a0193d43eca9c2ab115b Binary files /dev/null and b/metaicl/llama/kilt_nq/kilt_nq_16_100_train.jsonl differ diff --git a/metaicl/llama/kilt_nq/kilt_nq_16_13_train.jsonl b/metaicl/llama/kilt_nq/kilt_nq_16_13_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..376c0219816fb755c0bdd4df72e7220c24c43cbd Binary files /dev/null and b/metaicl/llama/kilt_nq/kilt_nq_16_13_train.jsonl differ diff --git a/metaicl/llama/kilt_nq/kilt_nq_16_21_train.jsonl b/metaicl/llama/kilt_nq/kilt_nq_16_21_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b65c8b52796b3956ff3c82d31adccbd9bdc33f0b Binary files /dev/null and b/metaicl/llama/kilt_nq/kilt_nq_16_21_train.jsonl differ diff --git a/metaicl/llama/kilt_nq/kilt_nq_16_42_train.jsonl b/metaicl/llama/kilt_nq/kilt_nq_16_42_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6b00459cd1922e48af9d931c520fd4a92a2660a2 Binary files /dev/null and b/metaicl/llama/kilt_nq/kilt_nq_16_42_train.jsonl differ diff --git a/metaicl/llama/kilt_nq/kilt_nq_16_87_train.jsonl b/metaicl/llama/kilt_nq/kilt_nq_16_87_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..80895d80b3b879abf5d0fa24a2c27ae9f9036b92 Binary files /dev/null and b/metaicl/llama/kilt_nq/kilt_nq_16_87_train.jsonl differ diff --git a/metaicl/llama/kilt_trex/kilt_trex_16384_100_train.jsonl b/metaicl/llama/kilt_trex/kilt_trex_16384_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..184b44b40e652bfd6bdf707f85bb9653606a51fb --- /dev/null +++ b/metaicl/llama/kilt_trex/kilt_trex_16384_100_train.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:7739ebef27db967b8117f5de91a31037ad842e7c68fd26aee21c3416101ea63c +size 996563 diff --git a/metaicl/llama/kilt_trex/kilt_trex_16_100_test.jsonl b/metaicl/llama/kilt_trex/kilt_trex_16_100_test.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b6667ce50836a957a8fb495349d84078c8bd089d --- /dev/null +++ b/metaicl/llama/kilt_trex/kilt_trex_16_100_test.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:3b5102893ce29d6aeec79a438823165222223a9773cba822568dc89ceaf95e3c +size 303755 diff --git a/metaicl/llama/kilt_trex/kilt_trex_16_100_train.jsonl b/metaicl/llama/kilt_trex/kilt_trex_16_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7bcb3e3d846eebcd2b347ec455c2126fd2ce7980 Binary files /dev/null and b/metaicl/llama/kilt_trex/kilt_trex_16_100_train.jsonl differ diff --git a/metaicl/llama/kilt_trex/kilt_trex_16_13_train.jsonl b/metaicl/llama/kilt_trex/kilt_trex_16_13_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b7b98678eb215936168abcf0234c1a8123756a3e Binary files /dev/null and b/metaicl/llama/kilt_trex/kilt_trex_16_13_train.jsonl differ diff --git a/metaicl/llama/kilt_trex/kilt_trex_16_21_train.jsonl b/metaicl/llama/kilt_trex/kilt_trex_16_21_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7ced6a445e4498025f8c8f000daa27b8a080d08f Binary files /dev/null and b/metaicl/llama/kilt_trex/kilt_trex_16_21_train.jsonl differ diff --git a/metaicl/llama/kilt_trex/kilt_trex_16_42_train.jsonl b/metaicl/llama/kilt_trex/kilt_trex_16_42_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1b2269145f1d602d333c53d91624bcefe6b51316 Binary files /dev/null and b/metaicl/llama/kilt_trex/kilt_trex_16_42_train.jsonl differ diff --git a/metaicl/llama/kilt_trex/kilt_trex_16_87_train.jsonl b/metaicl/llama/kilt_trex/kilt_trex_16_87_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4ec12da1bb86d1630b0b36c0807851783549a9be Binary files /dev/null and b/metaicl/llama/kilt_trex/kilt_trex_16_87_train.jsonl differ diff --git a/metaicl/llama/kilt_zsre/kilt_zsre_16384_100_train.jsonl b/metaicl/llama/kilt_zsre/kilt_zsre_16384_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8dccab3064d52462687496657fe8c184609c643d --- /dev/null +++ b/metaicl/llama/kilt_zsre/kilt_zsre_16384_100_train.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:8d603a7b6c2ed7b66a3e5a59957c1347d95bb85cf52b16d5c0b2540cbc793f1c +size 1056147 diff --git a/metaicl/llama/kilt_zsre/kilt_zsre_16_100_test.jsonl b/metaicl/llama/kilt_zsre/kilt_zsre_16_100_test.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5800ccfe4326249c76b25e247b0f7e561cca44ad --- /dev/null +++ b/metaicl/llama/kilt_zsre/kilt_zsre_16_100_test.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:e0643d754b5436f1b9b0708dea364dde70478a8d37e4e6306a79fab918a3d2eb +size 246027 diff --git a/metaicl/llama/kilt_zsre/kilt_zsre_16_100_train.jsonl b/metaicl/llama/kilt_zsre/kilt_zsre_16_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b92622afe259989307b7dc1ced27f2b29ce22469 Binary files /dev/null and b/metaicl/llama/kilt_zsre/kilt_zsre_16_100_train.jsonl differ diff --git a/metaicl/llama/kilt_zsre/kilt_zsre_16_13_train.jsonl b/metaicl/llama/kilt_zsre/kilt_zsre_16_13_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1a2efe16f5dca6483e7bb8aede3ee7955803c252 Binary files /dev/null and b/metaicl/llama/kilt_zsre/kilt_zsre_16_13_train.jsonl differ diff --git a/metaicl/llama/kilt_zsre/kilt_zsre_16_21_train.jsonl b/metaicl/llama/kilt_zsre/kilt_zsre_16_21_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0b118c5296caa55a383e46ba708c1ee267148b4c Binary files /dev/null and b/metaicl/llama/kilt_zsre/kilt_zsre_16_21_train.jsonl differ diff --git a/metaicl/llama/kilt_zsre/kilt_zsre_16_42_train.jsonl b/metaicl/llama/kilt_zsre/kilt_zsre_16_42_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..625d2dfe720a83cad6147685666616e09bacdd79 Binary files /dev/null and b/metaicl/llama/kilt_zsre/kilt_zsre_16_42_train.jsonl differ diff --git a/metaicl/llama/kilt_zsre/kilt_zsre_16_87_train.jsonl b/metaicl/llama/kilt_zsre/kilt_zsre_16_87_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9789c719b10033d0617e839d2529a23895da57b5 Binary files /dev/null and b/metaicl/llama/kilt_zsre/kilt_zsre_16_87_train.jsonl differ diff --git a/metaicl/llama/lama-conceptnet/lama-conceptnet_16384_100_train.jsonl b/metaicl/llama/lama-conceptnet/lama-conceptnet_16384_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d8c2365d259f59fbc0d4572983c759b6d5d45874 --- /dev/null +++ b/metaicl/llama/lama-conceptnet/lama-conceptnet_16384_100_train.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:d0e1a00c086f2f1994f51d4b27f48a3a5131f8136565a7cbedfae7fe40eb4b42 +size 1084511 diff --git a/metaicl/llama/lama-conceptnet/lama-conceptnet_16_100_test.jsonl b/metaicl/llama/lama-conceptnet/lama-conceptnet_16_100_test.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..cfaea2df5ddf524e5c2e37f8db6d2b664de05bde --- /dev/null +++ b/metaicl/llama/lama-conceptnet/lama-conceptnet_16_100_test.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:13a1571d00aebea9d40e175e37dbf8d84e59f2fe84ee01d6537e41a72c9ecabe +size 394135 diff --git a/metaicl/llama/lama-conceptnet/lama-conceptnet_16_100_train.jsonl b/metaicl/llama/lama-conceptnet/lama-conceptnet_16_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..646fea5e1b9f608c2fbb20f18651561521e8820e Binary files /dev/null and b/metaicl/llama/lama-conceptnet/lama-conceptnet_16_100_train.jsonl differ diff --git a/metaicl/llama/lama-conceptnet/lama-conceptnet_16_13_train.jsonl b/metaicl/llama/lama-conceptnet/lama-conceptnet_16_13_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7edc1266b4f4683f44a8331d20425e36c362d951 Binary files /dev/null and b/metaicl/llama/lama-conceptnet/lama-conceptnet_16_13_train.jsonl differ diff --git a/metaicl/llama/lama-conceptnet/lama-conceptnet_16_21_train.jsonl b/metaicl/llama/lama-conceptnet/lama-conceptnet_16_21_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..57ca329c5f829edd9936343a5e354453e4334bf4 Binary files /dev/null and b/metaicl/llama/lama-conceptnet/lama-conceptnet_16_21_train.jsonl differ diff --git a/metaicl/llama/lama-conceptnet/lama-conceptnet_16_42_train.jsonl b/metaicl/llama/lama-conceptnet/lama-conceptnet_16_42_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c19efa89a132a9ff96b858f359fed3e5a75e92e1 Binary files /dev/null and b/metaicl/llama/lama-conceptnet/lama-conceptnet_16_42_train.jsonl differ diff --git a/metaicl/llama/lama-conceptnet/lama-conceptnet_16_87_train.jsonl b/metaicl/llama/lama-conceptnet/lama-conceptnet_16_87_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0381a56fe297c877520e9fd870d03b94af33b44d Binary files /dev/null and b/metaicl/llama/lama-conceptnet/lama-conceptnet_16_87_train.jsonl differ diff --git a/metaicl/llama/lama-google_re/lama-google_re_16384_100_train.jsonl b/metaicl/llama/lama-google_re/lama-google_re_16384_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..42b9d6e5da615c0eefb88ce880ff2b37a7de2001 --- /dev/null +++ b/metaicl/llama/lama-google_re/lama-google_re_16384_100_train.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:16eb51d226c5e991862743c305150c580c3dd784668c185aae1a101015db6263 +size 301725 diff --git a/metaicl/llama/lama-google_re/lama-google_re_16_100_test.jsonl b/metaicl/llama/lama-google_re/lama-google_re_16_100_test.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..52957314e531f51d5e26058a25cd84185cf6595e Binary files /dev/null and b/metaicl/llama/lama-google_re/lama-google_re_16_100_test.jsonl differ diff --git a/metaicl/llama/lama-google_re/lama-google_re_16_100_train.jsonl b/metaicl/llama/lama-google_re/lama-google_re_16_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..93bcfd03221d79eddff1ba778775ade5f5596299 Binary files /dev/null and b/metaicl/llama/lama-google_re/lama-google_re_16_100_train.jsonl differ diff --git a/metaicl/llama/lama-google_re/lama-google_re_16_13_train.jsonl b/metaicl/llama/lama-google_re/lama-google_re_16_13_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..85c578e0ace2d8c2c669b834c0eaf2476f73432a Binary files /dev/null and b/metaicl/llama/lama-google_re/lama-google_re_16_13_train.jsonl differ diff --git a/metaicl/llama/lama-google_re/lama-google_re_16_21_train.jsonl b/metaicl/llama/lama-google_re/lama-google_re_16_21_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d7fafd6b59791adf04ed400bddfcf377dc475349 Binary files /dev/null and b/metaicl/llama/lama-google_re/lama-google_re_16_21_train.jsonl differ diff --git a/metaicl/llama/lama-google_re/lama-google_re_16_42_train.jsonl b/metaicl/llama/lama-google_re/lama-google_re_16_42_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f2121c1fc4e03ab8b895c14f295e5336e1a3088d Binary files /dev/null and b/metaicl/llama/lama-google_re/lama-google_re_16_42_train.jsonl differ diff --git a/metaicl/llama/lama-google_re/lama-google_re_16_87_train.jsonl b/metaicl/llama/lama-google_re/lama-google_re_16_87_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..57028fb1a2f66bd1eac3f9ed19e303fffcf7a382 Binary files /dev/null and b/metaicl/llama/lama-google_re/lama-google_re_16_87_train.jsonl differ diff --git a/metaicl/llama/lama-squad/lama-squad_16384_100_train.jsonl b/metaicl/llama/lama-squad/lama-squad_16384_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7721e630199aa2bdee374da9ff377d93d43d0a53 Binary files /dev/null and b/metaicl/llama/lama-squad/lama-squad_16384_100_train.jsonl differ diff --git a/metaicl/llama/lama-squad/lama-squad_16_100_test.jsonl b/metaicl/llama/lama-squad/lama-squad_16_100_test.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0c658a6647a6f7906c3d48a729258c768ba2536c Binary files /dev/null and b/metaicl/llama/lama-squad/lama-squad_16_100_test.jsonl differ diff --git a/metaicl/llama/lama-squad/lama-squad_16_100_train.jsonl b/metaicl/llama/lama-squad/lama-squad_16_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e7ae402683fd2bb11f806108f1f397347a81320e Binary files /dev/null and b/metaicl/llama/lama-squad/lama-squad_16_100_train.jsonl differ diff --git a/metaicl/llama/lama-squad/lama-squad_16_13_train.jsonl b/metaicl/llama/lama-squad/lama-squad_16_13_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8cc0f9ce67d1adbc86077c627132fe0a49a4a6b6 Binary files /dev/null and b/metaicl/llama/lama-squad/lama-squad_16_13_train.jsonl differ diff --git a/metaicl/llama/lama-squad/lama-squad_16_21_train.jsonl b/metaicl/llama/lama-squad/lama-squad_16_21_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d04e0c7a85d70518896a49fe8cde1b2728dccd18 Binary files /dev/null and b/metaicl/llama/lama-squad/lama-squad_16_21_train.jsonl differ diff --git a/metaicl/llama/lama-squad/lama-squad_16_42_train.jsonl b/metaicl/llama/lama-squad/lama-squad_16_42_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9d1f7a9279e795343aa69b12a86a4769c06a22e4 Binary files /dev/null and b/metaicl/llama/lama-squad/lama-squad_16_42_train.jsonl differ diff --git a/metaicl/llama/lama-squad/lama-squad_16_87_train.jsonl b/metaicl/llama/lama-squad/lama-squad_16_87_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..07d29f7f40b2940aebbac2fac322be9a27396539 Binary files /dev/null and b/metaicl/llama/lama-squad/lama-squad_16_87_train.jsonl differ diff --git a/metaicl/llama/lama-trex/lama-trex_16384_100_train.jsonl b/metaicl/llama/lama-trex/lama-trex_16384_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..41554188c098250cc499c34b6903760914148e38 --- /dev/null +++ b/metaicl/llama/lama-trex/lama-trex_16384_100_train.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:3087cb713a6c231cc2b57899a568ba0b79f74b21530b56ef0db3e342e3fab0dc +size 934355 diff --git a/metaicl/llama/lama-trex/lama-trex_16_100_test.jsonl b/metaicl/llama/lama-trex/lama-trex_16_100_test.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9d32ca69d3dca9eda75e60302a85b0617ede4b79 --- /dev/null +++ b/metaicl/llama/lama-trex/lama-trex_16_100_test.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:5c69c45f9aab383e76fd78af18f7806813372e498edbaf4fe9f29f6e9b694b89 +size 743243 diff --git a/metaicl/llama/lama-trex/lama-trex_16_100_train.jsonl b/metaicl/llama/lama-trex/lama-trex_16_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..488dfff6ace7ff269b0061a7660c77844b446cf1 Binary files /dev/null and b/metaicl/llama/lama-trex/lama-trex_16_100_train.jsonl differ diff --git a/metaicl/llama/lama-trex/lama-trex_16_13_train.jsonl b/metaicl/llama/lama-trex/lama-trex_16_13_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ea132bf339df47152d544c03e8273fcc64ff0403 Binary files /dev/null and b/metaicl/llama/lama-trex/lama-trex_16_13_train.jsonl differ diff --git a/metaicl/llama/lama-trex/lama-trex_16_21_train.jsonl b/metaicl/llama/lama-trex/lama-trex_16_21_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..407ae42476fa436dda58ba794eba48c96107058d Binary files /dev/null and b/metaicl/llama/lama-trex/lama-trex_16_21_train.jsonl differ diff --git a/metaicl/llama/lama-trex/lama-trex_16_42_train.jsonl b/metaicl/llama/lama-trex/lama-trex_16_42_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..df14a8adaeb1f04016cc7b4823ac47be2af30413 Binary files /dev/null and b/metaicl/llama/lama-trex/lama-trex_16_42_train.jsonl differ diff --git a/metaicl/llama/lama-trex/lama-trex_16_87_train.jsonl b/metaicl/llama/lama-trex/lama-trex_16_87_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d404ead8391b65bfcb49db148b830d62c2eb476b Binary files /dev/null and b/metaicl/llama/lama-trex/lama-trex_16_87_train.jsonl differ diff --git a/metaicl/llama/liar/liar_16384_100_train.jsonl b/metaicl/llama/liar/liar_16384_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0a3894fe2ac8751752152302d8c38e4c47330a8c --- /dev/null +++ b/metaicl/llama/liar/liar_16384_100_train.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:17229dbee7f6780263029925c2698c929395fa9b7aae6b45d953d6a554dcfaec +size 2909001 diff --git a/metaicl/llama/liar/liar_16_100_test.jsonl b/metaicl/llama/liar/liar_16_100_test.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..31bf7a672b2ae2468fd2b51d4ea2041a8c29139a --- /dev/null +++ b/metaicl/llama/liar/liar_16_100_test.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:cc3feaf1cb9435f25ff243d87de97b679925472c83f87ed1c6e3a2a4b2bd45c5 +size 363521 diff --git a/metaicl/llama/liar/liar_16_100_train.jsonl b/metaicl/llama/liar/liar_16_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d5b75c7146876e4125386f01b482545e017cf907 Binary files /dev/null and b/metaicl/llama/liar/liar_16_100_train.jsonl differ diff --git a/metaicl/llama/liar/liar_16_13_train.jsonl b/metaicl/llama/liar/liar_16_13_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e9f7a3fa8fdda233750aadc4e04748e78a1a1248 Binary files /dev/null and b/metaicl/llama/liar/liar_16_13_train.jsonl differ diff --git a/metaicl/llama/liar/liar_16_21_train.jsonl b/metaicl/llama/liar/liar_16_21_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..266f5389db36082c687ef9a2d57b016268d8f686 Binary files /dev/null and b/metaicl/llama/liar/liar_16_21_train.jsonl differ diff --git a/metaicl/llama/liar/liar_16_42_train.jsonl b/metaicl/llama/liar/liar_16_42_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2d889180790e037df941298c70ceb522e4840192 Binary files /dev/null and b/metaicl/llama/liar/liar_16_42_train.jsonl differ diff --git a/metaicl/llama/liar/liar_16_87_train.jsonl b/metaicl/llama/liar/liar_16_87_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..361965f434b32124db3a67b38e51781e264378c4 Binary files /dev/null and b/metaicl/llama/liar/liar_16_87_train.jsonl differ diff --git a/metaicl/llama/mc_taco/mc_taco_16384_100_train.jsonl b/metaicl/llama/mc_taco/mc_taco_16384_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..161cd7687cd0e87a28b715acfde9f40d96ccd9cb --- /dev/null +++ b/metaicl/llama/mc_taco/mc_taco_16384_100_train.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:ccb23526f24e318a459840b404a0af5e0f10b7a00b813d77e51356087fcf1cf7 +size 586639 diff --git a/metaicl/llama/mc_taco/mc_taco_16_100_test.jsonl b/metaicl/llama/mc_taco/mc_taco_16_100_test.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..20550961f2dbca1325e8a01cde9ac90e4e2454af --- /dev/null +++ b/metaicl/llama/mc_taco/mc_taco_16_100_test.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:a1239b7a372cc8be4d1ffb2d4d2788b9b6f177aebdccb6c8fcc7cd0969dfb27c +size 146503 diff --git a/metaicl/llama/mc_taco/mc_taco_16_100_train.jsonl b/metaicl/llama/mc_taco/mc_taco_16_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5b2eece1db3d98a70db97f5103e97ba01db3b678 Binary files /dev/null and b/metaicl/llama/mc_taco/mc_taco_16_100_train.jsonl differ diff --git a/metaicl/llama/mc_taco/mc_taco_16_13_train.jsonl b/metaicl/llama/mc_taco/mc_taco_16_13_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..92f7680e84c539e4b9d93cc97f5f41e4ff11fcf6 Binary files /dev/null and b/metaicl/llama/mc_taco/mc_taco_16_13_train.jsonl differ diff --git a/metaicl/llama/mc_taco/mc_taco_16_21_train.jsonl b/metaicl/llama/mc_taco/mc_taco_16_21_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5499631e6deae5479395b62647200dbdd643cddf Binary files /dev/null and b/metaicl/llama/mc_taco/mc_taco_16_21_train.jsonl differ diff --git a/metaicl/llama/mc_taco/mc_taco_16_42_train.jsonl b/metaicl/llama/mc_taco/mc_taco_16_42_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a6f5009ac45b116b909ab5b403ab67f7d297075d Binary files /dev/null and b/metaicl/llama/mc_taco/mc_taco_16_42_train.jsonl differ diff --git a/metaicl/llama/mc_taco/mc_taco_16_87_train.jsonl b/metaicl/llama/mc_taco/mc_taco_16_87_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e24a13063c9830d7bdb4d0693fa039732081efe8 Binary files /dev/null and b/metaicl/llama/mc_taco/mc_taco_16_87_train.jsonl differ diff --git a/metaicl/llama/medical_questions_pairs/medical_questions_pairs_16384_100_train.jsonl b/metaicl/llama/medical_questions_pairs/medical_questions_pairs_16384_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4885a20aab238f3364f4ebb65f35e83239afeba0 --- /dev/null +++ b/metaicl/llama/medical_questions_pairs/medical_questions_pairs_16384_100_train.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:d93c5505e7006f52165e55835e40b4064a86853d52e5cf328bb7f38040fb4244 +size 658543 diff --git a/metaicl/llama/medical_questions_pairs/medical_questions_pairs_16_100_test.jsonl b/metaicl/llama/medical_questions_pairs/medical_questions_pairs_16_100_test.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7e49712cb033f7e1b199e4b1485bcfbeb9bf6cc0 --- /dev/null +++ b/metaicl/llama/medical_questions_pairs/medical_questions_pairs_16_100_test.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:7ad4688d85fb77c617dca7498cf24f38c299e0338f6968962040f7dd8b5a0801 +size 167463 diff --git a/metaicl/llama/medical_questions_pairs/medical_questions_pairs_16_100_train.jsonl b/metaicl/llama/medical_questions_pairs/medical_questions_pairs_16_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9dd5334fbe3f66c91c3ac7be135c9be2243146c3 Binary files /dev/null and b/metaicl/llama/medical_questions_pairs/medical_questions_pairs_16_100_train.jsonl differ diff --git a/metaicl/llama/medical_questions_pairs/medical_questions_pairs_16_13_train.jsonl b/metaicl/llama/medical_questions_pairs/medical_questions_pairs_16_13_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..341f652711ba99b5bf3447fac2a1a008aaf6a7e2 Binary files /dev/null and b/metaicl/llama/medical_questions_pairs/medical_questions_pairs_16_13_train.jsonl differ diff --git a/metaicl/llama/medical_questions_pairs/medical_questions_pairs_16_21_train.jsonl b/metaicl/llama/medical_questions_pairs/medical_questions_pairs_16_21_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1ec32d8c744655c2d81bad65639f0391a2aa4dea Binary files /dev/null and b/metaicl/llama/medical_questions_pairs/medical_questions_pairs_16_21_train.jsonl differ diff --git a/metaicl/llama/medical_questions_pairs/medical_questions_pairs_16_42_train.jsonl b/metaicl/llama/medical_questions_pairs/medical_questions_pairs_16_42_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..080a2841c00f3fef84b731e42d8923bb3cebd5e3 Binary files /dev/null and b/metaicl/llama/medical_questions_pairs/medical_questions_pairs_16_42_train.jsonl differ diff --git a/metaicl/llama/medical_questions_pairs/medical_questions_pairs_16_87_train.jsonl b/metaicl/llama/medical_questions_pairs/medical_questions_pairs_16_87_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..165dad5960cd711c67cb847c843edc77f771806e Binary files /dev/null and b/metaicl/llama/medical_questions_pairs/medical_questions_pairs_16_87_train.jsonl differ diff --git a/metaicl/llama/numer_sense/numer_sense_16384_100_train.jsonl b/metaicl/llama/numer_sense/numer_sense_16384_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..15cc985e9c843229cbfb4d724151434e1f409e13 --- /dev/null +++ b/metaicl/llama/numer_sense/numer_sense_16384_100_train.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:7e459bc5dea04477eb25b333df04f3348729fd367cd4f4c36f2864e00c5d79a1 +size 1701911 diff --git a/metaicl/llama/numer_sense/numer_sense_16_100_test.jsonl b/metaicl/llama/numer_sense/numer_sense_16_100_test.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..14e532bd648526f4fe8ca557429479cba67c238f --- /dev/null +++ b/metaicl/llama/numer_sense/numer_sense_16_100_test.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:3eec8014a8b0e0dcc4e6865a74bc9e989197217992425cbf2d8f59669ca28060 +size 425359 diff --git a/metaicl/llama/numer_sense/numer_sense_16_100_train.jsonl b/metaicl/llama/numer_sense/numer_sense_16_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7fb31bf9f417030b7aea466fd6fbd49b2f2219f3 Binary files /dev/null and b/metaicl/llama/numer_sense/numer_sense_16_100_train.jsonl differ diff --git a/metaicl/llama/numer_sense/numer_sense_16_13_train.jsonl b/metaicl/llama/numer_sense/numer_sense_16_13_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a2cf126dae4688366bf0838b6d79ddfe6bf23311 Binary files /dev/null and b/metaicl/llama/numer_sense/numer_sense_16_13_train.jsonl differ diff --git a/metaicl/llama/numer_sense/numer_sense_16_21_train.jsonl b/metaicl/llama/numer_sense/numer_sense_16_21_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d2359e8e201dd74e98be68bd8bac96c07f0300aa Binary files /dev/null and b/metaicl/llama/numer_sense/numer_sense_16_21_train.jsonl differ diff --git a/metaicl/llama/numer_sense/numer_sense_16_42_train.jsonl b/metaicl/llama/numer_sense/numer_sense_16_42_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3f2cd4b23234facc70d27e8da0ccc00657325710 Binary files /dev/null and b/metaicl/llama/numer_sense/numer_sense_16_42_train.jsonl differ diff --git a/metaicl/llama/numer_sense/numer_sense_16_87_train.jsonl b/metaicl/llama/numer_sense/numer_sense_16_87_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b210170402d8edee740754c4bdc5f107437425a6 Binary files /dev/null and b/metaicl/llama/numer_sense/numer_sense_16_87_train.jsonl differ diff --git a/metaicl/llama/onestop_english/onestop_english_16384_100_train.jsonl b/metaicl/llama/onestop_english/onestop_english_16384_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..216f58198326a02ee98b01f5b2f5a1abaed8f226 --- /dev/null +++ b/metaicl/llama/onestop_english/onestop_english_16384_100_train.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:8d7a97a0866d59a1828b6a70a86e70dbbcd1cf093e9838b06a20ed9d5a6e566f +size 1344031 diff --git a/metaicl/llama/onestop_english/onestop_english_16_100_test.jsonl b/metaicl/llama/onestop_english/onestop_english_16_100_test.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3acf2c8b44542098dcd746f274b9e50379a3a565 --- /dev/null +++ b/metaicl/llama/onestop_english/onestop_english_16_100_test.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:6d7572cb27675bedcd11ebe49cd298e8bfbc344ed3e691a51435d34ef6c7ac2b +size 331735 diff --git a/metaicl/llama/onestop_english/onestop_english_16_100_train.jsonl b/metaicl/llama/onestop_english/onestop_english_16_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4fb9bfeebb90c8c9688da8020c5e9ca494c1b04f Binary files /dev/null and b/metaicl/llama/onestop_english/onestop_english_16_100_train.jsonl differ diff --git a/metaicl/llama/onestop_english/onestop_english_16_13_train.jsonl b/metaicl/llama/onestop_english/onestop_english_16_13_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4a8ecf16fdccd39499a85af5e392fe9984c4bc99 Binary files /dev/null and b/metaicl/llama/onestop_english/onestop_english_16_13_train.jsonl differ diff --git a/metaicl/llama/onestop_english/onestop_english_16_21_train.jsonl b/metaicl/llama/onestop_english/onestop_english_16_21_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e47b80c93b30fd932bf1c19e4d7e341051989354 Binary files /dev/null and b/metaicl/llama/onestop_english/onestop_english_16_21_train.jsonl differ diff --git a/metaicl/llama/onestop_english/onestop_english_16_42_train.jsonl b/metaicl/llama/onestop_english/onestop_english_16_42_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e257abd419e3670629a691bf4c2e68b5a2beeb95 Binary files /dev/null and b/metaicl/llama/onestop_english/onestop_english_16_42_train.jsonl differ diff --git a/metaicl/llama/onestop_english/onestop_english_16_87_train.jsonl b/metaicl/llama/onestop_english/onestop_english_16_87_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..be49842c3284ff6173fe199bb7b068b0357ec968 Binary files /dev/null and b/metaicl/llama/onestop_english/onestop_english_16_87_train.jsonl differ diff --git a/metaicl/llama/openbookqa/openbookqa_16384_100_train.jsonl b/metaicl/llama/openbookqa/openbookqa_16384_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..cc145d634fe996a54ba1d1f2698c72930646a97d --- /dev/null +++ b/metaicl/llama/openbookqa/openbookqa_16384_100_train.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:5699817453e2c1502e503782062245e5b90915b288e94d3ed78aa6ed6469ea11 +size 772053 diff --git a/metaicl/llama/openbookqa/openbookqa_16_100_test.jsonl b/metaicl/llama/openbookqa/openbookqa_16_100_test.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f6d5271c2370421344c0c61331a21161cd9b013f Binary files /dev/null and b/metaicl/llama/openbookqa/openbookqa_16_100_test.jsonl differ diff --git a/metaicl/llama/openbookqa/openbookqa_16_100_train.jsonl b/metaicl/llama/openbookqa/openbookqa_16_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6213570b6e44e29bb4ead28b8f82315ec54bff9c Binary files /dev/null and b/metaicl/llama/openbookqa/openbookqa_16_100_train.jsonl differ diff --git a/metaicl/llama/openbookqa/openbookqa_16_13_train.jsonl b/metaicl/llama/openbookqa/openbookqa_16_13_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b9e07f67082774622f97245ee9b1d5e04d494543 Binary files /dev/null and b/metaicl/llama/openbookqa/openbookqa_16_13_train.jsonl differ diff --git a/metaicl/llama/openbookqa/openbookqa_16_21_train.jsonl b/metaicl/llama/openbookqa/openbookqa_16_21_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ab95a7d0d9254764ec7b1dfe89d90f2e7c0fca30 Binary files /dev/null and b/metaicl/llama/openbookqa/openbookqa_16_21_train.jsonl differ diff --git a/metaicl/llama/openbookqa/openbookqa_16_42_train.jsonl b/metaicl/llama/openbookqa/openbookqa_16_42_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ec1b0dc26258e680de9aa04ebb908c2813f805c4 Binary files /dev/null and b/metaicl/llama/openbookqa/openbookqa_16_42_train.jsonl differ diff --git a/metaicl/llama/openbookqa/openbookqa_16_87_train.jsonl b/metaicl/llama/openbookqa/openbookqa_16_87_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f1b39fdf1456f9ac24fe1b432001954252e60f19 Binary files /dev/null and b/metaicl/llama/openbookqa/openbookqa_16_87_train.jsonl differ diff --git a/metaicl/llama/paws/paws_16384_100_train.jsonl b/metaicl/llama/paws/paws_16384_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0a6c89fbe22a1c98c5d9b330ee962ffecf6a837d --- /dev/null +++ b/metaicl/llama/paws/paws_16384_100_train.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:f7255b5123ee45b216ac5d16bf36e61384d31810ed0b5f324055739a7c1275d1 +size 4560649 diff --git a/metaicl/llama/paws/paws_16_100_test.jsonl b/metaicl/llama/paws/paws_16_100_test.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d685aebc10e1f6e1846e620caac46a4353cee7f6 --- /dev/null +++ b/metaicl/llama/paws/paws_16_100_test.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:5002fba0bd995c99938e6f7e9e8f9f2f61c0d7fc98ed0afae289be7965e16f83 +size 2234561 diff --git a/metaicl/llama/paws/paws_16_100_train.jsonl b/metaicl/llama/paws/paws_16_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8773601967d72f9a16ae85b4e0eefd11ea93f24e Binary files /dev/null and b/metaicl/llama/paws/paws_16_100_train.jsonl differ diff --git a/metaicl/llama/paws/paws_16_13_train.jsonl b/metaicl/llama/paws/paws_16_13_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4090535936fb9eec9d7649e9a05b9c10644cf7c8 Binary files /dev/null and b/metaicl/llama/paws/paws_16_13_train.jsonl differ diff --git a/metaicl/llama/paws/paws_16_21_train.jsonl b/metaicl/llama/paws/paws_16_21_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8c9b71effef90df4289ae6ccbbf7a8987d9bec5e Binary files /dev/null and b/metaicl/llama/paws/paws_16_21_train.jsonl differ diff --git a/metaicl/llama/paws/paws_16_42_train.jsonl b/metaicl/llama/paws/paws_16_42_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..13dd702ca5740a51c245beb57900e67e46ba7d64 Binary files /dev/null and b/metaicl/llama/paws/paws_16_42_train.jsonl differ diff --git a/metaicl/llama/paws/paws_16_87_train.jsonl b/metaicl/llama/paws/paws_16_87_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5b0644af00871d29da00464e0f1527b527c35b0a Binary files /dev/null and b/metaicl/llama/paws/paws_16_87_train.jsonl differ diff --git a/metaicl/llama/piqa/piqa_16384_100_train.jsonl b/metaicl/llama/piqa/piqa_16384_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5d6d237ce6879cb712be7284343d8dbf122e491e --- /dev/null +++ b/metaicl/llama/piqa/piqa_16384_100_train.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:2480231594cae0bc3047774c2d4ee853feb03d4d2a7e140fb881aae9d040121d +size 4817545 diff --git a/metaicl/llama/piqa/piqa_16_100_test.jsonl b/metaicl/llama/piqa/piqa_16_100_test.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..53207e17abfeeb248124e13161454a0554495b41 --- /dev/null +++ b/metaicl/llama/piqa/piqa_16_100_test.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:f7de5d815afc93e0fb70c882675f664b6f2ae1a05c2d9de1c1ff0c866ca79523 +size 547265 diff --git a/metaicl/llama/piqa/piqa_16_100_train.jsonl b/metaicl/llama/piqa/piqa_16_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3574986bdc1d51c4a2052cccb9922cae5f1da5cb Binary files /dev/null and b/metaicl/llama/piqa/piqa_16_100_train.jsonl differ diff --git a/metaicl/llama/piqa/piqa_16_13_train.jsonl b/metaicl/llama/piqa/piqa_16_13_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c72f41963a878e6eb1c030c9baf142bb64b36bc1 Binary files /dev/null and b/metaicl/llama/piqa/piqa_16_13_train.jsonl differ diff --git a/metaicl/llama/piqa/piqa_16_21_train.jsonl b/metaicl/llama/piqa/piqa_16_21_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7c57c6d430ef30845411782abd34986f4b73b4fb Binary files /dev/null and b/metaicl/llama/piqa/piqa_16_21_train.jsonl differ diff --git a/metaicl/llama/piqa/piqa_16_42_train.jsonl b/metaicl/llama/piqa/piqa_16_42_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f02d01f67e5c2dc5cb03c036e98a870bed991a73 Binary files /dev/null and b/metaicl/llama/piqa/piqa_16_42_train.jsonl differ diff --git a/metaicl/llama/piqa/piqa_16_87_train.jsonl b/metaicl/llama/piqa/piqa_16_87_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a8324bc4bfa715f064b0c300a60486b889cbe9dd Binary files /dev/null and b/metaicl/llama/piqa/piqa_16_87_train.jsonl differ diff --git a/metaicl/llama/poem_sentiment/poem_sentiment_16384_100_train.jsonl b/metaicl/llama/poem_sentiment/poem_sentiment_16384_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..817af0379358f40777f239933bf2217c00f71009 Binary files /dev/null and b/metaicl/llama/poem_sentiment/poem_sentiment_16384_100_train.jsonl differ diff --git a/metaicl/llama/poem_sentiment/poem_sentiment_16_100_test.jsonl b/metaicl/llama/poem_sentiment/poem_sentiment_16_100_test.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3c1e9c8eb2be57e93b0f083aca575ba87a65f91d Binary files /dev/null and b/metaicl/llama/poem_sentiment/poem_sentiment_16_100_test.jsonl differ diff --git a/metaicl/llama/poem_sentiment/poem_sentiment_16_100_train.jsonl b/metaicl/llama/poem_sentiment/poem_sentiment_16_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..587277c3861687d0fdfacccb5fa84d986752ec98 Binary files /dev/null and b/metaicl/llama/poem_sentiment/poem_sentiment_16_100_train.jsonl differ diff --git a/metaicl/llama/poem_sentiment/poem_sentiment_16_13_train.jsonl b/metaicl/llama/poem_sentiment/poem_sentiment_16_13_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7489bf0f8c24989c3de2a4da58bc12d98a48beb9 Binary files /dev/null and b/metaicl/llama/poem_sentiment/poem_sentiment_16_13_train.jsonl differ diff --git a/metaicl/llama/poem_sentiment/poem_sentiment_16_21_train.jsonl b/metaicl/llama/poem_sentiment/poem_sentiment_16_21_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8bfbae78c536167561bd072df8d77f4e4eb3deb5 Binary files /dev/null and b/metaicl/llama/poem_sentiment/poem_sentiment_16_21_train.jsonl differ diff --git a/metaicl/llama/poem_sentiment/poem_sentiment_16_42_train.jsonl b/metaicl/llama/poem_sentiment/poem_sentiment_16_42_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8dcda05fb3aef7a7f343ef2ac0ffff5722a67caf Binary files /dev/null and b/metaicl/llama/poem_sentiment/poem_sentiment_16_42_train.jsonl differ diff --git a/metaicl/llama/poem_sentiment/poem_sentiment_16_87_train.jsonl b/metaicl/llama/poem_sentiment/poem_sentiment_16_87_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ea8cea943ea75141a0e5fe3187432a3efc6886bc Binary files /dev/null and b/metaicl/llama/poem_sentiment/poem_sentiment_16_87_train.jsonl differ diff --git a/metaicl/llama/proto_qa/proto_qa_16384_100_train.jsonl b/metaicl/llama/proto_qa/proto_qa_16384_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e00cb85e1218f261776d528620bbb71f4e0a127c --- /dev/null +++ b/metaicl/llama/proto_qa/proto_qa_16384_100_train.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:d762668fc3fad0784b79f793dd4b41161c98754fcfbf6a32e0c81c18a15b0af7 +size 456145 diff --git a/metaicl/llama/proto_qa/proto_qa_16_100_test.jsonl b/metaicl/llama/proto_qa/proto_qa_16_100_test.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2b01bc59eadc8f4b80ed0882b067522502082a81 --- /dev/null +++ b/metaicl/llama/proto_qa/proto_qa_16_100_test.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:60fcabb4b2a9e3ce38c9d831823b3fe585a2b01314e86c896270f5ccb47662a0 +size 113417 diff --git a/metaicl/llama/proto_qa/proto_qa_16_100_train.jsonl b/metaicl/llama/proto_qa/proto_qa_16_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..65cb36226a2a0c837e1aa5f8e89ffef565c258b0 Binary files /dev/null and b/metaicl/llama/proto_qa/proto_qa_16_100_train.jsonl differ diff --git a/metaicl/llama/proto_qa/proto_qa_16_13_train.jsonl b/metaicl/llama/proto_qa/proto_qa_16_13_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..66f6f9ed83ac4f8e2c301d5ce6a4b537edf02087 Binary files /dev/null and b/metaicl/llama/proto_qa/proto_qa_16_13_train.jsonl differ diff --git a/metaicl/llama/proto_qa/proto_qa_16_21_train.jsonl b/metaicl/llama/proto_qa/proto_qa_16_21_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8c1d48bb1cadd8304a1c1a69752afba7161b4096 Binary files /dev/null and b/metaicl/llama/proto_qa/proto_qa_16_21_train.jsonl differ diff --git a/metaicl/llama/proto_qa/proto_qa_16_42_train.jsonl b/metaicl/llama/proto_qa/proto_qa_16_42_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1c4af8f2801713b348eda20edb0df1266c4c5afd Binary files /dev/null and b/metaicl/llama/proto_qa/proto_qa_16_42_train.jsonl differ diff --git a/metaicl/llama/proto_qa/proto_qa_16_87_train.jsonl b/metaicl/llama/proto_qa/proto_qa_16_87_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a5f860c51cd3e9c3e4419b261bc9f537f52656cc Binary files /dev/null and b/metaicl/llama/proto_qa/proto_qa_16_87_train.jsonl differ diff --git a/metaicl/llama/qa_srl/qa_srl_16384_100_train.jsonl b/metaicl/llama/qa_srl/qa_srl_16384_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..25857fe21f8b0e1b8a392d2dd5efa63d2c6d8f6e --- /dev/null +++ b/metaicl/llama/qa_srl/qa_srl_16384_100_train.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:1aedd07a3754f2e8f82c758b74c2627cb02aeadad582b1f9a5628c33ff54a006 +size 1190285 diff --git a/metaicl/llama/qa_srl/qa_srl_16_100_test.jsonl b/metaicl/llama/qa_srl/qa_srl_16_100_test.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3521cf3b216a1d651abc5986656394e577db6c6f --- /dev/null +++ b/metaicl/llama/qa_srl/qa_srl_16_100_test.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:8a457e44e58e9cefda8f06930c70d48a31758a47bf72a6b3b6a299c65370ccaf +size 408069 diff --git a/metaicl/llama/qa_srl/qa_srl_16_100_train.jsonl b/metaicl/llama/qa_srl/qa_srl_16_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..99413cd52f5e15a99511e930812fd66d43a2d8b6 Binary files /dev/null and b/metaicl/llama/qa_srl/qa_srl_16_100_train.jsonl differ diff --git a/metaicl/llama/qa_srl/qa_srl_16_13_train.jsonl b/metaicl/llama/qa_srl/qa_srl_16_13_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..aaae9c314b7deb5cb2cfd381604dcb90f77db051 Binary files /dev/null and b/metaicl/llama/qa_srl/qa_srl_16_13_train.jsonl differ diff --git a/metaicl/llama/qa_srl/qa_srl_16_21_train.jsonl b/metaicl/llama/qa_srl/qa_srl_16_21_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e197554fb5b775db77d992312b2bcc10c71b59f7 Binary files /dev/null and b/metaicl/llama/qa_srl/qa_srl_16_21_train.jsonl differ diff --git a/metaicl/llama/qa_srl/qa_srl_16_42_train.jsonl b/metaicl/llama/qa_srl/qa_srl_16_42_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..de70687b1a18f409732860e663fdd41b22f62881 Binary files /dev/null and b/metaicl/llama/qa_srl/qa_srl_16_42_train.jsonl differ diff --git a/metaicl/llama/qa_srl/qa_srl_16_87_train.jsonl b/metaicl/llama/qa_srl/qa_srl_16_87_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b1eb04d48201f387ced8dc71a8ff9e1c36a86514 Binary files /dev/null and b/metaicl/llama/qa_srl/qa_srl_16_87_train.jsonl differ diff --git a/metaicl/llama/qasc/qasc_16384_100_train.jsonl b/metaicl/llama/qasc/qasc_16384_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..fd1a3ae94ea05fe7331b6b81290ac349cc719940 --- /dev/null +++ b/metaicl/llama/qasc/qasc_16384_100_train.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:dbbddd0c3c10b9dd307cc4124ab923529de51a76d9c8ef4bed787ba571d8fdba +size 1568841 diff --git a/metaicl/llama/qasc/qasc_16_100_test.jsonl b/metaicl/llama/qasc/qasc_16_100_test.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e02d3f12ecaede38fbe61ca7c6bca12c26c27472 --- /dev/null +++ b/metaicl/llama/qasc/qasc_16_100_test.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:be176a2eaa7b866cd9c9a99aae59d57976bdb3165f82174a04a787382b9a45c1 +size 184257 diff --git a/metaicl/llama/qasc/qasc_16_100_train.jsonl b/metaicl/llama/qasc/qasc_16_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d712018146c37592060af8171e1470175efe6854 Binary files /dev/null and b/metaicl/llama/qasc/qasc_16_100_train.jsonl differ diff --git a/metaicl/llama/qasc/qasc_16_13_train.jsonl b/metaicl/llama/qasc/qasc_16_13_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..df29a89a7ac2f06c37b64cea6c6c9f5a40eb1462 Binary files /dev/null and b/metaicl/llama/qasc/qasc_16_13_train.jsonl differ diff --git a/metaicl/llama/qasc/qasc_16_21_train.jsonl b/metaicl/llama/qasc/qasc_16_21_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..481871adc0aeefe35f20a270cf475b5be4e68674 Binary files /dev/null and b/metaicl/llama/qasc/qasc_16_21_train.jsonl differ diff --git a/metaicl/llama/qasc/qasc_16_42_train.jsonl b/metaicl/llama/qasc/qasc_16_42_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..cea5b064ecff31b085207e23de77edcc9d14d858 Binary files /dev/null and b/metaicl/llama/qasc/qasc_16_42_train.jsonl differ diff --git a/metaicl/llama/qasc/qasc_16_87_train.jsonl b/metaicl/llama/qasc/qasc_16_87_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..75dee431d9cf706dfe812afabda99cdff3adb6dd Binary files /dev/null and b/metaicl/llama/qasc/qasc_16_87_train.jsonl differ diff --git a/metaicl/llama/quail/quail_16384_100_train.jsonl b/metaicl/llama/quail/quail_16384_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1d86c355b73549c796267859b2ce4dced7877cfe --- /dev/null +++ b/metaicl/llama/quail/quail_16384_100_train.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:c9caa0b04240e6b51a437ad7cf2a7508c7d6f0032375f6172d2a88355b4359cc +size 15960203 diff --git a/metaicl/llama/quail/quail_16_100_test.jsonl b/metaicl/llama/quail/quail_16_100_test.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0655a47b093e794cbb1afcebef9998c225a48ec5 --- /dev/null +++ b/metaicl/llama/quail/quail_16_100_test.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:d3cdf11804dc64598d165355fb2cb74e18aa6058437502b9c4f5a7a071f701f0 +size 3424323 diff --git a/metaicl/llama/quail/quail_16_100_train.jsonl b/metaicl/llama/quail/quail_16_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..cc2d839b3197ec42eb9114ff42fcae5e33c7e4df Binary files /dev/null and b/metaicl/llama/quail/quail_16_100_train.jsonl differ diff --git a/metaicl/llama/quail/quail_16_13_train.jsonl b/metaicl/llama/quail/quail_16_13_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..618367681dad1189d4ad689b5ddcab2597705783 Binary files /dev/null and b/metaicl/llama/quail/quail_16_13_train.jsonl differ diff --git a/metaicl/llama/quail/quail_16_21_train.jsonl b/metaicl/llama/quail/quail_16_21_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7918600030c703f636fa2ebb8ae8aa82224dcea0 Binary files /dev/null and b/metaicl/llama/quail/quail_16_21_train.jsonl differ diff --git a/metaicl/llama/quail/quail_16_42_train.jsonl b/metaicl/llama/quail/quail_16_42_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b67238bf05396a3bc7d2a325608909d4dbde63dc Binary files /dev/null and b/metaicl/llama/quail/quail_16_42_train.jsonl differ diff --git a/metaicl/llama/quail/quail_16_87_train.jsonl b/metaicl/llama/quail/quail_16_87_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..dd12cffe364c95590ac28427797f252d1c907f18 Binary files /dev/null and b/metaicl/llama/quail/quail_16_87_train.jsonl differ diff --git a/metaicl/llama/quarel/quarel_16384_100_train.jsonl b/metaicl/llama/quarel/quarel_16384_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..769e4675d527ee635dfafbf15e53c7257e348214 --- /dev/null +++ b/metaicl/llama/quarel/quarel_16384_100_train.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:5dff471c330078caf603147c5f1156d8821a752e1a26555140ad04e9c8432fed +size 353677 diff --git a/metaicl/llama/quarel/quarel_16_100_test.jsonl b/metaicl/llama/quarel/quarel_16_100_test.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..51c8f44024f50401c7b85962ff65a3e416b82c2b Binary files /dev/null and b/metaicl/llama/quarel/quarel_16_100_test.jsonl differ diff --git a/metaicl/llama/quarel/quarel_16_100_train.jsonl b/metaicl/llama/quarel/quarel_16_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ccea07f43663f65d96a1333f1a5d220474e43aae Binary files /dev/null and b/metaicl/llama/quarel/quarel_16_100_train.jsonl differ diff --git a/metaicl/llama/quarel/quarel_16_13_train.jsonl b/metaicl/llama/quarel/quarel_16_13_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..dfe3a1c7682e4cfbd86ab82b9f30a4b2634fcc6f Binary files /dev/null and b/metaicl/llama/quarel/quarel_16_13_train.jsonl differ diff --git a/metaicl/llama/quarel/quarel_16_21_train.jsonl b/metaicl/llama/quarel/quarel_16_21_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1d1c92505f3ba05142e73513d5b02c1dee3afe2b Binary files /dev/null and b/metaicl/llama/quarel/quarel_16_21_train.jsonl differ diff --git a/metaicl/llama/quarel/quarel_16_42_train.jsonl b/metaicl/llama/quarel/quarel_16_42_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c85e49bf31b67b8f8035a641c591e27c1bc01f55 Binary files /dev/null and b/metaicl/llama/quarel/quarel_16_42_train.jsonl differ diff --git a/metaicl/llama/quarel/quarel_16_87_train.jsonl b/metaicl/llama/quarel/quarel_16_87_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d4cd52d5608f89e070eb700409aff00e8de3d548 Binary files /dev/null and b/metaicl/llama/quarel/quarel_16_87_train.jsonl differ diff --git a/metaicl/llama/quartz-no_knowledge/quartz-no_knowledge_16384_100_train.jsonl b/metaicl/llama/quartz-no_knowledge/quartz-no_knowledge_16384_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..fb8e6485c1704d7b80fc606f4eba7563b54bea11 --- /dev/null +++ b/metaicl/llama/quartz-no_knowledge/quartz-no_knowledge_16384_100_train.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:6cbee4b5c803ae3fc8b97e244f385147838d405d58400f6140595e5654374bc6 +size 362343 diff --git a/metaicl/llama/quartz-no_knowledge/quartz-no_knowledge_16_100_test.jsonl b/metaicl/llama/quartz-no_knowledge/quartz-no_knowledge_16_100_test.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e4653c04c7d2a0ed2074045fa776d3ddf74ae71f Binary files /dev/null and b/metaicl/llama/quartz-no_knowledge/quartz-no_knowledge_16_100_test.jsonl differ diff --git a/metaicl/llama/quartz-no_knowledge/quartz-no_knowledge_16_100_train.jsonl b/metaicl/llama/quartz-no_knowledge/quartz-no_knowledge_16_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4c737352434d6e88e1bf6b84f4457709693073a2 Binary files /dev/null and b/metaicl/llama/quartz-no_knowledge/quartz-no_knowledge_16_100_train.jsonl differ diff --git a/metaicl/llama/quartz-no_knowledge/quartz-no_knowledge_16_13_train.jsonl b/metaicl/llama/quartz-no_knowledge/quartz-no_knowledge_16_13_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..24dfe017f7c9e73e212e074ef6021f6fe19d7165 Binary files /dev/null and b/metaicl/llama/quartz-no_knowledge/quartz-no_knowledge_16_13_train.jsonl differ diff --git a/metaicl/llama/quartz-no_knowledge/quartz-no_knowledge_16_21_train.jsonl b/metaicl/llama/quartz-no_knowledge/quartz-no_knowledge_16_21_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8dbcf3f302e7b5e7e482e292b1264541da752a1b Binary files /dev/null and b/metaicl/llama/quartz-no_knowledge/quartz-no_knowledge_16_21_train.jsonl differ diff --git a/metaicl/llama/quartz-no_knowledge/quartz-no_knowledge_16_42_train.jsonl b/metaicl/llama/quartz-no_knowledge/quartz-no_knowledge_16_42_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d08e8c9f42018131de507533993b9f36ca182921 Binary files /dev/null and b/metaicl/llama/quartz-no_knowledge/quartz-no_knowledge_16_42_train.jsonl differ diff --git a/metaicl/llama/quartz-no_knowledge/quartz-no_knowledge_16_87_train.jsonl b/metaicl/llama/quartz-no_knowledge/quartz-no_knowledge_16_87_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0dbce45fe69a8f5afbfea3ba7036f0d22b91d536 Binary files /dev/null and b/metaicl/llama/quartz-no_knowledge/quartz-no_knowledge_16_87_train.jsonl differ diff --git a/metaicl/llama/quartz-with_knowledge/quartz-with_knowledge_16384_100_train.jsonl b/metaicl/llama/quartz-with_knowledge/quartz-with_knowledge_16384_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..250230acde03b91b642bce4b85d6a9f5f5421ca0 --- /dev/null +++ b/metaicl/llama/quartz-with_knowledge/quartz-with_knowledge_16384_100_train.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:8b0daa71893bf3f4cbd3aaaefcfdf3f819a132deb52f03c938304b28e964a92a +size 533099 diff --git a/metaicl/llama/quartz-with_knowledge/quartz-with_knowledge_16_100_test.jsonl b/metaicl/llama/quartz-with_knowledge/quartz-with_knowledge_16_100_test.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..be9f08b7211e95dbf2c67e5d90448331cd9df1fd Binary files /dev/null and b/metaicl/llama/quartz-with_knowledge/quartz-with_knowledge_16_100_test.jsonl differ diff --git a/metaicl/llama/quartz-with_knowledge/quartz-with_knowledge_16_100_train.jsonl b/metaicl/llama/quartz-with_knowledge/quartz-with_knowledge_16_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6e94230e1ed541beb54a4f1f5ff6911490421a19 Binary files /dev/null and b/metaicl/llama/quartz-with_knowledge/quartz-with_knowledge_16_100_train.jsonl differ diff --git a/metaicl/llama/quartz-with_knowledge/quartz-with_knowledge_16_13_train.jsonl b/metaicl/llama/quartz-with_knowledge/quartz-with_knowledge_16_13_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b9e6c88593712ce9b26afc3ecb4703d12398316c Binary files /dev/null and b/metaicl/llama/quartz-with_knowledge/quartz-with_knowledge_16_13_train.jsonl differ diff --git a/metaicl/llama/quartz-with_knowledge/quartz-with_knowledge_16_21_train.jsonl b/metaicl/llama/quartz-with_knowledge/quartz-with_knowledge_16_21_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6f950320ef7b5e37fe435c8cef65304027b3ed85 Binary files /dev/null and b/metaicl/llama/quartz-with_knowledge/quartz-with_knowledge_16_21_train.jsonl differ diff --git a/metaicl/llama/quartz-with_knowledge/quartz-with_knowledge_16_42_train.jsonl b/metaicl/llama/quartz-with_knowledge/quartz-with_knowledge_16_42_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..185efdaa0d91a49db3cf8ad37a336ed3123fffe4 Binary files /dev/null and b/metaicl/llama/quartz-with_knowledge/quartz-with_knowledge_16_42_train.jsonl differ diff --git a/metaicl/llama/quartz-with_knowledge/quartz-with_knowledge_16_87_train.jsonl b/metaicl/llama/quartz-with_knowledge/quartz-with_knowledge_16_87_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..dd29be95cd562511183b42350f2ca8125f043778 Binary files /dev/null and b/metaicl/llama/quartz-with_knowledge/quartz-with_knowledge_16_87_train.jsonl differ diff --git a/metaicl/llama/quoref/quoref_16384_100_train.jsonl b/metaicl/llama/quoref/quoref_16384_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c798837c0e908c6ab0b3a53e7d846424280db6b0 --- /dev/null +++ b/metaicl/llama/quoref/quoref_16384_100_train.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:5f11379f7e7e82402750d7506ede847c8ab3b122022307d5104ff854c50eb69c +size 27130893 diff --git a/metaicl/llama/quoref/quoref_16_100_test.jsonl b/metaicl/llama/quoref/quoref_16_100_test.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5da8bf9f7cd1f40de34ded416c13c49f6ada4269 --- /dev/null +++ b/metaicl/llama/quoref/quoref_16_100_test.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:3a3888f1854b51ce1f3a805c413a536d75208fc42ac872f895bedaaf2351bf88 +size 3940613 diff --git a/metaicl/llama/quoref/quoref_16_100_train.jsonl b/metaicl/llama/quoref/quoref_16_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8388419f82b3e04557878f3d3db83fae3e6685ef Binary files /dev/null and b/metaicl/llama/quoref/quoref_16_100_train.jsonl differ diff --git a/metaicl/llama/quoref/quoref_16_13_train.jsonl b/metaicl/llama/quoref/quoref_16_13_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f2f8ad2eeaa85b78b4f151ffa561ba84a1f80c04 Binary files /dev/null and b/metaicl/llama/quoref/quoref_16_13_train.jsonl differ diff --git a/metaicl/llama/quoref/quoref_16_21_train.jsonl b/metaicl/llama/quoref/quoref_16_21_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..cb9a9ae7a3e7f8a5f6d660d1176a3f2e7b4953b9 Binary files /dev/null and b/metaicl/llama/quoref/quoref_16_21_train.jsonl differ diff --git a/metaicl/llama/quoref/quoref_16_42_train.jsonl b/metaicl/llama/quoref/quoref_16_42_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ccb17d204aa6c129f186b119955749c30aa61d4d Binary files /dev/null and b/metaicl/llama/quoref/quoref_16_42_train.jsonl differ diff --git a/metaicl/llama/quoref/quoref_16_87_train.jsonl b/metaicl/llama/quoref/quoref_16_87_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e03982ed44a4d5c3a5f71013c1f186a99ba7bc81 Binary files /dev/null and b/metaicl/llama/quoref/quoref_16_87_train.jsonl differ diff --git a/metaicl/llama/race-high/race-high_16384_100_train.jsonl b/metaicl/llama/race-high/race-high_16384_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..59d53e893c3d639ae3421322b4c90ff58504176a --- /dev/null +++ b/metaicl/llama/race-high/race-high_16384_100_train.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:cfb0c27dd062de8e9ca44eece3224425e6690b3b2b9a7907c25e7afb886b8f0b +size 24569171 diff --git a/metaicl/llama/race-high/race-high_16_100_test.jsonl b/metaicl/llama/race-high/race-high_16_100_test.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0d7ba3f2a89d4ef31c5924f2c275cd4e112ba772 --- /dev/null +++ b/metaicl/llama/race-high/race-high_16_100_test.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:7a53f9f693c47d2254c0b21ecbb1db92048169ba2a61a9ea07758dd5c2575614 +size 5107723 diff --git a/metaicl/llama/race-high/race-high_16_100_train.jsonl b/metaicl/llama/race-high/race-high_16_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..66c97a7f8358ce70aac6f9d0fabc4171cdbff7d0 Binary files /dev/null and b/metaicl/llama/race-high/race-high_16_100_train.jsonl differ diff --git a/metaicl/llama/race-high/race-high_16_13_train.jsonl b/metaicl/llama/race-high/race-high_16_13_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..cc9ef3d73ab7775503d57b099a55a45a86c24e55 Binary files /dev/null and b/metaicl/llama/race-high/race-high_16_13_train.jsonl differ diff --git a/metaicl/llama/race-high/race-high_16_21_train.jsonl b/metaicl/llama/race-high/race-high_16_21_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3705a2cb3c9c59bffe4bde741f6c6a1f87f15e60 Binary files /dev/null and b/metaicl/llama/race-high/race-high_16_21_train.jsonl differ diff --git a/metaicl/llama/race-high/race-high_16_42_train.jsonl b/metaicl/llama/race-high/race-high_16_42_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1bf3d8b986f6e8b031c80f502bd8fd3f04082254 Binary files /dev/null and b/metaicl/llama/race-high/race-high_16_42_train.jsonl differ diff --git a/metaicl/llama/race-high/race-high_16_87_train.jsonl b/metaicl/llama/race-high/race-high_16_87_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d3b42818b7c8aec0784a6ba8ab2857bddff03cbd Binary files /dev/null and b/metaicl/llama/race-high/race-high_16_87_train.jsonl differ diff --git a/metaicl/llama/race-middle/race-middle_16384_100_train.jsonl b/metaicl/llama/race-middle/race-middle_16384_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..33c0591c9a34c6ff5ab9b89a0d7eaa4c9b4ad9ea --- /dev/null +++ b/metaicl/llama/race-middle/race-middle_16384_100_train.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:86c18a5ae2a587d3b9572dae669d173693d0d19a1a7dbd7349a03c4799812531 +size 15732119 diff --git a/metaicl/llama/race-middle/race-middle_16_100_test.jsonl b/metaicl/llama/race-middle/race-middle_16_100_test.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6b7e984521402b436ce6704c71d0dcde988562b3 --- /dev/null +++ b/metaicl/llama/race-middle/race-middle_16_100_test.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:dab14680c48b30cb5c27dd2a95371eec6648b6e6778a09142476dcac3a79fae8 +size 1377807 diff --git a/metaicl/llama/race-middle/race-middle_16_100_train.jsonl b/metaicl/llama/race-middle/race-middle_16_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..64707e043ebb3988499798ba5641e97b3f435ad2 Binary files /dev/null and b/metaicl/llama/race-middle/race-middle_16_100_train.jsonl differ diff --git a/metaicl/llama/race-middle/race-middle_16_13_train.jsonl b/metaicl/llama/race-middle/race-middle_16_13_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5c596d92153917d980e6598ceee7da3da33b07bd Binary files /dev/null and b/metaicl/llama/race-middle/race-middle_16_13_train.jsonl differ diff --git a/metaicl/llama/race-middle/race-middle_16_21_train.jsonl b/metaicl/llama/race-middle/race-middle_16_21_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6a916dc4493c6a375e8684e2c3fc41d69abe6403 Binary files /dev/null and b/metaicl/llama/race-middle/race-middle_16_21_train.jsonl differ diff --git a/metaicl/llama/race-middle/race-middle_16_42_train.jsonl b/metaicl/llama/race-middle/race-middle_16_42_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f00cedf9f668d3cc2955e4a21601d1b04cf5e15e Binary files /dev/null and b/metaicl/llama/race-middle/race-middle_16_42_train.jsonl differ diff --git a/metaicl/llama/race-middle/race-middle_16_87_train.jsonl b/metaicl/llama/race-middle/race-middle_16_87_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..cef930f13ab123e3749d74ae63e79b2108f9cb16 Binary files /dev/null and b/metaicl/llama/race-middle/race-middle_16_87_train.jsonl differ diff --git a/metaicl/llama/ropes/ropes_16384_100_train.jsonl b/metaicl/llama/ropes/ropes_16384_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2c588da32d3ea493d5453cb93069694880dbd580 --- /dev/null +++ b/metaicl/llama/ropes/ropes_16384_100_train.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:73f1c2361977a37fb047a52407f57e699f63018f147b15524e6bedc6d0c80dcf +size 9033611 diff --git a/metaicl/llama/ropes/ropes_16_100_test.jsonl b/metaicl/llama/ropes/ropes_16_100_test.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5e1fc6291dbdc7f55f52bec42b79fed60b19cf95 --- /dev/null +++ b/metaicl/llama/ropes/ropes_16_100_test.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:8047370d089cf1bd5255ab4f79853d425aa7e0431811e6b43d0d71201f7d3251 +size 1329795 diff --git a/metaicl/llama/ropes/ropes_16_100_train.jsonl b/metaicl/llama/ropes/ropes_16_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a0f4ae6b9b557b9de844e9696f48f3f04a0067cc Binary files /dev/null and b/metaicl/llama/ropes/ropes_16_100_train.jsonl differ diff --git a/metaicl/llama/ropes/ropes_16_13_train.jsonl b/metaicl/llama/ropes/ropes_16_13_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3808c133f4b8cdbba148fa1afaf182d076b9bc52 Binary files /dev/null and b/metaicl/llama/ropes/ropes_16_13_train.jsonl differ diff --git a/metaicl/llama/ropes/ropes_16_21_train.jsonl b/metaicl/llama/ropes/ropes_16_21_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..48f980ff11ab1555a3e54c7f98a8df42b6d16385 Binary files /dev/null and b/metaicl/llama/ropes/ropes_16_21_train.jsonl differ diff --git a/metaicl/llama/ropes/ropes_16_42_train.jsonl b/metaicl/llama/ropes/ropes_16_42_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..20a72f76bf1a14df794b8965e312a13a060724c0 Binary files /dev/null and b/metaicl/llama/ropes/ropes_16_42_train.jsonl differ diff --git a/metaicl/llama/ropes/ropes_16_87_train.jsonl b/metaicl/llama/ropes/ropes_16_87_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..860df28dcf4fb1ffd71887538486261a93d8f33e Binary files /dev/null and b/metaicl/llama/ropes/ropes_16_87_train.jsonl differ diff --git a/metaicl/llama/rotten_tomatoes/rotten_tomatoes_16384_100_train.jsonl b/metaicl/llama/rotten_tomatoes/rotten_tomatoes_16384_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..195737c5ca9c8dbfdd474fec86d6f32a4eac6238 --- /dev/null +++ b/metaicl/llama/rotten_tomatoes/rotten_tomatoes_16384_100_train.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:5094099bd634c10d151ff68adb2acdabd167e0ae327abf2104948112d0fe4336 +size 1144159 diff --git a/metaicl/llama/rotten_tomatoes/rotten_tomatoes_16_100_test.jsonl b/metaicl/llama/rotten_tomatoes/rotten_tomatoes_16_100_test.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d8d3f098dc66729716d7f20e4105a0f4009edf95 --- /dev/null +++ b/metaicl/llama/rotten_tomatoes/rotten_tomatoes_16_100_test.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:603466554ddc7bc06e4b63ce987e85f53ed4d993cf9a84bcc0e36cf49825d472 +size 142679 diff --git a/metaicl/llama/rotten_tomatoes/rotten_tomatoes_16_100_train.jsonl b/metaicl/llama/rotten_tomatoes/rotten_tomatoes_16_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..95666e460f691730205b73a950d39de2460e060a Binary files /dev/null and b/metaicl/llama/rotten_tomatoes/rotten_tomatoes_16_100_train.jsonl differ diff --git a/metaicl/llama/rotten_tomatoes/rotten_tomatoes_16_13_train.jsonl b/metaicl/llama/rotten_tomatoes/rotten_tomatoes_16_13_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..023d27c6107b5ae30f8453c989f30a29d040807d Binary files /dev/null and b/metaicl/llama/rotten_tomatoes/rotten_tomatoes_16_13_train.jsonl differ diff --git a/metaicl/llama/rotten_tomatoes/rotten_tomatoes_16_21_train.jsonl b/metaicl/llama/rotten_tomatoes/rotten_tomatoes_16_21_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c05840796902817b54b913eb4d9ced0ddaefdb66 Binary files /dev/null and b/metaicl/llama/rotten_tomatoes/rotten_tomatoes_16_21_train.jsonl differ diff --git a/metaicl/llama/rotten_tomatoes/rotten_tomatoes_16_42_train.jsonl b/metaicl/llama/rotten_tomatoes/rotten_tomatoes_16_42_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b664dec0da303c2906db93a378ed324eba2ede3e Binary files /dev/null and b/metaicl/llama/rotten_tomatoes/rotten_tomatoes_16_42_train.jsonl differ diff --git a/metaicl/llama/rotten_tomatoes/rotten_tomatoes_16_87_train.jsonl b/metaicl/llama/rotten_tomatoes/rotten_tomatoes_16_87_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..88274e955941891f61b569e469f69e5f599c0f19 Binary files /dev/null and b/metaicl/llama/rotten_tomatoes/rotten_tomatoes_16_87_train.jsonl differ diff --git a/metaicl/llama/sciq/sciq_16384_100_train.jsonl b/metaicl/llama/sciq/sciq_16384_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7c7a0b3cf72654300cd446c35b83f0e082c1fd78 --- /dev/null +++ b/metaicl/llama/sciq/sciq_16384_100_train.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:fd2c5948d0d8d976f33a1c5215d09728072d191ba58193493f314cccce116288 +size 5122889 diff --git a/metaicl/llama/sciq/sciq_16_100_test.jsonl b/metaicl/llama/sciq/sciq_16_100_test.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..cae0971ab7383df82308c476dc3f429832a4f16b --- /dev/null +++ b/metaicl/llama/sciq/sciq_16_100_test.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:66da80427816a57d6e5899b6a5585e8f4f451dc5378500e78e12ee475f5a9c3c +size 430017 diff --git a/metaicl/llama/sciq/sciq_16_100_train.jsonl b/metaicl/llama/sciq/sciq_16_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1b402383e355a86a563a592e20234593d2c5a115 Binary files /dev/null and b/metaicl/llama/sciq/sciq_16_100_train.jsonl differ diff --git a/metaicl/llama/sciq/sciq_16_13_train.jsonl b/metaicl/llama/sciq/sciq_16_13_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6495329d73e5ae512e8e6481099befa2e94e6f16 Binary files /dev/null and b/metaicl/llama/sciq/sciq_16_13_train.jsonl differ diff --git a/metaicl/llama/sciq/sciq_16_21_train.jsonl b/metaicl/llama/sciq/sciq_16_21_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..141184b6661e1feda733cc2e8f01a7bc0d42ffd2 Binary files /dev/null and b/metaicl/llama/sciq/sciq_16_21_train.jsonl differ diff --git a/metaicl/llama/sciq/sciq_16_42_train.jsonl b/metaicl/llama/sciq/sciq_16_42_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..40789b39162b50d26aeba24f08cead9e73c039fc Binary files /dev/null and b/metaicl/llama/sciq/sciq_16_42_train.jsonl differ diff --git a/metaicl/llama/sciq/sciq_16_87_train.jsonl b/metaicl/llama/sciq/sciq_16_87_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1aa16890e536d0203d1cded1b95ac223f05816a7 Binary files /dev/null and b/metaicl/llama/sciq/sciq_16_87_train.jsonl differ diff --git a/metaicl/llama/scitail/scitail_16384_100_train.jsonl b/metaicl/llama/scitail/scitail_16384_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8935cbf95a50da24cd0e7535a89c7cb0079db4c6 --- /dev/null +++ b/metaicl/llama/scitail/scitail_16384_100_train.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:51d4754939c4d3c07b5b79abe2b74b4754be6a28cdc1459d86b4ac3df2380214 +size 3611791 diff --git a/metaicl/llama/scitail/scitail_16_100_test.jsonl b/metaicl/llama/scitail/scitail_16_100_test.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1afc2cac3c134a81cbdde0049f77517404367f7e --- /dev/null +++ b/metaicl/llama/scitail/scitail_16_100_test.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:985af8be55e127df53ca73ef23e3efea6724d6be2cb3d94d40ede2f8904add57 +size 292103 diff --git a/metaicl/llama/scitail/scitail_16_100_train.jsonl b/metaicl/llama/scitail/scitail_16_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7bff70ef3b2ad44146f2f2deaf137b5052ad43c4 Binary files /dev/null and b/metaicl/llama/scitail/scitail_16_100_train.jsonl differ diff --git a/metaicl/llama/scitail/scitail_16_13_train.jsonl b/metaicl/llama/scitail/scitail_16_13_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8ef967cbfcc6a16958d0fa5b6db5f1f250d92f8e Binary files /dev/null and b/metaicl/llama/scitail/scitail_16_13_train.jsonl differ diff --git a/metaicl/llama/scitail/scitail_16_21_train.jsonl b/metaicl/llama/scitail/scitail_16_21_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c45e1ddc7ce5f790a323dc1976d9f88ed5acd9ec Binary files /dev/null and b/metaicl/llama/scitail/scitail_16_21_train.jsonl differ diff --git a/metaicl/llama/scitail/scitail_16_42_train.jsonl b/metaicl/llama/scitail/scitail_16_42_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8156aa88e1ed4caa558bee8af671336b2fd37347 Binary files /dev/null and b/metaicl/llama/scitail/scitail_16_42_train.jsonl differ diff --git a/metaicl/llama/scitail/scitail_16_87_train.jsonl b/metaicl/llama/scitail/scitail_16_87_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e24856bc0173b0854c24c1089ebf23fd287e7e1d Binary files /dev/null and b/metaicl/llama/scitail/scitail_16_87_train.jsonl differ diff --git a/metaicl/llama/search_qa/search_qa_16384_100_train.jsonl b/metaicl/llama/search_qa/search_qa_16384_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b828b191d6790b926156772f03b7b6d7eb5155dd --- /dev/null +++ b/metaicl/llama/search_qa/search_qa_16384_100_train.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:cf1a46bf306617d9679921f4a56358a217c20505ce5f1c4a5583b8c43c1de96e +size 2127059 diff --git a/metaicl/llama/search_qa/search_qa_16_100_test.jsonl b/metaicl/llama/search_qa/search_qa_16_100_test.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..54d35c61a6bdd3ce815b46c6b07f246663e5b2ea --- /dev/null +++ b/metaicl/llama/search_qa/search_qa_16_100_test.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:03fcfbdbd5a2e21ef01cfd4b9446f51672f1684adc35862b11ecbd917794fccc +size 2933899 diff --git a/metaicl/llama/search_qa/search_qa_16_100_train.jsonl b/metaicl/llama/search_qa/search_qa_16_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c4379e200bb1ddfafae3f9f116a7fb69f8afa001 Binary files /dev/null and b/metaicl/llama/search_qa/search_qa_16_100_train.jsonl differ diff --git a/metaicl/llama/search_qa/search_qa_16_13_train.jsonl b/metaicl/llama/search_qa/search_qa_16_13_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b716e5393b87dad520b2d567a331da45a025c783 Binary files /dev/null and b/metaicl/llama/search_qa/search_qa_16_13_train.jsonl differ diff --git a/metaicl/llama/search_qa/search_qa_16_21_train.jsonl b/metaicl/llama/search_qa/search_qa_16_21_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c632910194a59e21e6969701171701ea609b1686 Binary files /dev/null and b/metaicl/llama/search_qa/search_qa_16_21_train.jsonl differ diff --git a/metaicl/llama/search_qa/search_qa_16_42_train.jsonl b/metaicl/llama/search_qa/search_qa_16_42_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..469f883b41d5c862157afc96c4a6b7a304318b3e Binary files /dev/null and b/metaicl/llama/search_qa/search_qa_16_42_train.jsonl differ diff --git a/metaicl/llama/search_qa/search_qa_16_87_train.jsonl b/metaicl/llama/search_qa/search_qa_16_87_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8551250eccd45f953ceb2c288cb721523afac570 Binary files /dev/null and b/metaicl/llama/search_qa/search_qa_16_87_train.jsonl differ diff --git a/metaicl/llama/sick/sick_16384_100_train.jsonl b/metaicl/llama/sick/sick_16384_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e5c9bb4b1f4b7be7c5a4c3816396baddb2053886 --- /dev/null +++ b/metaicl/llama/sick/sick_16384_100_train.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:6062740740deaecc915103fd29d300e4d973d484d8f142f298e9452e4eebfb1a +size 764489 diff --git a/metaicl/llama/sick/sick_16_100_test.jsonl b/metaicl/llama/sick/sick_16_100_test.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2ecb89d0ef30e68f5b1291c10602dcb758cceeca Binary files /dev/null and b/metaicl/llama/sick/sick_16_100_test.jsonl differ diff --git a/metaicl/llama/sick/sick_16_100_train.jsonl b/metaicl/llama/sick/sick_16_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b8b962dceedce25b03ebeb3c31c1feeb3ea4056c Binary files /dev/null and b/metaicl/llama/sick/sick_16_100_train.jsonl differ diff --git a/metaicl/llama/sick/sick_16_13_train.jsonl b/metaicl/llama/sick/sick_16_13_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8f896f5765f52a45e954c6c31ffb3ca82d69164b Binary files /dev/null and b/metaicl/llama/sick/sick_16_13_train.jsonl differ diff --git a/metaicl/llama/sick/sick_16_21_train.jsonl b/metaicl/llama/sick/sick_16_21_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c52bde6495e99f3e8e63e26bdea00c48db06b664 Binary files /dev/null and b/metaicl/llama/sick/sick_16_21_train.jsonl differ diff --git a/metaicl/llama/sick/sick_16_42_train.jsonl b/metaicl/llama/sick/sick_16_42_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..dd1714019e9a4fb4b9edeb1c9923b8312fbfe42b Binary files /dev/null and b/metaicl/llama/sick/sick_16_42_train.jsonl differ diff --git a/metaicl/llama/sick/sick_16_87_train.jsonl b/metaicl/llama/sick/sick_16_87_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ed3feb5525cd2d9df0375784c1ec569a4402d5e5 Binary files /dev/null and b/metaicl/llama/sick/sick_16_87_train.jsonl differ diff --git a/metaicl/llama/sms_spam/sms_spam_16384_100_train.jsonl b/metaicl/llama/sms_spam/sms_spam_16384_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..aeecc7412e2f0080cb63eedec89b93bf56ea1ee0 --- /dev/null +++ b/metaicl/llama/sms_spam/sms_spam_16384_100_train.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:8e0ccd199f32c451c7c89389254d750a6661a610a9c21507c7e39e9f4bd43b1f +size 582545 diff --git a/metaicl/llama/sms_spam/sms_spam_16_100_test.jsonl b/metaicl/llama/sms_spam/sms_spam_16_100_test.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..745e2ba2a0d84dde8ffa94f9c6dddd986b08096f --- /dev/null +++ b/metaicl/llama/sms_spam/sms_spam_16_100_test.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:6b7d032b6dfb5179e8f78bf7c045895c35e4929e0fb3e04d588a843b5929a6f0 +size 147209 diff --git a/metaicl/llama/sms_spam/sms_spam_16_100_train.jsonl b/metaicl/llama/sms_spam/sms_spam_16_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f3569ab4851a62109731ba24649317ff9f906c4f Binary files /dev/null and b/metaicl/llama/sms_spam/sms_spam_16_100_train.jsonl differ diff --git a/metaicl/llama/sms_spam/sms_spam_16_13_train.jsonl b/metaicl/llama/sms_spam/sms_spam_16_13_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..53bc7a747d3d5381ddefd4c4019611892084f82d Binary files /dev/null and b/metaicl/llama/sms_spam/sms_spam_16_13_train.jsonl differ diff --git a/metaicl/llama/sms_spam/sms_spam_16_21_train.jsonl b/metaicl/llama/sms_spam/sms_spam_16_21_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..502652352bd3a7f6504298b196f1679a233a7729 Binary files /dev/null and b/metaicl/llama/sms_spam/sms_spam_16_21_train.jsonl differ diff --git a/metaicl/llama/sms_spam/sms_spam_16_42_train.jsonl b/metaicl/llama/sms_spam/sms_spam_16_42_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8950be0a808d5ca0c50186e14adce42620a438bb Binary files /dev/null and b/metaicl/llama/sms_spam/sms_spam_16_42_train.jsonl differ diff --git a/metaicl/llama/sms_spam/sms_spam_16_87_train.jsonl b/metaicl/llama/sms_spam/sms_spam_16_87_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..55c647d95abc617ad17d69e3138052c9a330056b Binary files /dev/null and b/metaicl/llama/sms_spam/sms_spam_16_87_train.jsonl differ diff --git a/metaicl/llama/social_i_qa/social_i_qa_16384_100_train.jsonl b/metaicl/llama/social_i_qa/social_i_qa_16384_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5dc1f97d5c0f59d39ce987835ae69c2c43f14b54 --- /dev/null +++ b/metaicl/llama/social_i_qa/social_i_qa_16384_100_train.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:aab7fa96bd14f1e9c1e4ae20be7e63f57dffe98eecadb586ee40cecad94d3b6f +size 2977239 diff --git a/metaicl/llama/social_i_qa/social_i_qa_16_100_test.jsonl b/metaicl/llama/social_i_qa/social_i_qa_16_100_test.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..bbeddadd0b27dc2136f955513f1ee1ada76a9bf5 --- /dev/null +++ b/metaicl/llama/social_i_qa/social_i_qa_16_100_test.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:e5e30d67082599d780e4e64406352c7873f4b1e8cdbe0baf715ee6e27fd4d202 +size 357775 diff --git a/metaicl/llama/social_i_qa/social_i_qa_16_100_train.jsonl b/metaicl/llama/social_i_qa/social_i_qa_16_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..40e1bcfa7f5296a83ae7718ed67348c6540d55e1 Binary files /dev/null and b/metaicl/llama/social_i_qa/social_i_qa_16_100_train.jsonl differ diff --git a/metaicl/llama/social_i_qa/social_i_qa_16_13_train.jsonl b/metaicl/llama/social_i_qa/social_i_qa_16_13_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..da28f35208e16326f016a0ac502520a833fdaa17 Binary files /dev/null and b/metaicl/llama/social_i_qa/social_i_qa_16_13_train.jsonl differ diff --git a/metaicl/llama/social_i_qa/social_i_qa_16_21_train.jsonl b/metaicl/llama/social_i_qa/social_i_qa_16_21_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d83e2519043e3669d529397a2ab307401f85ed94 Binary files /dev/null and b/metaicl/llama/social_i_qa/social_i_qa_16_21_train.jsonl differ diff --git a/metaicl/llama/social_i_qa/social_i_qa_16_42_train.jsonl b/metaicl/llama/social_i_qa/social_i_qa_16_42_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..527f0185b0adbca4188f8913b2a46a7213386cb9 Binary files /dev/null and b/metaicl/llama/social_i_qa/social_i_qa_16_42_train.jsonl differ diff --git a/metaicl/llama/social_i_qa/social_i_qa_16_87_train.jsonl b/metaicl/llama/social_i_qa/social_i_qa_16_87_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..931d493a248277bacdf90fcf297a2e84b5a3508f Binary files /dev/null and b/metaicl/llama/social_i_qa/social_i_qa_16_87_train.jsonl differ diff --git a/metaicl/llama/spider/spider_16384_100_train.jsonl b/metaicl/llama/spider/spider_16384_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..91f87dabcd25a2b856c6af1b1e329b57e6ae5c87 --- /dev/null +++ b/metaicl/llama/spider/spider_16384_100_train.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:5c4a2b092fc28a4096c1a3339f249f36e702adf7ce614b0b36ee9fdfe0ecf724 +size 1256845 diff --git a/metaicl/llama/spider/spider_16_100_test.jsonl b/metaicl/llama/spider/spider_16_100_test.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0af416836c7344cb8ddf15a8340d2c749fd02e82 --- /dev/null +++ b/metaicl/llama/spider/spider_16_100_test.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:da5da70eca100e9bc2556d017b562b7d941ef12f246453aa6c7948f5cd3f1bb2 +size 180997 diff --git a/metaicl/llama/spider/spider_16_100_train.jsonl b/metaicl/llama/spider/spider_16_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..bd241adf61c02fa560c55b423f57c8323901e761 Binary files /dev/null and b/metaicl/llama/spider/spider_16_100_train.jsonl differ diff --git a/metaicl/llama/spider/spider_16_13_train.jsonl b/metaicl/llama/spider/spider_16_13_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d52bfcbe827746981df4eb26e49d91475bc029b9 Binary files /dev/null and b/metaicl/llama/spider/spider_16_13_train.jsonl differ diff --git a/metaicl/llama/spider/spider_16_21_train.jsonl b/metaicl/llama/spider/spider_16_21_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..16a19eee98a66ce531cc3deffb4ebffdfdedcff9 Binary files /dev/null and b/metaicl/llama/spider/spider_16_21_train.jsonl differ diff --git a/metaicl/llama/spider/spider_16_42_train.jsonl b/metaicl/llama/spider/spider_16_42_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..38663037582e099ce0157afe84cf6a3e059ca529 Binary files /dev/null and b/metaicl/llama/spider/spider_16_42_train.jsonl differ diff --git a/metaicl/llama/spider/spider_16_87_train.jsonl b/metaicl/llama/spider/spider_16_87_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7b8cc11c0c22a6bcd89b1c3662dc94c6a45cea6c Binary files /dev/null and b/metaicl/llama/spider/spider_16_87_train.jsonl differ diff --git a/metaicl/llama/squad-no_context/squad-no_context_16384_100_train.jsonl b/metaicl/llama/squad-no_context/squad-no_context_16384_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d738fd6a6a34e2fc9e8b32f201b20074dd97e12e --- /dev/null +++ b/metaicl/llama/squad-no_context/squad-no_context_16384_100_train.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:367582afbd86c2b768c00ab3ad893c14ec1afb0dc8dbfcc7167a6ed5b53a8c0d +size 1370209 diff --git a/metaicl/llama/squad-no_context/squad-no_context_16_100_test.jsonl b/metaicl/llama/squad-no_context/squad-no_context_16_100_test.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..151c4763a96dbc03f41916de61bdff2d1bc3d300 --- /dev/null +++ b/metaicl/llama/squad-no_context/squad-no_context_16_100_test.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:e73f595b5e2b6237a4fccc1b452a1f93d93e74ee61c2a55659104f3a6c642ed8 +size 876441 diff --git a/metaicl/llama/squad-no_context/squad-no_context_16_100_train.jsonl b/metaicl/llama/squad-no_context/squad-no_context_16_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e4c9f9eae3617b3261b105459cc4e505347990cf Binary files /dev/null and b/metaicl/llama/squad-no_context/squad-no_context_16_100_train.jsonl differ diff --git a/metaicl/llama/squad-no_context/squad-no_context_16_13_train.jsonl b/metaicl/llama/squad-no_context/squad-no_context_16_13_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c36484ec9654e519149f375456a9a16204481b91 Binary files /dev/null and b/metaicl/llama/squad-no_context/squad-no_context_16_13_train.jsonl differ diff --git a/metaicl/llama/squad-no_context/squad-no_context_16_21_train.jsonl b/metaicl/llama/squad-no_context/squad-no_context_16_21_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b49c16205cf2d8989e2665333163e435887a9a2d Binary files /dev/null and b/metaicl/llama/squad-no_context/squad-no_context_16_21_train.jsonl differ diff --git a/metaicl/llama/squad-no_context/squad-no_context_16_42_train.jsonl b/metaicl/llama/squad-no_context/squad-no_context_16_42_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a5c2b870b0fdea74fa91ec91483db8e366355cba Binary files /dev/null and b/metaicl/llama/squad-no_context/squad-no_context_16_42_train.jsonl differ diff --git a/metaicl/llama/squad-no_context/squad-no_context_16_87_train.jsonl b/metaicl/llama/squad-no_context/squad-no_context_16_87_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..fff4e9f31cd0ea4a7e0a7bf48d5d9949b92dc2a0 Binary files /dev/null and b/metaicl/llama/squad-no_context/squad-no_context_16_87_train.jsonl differ diff --git a/metaicl/llama/squad-with_context/squad-with_context_16384_100_train.jsonl b/metaicl/llama/squad-with_context/squad-with_context_16384_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..39f223fc397f55d9de78cd994e3bba0a02594670 --- /dev/null +++ b/metaicl/llama/squad-with_context/squad-with_context_16384_100_train.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:7f5ae370190d2e2cbe7730ca73982f23583aeae63162a199dc5376dd1753ac13 +size 10592485 diff --git a/metaicl/llama/squad-with_context/squad-with_context_16_100_test.jsonl b/metaicl/llama/squad-with_context/squad-with_context_16_100_test.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ea4347d4ad2ea458bd7baab3d158470e2e1d83dc --- /dev/null +++ b/metaicl/llama/squad-with_context/squad-with_context_16_100_test.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:9c2a3ca45640f5f6368570227b4cc13600d8bfe04c34b3dcfac5209844bf1049 +size 6946973 diff --git a/metaicl/llama/squad-with_context/squad-with_context_16_100_train.jsonl b/metaicl/llama/squad-with_context/squad-with_context_16_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8d3777fc42434d38567cb0a820a7a95000f3c0f3 Binary files /dev/null and b/metaicl/llama/squad-with_context/squad-with_context_16_100_train.jsonl differ diff --git a/metaicl/llama/squad-with_context/squad-with_context_16_13_train.jsonl b/metaicl/llama/squad-with_context/squad-with_context_16_13_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..13586ceb35b2ca9b31b0e50f675f9b6a9e750aa0 Binary files /dev/null and b/metaicl/llama/squad-with_context/squad-with_context_16_13_train.jsonl differ diff --git a/metaicl/llama/squad-with_context/squad-with_context_16_21_train.jsonl b/metaicl/llama/squad-with_context/squad-with_context_16_21_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..48773e340d5130aa835f29107a824e4181c51bcf Binary files /dev/null and b/metaicl/llama/squad-with_context/squad-with_context_16_21_train.jsonl differ diff --git a/metaicl/llama/squad-with_context/squad-with_context_16_42_train.jsonl b/metaicl/llama/squad-with_context/squad-with_context_16_42_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..78865a719cb7af5b4e229ffd494d6549a959179d Binary files /dev/null and b/metaicl/llama/squad-with_context/squad-with_context_16_42_train.jsonl differ diff --git a/metaicl/llama/squad-with_context/squad-with_context_16_87_train.jsonl b/metaicl/llama/squad-with_context/squad-with_context_16_87_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..470d1348bbcb3449561869397046a311072141a1 Binary files /dev/null and b/metaicl/llama/squad-with_context/squad-with_context_16_87_train.jsonl differ diff --git a/metaicl/llama/superglue-cb/superglue-cb_16384_100_train.jsonl b/metaicl/llama/superglue-cb/superglue-cb_16384_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0fbbe015122ad90045311d53fffd5a9094e463d7 Binary files /dev/null and b/metaicl/llama/superglue-cb/superglue-cb_16384_100_train.jsonl differ diff --git a/metaicl/llama/superglue-cb/superglue-cb_16_100_test.jsonl b/metaicl/llama/superglue-cb/superglue-cb_16_100_test.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4a7cd2edef3674f3d2b1cefe1fb6c724619bdefa Binary files /dev/null and b/metaicl/llama/superglue-cb/superglue-cb_16_100_test.jsonl differ diff --git a/metaicl/llama/superglue-cb/superglue-cb_16_100_train.jsonl b/metaicl/llama/superglue-cb/superglue-cb_16_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c3db611f9c17843bfcfdb18719001bf627124b05 Binary files /dev/null and b/metaicl/llama/superglue-cb/superglue-cb_16_100_train.jsonl differ diff --git a/metaicl/llama/superglue-cb/superglue-cb_16_13_train.jsonl b/metaicl/llama/superglue-cb/superglue-cb_16_13_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f8d4ca1273aa2d26f8fa3c1e11cb747e5d089031 Binary files /dev/null and b/metaicl/llama/superglue-cb/superglue-cb_16_13_train.jsonl differ diff --git a/metaicl/llama/superglue-cb/superglue-cb_16_21_train.jsonl b/metaicl/llama/superglue-cb/superglue-cb_16_21_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..976fec3fa2ba4e120b9a9343bf04514f1bbf6d22 Binary files /dev/null and b/metaicl/llama/superglue-cb/superglue-cb_16_21_train.jsonl differ diff --git a/metaicl/llama/superglue-cb/superglue-cb_16_42_train.jsonl b/metaicl/llama/superglue-cb/superglue-cb_16_42_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..927d2b9c2ff8944197aa47fd505e24590bdc615d Binary files /dev/null and b/metaicl/llama/superglue-cb/superglue-cb_16_42_train.jsonl differ diff --git a/metaicl/llama/superglue-cb/superglue-cb_16_87_train.jsonl b/metaicl/llama/superglue-cb/superglue-cb_16_87_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f535da6a449e19f61d40539b50a91c45ceb72881 Binary files /dev/null and b/metaicl/llama/superglue-cb/superglue-cb_16_87_train.jsonl differ diff --git a/metaicl/llama/superglue-copa/superglue-copa_16384_100_train.jsonl b/metaicl/llama/superglue-copa/superglue-copa_16384_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0256f965334830b5f64decad8507b0b2928f52c8 Binary files /dev/null and b/metaicl/llama/superglue-copa/superglue-copa_16384_100_train.jsonl differ diff --git a/metaicl/llama/superglue-copa/superglue-copa_16_100_test.jsonl b/metaicl/llama/superglue-copa/superglue-copa_16_100_test.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..dd4fe5cdd8d1acc6c028196f186bbe6c2db64ce7 Binary files /dev/null and b/metaicl/llama/superglue-copa/superglue-copa_16_100_test.jsonl differ diff --git a/metaicl/llama/superglue-copa/superglue-copa_16_100_train.jsonl b/metaicl/llama/superglue-copa/superglue-copa_16_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..127bfea1fae2427bfb84145c3aa3bc4ba7ad4960 Binary files /dev/null and b/metaicl/llama/superglue-copa/superglue-copa_16_100_train.jsonl differ diff --git a/metaicl/llama/superglue-copa/superglue-copa_16_13_train.jsonl b/metaicl/llama/superglue-copa/superglue-copa_16_13_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ccdca8a6720517ce1ee10cde0a56f4fe1f72324a Binary files /dev/null and b/metaicl/llama/superglue-copa/superglue-copa_16_13_train.jsonl differ diff --git a/metaicl/llama/superglue-copa/superglue-copa_16_21_train.jsonl b/metaicl/llama/superglue-copa/superglue-copa_16_21_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..017fc1503626153b9f24a78a0bff08855a4d9b85 Binary files /dev/null and b/metaicl/llama/superglue-copa/superglue-copa_16_21_train.jsonl differ diff --git a/metaicl/llama/superglue-copa/superglue-copa_16_42_train.jsonl b/metaicl/llama/superglue-copa/superglue-copa_16_42_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..74954bf32230eba05ed9bb3941e6e1fd1dae03c9 Binary files /dev/null and b/metaicl/llama/superglue-copa/superglue-copa_16_42_train.jsonl differ diff --git a/metaicl/llama/superglue-copa/superglue-copa_16_87_train.jsonl b/metaicl/llama/superglue-copa/superglue-copa_16_87_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b05bd429ec7bf9c81461a9af6539290c20cc9dbc Binary files /dev/null and b/metaicl/llama/superglue-copa/superglue-copa_16_87_train.jsonl differ diff --git a/metaicl/llama/superglue-multirc/superglue-multirc_16384_100_train.jsonl b/metaicl/llama/superglue-multirc/superglue-multirc_16384_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7241b0e11f2270f88a139ea9eca2b98bae15e04b --- /dev/null +++ b/metaicl/llama/superglue-multirc/superglue-multirc_16384_100_train.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:2594aa6783b640145184d472dbee9e2fe683afff452b19e9fd057d50842237c5 +size 7103331 diff --git a/metaicl/llama/superglue-multirc/superglue-multirc_16_100_test.jsonl b/metaicl/llama/superglue-multirc/superglue-multirc_16_100_test.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d54feb657c285e83dc8a6ce2b54bc4ea80be06e8 --- /dev/null +++ b/metaicl/llama/superglue-multirc/superglue-multirc_16_100_test.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:8300566ec75079ad4da52ac8bc51e062f6b4c0f2ef838b8b784ddff383092bec +size 1263515 diff --git a/metaicl/llama/superglue-multirc/superglue-multirc_16_100_train.jsonl b/metaicl/llama/superglue-multirc/superglue-multirc_16_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c6ca12af8f35612872be1808ccb95259aeba6b89 Binary files /dev/null and b/metaicl/llama/superglue-multirc/superglue-multirc_16_100_train.jsonl differ diff --git a/metaicl/llama/superglue-multirc/superglue-multirc_16_13_train.jsonl b/metaicl/llama/superglue-multirc/superglue-multirc_16_13_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..192e7cfef5a7950810b090bd2de58bcc4f1d0923 Binary files /dev/null and b/metaicl/llama/superglue-multirc/superglue-multirc_16_13_train.jsonl differ diff --git a/metaicl/llama/superglue-multirc/superglue-multirc_16_21_train.jsonl b/metaicl/llama/superglue-multirc/superglue-multirc_16_21_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e5a039beec4a99127f028f81cee17c9e517ef181 Binary files /dev/null and b/metaicl/llama/superglue-multirc/superglue-multirc_16_21_train.jsonl differ diff --git a/metaicl/llama/superglue-multirc/superglue-multirc_16_42_train.jsonl b/metaicl/llama/superglue-multirc/superglue-multirc_16_42_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..bd21af0484b202a0075f984b78d9f9a325b40c23 Binary files /dev/null and b/metaicl/llama/superglue-multirc/superglue-multirc_16_42_train.jsonl differ diff --git a/metaicl/llama/superglue-multirc/superglue-multirc_16_87_train.jsonl b/metaicl/llama/superglue-multirc/superglue-multirc_16_87_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a4f422cab6e3b908d33898ae6e1b223fe9a9db3e Binary files /dev/null and b/metaicl/llama/superglue-multirc/superglue-multirc_16_87_train.jsonl differ diff --git a/metaicl/llama/superglue-record/superglue-record_16384_100_train.jsonl b/metaicl/llama/superglue-record/superglue-record_16384_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..53014821958d5c581841d274bc7512c6e4214a95 --- /dev/null +++ b/metaicl/llama/superglue-record/superglue-record_16384_100_train.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:5112d36efb8228ebf9026202ec2986d13a0358dc72a9a11fba7e97f205bee2bf +size 14904993 diff --git a/metaicl/llama/superglue-record/superglue-record_16_100_test.jsonl b/metaicl/llama/superglue-record/superglue-record_16_100_test.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b44e66ea3edf7c5aa1e5687d54a2b9d2c2dd8ce5 --- /dev/null +++ b/metaicl/llama/superglue-record/superglue-record_16_100_test.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:a9e1633adc558cad5170734814cd8440d4990e7bfd02a9102a2fa488142bac51 +size 8857497 diff --git a/metaicl/llama/superglue-record/superglue-record_16_100_train.jsonl b/metaicl/llama/superglue-record/superglue-record_16_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..71fa62536f8840be7be208e6c089c1826192923f Binary files /dev/null and b/metaicl/llama/superglue-record/superglue-record_16_100_train.jsonl differ diff --git a/metaicl/llama/superglue-record/superglue-record_16_13_train.jsonl b/metaicl/llama/superglue-record/superglue-record_16_13_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..cdaf30682d65ae742d69ad024fb5fd3ff23fde45 Binary files /dev/null and b/metaicl/llama/superglue-record/superglue-record_16_13_train.jsonl differ diff --git a/metaicl/llama/superglue-record/superglue-record_16_21_train.jsonl b/metaicl/llama/superglue-record/superglue-record_16_21_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ab03c2456311c7fbf5d027fcf0076501883169b8 Binary files /dev/null and b/metaicl/llama/superglue-record/superglue-record_16_21_train.jsonl differ diff --git a/metaicl/llama/superglue-record/superglue-record_16_42_train.jsonl b/metaicl/llama/superglue-record/superglue-record_16_42_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1b711f4d7e50c4e75b97d8d6b00f93d1dbf2e83f Binary files /dev/null and b/metaicl/llama/superglue-record/superglue-record_16_42_train.jsonl differ diff --git a/metaicl/llama/superglue-record/superglue-record_16_87_train.jsonl b/metaicl/llama/superglue-record/superglue-record_16_87_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..20343095c38a036ad4a3e33b3fe387639e524011 Binary files /dev/null and b/metaicl/llama/superglue-record/superglue-record_16_87_train.jsonl differ diff --git a/metaicl/llama/superglue-rte/superglue-rte_16384_100_train.jsonl b/metaicl/llama/superglue-rte/superglue-rte_16384_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..bb66f99ac3c4cd13eabd9b2ef22f63db9a705f64 --- /dev/null +++ b/metaicl/llama/superglue-rte/superglue-rte_16384_100_train.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:6a4616ec1a6c69796f4648a4acf79d2a8ef205aece2a0be1c562776178f19831 +size 860507 diff --git a/metaicl/llama/superglue-rte/superglue-rte_16_100_test.jsonl b/metaicl/llama/superglue-rte/superglue-rte_16_100_test.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4ac65a6d2a763f4f9702bfacf64408e3b93b3e2d Binary files /dev/null and b/metaicl/llama/superglue-rte/superglue-rte_16_100_test.jsonl differ diff --git a/metaicl/llama/superglue-rte/superglue-rte_16_100_train.jsonl b/metaicl/llama/superglue-rte/superglue-rte_16_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..65c81d705939f9f959546dc3cf9f91d8ef9a08e5 Binary files /dev/null and b/metaicl/llama/superglue-rte/superglue-rte_16_100_train.jsonl differ diff --git a/metaicl/llama/superglue-rte/superglue-rte_16_13_train.jsonl b/metaicl/llama/superglue-rte/superglue-rte_16_13_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..fb499b3a4a7813a7f71d17d011383c29863c0133 Binary files /dev/null and b/metaicl/llama/superglue-rte/superglue-rte_16_13_train.jsonl differ diff --git a/metaicl/llama/superglue-rte/superglue-rte_16_21_train.jsonl b/metaicl/llama/superglue-rte/superglue-rte_16_21_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1d990756d09b16bc8827fdff7cb0d4fef1615ca3 Binary files /dev/null and b/metaicl/llama/superglue-rte/superglue-rte_16_21_train.jsonl differ diff --git a/metaicl/llama/superglue-rte/superglue-rte_16_42_train.jsonl b/metaicl/llama/superglue-rte/superglue-rte_16_42_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..69720053bd2e4c32a9b5f16b4d3c4d353e16184b Binary files /dev/null and b/metaicl/llama/superglue-rte/superglue-rte_16_42_train.jsonl differ diff --git a/metaicl/llama/superglue-rte/superglue-rte_16_87_train.jsonl b/metaicl/llama/superglue-rte/superglue-rte_16_87_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..51544c25615a161d1591450aef1b156b9d907f5a Binary files /dev/null and b/metaicl/llama/superglue-rte/superglue-rte_16_87_train.jsonl differ diff --git a/metaicl/llama/superglue-wic/superglue-wic_16384_100_train.jsonl b/metaicl/llama/superglue-wic/superglue-wic_16384_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8e5ef669e79230c8a61773f753941e416a891d73 --- /dev/null +++ b/metaicl/llama/superglue-wic/superglue-wic_16384_100_train.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:f8ab2c6f086f6ceb0616e953fa1812dd512f4c5665a2e8ea135e0b6f44b519eb +size 888923 diff --git a/metaicl/llama/superglue-wic/superglue-wic_16_100_test.jsonl b/metaicl/llama/superglue-wic/superglue-wic_16_100_test.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3643e70a8b6cc0b06bcc69239fe8b599a39d8644 --- /dev/null +++ b/metaicl/llama/superglue-wic/superglue-wic_16_100_test.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:960e7c9bff3d89fc167e8131530441c5ee7cdbe2c6a9c97ecd6fafebf9329f68 +size 107475 diff --git a/metaicl/llama/superglue-wic/superglue-wic_16_100_train.jsonl b/metaicl/llama/superglue-wic/superglue-wic_16_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9bf405b43fbc8c151eb73fd76b0b454c859bfad7 Binary files /dev/null and b/metaicl/llama/superglue-wic/superglue-wic_16_100_train.jsonl differ diff --git a/metaicl/llama/superglue-wic/superglue-wic_16_13_train.jsonl b/metaicl/llama/superglue-wic/superglue-wic_16_13_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..60cf0178ca974c84332158f5478cb0e72c4dbe7b Binary files /dev/null and b/metaicl/llama/superglue-wic/superglue-wic_16_13_train.jsonl differ diff --git a/metaicl/llama/superglue-wic/superglue-wic_16_21_train.jsonl b/metaicl/llama/superglue-wic/superglue-wic_16_21_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3b0cfde4f6ecab14c12b95eb4ea23e5732bedb39 Binary files /dev/null and b/metaicl/llama/superglue-wic/superglue-wic_16_21_train.jsonl differ diff --git a/metaicl/llama/superglue-wic/superglue-wic_16_42_train.jsonl b/metaicl/llama/superglue-wic/superglue-wic_16_42_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..dc039bc1cf9175797eecc2d99076a58bda4b414d Binary files /dev/null and b/metaicl/llama/superglue-wic/superglue-wic_16_42_train.jsonl differ diff --git a/metaicl/llama/superglue-wic/superglue-wic_16_87_train.jsonl b/metaicl/llama/superglue-wic/superglue-wic_16_87_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d55c7eb59c1413064a9b723eb5dba86324e6df3e Binary files /dev/null and b/metaicl/llama/superglue-wic/superglue-wic_16_87_train.jsonl differ diff --git a/metaicl/llama/superglue-wsc/superglue-wsc_16384_100_train.jsonl b/metaicl/llama/superglue-wsc/superglue-wsc_16384_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..391880eb647f9b9e5027caee972d09ce2c22c8a3 --- /dev/null +++ b/metaicl/llama/superglue-wsc/superglue-wsc_16384_100_train.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:2357adeafef3145f060fbcd301095c7a25d1c3548ace7653c04e189c8ed38dcc +size 112987 diff --git a/metaicl/llama/superglue-wsc/superglue-wsc_16_100_test.jsonl b/metaicl/llama/superglue-wsc/superglue-wsc_16_100_test.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..24ac4f312d0197cc6268639c1a4c2c4d80865166 Binary files /dev/null and b/metaicl/llama/superglue-wsc/superglue-wsc_16_100_test.jsonl differ diff --git a/metaicl/llama/superglue-wsc/superglue-wsc_16_100_train.jsonl b/metaicl/llama/superglue-wsc/superglue-wsc_16_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ffd471e05cb5b2e41e934660c65d875baa045bc2 Binary files /dev/null and b/metaicl/llama/superglue-wsc/superglue-wsc_16_100_train.jsonl differ diff --git a/metaicl/llama/superglue-wsc/superglue-wsc_16_13_train.jsonl b/metaicl/llama/superglue-wsc/superglue-wsc_16_13_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3e3998ab123f732bff3e0221af2d40d336dfee3e Binary files /dev/null and b/metaicl/llama/superglue-wsc/superglue-wsc_16_13_train.jsonl differ diff --git a/metaicl/llama/superglue-wsc/superglue-wsc_16_21_train.jsonl b/metaicl/llama/superglue-wsc/superglue-wsc_16_21_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..021f090a19f24da3b8a8dd70c8b342124282a8f3 Binary files /dev/null and b/metaicl/llama/superglue-wsc/superglue-wsc_16_21_train.jsonl differ diff --git a/metaicl/llama/superglue-wsc/superglue-wsc_16_42_train.jsonl b/metaicl/llama/superglue-wsc/superglue-wsc_16_42_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ef2b752a6d3f542fbbe819187ccd1063d9b8051c Binary files /dev/null and b/metaicl/llama/superglue-wsc/superglue-wsc_16_42_train.jsonl differ diff --git a/metaicl/llama/superglue-wsc/superglue-wsc_16_87_train.jsonl b/metaicl/llama/superglue-wsc/superglue-wsc_16_87_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f0107138ab94ad960998f27f8ee2873821c3dd81 Binary files /dev/null and b/metaicl/llama/superglue-wsc/superglue-wsc_16_87_train.jsonl differ diff --git a/metaicl/llama/swag/swag_16384_100_train.jsonl b/metaicl/llama/swag/swag_16384_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..35cca61eb3eed08e1b422955d4b783dac470d76c --- /dev/null +++ b/metaicl/llama/swag/swag_16384_100_train.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:70a3cd65851a74a8d0ef92adff7fc30de2cc7df6b630cf2f1bcd1d383ca31703 +size 4704329 diff --git a/metaicl/llama/swag/swag_16_100_test.jsonl b/metaicl/llama/swag/swag_16_100_test.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..77c7886169b22e719bd90e04a66a916cb24719d9 --- /dev/null +++ b/metaicl/llama/swag/swag_16_100_test.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:77a3f9b305f021b3dcc4af837bd79fa4ebfcb34d8ad55678045852d737352b50 +size 5906561 diff --git a/metaicl/llama/swag/swag_16_100_train.jsonl b/metaicl/llama/swag/swag_16_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..212b8c01792986a5082fcf4c6601176e6ae4e4bd Binary files /dev/null and b/metaicl/llama/swag/swag_16_100_train.jsonl differ diff --git a/metaicl/llama/swag/swag_16_13_train.jsonl b/metaicl/llama/swag/swag_16_13_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..50c9ac96834626042361b802166f78bb28ea670f Binary files /dev/null and b/metaicl/llama/swag/swag_16_13_train.jsonl differ diff --git a/metaicl/llama/swag/swag_16_21_train.jsonl b/metaicl/llama/swag/swag_16_21_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..634a3f78aea2ab5091e262d68e03b2400ca20c3c Binary files /dev/null and b/metaicl/llama/swag/swag_16_21_train.jsonl differ diff --git a/metaicl/llama/swag/swag_16_42_train.jsonl b/metaicl/llama/swag/swag_16_42_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..416247bb05af85bde01fcee3e63519be99f8c5a6 Binary files /dev/null and b/metaicl/llama/swag/swag_16_42_train.jsonl differ diff --git a/metaicl/llama/swag/swag_16_87_train.jsonl b/metaicl/llama/swag/swag_16_87_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8e428ade924a9aaad8b17942b4fb7a9be0aa9726 Binary files /dev/null and b/metaicl/llama/swag/swag_16_87_train.jsonl differ diff --git a/metaicl/llama/tab_fact/tab_fact_16384_100_train.jsonl b/metaicl/llama/tab_fact/tab_fact_16384_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..bbe0d15d98979183cb6eb7d9295632fa38e0cbc3 --- /dev/null +++ b/metaicl/llama/tab_fact/tab_fact_16384_100_train.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:01b282fae2cd520143503d1633084f014be62f4c7018091e967f383112882606 +size 29577873 diff --git a/metaicl/llama/tab_fact/tab_fact_16_100_test.jsonl b/metaicl/llama/tab_fact/tab_fact_16_100_test.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5a5d46c456ad6d8ed05900b8f81c62c537990d14 --- /dev/null +++ b/metaicl/llama/tab_fact/tab_fact_16_100_test.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:3e3145f3ffd3eeb09f52e3c783047886db0e5d3da5f633ade18ff7bb7fac469b +size 23213705 diff --git a/metaicl/llama/tab_fact/tab_fact_16_100_train.jsonl b/metaicl/llama/tab_fact/tab_fact_16_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..804b680d0c8db2a7897f4e807f561cbd626f0221 Binary files /dev/null and b/metaicl/llama/tab_fact/tab_fact_16_100_train.jsonl differ diff --git a/metaicl/llama/tab_fact/tab_fact_16_13_train.jsonl b/metaicl/llama/tab_fact/tab_fact_16_13_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9bf9c6b71b6b2bcb7b0d452e83492f6b1da6a9ae Binary files /dev/null and b/metaicl/llama/tab_fact/tab_fact_16_13_train.jsonl differ diff --git a/metaicl/llama/tab_fact/tab_fact_16_21_train.jsonl b/metaicl/llama/tab_fact/tab_fact_16_21_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..32820a2cd3023d17c6df0e3802e282f044f8c6d9 Binary files /dev/null and b/metaicl/llama/tab_fact/tab_fact_16_21_train.jsonl differ diff --git a/metaicl/llama/tab_fact/tab_fact_16_42_train.jsonl b/metaicl/llama/tab_fact/tab_fact_16_42_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ec4b32cd972f6a63566ea7f91f981bca5f0554bd Binary files /dev/null and b/metaicl/llama/tab_fact/tab_fact_16_42_train.jsonl differ diff --git a/metaicl/llama/tab_fact/tab_fact_16_87_train.jsonl b/metaicl/llama/tab_fact/tab_fact_16_87_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8187df89f12814218890584771a75fbe08c14d07 Binary files /dev/null and b/metaicl/llama/tab_fact/tab_fact_16_87_train.jsonl differ diff --git a/metaicl/llama/trec-finegrained/trec-finegrained_16384_100_train.jsonl b/metaicl/llama/trec-finegrained/trec-finegrained_16384_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7bb155e4252a8a988e21678af2f4c1d9a3a3026b --- /dev/null +++ b/metaicl/llama/trec-finegrained/trec-finegrained_16384_100_train.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:e4d2357b49ea4318ea3b9228859bc37356c9bcc72f9c58946bec4dbb56eb52f5 +size 2530721 diff --git a/metaicl/llama/trec-finegrained/trec-finegrained_16_100_test.jsonl b/metaicl/llama/trec-finegrained/trec-finegrained_16_100_test.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5b2d65d6e09d0a26edbc8925ca7ef7db88f375e0 --- /dev/null +++ b/metaicl/llama/trec-finegrained/trec-finegrained_16_100_test.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:4b01efa971aa3bec53a2d5eff3fe570199c6829c57f4202a70a8bb2f6dd61a8a +size 633305 diff --git a/metaicl/llama/trec-finegrained/trec-finegrained_16_100_train.jsonl b/metaicl/llama/trec-finegrained/trec-finegrained_16_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6a900ff7577f2636122199bb5ddf762f68e3320a Binary files /dev/null and b/metaicl/llama/trec-finegrained/trec-finegrained_16_100_train.jsonl differ diff --git a/metaicl/llama/trec-finegrained/trec-finegrained_16_13_train.jsonl b/metaicl/llama/trec-finegrained/trec-finegrained_16_13_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7669925fea6374c344f8a4ed98ed917a6140741c Binary files /dev/null and b/metaicl/llama/trec-finegrained/trec-finegrained_16_13_train.jsonl differ diff --git a/metaicl/llama/trec-finegrained/trec-finegrained_16_21_train.jsonl b/metaicl/llama/trec-finegrained/trec-finegrained_16_21_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..345da9aa4cc8776849b512b62434a668c16a6639 Binary files /dev/null and b/metaicl/llama/trec-finegrained/trec-finegrained_16_21_train.jsonl differ diff --git a/metaicl/llama/trec-finegrained/trec-finegrained_16_42_train.jsonl b/metaicl/llama/trec-finegrained/trec-finegrained_16_42_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5ccae31f7b7dc5a7510866858ee96bc63cba8789 Binary files /dev/null and b/metaicl/llama/trec-finegrained/trec-finegrained_16_42_train.jsonl differ diff --git a/metaicl/llama/trec-finegrained/trec-finegrained_16_87_train.jsonl b/metaicl/llama/trec-finegrained/trec-finegrained_16_87_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..40a986022358d2a152112a1d205d12e4a68615e2 Binary files /dev/null and b/metaicl/llama/trec-finegrained/trec-finegrained_16_87_train.jsonl differ diff --git a/metaicl/llama/trec/trec_16384_100_train.jsonl b/metaicl/llama/trec/trec_16384_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..42916ba8f99371645012092e5a2349705c10adc0 --- /dev/null +++ b/metaicl/llama/trec/trec_16384_100_train.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:93f6f463e9aeb43cb9273799bfa2c4449ea60d4a9ca45aa03978ef1ab9abd82a +size 645961 diff --git a/metaicl/llama/trec/trec_16_100_test.jsonl b/metaicl/llama/trec/trec_16_100_test.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..17221f5e16e6ea63b34305ac3b88207219c89146 --- /dev/null +++ b/metaicl/llama/trec/trec_16_100_test.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:cd490a8bbb574953f3325507c9f55f94a17fe68220d4b5ea422931414d2c6b5b +size 161729 diff --git a/metaicl/llama/trec/trec_16_100_train.jsonl b/metaicl/llama/trec/trec_16_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8da536673d508c8a8bbdc62c3bffbb4b61a70c7f Binary files /dev/null and b/metaicl/llama/trec/trec_16_100_train.jsonl differ diff --git a/metaicl/llama/trec/trec_16_13_train.jsonl b/metaicl/llama/trec/trec_16_13_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1717b5e3bbcbf18714d6173ba7c82e00cd4f9f04 Binary files /dev/null and b/metaicl/llama/trec/trec_16_13_train.jsonl differ diff --git a/metaicl/llama/trec/trec_16_21_train.jsonl b/metaicl/llama/trec/trec_16_21_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..16d79027a796c98715bf9b9b3253b9d361108176 Binary files /dev/null and b/metaicl/llama/trec/trec_16_21_train.jsonl differ diff --git a/metaicl/llama/trec/trec_16_42_train.jsonl b/metaicl/llama/trec/trec_16_42_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..60b862f704af5fe1fe122b7262bb14794a4a86f0 Binary files /dev/null and b/metaicl/llama/trec/trec_16_42_train.jsonl differ diff --git a/metaicl/llama/trec/trec_16_87_train.jsonl b/metaicl/llama/trec/trec_16_87_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0ba036e8d194a81d509cf56ff40a9a08415c56ba Binary files /dev/null and b/metaicl/llama/trec/trec_16_87_train.jsonl differ diff --git a/metaicl/llama/tweet_eval-emoji/tweet_eval-emoji_16384_100_train.jsonl b/metaicl/llama/tweet_eval-emoji/tweet_eval-emoji_16384_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..027f3e1a5cd3d1b6478b9361066a90a9d559690d --- /dev/null +++ b/metaicl/llama/tweet_eval-emoji/tweet_eval-emoji_16384_100_train.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:125b09293f11ea69c45f4c5cfd59a5f42770fd7f806463c84cb2fca916cd5cbe +size 7969121 diff --git a/metaicl/llama/tweet_eval-emoji/tweet_eval-emoji_16_100_test.jsonl b/metaicl/llama/tweet_eval-emoji/tweet_eval-emoji_16_100_test.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d88f1b01843a0219f275fe0269b2294c7386db4b --- /dev/null +++ b/metaicl/llama/tweet_eval-emoji/tweet_eval-emoji_16_100_test.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:84d934fcd0167d5263aee8413a4b7112c458aec9c3ff97285d823329c1b58c5b +size 2400217 diff --git a/metaicl/llama/tweet_eval-emoji/tweet_eval-emoji_16_100_train.jsonl b/metaicl/llama/tweet_eval-emoji/tweet_eval-emoji_16_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e0b5b0de24b8230bef97b95580b64b569179db83 Binary files /dev/null and b/metaicl/llama/tweet_eval-emoji/tweet_eval-emoji_16_100_train.jsonl differ diff --git a/metaicl/llama/tweet_eval-emoji/tweet_eval-emoji_16_13_train.jsonl b/metaicl/llama/tweet_eval-emoji/tweet_eval-emoji_16_13_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..cd56bebbee9a823d17e75f29abf3618dd38a0e2a Binary files /dev/null and b/metaicl/llama/tweet_eval-emoji/tweet_eval-emoji_16_13_train.jsonl differ diff --git a/metaicl/llama/tweet_eval-emoji/tweet_eval-emoji_16_21_train.jsonl b/metaicl/llama/tweet_eval-emoji/tweet_eval-emoji_16_21_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..353fddc71e061610d3d61db33272b384589b7aee Binary files /dev/null and b/metaicl/llama/tweet_eval-emoji/tweet_eval-emoji_16_21_train.jsonl differ diff --git a/metaicl/llama/tweet_eval-emoji/tweet_eval-emoji_16_42_train.jsonl b/metaicl/llama/tweet_eval-emoji/tweet_eval-emoji_16_42_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0d9fee7c651600c96339d22ca18293b3ec463a8a Binary files /dev/null and b/metaicl/llama/tweet_eval-emoji/tweet_eval-emoji_16_42_train.jsonl differ diff --git a/metaicl/llama/tweet_eval-emoji/tweet_eval-emoji_16_87_train.jsonl b/metaicl/llama/tweet_eval-emoji/tweet_eval-emoji_16_87_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a4e80f181d6737b003228985237da0fdf74cf2c2 Binary files /dev/null and b/metaicl/llama/tweet_eval-emoji/tweet_eval-emoji_16_87_train.jsonl differ diff --git a/metaicl/llama/tweet_eval-emotion/tweet_eval-emotion_16384_100_train.jsonl b/metaicl/llama/tweet_eval-emotion/tweet_eval-emotion_16384_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7b0019000afd043d62cad7de632a4af90547cf36 --- /dev/null +++ b/metaicl/llama/tweet_eval-emotion/tweet_eval-emotion_16384_100_train.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:fe53f85a1210261f476f369c522e5cba6a63ff33677362135c1181060e2d5fc0 +size 514981 diff --git a/metaicl/llama/tweet_eval-emotion/tweet_eval-emotion_16_100_test.jsonl b/metaicl/llama/tweet_eval-emotion/tweet_eval-emotion_16_100_test.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3664bc697c09d8fdd71123227f139a3e4631a1a3 Binary files /dev/null and b/metaicl/llama/tweet_eval-emotion/tweet_eval-emotion_16_100_test.jsonl differ diff --git a/metaicl/llama/tweet_eval-emotion/tweet_eval-emotion_16_100_train.jsonl b/metaicl/llama/tweet_eval-emotion/tweet_eval-emotion_16_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e8913af2e206431be9bb9a4c4833fded20be266f Binary files /dev/null and b/metaicl/llama/tweet_eval-emotion/tweet_eval-emotion_16_100_train.jsonl differ diff --git a/metaicl/llama/tweet_eval-emotion/tweet_eval-emotion_16_13_train.jsonl b/metaicl/llama/tweet_eval-emotion/tweet_eval-emotion_16_13_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ac69e2a93cbc97d7f80215d84b471689bf53a0f6 Binary files /dev/null and b/metaicl/llama/tweet_eval-emotion/tweet_eval-emotion_16_13_train.jsonl differ diff --git a/metaicl/llama/tweet_eval-emotion/tweet_eval-emotion_16_21_train.jsonl b/metaicl/llama/tweet_eval-emotion/tweet_eval-emotion_16_21_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a265d050a025195e7144b84657bfe94b39a5b61c Binary files /dev/null and b/metaicl/llama/tweet_eval-emotion/tweet_eval-emotion_16_21_train.jsonl differ diff --git a/metaicl/llama/tweet_eval-emotion/tweet_eval-emotion_16_42_train.jsonl b/metaicl/llama/tweet_eval-emotion/tweet_eval-emotion_16_42_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8b348bc1ddfcb33e2b8f9c94b8e107efe1f2382c Binary files /dev/null and b/metaicl/llama/tweet_eval-emotion/tweet_eval-emotion_16_42_train.jsonl differ diff --git a/metaicl/llama/tweet_eval-emotion/tweet_eval-emotion_16_87_train.jsonl b/metaicl/llama/tweet_eval-emotion/tweet_eval-emotion_16_87_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..967990acf9f570d8310aecd30cc8b5799045c895 Binary files /dev/null and b/metaicl/llama/tweet_eval-emotion/tweet_eval-emotion_16_87_train.jsonl differ diff --git a/metaicl/llama/tweet_eval-hate/tweet_eval-hate_16384_100_train.jsonl b/metaicl/llama/tweet_eval-hate/tweet_eval-hate_16384_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4e7da8e64a20853a2e742f82b0c0b656d9893241 --- /dev/null +++ b/metaicl/llama/tweet_eval-hate/tweet_eval-hate_16384_100_train.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:c85ad9eccbfef8ceea007df6638b72385988c89bdd6c45f0c73f892cd11125e4 +size 1523231 diff --git a/metaicl/llama/tweet_eval-hate/tweet_eval-hate_16_100_test.jsonl b/metaicl/llama/tweet_eval-hate/tweet_eval-hate_16_100_test.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a27ebfa29c1ceeeaea92362c1c32cecbf48eb98c --- /dev/null +++ b/metaicl/llama/tweet_eval-hate/tweet_eval-hate_16_100_test.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:97f814b806c1fe544752de99214ca310bc9a690aea57d092905486f5a22fec1e +size 184215 diff --git a/metaicl/llama/tweet_eval-hate/tweet_eval-hate_16_100_train.jsonl b/metaicl/llama/tweet_eval-hate/tweet_eval-hate_16_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d400314cffcbe4d0450380366ad9a4ec643f679b Binary files /dev/null and b/metaicl/llama/tweet_eval-hate/tweet_eval-hate_16_100_train.jsonl differ diff --git a/metaicl/llama/tweet_eval-hate/tweet_eval-hate_16_13_train.jsonl b/metaicl/llama/tweet_eval-hate/tweet_eval-hate_16_13_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b526f1c913c091802cd80eddfecb53812d482f82 Binary files /dev/null and b/metaicl/llama/tweet_eval-hate/tweet_eval-hate_16_13_train.jsonl differ diff --git a/metaicl/llama/tweet_eval-hate/tweet_eval-hate_16_21_train.jsonl b/metaicl/llama/tweet_eval-hate/tweet_eval-hate_16_21_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..57f8a8bef4c3d22726d1b0b5ea22c1d173ad4083 Binary files /dev/null and b/metaicl/llama/tweet_eval-hate/tweet_eval-hate_16_21_train.jsonl differ diff --git a/metaicl/llama/tweet_eval-hate/tweet_eval-hate_16_42_train.jsonl b/metaicl/llama/tweet_eval-hate/tweet_eval-hate_16_42_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..82cc748aa5c6050e9b3cf5e708a931e030179c6b Binary files /dev/null and b/metaicl/llama/tweet_eval-hate/tweet_eval-hate_16_42_train.jsonl differ diff --git a/metaicl/llama/tweet_eval-hate/tweet_eval-hate_16_87_train.jsonl b/metaicl/llama/tweet_eval-hate/tweet_eval-hate_16_87_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..89c78bcf4b77a3b72ed64cfaa5920b7b955707da Binary files /dev/null and b/metaicl/llama/tweet_eval-hate/tweet_eval-hate_16_87_train.jsonl differ diff --git a/metaicl/llama/tweet_eval-irony/tweet_eval-irony_16384_100_train.jsonl b/metaicl/llama/tweet_eval-irony/tweet_eval-irony_16384_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..56aefa6735ae1a01892511209f0eec093fe10bee --- /dev/null +++ b/metaicl/llama/tweet_eval-irony/tweet_eval-irony_16384_100_train.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:eea0f7ac5debb85955468dac8f2c1962d0d47e2617ddec672c479d7e4c72470d +size 464737 diff --git a/metaicl/llama/tweet_eval-irony/tweet_eval-irony_16_100_test.jsonl b/metaicl/llama/tweet_eval-irony/tweet_eval-irony_16_100_test.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..cad6daa5b91305bd55c9423a6eebb905015d8541 --- /dev/null +++ b/metaicl/llama/tweet_eval-irony/tweet_eval-irony_16_100_test.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:e2307f85c01b7553a92247237656a21d3451919816044671686dd0218bfab985 +size 154841 diff --git a/metaicl/llama/tweet_eval-irony/tweet_eval-irony_16_100_train.jsonl b/metaicl/llama/tweet_eval-irony/tweet_eval-irony_16_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1221d16ab5addf2a3e78078cb215c2303cf2e33b Binary files /dev/null and b/metaicl/llama/tweet_eval-irony/tweet_eval-irony_16_100_train.jsonl differ diff --git a/metaicl/llama/tweet_eval-irony/tweet_eval-irony_16_13_train.jsonl b/metaicl/llama/tweet_eval-irony/tweet_eval-irony_16_13_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9006df279c8168f6bfeb058418db72f0e4c3d3d1 Binary files /dev/null and b/metaicl/llama/tweet_eval-irony/tweet_eval-irony_16_13_train.jsonl differ diff --git a/metaicl/llama/tweet_eval-irony/tweet_eval-irony_16_21_train.jsonl b/metaicl/llama/tweet_eval-irony/tweet_eval-irony_16_21_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a275accd33a754ebda7082eb9825b341c7c7a124 Binary files /dev/null and b/metaicl/llama/tweet_eval-irony/tweet_eval-irony_16_21_train.jsonl differ diff --git a/metaicl/llama/tweet_eval-irony/tweet_eval-irony_16_42_train.jsonl b/metaicl/llama/tweet_eval-irony/tweet_eval-irony_16_42_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..738bde43730446a3f09ab4b03308cd8add2e2f55 Binary files /dev/null and b/metaicl/llama/tweet_eval-irony/tweet_eval-irony_16_42_train.jsonl differ diff --git a/metaicl/llama/tweet_eval-irony/tweet_eval-irony_16_87_train.jsonl b/metaicl/llama/tweet_eval-irony/tweet_eval-irony_16_87_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3c44493ff85d976899b1b3b783618ab25142e635 Binary files /dev/null and b/metaicl/llama/tweet_eval-irony/tweet_eval-irony_16_87_train.jsonl differ diff --git a/metaicl/llama/tweet_eval-offensive/tweet_eval-offensive_16384_100_train.jsonl b/metaicl/llama/tweet_eval-offensive/tweet_eval-offensive_16384_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..60136d828935a326694754a74dd9fe9b3b8fdac3 --- /dev/null +++ b/metaicl/llama/tweet_eval-offensive/tweet_eval-offensive_16384_100_train.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:592226b80ce820e70c0197a4b8091b80ae16ba648a77d47c1cbbf2c80181e81a +size 2038953 diff --git a/metaicl/llama/tweet_eval-offensive/tweet_eval-offensive_16_100_test.jsonl b/metaicl/llama/tweet_eval-offensive/tweet_eval-offensive_16_100_test.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b66c85d13eeffdf14beab74e56d68eb558f3529b --- /dev/null +++ b/metaicl/llama/tweet_eval-offensive/tweet_eval-offensive_16_100_test.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:d287e52144c90038fd84f9cbccf4cfe12e3d459a0a4b0a90b07f6e90849b52ac +size 233825 diff --git a/metaicl/llama/tweet_eval-offensive/tweet_eval-offensive_16_100_train.jsonl b/metaicl/llama/tweet_eval-offensive/tweet_eval-offensive_16_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..758373f79e9079f52c97ffbc5efe1df44a6b277d Binary files /dev/null and b/metaicl/llama/tweet_eval-offensive/tweet_eval-offensive_16_100_train.jsonl differ diff --git a/metaicl/llama/tweet_eval-offensive/tweet_eval-offensive_16_13_train.jsonl b/metaicl/llama/tweet_eval-offensive/tweet_eval-offensive_16_13_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b93f248fc2de9a43823162b8fd8ecccf3ed67796 Binary files /dev/null and b/metaicl/llama/tweet_eval-offensive/tweet_eval-offensive_16_13_train.jsonl differ diff --git a/metaicl/llama/tweet_eval-offensive/tweet_eval-offensive_16_21_train.jsonl b/metaicl/llama/tweet_eval-offensive/tweet_eval-offensive_16_21_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1405a7b514247f7ee49ec58ff5a7d5d9f8509b09 Binary files /dev/null and b/metaicl/llama/tweet_eval-offensive/tweet_eval-offensive_16_21_train.jsonl differ diff --git a/metaicl/llama/tweet_eval-offensive/tweet_eval-offensive_16_42_train.jsonl b/metaicl/llama/tweet_eval-offensive/tweet_eval-offensive_16_42_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f858ff7f05ca3c4952d36505b9a672c06704ef92 Binary files /dev/null and b/metaicl/llama/tweet_eval-offensive/tweet_eval-offensive_16_42_train.jsonl differ diff --git a/metaicl/llama/tweet_eval-offensive/tweet_eval-offensive_16_87_train.jsonl b/metaicl/llama/tweet_eval-offensive/tweet_eval-offensive_16_87_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1ae9116d3a95efe4bedc2afec55a1f2faf93431f Binary files /dev/null and b/metaicl/llama/tweet_eval-offensive/tweet_eval-offensive_16_87_train.jsonl differ diff --git a/metaicl/llama/tweet_eval-sentiment/tweet_eval-sentiment_16384_100_train.jsonl b/metaicl/llama/tweet_eval-sentiment/tweet_eval-sentiment_16384_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..54cf752e0007447c2c5891fa5186d204e8d1fcd1 --- /dev/null +++ b/metaicl/llama/tweet_eval-sentiment/tweet_eval-sentiment_16384_100_train.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:58e8417f1f52de600572be2a9c50fb11b3772d9e9d92d9e5659daff09417d75b +size 2530345 diff --git a/metaicl/llama/tweet_eval-sentiment/tweet_eval-sentiment_16_100_test.jsonl b/metaicl/llama/tweet_eval-sentiment/tweet_eval-sentiment_16_100_test.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b6e5d37bc517a03c17d8128f0ffc5c1b88225200 --- /dev/null +++ b/metaicl/llama/tweet_eval-sentiment/tweet_eval-sentiment_16_100_test.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:1498285547badaadccd61fb5da453ccac322447620d293397c33535e414b6e38 +size 309089 diff --git a/metaicl/llama/tweet_eval-sentiment/tweet_eval-sentiment_16_100_train.jsonl b/metaicl/llama/tweet_eval-sentiment/tweet_eval-sentiment_16_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..59f97b5394f9976fc9c810206ed132971bd073a3 Binary files /dev/null and b/metaicl/llama/tweet_eval-sentiment/tweet_eval-sentiment_16_100_train.jsonl differ diff --git a/metaicl/llama/tweet_eval-sentiment/tweet_eval-sentiment_16_13_train.jsonl b/metaicl/llama/tweet_eval-sentiment/tweet_eval-sentiment_16_13_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..821c54dc8d34d09828d77782af1754a202fcc787 Binary files /dev/null and b/metaicl/llama/tweet_eval-sentiment/tweet_eval-sentiment_16_13_train.jsonl differ diff --git a/metaicl/llama/tweet_eval-sentiment/tweet_eval-sentiment_16_21_train.jsonl b/metaicl/llama/tweet_eval-sentiment/tweet_eval-sentiment_16_21_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..38a7b594004ccef5492796010bc3af6cde6ced44 Binary files /dev/null and b/metaicl/llama/tweet_eval-sentiment/tweet_eval-sentiment_16_21_train.jsonl differ diff --git a/metaicl/llama/tweet_eval-sentiment/tweet_eval-sentiment_16_42_train.jsonl b/metaicl/llama/tweet_eval-sentiment/tweet_eval-sentiment_16_42_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..daea900303bb5fc2228dd259453f97ade2010cc1 Binary files /dev/null and b/metaicl/llama/tweet_eval-sentiment/tweet_eval-sentiment_16_42_train.jsonl differ diff --git a/metaicl/llama/tweet_eval-sentiment/tweet_eval-sentiment_16_87_train.jsonl b/metaicl/llama/tweet_eval-sentiment/tweet_eval-sentiment_16_87_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..672916e10790aa9b51a5155991393f8d168b1550 Binary files /dev/null and b/metaicl/llama/tweet_eval-sentiment/tweet_eval-sentiment_16_87_train.jsonl differ diff --git a/metaicl/llama/tweet_eval-stance_abortion/tweet_eval-stance_abortion_16384_100_train.jsonl b/metaicl/llama/tweet_eval-stance_abortion/tweet_eval-stance_abortion_16384_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d45401858f61454b3d3dfb4ef79d2d41f4b6f1e6 Binary files /dev/null and b/metaicl/llama/tweet_eval-stance_abortion/tweet_eval-stance_abortion_16384_100_train.jsonl differ diff --git a/metaicl/llama/tweet_eval-stance_abortion/tweet_eval-stance_abortion_16_100_test.jsonl b/metaicl/llama/tweet_eval-stance_abortion/tweet_eval-stance_abortion_16_100_test.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e049e63b3c2b31dc94974f9425066275b179c93a Binary files /dev/null and b/metaicl/llama/tweet_eval-stance_abortion/tweet_eval-stance_abortion_16_100_test.jsonl differ diff --git a/metaicl/llama/tweet_eval-stance_abortion/tweet_eval-stance_abortion_16_100_train.jsonl b/metaicl/llama/tweet_eval-stance_abortion/tweet_eval-stance_abortion_16_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5795f45eedf007c3214efb6e9b4b5c05659c24d7 Binary files /dev/null and b/metaicl/llama/tweet_eval-stance_abortion/tweet_eval-stance_abortion_16_100_train.jsonl differ diff --git a/metaicl/llama/tweet_eval-stance_abortion/tweet_eval-stance_abortion_16_13_train.jsonl b/metaicl/llama/tweet_eval-stance_abortion/tweet_eval-stance_abortion_16_13_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e2c3372ad65339f86154483b909e3523824369a4 Binary files /dev/null and b/metaicl/llama/tweet_eval-stance_abortion/tweet_eval-stance_abortion_16_13_train.jsonl differ diff --git a/metaicl/llama/tweet_eval-stance_abortion/tweet_eval-stance_abortion_16_21_train.jsonl b/metaicl/llama/tweet_eval-stance_abortion/tweet_eval-stance_abortion_16_21_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3bd8e64351e109cd8174db88257751eeb913b130 Binary files /dev/null and b/metaicl/llama/tweet_eval-stance_abortion/tweet_eval-stance_abortion_16_21_train.jsonl differ diff --git a/metaicl/llama/tweet_eval-stance_abortion/tweet_eval-stance_abortion_16_42_train.jsonl b/metaicl/llama/tweet_eval-stance_abortion/tweet_eval-stance_abortion_16_42_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f20441bfcf6b077b3c7178f7a4e37fe5516fb7b9 Binary files /dev/null and b/metaicl/llama/tweet_eval-stance_abortion/tweet_eval-stance_abortion_16_42_train.jsonl differ diff --git a/metaicl/llama/tweet_eval-stance_abortion/tweet_eval-stance_abortion_16_87_train.jsonl b/metaicl/llama/tweet_eval-stance_abortion/tweet_eval-stance_abortion_16_87_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2aee99fb5732cbb00b2241ae3118ba8b43a09650 Binary files /dev/null and b/metaicl/llama/tweet_eval-stance_abortion/tweet_eval-stance_abortion_16_87_train.jsonl differ diff --git a/metaicl/llama/tweet_eval-stance_atheism/tweet_eval-stance_atheism_16384_100_train.jsonl b/metaicl/llama/tweet_eval-stance_atheism/tweet_eval-stance_atheism_16384_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4e9ab261706d563428f2c220ed2ec617f1da1295 Binary files /dev/null and b/metaicl/llama/tweet_eval-stance_atheism/tweet_eval-stance_atheism_16384_100_train.jsonl differ diff --git a/metaicl/llama/tweet_eval-stance_atheism/tweet_eval-stance_atheism_16_100_test.jsonl b/metaicl/llama/tweet_eval-stance_atheism/tweet_eval-stance_atheism_16_100_test.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b77d1d3ca8ceca39ec4a31909ae4c027bc0f9462 Binary files /dev/null and b/metaicl/llama/tweet_eval-stance_atheism/tweet_eval-stance_atheism_16_100_test.jsonl differ diff --git a/metaicl/llama/tweet_eval-stance_atheism/tweet_eval-stance_atheism_16_100_train.jsonl b/metaicl/llama/tweet_eval-stance_atheism/tweet_eval-stance_atheism_16_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..bd53f8e33c6cdddb50337de109e1ea4f8c86a174 Binary files /dev/null and b/metaicl/llama/tweet_eval-stance_atheism/tweet_eval-stance_atheism_16_100_train.jsonl differ diff --git a/metaicl/llama/tweet_eval-stance_atheism/tweet_eval-stance_atheism_16_13_train.jsonl b/metaicl/llama/tweet_eval-stance_atheism/tweet_eval-stance_atheism_16_13_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7efb749467b2e702ed3fc91877218c3987be16ae Binary files /dev/null and b/metaicl/llama/tweet_eval-stance_atheism/tweet_eval-stance_atheism_16_13_train.jsonl differ diff --git a/metaicl/llama/tweet_eval-stance_atheism/tweet_eval-stance_atheism_16_21_train.jsonl b/metaicl/llama/tweet_eval-stance_atheism/tweet_eval-stance_atheism_16_21_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..70d1021e6cdbd4035ad379631d91752315afea5e Binary files /dev/null and b/metaicl/llama/tweet_eval-stance_atheism/tweet_eval-stance_atheism_16_21_train.jsonl differ diff --git a/metaicl/llama/tweet_eval-stance_atheism/tweet_eval-stance_atheism_16_42_train.jsonl b/metaicl/llama/tweet_eval-stance_atheism/tweet_eval-stance_atheism_16_42_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ba9f97f60640edd4bebb167f93ccaa5586339ad8 Binary files /dev/null and b/metaicl/llama/tweet_eval-stance_atheism/tweet_eval-stance_atheism_16_42_train.jsonl differ diff --git a/metaicl/llama/tweet_eval-stance_atheism/tweet_eval-stance_atheism_16_87_train.jsonl b/metaicl/llama/tweet_eval-stance_atheism/tweet_eval-stance_atheism_16_87_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..082ea4a35c35c19b169d16f41ef08121bec079a1 Binary files /dev/null and b/metaicl/llama/tweet_eval-stance_atheism/tweet_eval-stance_atheism_16_87_train.jsonl differ diff --git a/metaicl/llama/tweet_eval-stance_climate/tweet_eval-stance_climate_16384_100_train.jsonl b/metaicl/llama/tweet_eval-stance_climate/tweet_eval-stance_climate_16384_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7e6f32433c107026eccf6c10f987377b63ca9228 Binary files /dev/null and b/metaicl/llama/tweet_eval-stance_climate/tweet_eval-stance_climate_16384_100_train.jsonl differ diff --git a/metaicl/llama/tweet_eval-stance_climate/tweet_eval-stance_climate_16_100_test.jsonl b/metaicl/llama/tweet_eval-stance_climate/tweet_eval-stance_climate_16_100_test.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9a8e8a161eb381c53acb4c7df2643c0141d4d069 Binary files /dev/null and b/metaicl/llama/tweet_eval-stance_climate/tweet_eval-stance_climate_16_100_test.jsonl differ diff --git a/metaicl/llama/tweet_eval-stance_climate/tweet_eval-stance_climate_16_100_train.jsonl b/metaicl/llama/tweet_eval-stance_climate/tweet_eval-stance_climate_16_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..91597de5e412396c58168a014e41cbaa7814302b Binary files /dev/null and b/metaicl/llama/tweet_eval-stance_climate/tweet_eval-stance_climate_16_100_train.jsonl differ diff --git a/metaicl/llama/tweet_eval-stance_climate/tweet_eval-stance_climate_16_13_train.jsonl b/metaicl/llama/tweet_eval-stance_climate/tweet_eval-stance_climate_16_13_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9b462d4c226d02d69c9e1a32b28b4843d7305f0a Binary files /dev/null and b/metaicl/llama/tweet_eval-stance_climate/tweet_eval-stance_climate_16_13_train.jsonl differ diff --git a/metaicl/llama/tweet_eval-stance_climate/tweet_eval-stance_climate_16_21_train.jsonl b/metaicl/llama/tweet_eval-stance_climate/tweet_eval-stance_climate_16_21_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..69da018a7e1f0a4a33a88fc050ae97d6f9423c4c Binary files /dev/null and b/metaicl/llama/tweet_eval-stance_climate/tweet_eval-stance_climate_16_21_train.jsonl differ diff --git a/metaicl/llama/tweet_eval-stance_climate/tweet_eval-stance_climate_16_42_train.jsonl b/metaicl/llama/tweet_eval-stance_climate/tweet_eval-stance_climate_16_42_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..acf41648776edcd5c32b0f4a6fbf0e895a4590a3 Binary files /dev/null and b/metaicl/llama/tweet_eval-stance_climate/tweet_eval-stance_climate_16_42_train.jsonl differ diff --git a/metaicl/llama/tweet_eval-stance_climate/tweet_eval-stance_climate_16_87_train.jsonl b/metaicl/llama/tweet_eval-stance_climate/tweet_eval-stance_climate_16_87_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..bcb5e175814a68e78032364c597f83af49c45746 Binary files /dev/null and b/metaicl/llama/tweet_eval-stance_climate/tweet_eval-stance_climate_16_87_train.jsonl differ diff --git a/metaicl/llama/tweet_eval-stance_feminist/tweet_eval-stance_feminist_16384_100_train.jsonl b/metaicl/llama/tweet_eval-stance_feminist/tweet_eval-stance_feminist_16384_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..520bf7c82491b999cd8b379a3401c9f4deea3d86 Binary files /dev/null and b/metaicl/llama/tweet_eval-stance_feminist/tweet_eval-stance_feminist_16384_100_train.jsonl differ diff --git a/metaicl/llama/tweet_eval-stance_feminist/tweet_eval-stance_feminist_16_100_test.jsonl b/metaicl/llama/tweet_eval-stance_feminist/tweet_eval-stance_feminist_16_100_test.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..94677083159fb5ba566733829300d9216d0a16b9 Binary files /dev/null and b/metaicl/llama/tweet_eval-stance_feminist/tweet_eval-stance_feminist_16_100_test.jsonl differ diff --git a/metaicl/llama/tweet_eval-stance_feminist/tweet_eval-stance_feminist_16_100_train.jsonl b/metaicl/llama/tweet_eval-stance_feminist/tweet_eval-stance_feminist_16_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9cbfd6b2e1fa4c0fd6ea2bd38878c708d24316b7 Binary files /dev/null and b/metaicl/llama/tweet_eval-stance_feminist/tweet_eval-stance_feminist_16_100_train.jsonl differ diff --git a/metaicl/llama/tweet_eval-stance_feminist/tweet_eval-stance_feminist_16_13_train.jsonl b/metaicl/llama/tweet_eval-stance_feminist/tweet_eval-stance_feminist_16_13_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3949bed36f8eac354364f5f41652cbac9a253270 Binary files /dev/null and b/metaicl/llama/tweet_eval-stance_feminist/tweet_eval-stance_feminist_16_13_train.jsonl differ diff --git a/metaicl/llama/tweet_eval-stance_feminist/tweet_eval-stance_feminist_16_21_train.jsonl b/metaicl/llama/tweet_eval-stance_feminist/tweet_eval-stance_feminist_16_21_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6e74873b90ca32bd368f25d426509e36f130932c Binary files /dev/null and b/metaicl/llama/tweet_eval-stance_feminist/tweet_eval-stance_feminist_16_21_train.jsonl differ diff --git a/metaicl/llama/tweet_eval-stance_feminist/tweet_eval-stance_feminist_16_42_train.jsonl b/metaicl/llama/tweet_eval-stance_feminist/tweet_eval-stance_feminist_16_42_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..dfaba000d87abe591a026cb4929e2675af1c95ff Binary files /dev/null and b/metaicl/llama/tweet_eval-stance_feminist/tweet_eval-stance_feminist_16_42_train.jsonl differ diff --git a/metaicl/llama/tweet_eval-stance_feminist/tweet_eval-stance_feminist_16_87_train.jsonl b/metaicl/llama/tweet_eval-stance_feminist/tweet_eval-stance_feminist_16_87_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e15eae1fa1584c87639d48b4f1d0d605bb6ab51f Binary files /dev/null and b/metaicl/llama/tweet_eval-stance_feminist/tweet_eval-stance_feminist_16_87_train.jsonl differ diff --git a/metaicl/llama/tweet_eval-stance_hillary/tweet_eval-stance_hillary_16384_100_train.jsonl b/metaicl/llama/tweet_eval-stance_hillary/tweet_eval-stance_hillary_16384_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a6b355c18e7bc3886fb69a67ca2688b32e2785e4 Binary files /dev/null and b/metaicl/llama/tweet_eval-stance_hillary/tweet_eval-stance_hillary_16384_100_train.jsonl differ diff --git a/metaicl/llama/tweet_eval-stance_hillary/tweet_eval-stance_hillary_16_100_test.jsonl b/metaicl/llama/tweet_eval-stance_hillary/tweet_eval-stance_hillary_16_100_test.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..cd8ff912db959443e0a5bb137e47befb1a12b2be Binary files /dev/null and b/metaicl/llama/tweet_eval-stance_hillary/tweet_eval-stance_hillary_16_100_test.jsonl differ diff --git a/metaicl/llama/tweet_eval-stance_hillary/tweet_eval-stance_hillary_16_100_train.jsonl b/metaicl/llama/tweet_eval-stance_hillary/tweet_eval-stance_hillary_16_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7be0d0d714856a40cc0d06c1f1ef8b1d161c37f3 Binary files /dev/null and b/metaicl/llama/tweet_eval-stance_hillary/tweet_eval-stance_hillary_16_100_train.jsonl differ diff --git a/metaicl/llama/tweet_eval-stance_hillary/tweet_eval-stance_hillary_16_13_train.jsonl b/metaicl/llama/tweet_eval-stance_hillary/tweet_eval-stance_hillary_16_13_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..acde6bb21cd19ead93c530a9e46a9b1b6e633303 Binary files /dev/null and b/metaicl/llama/tweet_eval-stance_hillary/tweet_eval-stance_hillary_16_13_train.jsonl differ diff --git a/metaicl/llama/tweet_eval-stance_hillary/tweet_eval-stance_hillary_16_21_train.jsonl b/metaicl/llama/tweet_eval-stance_hillary/tweet_eval-stance_hillary_16_21_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..626d0b4fa5f7742ff3d914f2b2dca9e78c52ede7 Binary files /dev/null and b/metaicl/llama/tweet_eval-stance_hillary/tweet_eval-stance_hillary_16_21_train.jsonl differ diff --git a/metaicl/llama/tweet_eval-stance_hillary/tweet_eval-stance_hillary_16_42_train.jsonl b/metaicl/llama/tweet_eval-stance_hillary/tweet_eval-stance_hillary_16_42_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e7d2947e5b829727649b7fba0a751224336cbeb3 Binary files /dev/null and b/metaicl/llama/tweet_eval-stance_hillary/tweet_eval-stance_hillary_16_42_train.jsonl differ diff --git a/metaicl/llama/tweet_eval-stance_hillary/tweet_eval-stance_hillary_16_87_train.jsonl b/metaicl/llama/tweet_eval-stance_hillary/tweet_eval-stance_hillary_16_87_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..80465a0753d1e7e5dc72fa73e0bfc54965a4776f Binary files /dev/null and b/metaicl/llama/tweet_eval-stance_hillary/tweet_eval-stance_hillary_16_87_train.jsonl differ diff --git a/metaicl/llama/tweet_qa/tweet_qa_16384_100_train.jsonl b/metaicl/llama/tweet_qa/tweet_qa_16384_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3216fe649ea895558f43b718f2da81bd3053aa8f --- /dev/null +++ b/metaicl/llama/tweet_qa/tweet_qa_16384_100_train.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:7e695bfad42f021d93518d4601c2b336800b38816677172926465ca3720e322d +size 2449361 diff --git a/metaicl/llama/tweet_qa/tweet_qa_16_100_test.jsonl b/metaicl/llama/tweet_qa/tweet_qa_16_100_test.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c52507b2358659d4e8d17c91e827ad2bceb32d55 --- /dev/null +++ b/metaicl/llama/tweet_qa/tweet_qa_16_100_test.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:86dfb54d438326d2ac169a1baf0bec69fb3e75d75c58348aaf69633637afef17 +size 246857 diff --git a/metaicl/llama/tweet_qa/tweet_qa_16_100_train.jsonl b/metaicl/llama/tweet_qa/tweet_qa_16_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d2996a09f43448c61af5f1e989b352073eef8dd1 Binary files /dev/null and b/metaicl/llama/tweet_qa/tweet_qa_16_100_train.jsonl differ diff --git a/metaicl/llama/tweet_qa/tweet_qa_16_13_train.jsonl b/metaicl/llama/tweet_qa/tweet_qa_16_13_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2034dbfaf1e568ed37e0004883a039796d51d713 Binary files /dev/null and b/metaicl/llama/tweet_qa/tweet_qa_16_13_train.jsonl differ diff --git a/metaicl/llama/tweet_qa/tweet_qa_16_21_train.jsonl b/metaicl/llama/tweet_qa/tweet_qa_16_21_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..576310afdf6001b678d5245532246f7c566b258e Binary files /dev/null and b/metaicl/llama/tweet_qa/tweet_qa_16_21_train.jsonl differ diff --git a/metaicl/llama/tweet_qa/tweet_qa_16_42_train.jsonl b/metaicl/llama/tweet_qa/tweet_qa_16_42_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..28f6e6db896a39bbac9f4f4f6f27ba84da485fa8 Binary files /dev/null and b/metaicl/llama/tweet_qa/tweet_qa_16_42_train.jsonl differ diff --git a/metaicl/llama/tweet_qa/tweet_qa_16_87_train.jsonl b/metaicl/llama/tweet_qa/tweet_qa_16_87_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ade1dac9afbe2ff82dc2b1a8f7604d970bed17d1 Binary files /dev/null and b/metaicl/llama/tweet_qa/tweet_qa_16_87_train.jsonl differ diff --git a/metaicl/llama/unifiedqa:ai2_science_middle/unifiedqa:ai2_science_middle_16_100_test.jsonl b/metaicl/llama/unifiedqa:ai2_science_middle/unifiedqa:ai2_science_middle_16_100_test.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ece4c9511680f01d2313d4005d6b5e36f3461ceb --- /dev/null +++ b/metaicl/llama/unifiedqa:ai2_science_middle/unifiedqa:ai2_science_middle_16_100_test.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:76e3264be4c4dd012c8c98f08331a185a0fe43f81217fc94009c93af6caeefcf +size 177265 diff --git a/metaicl/llama/unifiedqa:ai2_science_middle/unifiedqa:ai2_science_middle_16_100_train.jsonl b/metaicl/llama/unifiedqa:ai2_science_middle/unifiedqa:ai2_science_middle_16_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5063d1d9418674f102026d312c4c697ec37c0f9d Binary files /dev/null and b/metaicl/llama/unifiedqa:ai2_science_middle/unifiedqa:ai2_science_middle_16_100_train.jsonl differ diff --git a/metaicl/llama/unifiedqa:ai2_science_middle/unifiedqa:ai2_science_middle_16_13_train.jsonl b/metaicl/llama/unifiedqa:ai2_science_middle/unifiedqa:ai2_science_middle_16_13_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..08326d1f4c44f38d702390a931bcf7f04ff11cc8 Binary files /dev/null and b/metaicl/llama/unifiedqa:ai2_science_middle/unifiedqa:ai2_science_middle_16_13_train.jsonl differ diff --git a/metaicl/llama/unifiedqa:ai2_science_middle/unifiedqa:ai2_science_middle_16_21_train.jsonl b/metaicl/llama/unifiedqa:ai2_science_middle/unifiedqa:ai2_science_middle_16_21_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6dbd1042c8fbb8e919839fc24a31457e8fdb872a Binary files /dev/null and b/metaicl/llama/unifiedqa:ai2_science_middle/unifiedqa:ai2_science_middle_16_21_train.jsonl differ diff --git a/metaicl/llama/unifiedqa:ai2_science_middle/unifiedqa:ai2_science_middle_16_42_train.jsonl b/metaicl/llama/unifiedqa:ai2_science_middle/unifiedqa:ai2_science_middle_16_42_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6dc4e36723635999605c0f3d256e6868e77cd87c Binary files /dev/null and b/metaicl/llama/unifiedqa:ai2_science_middle/unifiedqa:ai2_science_middle_16_42_train.jsonl differ diff --git a/metaicl/llama/unifiedqa:ai2_science_middle/unifiedqa:ai2_science_middle_16_87_train.jsonl b/metaicl/llama/unifiedqa:ai2_science_middle/unifiedqa:ai2_science_middle_16_87_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5f38437eb9d432f3bc00665a66429f0c7061b393 Binary files /dev/null and b/metaicl/llama/unifiedqa:ai2_science_middle/unifiedqa:ai2_science_middle_16_87_train.jsonl differ diff --git a/metaicl/llama/unifiedqa:boolq/unifiedqa:boolq_16384_100_train.jsonl b/metaicl/llama/unifiedqa:boolq/unifiedqa:boolq_16384_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e7ad4bba84370aece6b5c050d2664eebb5033733 --- /dev/null +++ b/metaicl/llama/unifiedqa:boolq/unifiedqa:boolq_16384_100_train.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:71363f1381b87deed9b1d9f38bd8da539553e14f9a94656fa55642eba8bd8901 +size 4845855 diff --git a/metaicl/llama/unifiedqa:commonsenseqa/unifiedqa:commonsenseqa_16384_100_train.jsonl b/metaicl/llama/unifiedqa:commonsenseqa/unifiedqa:commonsenseqa_16384_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..961291a55f7551e87b0d81f0ee410bbbe260a576 --- /dev/null +++ b/metaicl/llama/unifiedqa:commonsenseqa/unifiedqa:commonsenseqa_16384_100_train.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:697404b99b6dee9a3f7880bc8f944ffb614580369b61fcc3c23227a46dc19372 +size 1530735 diff --git a/metaicl/llama/unifiedqa:drop/unifiedqa:drop_16384_100_train.jsonl b/metaicl/llama/unifiedqa:drop/unifiedqa:drop_16384_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6d9f8d37d759641081aaa0bcf8c8477be4741a80 --- /dev/null +++ b/metaicl/llama/unifiedqa:drop/unifiedqa:drop_16384_100_train.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:3a10dffe61459e9dacfa1e1c3eb35f6d46249380c8fd192b29223983927353e0 +size 14762653 diff --git a/metaicl/llama/unifiedqa:mctest/unifiedqa:mctest_16_100_test.jsonl b/metaicl/llama/unifiedqa:mctest/unifiedqa:mctest_16_100_test.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b45da972dd7e476aa43274fdb1f0e227a8f19dfb --- /dev/null +++ b/metaicl/llama/unifiedqa:mctest/unifiedqa:mctest_16_100_test.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:e8fa68c9750a92a0bf89c25d9f5ad1d3b04debbb93eec4a4157ee1a8804065bf +size 323481 diff --git a/metaicl/llama/unifiedqa:mctest/unifiedqa:mctest_16_100_train.jsonl b/metaicl/llama/unifiedqa:mctest/unifiedqa:mctest_16_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c3ff1804b65a5b92fcf31dc9c0a9b528439af154 Binary files /dev/null and b/metaicl/llama/unifiedqa:mctest/unifiedqa:mctest_16_100_train.jsonl differ diff --git a/metaicl/llama/unifiedqa:mctest/unifiedqa:mctest_16_13_train.jsonl b/metaicl/llama/unifiedqa:mctest/unifiedqa:mctest_16_13_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..46e5253d646e13403a7c8b5c3186eeb5c6eaf164 Binary files /dev/null and b/metaicl/llama/unifiedqa:mctest/unifiedqa:mctest_16_13_train.jsonl differ diff --git a/metaicl/llama/unifiedqa:mctest/unifiedqa:mctest_16_21_train.jsonl b/metaicl/llama/unifiedqa:mctest/unifiedqa:mctest_16_21_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e29e63caf8744790c0f986783f991843bfbe1f6f Binary files /dev/null and b/metaicl/llama/unifiedqa:mctest/unifiedqa:mctest_16_21_train.jsonl differ diff --git a/metaicl/llama/unifiedqa:mctest/unifiedqa:mctest_16_42_train.jsonl b/metaicl/llama/unifiedqa:mctest/unifiedqa:mctest_16_42_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e9fae5236489556aed8ee94010421f0b06092273 Binary files /dev/null and b/metaicl/llama/unifiedqa:mctest/unifiedqa:mctest_16_42_train.jsonl differ diff --git a/metaicl/llama/unifiedqa:mctest/unifiedqa:mctest_16_87_train.jsonl b/metaicl/llama/unifiedqa:mctest/unifiedqa:mctest_16_87_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..cfa0597976485920024197e931cb572bb300ef28 Binary files /dev/null and b/metaicl/llama/unifiedqa:mctest/unifiedqa:mctest_16_87_train.jsonl differ diff --git a/metaicl/llama/unifiedqa:narrativeqa/unifiedqa:narrativeqa_16384_100_train.jsonl b/metaicl/llama/unifiedqa:narrativeqa/unifiedqa:narrativeqa_16384_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6e55492bacb0ff380ade0fb352bbc9235940a7e7 --- /dev/null +++ b/metaicl/llama/unifiedqa:narrativeqa/unifiedqa:narrativeqa_16384_100_train.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:74a3888b3332867b65fc93dd1ae9d401df77adeb21709847b2c7660ab104efed +size 15137835 diff --git a/metaicl/llama/unifiedqa:natural_questions_with_dpr_para/unifiedqa:natural_questions_with_dpr_para_16384_100_train.jsonl b/metaicl/llama/unifiedqa:natural_questions_with_dpr_para/unifiedqa:natural_questions_with_dpr_para_16384_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0c26999865017037b88b47dcbd28df6d48103f12 --- /dev/null +++ b/metaicl/llama/unifiedqa:natural_questions_with_dpr_para/unifiedqa:natural_questions_with_dpr_para_16384_100_train.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:f21b7d9346cb313c0c8421cccb1cd2f5f0422815576f46ea133d767b125a0482 +size 15335699 diff --git a/metaicl/llama/unifiedqa:newsqa/unifiedqa:newsqa_16384_100_train.jsonl b/metaicl/llama/unifiedqa:newsqa/unifiedqa:newsqa_16384_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f6970b7ccbe9fa27a0b0b1ca8365483338d3e5ed --- /dev/null +++ b/metaicl/llama/unifiedqa:newsqa/unifiedqa:newsqa_16384_100_train.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:e803dfb15c0175c575fafd26b050e9e89c2022d8d005a4451e474a411528423b +size 14977889 diff --git a/metaicl/llama/unifiedqa:openbookqa/unifiedqa:openbookqa_16_100_test.jsonl b/metaicl/llama/unifiedqa:openbookqa/unifiedqa:openbookqa_16_100_test.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..74fe23aae2bf9d4b3c4c2237fbfe9b55e4392063 Binary files /dev/null and b/metaicl/llama/unifiedqa:openbookqa/unifiedqa:openbookqa_16_100_test.jsonl differ diff --git a/metaicl/llama/unifiedqa:openbookqa/unifiedqa:openbookqa_16_100_train.jsonl b/metaicl/llama/unifiedqa:openbookqa/unifiedqa:openbookqa_16_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5ed85083abc35f82e6aba6ec02cdfeafbc513318 Binary files /dev/null and b/metaicl/llama/unifiedqa:openbookqa/unifiedqa:openbookqa_16_100_train.jsonl differ diff --git a/metaicl/llama/unifiedqa:openbookqa/unifiedqa:openbookqa_16_13_train.jsonl b/metaicl/llama/unifiedqa:openbookqa/unifiedqa:openbookqa_16_13_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..62a2b488af2ad5af6a69c5a460fefd7e26ed2a10 Binary files /dev/null and b/metaicl/llama/unifiedqa:openbookqa/unifiedqa:openbookqa_16_13_train.jsonl differ diff --git a/metaicl/llama/unifiedqa:openbookqa/unifiedqa:openbookqa_16_21_train.jsonl b/metaicl/llama/unifiedqa:openbookqa/unifiedqa:openbookqa_16_21_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..673c3b459aaa210c02b5dc0387c854178b481939 Binary files /dev/null and b/metaicl/llama/unifiedqa:openbookqa/unifiedqa:openbookqa_16_21_train.jsonl differ diff --git a/metaicl/llama/unifiedqa:openbookqa/unifiedqa:openbookqa_16_42_train.jsonl b/metaicl/llama/unifiedqa:openbookqa/unifiedqa:openbookqa_16_42_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8d641d422c749729ed94810cdb287899dc52fd40 Binary files /dev/null and b/metaicl/llama/unifiedqa:openbookqa/unifiedqa:openbookqa_16_42_train.jsonl differ diff --git a/metaicl/llama/unifiedqa:openbookqa/unifiedqa:openbookqa_16_87_train.jsonl b/metaicl/llama/unifiedqa:openbookqa/unifiedqa:openbookqa_16_87_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2c0a462803dfe226a1900115571b27e30bd20101 Binary files /dev/null and b/metaicl/llama/unifiedqa:openbookqa/unifiedqa:openbookqa_16_87_train.jsonl differ diff --git a/metaicl/llama/unifiedqa:openbookqa_with_ir/unifiedqa:openbookqa_with_ir_16_100_test.jsonl b/metaicl/llama/unifiedqa:openbookqa_with_ir/unifiedqa:openbookqa_with_ir_16_100_test.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9e9d3d141645090b4f2d8d1bf1bb727fc850f2f3 --- /dev/null +++ b/metaicl/llama/unifiedqa:openbookqa_with_ir/unifiedqa:openbookqa_with_ir_16_100_test.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:a7725efbde4a46465253599a983217bc084b331f90d87e97046b01491905c989 +size 414705 diff --git a/metaicl/llama/unifiedqa:openbookqa_with_ir/unifiedqa:openbookqa_with_ir_16_100_train.jsonl b/metaicl/llama/unifiedqa:openbookqa_with_ir/unifiedqa:openbookqa_with_ir_16_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..00aa99453d736b2881a441b9123084261728308e Binary files /dev/null and b/metaicl/llama/unifiedqa:openbookqa_with_ir/unifiedqa:openbookqa_with_ir_16_100_train.jsonl differ diff --git a/metaicl/llama/unifiedqa:openbookqa_with_ir/unifiedqa:openbookqa_with_ir_16_13_train.jsonl b/metaicl/llama/unifiedqa:openbookqa_with_ir/unifiedqa:openbookqa_with_ir_16_13_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9f69470c8752b5a72e5612e57726e561c0c3fb9e Binary files /dev/null and b/metaicl/llama/unifiedqa:openbookqa_with_ir/unifiedqa:openbookqa_with_ir_16_13_train.jsonl differ diff --git a/metaicl/llama/unifiedqa:openbookqa_with_ir/unifiedqa:openbookqa_with_ir_16_21_train.jsonl b/metaicl/llama/unifiedqa:openbookqa_with_ir/unifiedqa:openbookqa_with_ir_16_21_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ba91cbcf7587dcc2476bc47bd1e6b3bd1f104cef Binary files /dev/null and b/metaicl/llama/unifiedqa:openbookqa_with_ir/unifiedqa:openbookqa_with_ir_16_21_train.jsonl differ diff --git a/metaicl/llama/unifiedqa:openbookqa_with_ir/unifiedqa:openbookqa_with_ir_16_42_train.jsonl b/metaicl/llama/unifiedqa:openbookqa_with_ir/unifiedqa:openbookqa_with_ir_16_42_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c6b305c799d9dfb0e4307421f0c5f8e661553867 Binary files /dev/null and b/metaicl/llama/unifiedqa:openbookqa_with_ir/unifiedqa:openbookqa_with_ir_16_42_train.jsonl differ diff --git a/metaicl/llama/unifiedqa:openbookqa_with_ir/unifiedqa:openbookqa_with_ir_16_87_train.jsonl b/metaicl/llama/unifiedqa:openbookqa_with_ir/unifiedqa:openbookqa_with_ir_16_87_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..024beddf909470ec3ad84fa562d0599d243d5a84 Binary files /dev/null and b/metaicl/llama/unifiedqa:openbookqa_with_ir/unifiedqa:openbookqa_with_ir_16_87_train.jsonl differ diff --git a/metaicl/llama/unifiedqa:physical_iqa/unifiedqa:physical_iqa_16384_100_train.jsonl b/metaicl/llama/unifiedqa:physical_iqa/unifiedqa:physical_iqa_16384_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..25ac73f9c243d297682f154df14239db2ddd8280 --- /dev/null +++ b/metaicl/llama/unifiedqa:physical_iqa/unifiedqa:physical_iqa_16384_100_train.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:edf4bfeff1ca8a105377435799ac18e378bfd23037a793f9382065ab238bd39c +size 4751597 diff --git a/metaicl/llama/unifiedqa:qasc/unifiedqa:qasc_16_100_test.jsonl b/metaicl/llama/unifiedqa:qasc/unifiedqa:qasc_16_100_test.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..06d66434f90abf7f113172c1a4e46e2374f94bf0 --- /dev/null +++ b/metaicl/llama/unifiedqa:qasc/unifiedqa:qasc_16_100_test.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:c9d3064a46aea84944f610a0b694ec882bd8e95bcd2f925db98f5e393d3e7664 +size 184341 diff --git a/metaicl/llama/unifiedqa:qasc/unifiedqa:qasc_16_100_train.jsonl b/metaicl/llama/unifiedqa:qasc/unifiedqa:qasc_16_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..36b764e04c8cf572dc2f6d03b47be39b7b2865ea Binary files /dev/null and b/metaicl/llama/unifiedqa:qasc/unifiedqa:qasc_16_100_train.jsonl differ diff --git a/metaicl/llama/unifiedqa:qasc/unifiedqa:qasc_16_13_train.jsonl b/metaicl/llama/unifiedqa:qasc/unifiedqa:qasc_16_13_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d0c17deeaf51aaed894ab16789db38ee51acb92d Binary files /dev/null and b/metaicl/llama/unifiedqa:qasc/unifiedqa:qasc_16_13_train.jsonl differ diff --git a/metaicl/llama/unifiedqa:qasc/unifiedqa:qasc_16_21_train.jsonl b/metaicl/llama/unifiedqa:qasc/unifiedqa:qasc_16_21_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..747928b349d8131febf96fd14c55a1bc92d2eb1b Binary files /dev/null and b/metaicl/llama/unifiedqa:qasc/unifiedqa:qasc_16_21_train.jsonl differ diff --git a/metaicl/llama/unifiedqa:qasc/unifiedqa:qasc_16_42_train.jsonl b/metaicl/llama/unifiedqa:qasc/unifiedqa:qasc_16_42_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..888410679915c81e45952cef05f5b9255f9dc24e Binary files /dev/null and b/metaicl/llama/unifiedqa:qasc/unifiedqa:qasc_16_42_train.jsonl differ diff --git a/metaicl/llama/unifiedqa:qasc/unifiedqa:qasc_16_87_train.jsonl b/metaicl/llama/unifiedqa:qasc/unifiedqa:qasc_16_87_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..cf6d4cb83b238e0b0e52052b6c3ceb85c4df17c5 Binary files /dev/null and b/metaicl/llama/unifiedqa:qasc/unifiedqa:qasc_16_87_train.jsonl differ diff --git a/metaicl/llama/unifiedqa:qasc_with_ir/unifiedqa:qasc_with_ir_16_100_test.jsonl b/metaicl/llama/unifiedqa:qasc_with_ir/unifiedqa:qasc_with_ir_16_100_test.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..dab7c01a5c1d70474d7ce1c382142e02cb33fea8 --- /dev/null +++ b/metaicl/llama/unifiedqa:qasc_with_ir/unifiedqa:qasc_with_ir_16_100_test.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:5f3249e4f65581aac72495924c40901be9ba991dacbe6cfb7f5176cd27021799 +size 1283685 diff --git a/metaicl/llama/unifiedqa:qasc_with_ir/unifiedqa:qasc_with_ir_16_100_train.jsonl b/metaicl/llama/unifiedqa:qasc_with_ir/unifiedqa:qasc_with_ir_16_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0b8414e2cfd9abc9d73424cf3f337a389ee1e142 Binary files /dev/null and b/metaicl/llama/unifiedqa:qasc_with_ir/unifiedqa:qasc_with_ir_16_100_train.jsonl differ diff --git a/metaicl/llama/unifiedqa:qasc_with_ir/unifiedqa:qasc_with_ir_16_13_train.jsonl b/metaicl/llama/unifiedqa:qasc_with_ir/unifiedqa:qasc_with_ir_16_13_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..42c9eee41dc37241f2b7b7b145e06ef673c4e360 Binary files /dev/null and b/metaicl/llama/unifiedqa:qasc_with_ir/unifiedqa:qasc_with_ir_16_13_train.jsonl differ diff --git a/metaicl/llama/unifiedqa:qasc_with_ir/unifiedqa:qasc_with_ir_16_21_train.jsonl b/metaicl/llama/unifiedqa:qasc_with_ir/unifiedqa:qasc_with_ir_16_21_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..562bf2627ae104e02c3b1c4c8b9bbe7a95541409 Binary files /dev/null and b/metaicl/llama/unifiedqa:qasc_with_ir/unifiedqa:qasc_with_ir_16_21_train.jsonl differ diff --git a/metaicl/llama/unifiedqa:qasc_with_ir/unifiedqa:qasc_with_ir_16_42_train.jsonl b/metaicl/llama/unifiedqa:qasc_with_ir/unifiedqa:qasc_with_ir_16_42_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7390c44e6c7d8387d968b94c068822f895a08e8b Binary files /dev/null and b/metaicl/llama/unifiedqa:qasc_with_ir/unifiedqa:qasc_with_ir_16_42_train.jsonl differ diff --git a/metaicl/llama/unifiedqa:qasc_with_ir/unifiedqa:qasc_with_ir_16_87_train.jsonl b/metaicl/llama/unifiedqa:qasc_with_ir/unifiedqa:qasc_with_ir_16_87_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4bf3dbf26fc4e73d364fdc42f88444fc70993129 Binary files /dev/null and b/metaicl/llama/unifiedqa:qasc_with_ir/unifiedqa:qasc_with_ir_16_87_train.jsonl differ diff --git a/metaicl/llama/unifiedqa:quoref/unifiedqa:quoref_16384_100_train.jsonl b/metaicl/llama/unifiedqa:quoref/unifiedqa:quoref_16384_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9b4b4f4b7a21bb23f048a3e69719df361b8c5598 --- /dev/null +++ b/metaicl/llama/unifiedqa:quoref/unifiedqa:quoref_16384_100_train.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:f09340e32c36d2eadb3e976031966967ccfde872538ce7b07764dcdb33a273c4 +size 15184097 diff --git a/metaicl/llama/unifiedqa:race_string/unifiedqa:race_string_16384_100_train.jsonl b/metaicl/llama/unifiedqa:race_string/unifiedqa:race_string_16384_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1d3a508a0c0b8a465be05ccd464f7c9b34491a7b --- /dev/null +++ b/metaicl/llama/unifiedqa:race_string/unifiedqa:race_string_16384_100_train.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:39ee139ce567a24d2962c98d2e8c0429ae85282f77639cd4c83dd49fc13a9403 +size 11677291 diff --git a/metaicl/llama/unifiedqa:ropes/unifiedqa:ropes_16384_100_train.jsonl b/metaicl/llama/unifiedqa:ropes/unifiedqa:ropes_16384_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f334fd443170e859a274c5efe1f51cf6925ea201 --- /dev/null +++ b/metaicl/llama/unifiedqa:ropes/unifiedqa:ropes_16384_100_train.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:31edd87970e7293d0ac9501423dde6142dfc882754cd617d2b5fb8a6cc60f49e +size 7414303 diff --git a/metaicl/llama/unifiedqa:social_iqa/unifiedqa:social_iqa_16384_100_train.jsonl b/metaicl/llama/unifiedqa:social_iqa/unifiedqa:social_iqa_16384_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..19e056624011b1db6cc38bc6bca47fa3b068b5f7 --- /dev/null +++ b/metaicl/llama/unifiedqa:social_iqa/unifiedqa:social_iqa_16384_100_train.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:6a90a6693ecb450aa7f264154669debe966baf9976d7f20f4382643f089bc0b5 +size 1909417 diff --git a/metaicl/llama/unifiedqa:squad1_1/unifiedqa:squad1_1_16384_100_train.jsonl b/metaicl/llama/unifiedqa:squad1_1/unifiedqa:squad1_1_16384_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..0c81d17d83722b1d5edbc790eb084a4568756b2d --- /dev/null +++ b/metaicl/llama/unifiedqa:squad1_1/unifiedqa:squad1_1_16384_100_train.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:ed900bc10065cc2215114798b2b2d367e302613c4715d81b7c8bda567e15db69 +size 10831269 diff --git a/metaicl/llama/unifiedqa:squad2/unifiedqa:squad2_16384_100_train.jsonl b/metaicl/llama/unifiedqa:squad2/unifiedqa:squad2_16384_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2f14527d2ce68b4b63135cbe794982cea082cfcc --- /dev/null +++ b/metaicl/llama/unifiedqa:squad2/unifiedqa:squad2_16384_100_train.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:9ef30319ed964d2fc3ce615937f0e235bd000fcbbc1283a5a7bf628cc3527a8f +size 10790369 diff --git a/metaicl/llama/unifiedqa:winogrande_xl/unifiedqa:winogrande_xl_16384_100_train.jsonl b/metaicl/llama/unifiedqa:winogrande_xl/unifiedqa:winogrande_xl_16384_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5610e0a4fed8eb0abb4bcf1956e112d11d0c1c7f --- /dev/null +++ b/metaicl/llama/unifiedqa:winogrande_xl/unifiedqa:winogrande_xl_16384_100_train.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:8e95ccdfb9c3198443f4d4e4cb40a93e7d059435ca7ab63e14d46fa0be13d5e2 +size 2116015 diff --git a/metaicl/llama/web_questions/web_questions_16384_100_train.jsonl b/metaicl/llama/web_questions/web_questions_16384_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f5e7ad0eb04b74189f393d8603329edab3be9d6e --- /dev/null +++ b/metaicl/llama/web_questions/web_questions_16384_100_train.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:4e7a9cc825a82070d651865b06ce00f668e014392cdbeae37c2991f4016376b0 +size 183707 diff --git a/metaicl/llama/web_questions/web_questions_16_100_test.jsonl b/metaicl/llama/web_questions/web_questions_16_100_test.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..09b8e19798cab44f0c23c9721b492300525e3b41 Binary files /dev/null and b/metaicl/llama/web_questions/web_questions_16_100_test.jsonl differ diff --git a/metaicl/llama/web_questions/web_questions_16_100_train.jsonl b/metaicl/llama/web_questions/web_questions_16_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..15ff27cf6cd4fba3ebe0f08660d4743cb748301f Binary files /dev/null and b/metaicl/llama/web_questions/web_questions_16_100_train.jsonl differ diff --git a/metaicl/llama/web_questions/web_questions_16_13_train.jsonl b/metaicl/llama/web_questions/web_questions_16_13_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..619d368d46f25eca17683d643e94b51642a774e3 Binary files /dev/null and b/metaicl/llama/web_questions/web_questions_16_13_train.jsonl differ diff --git a/metaicl/llama/web_questions/web_questions_16_21_train.jsonl b/metaicl/llama/web_questions/web_questions_16_21_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e501e1c272baed550d11cc8ddfc6e424e27d0731 Binary files /dev/null and b/metaicl/llama/web_questions/web_questions_16_21_train.jsonl differ diff --git a/metaicl/llama/web_questions/web_questions_16_42_train.jsonl b/metaicl/llama/web_questions/web_questions_16_42_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..133248b968522331c78db65776c56e7b7149090f Binary files /dev/null and b/metaicl/llama/web_questions/web_questions_16_42_train.jsonl differ diff --git a/metaicl/llama/web_questions/web_questions_16_87_train.jsonl b/metaicl/llama/web_questions/web_questions_16_87_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f74a054cbe2d04fe84fee3b5891ba3e8e195af98 Binary files /dev/null and b/metaicl/llama/web_questions/web_questions_16_87_train.jsonl differ diff --git a/metaicl/llama/wiki_qa/wiki_qa_16384_100_train.jsonl b/metaicl/llama/wiki_qa/wiki_qa_16384_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..70c65b8ebb3c0846963f7dbd4654030b906a9e30 --- /dev/null +++ b/metaicl/llama/wiki_qa/wiki_qa_16384_100_train.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:63f7726d8c223669dabc719d2828beaf79a7e7cae9aed8ebf73948388770a525 +size 3287375 diff --git a/metaicl/llama/wiki_qa/wiki_qa_16_100_test.jsonl b/metaicl/llama/wiki_qa/wiki_qa_16_100_test.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..196a43c2e3fc1541ee587fd80d86fb481e015f43 --- /dev/null +++ b/metaicl/llama/wiki_qa/wiki_qa_16_100_test.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:c33cfd8a4429dd37d856ddd603ed77c9a31caa5700b715385019f4cabc44b551 +size 544903 diff --git a/metaicl/llama/wiki_qa/wiki_qa_16_100_train.jsonl b/metaicl/llama/wiki_qa/wiki_qa_16_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4cd9e1b23f72400eeaa1fd233470fe29e0cb8a7d Binary files /dev/null and b/metaicl/llama/wiki_qa/wiki_qa_16_100_train.jsonl differ diff --git a/metaicl/llama/wiki_qa/wiki_qa_16_13_train.jsonl b/metaicl/llama/wiki_qa/wiki_qa_16_13_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..35ef2ebaec9b90b2c1501f56e5034b48c8f2ef1e Binary files /dev/null and b/metaicl/llama/wiki_qa/wiki_qa_16_13_train.jsonl differ diff --git a/metaicl/llama/wiki_qa/wiki_qa_16_21_train.jsonl b/metaicl/llama/wiki_qa/wiki_qa_16_21_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e4faa86ae50b5865c8711e9273efe7eb9644ecd5 Binary files /dev/null and b/metaicl/llama/wiki_qa/wiki_qa_16_21_train.jsonl differ diff --git a/metaicl/llama/wiki_qa/wiki_qa_16_42_train.jsonl b/metaicl/llama/wiki_qa/wiki_qa_16_42_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..c3244f3040ce0e101b879a9536d7a93cd62cea67 Binary files /dev/null and b/metaicl/llama/wiki_qa/wiki_qa_16_42_train.jsonl differ diff --git a/metaicl/llama/wiki_qa/wiki_qa_16_87_train.jsonl b/metaicl/llama/wiki_qa/wiki_qa_16_87_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..56ff68ebab04a48c412f882a6849885399688a23 Binary files /dev/null and b/metaicl/llama/wiki_qa/wiki_qa_16_87_train.jsonl differ diff --git a/metaicl/llama/wikisql/wikisql_16384_100_train.jsonl b/metaicl/llama/wikisql/wikisql_16384_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..03a5287fe08bddf792ad7274dc0c52781da99060 --- /dev/null +++ b/metaicl/llama/wikisql/wikisql_16384_100_train.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:cc4be5881b189797e0e5082ff0b3cbfe78c903324533646f5ab31020de3c3574 +size 2106383 diff --git a/metaicl/llama/wikisql/wikisql_16_100_test.jsonl b/metaicl/llama/wikisql/wikisql_16_100_test.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5eb702a8cdc64e08fc1ee638d09f8b87c2ba0169 --- /dev/null +++ b/metaicl/llama/wikisql/wikisql_16_100_test.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:f6e79e1eb39760e14ca352e46288455a14dae35307bcbcd6e85f021892f2061b +size 1079047 diff --git a/metaicl/llama/wikisql/wikisql_16_100_train.jsonl b/metaicl/llama/wikisql/wikisql_16_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..1ee9b7bfca82c669888926069d617933bee25f79 Binary files /dev/null and b/metaicl/llama/wikisql/wikisql_16_100_train.jsonl differ diff --git a/metaicl/llama/wikisql/wikisql_16_13_train.jsonl b/metaicl/llama/wikisql/wikisql_16_13_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..3c548ee71494031398cb01bf15cbee758486ca59 Binary files /dev/null and b/metaicl/llama/wikisql/wikisql_16_13_train.jsonl differ diff --git a/metaicl/llama/wikisql/wikisql_16_21_train.jsonl b/metaicl/llama/wikisql/wikisql_16_21_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..90615cae41a241a4e4c68132deaa31c3f799e506 Binary files /dev/null and b/metaicl/llama/wikisql/wikisql_16_21_train.jsonl differ diff --git a/metaicl/llama/wikisql/wikisql_16_42_train.jsonl b/metaicl/llama/wikisql/wikisql_16_42_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a29d72b0bb01304653dafb31b477e84df360bc61 Binary files /dev/null and b/metaicl/llama/wikisql/wikisql_16_42_train.jsonl differ diff --git a/metaicl/llama/wikisql/wikisql_16_87_train.jsonl b/metaicl/llama/wikisql/wikisql_16_87_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d1c9310990d1c13ecc180f59231dfcecae0d3fa2 Binary files /dev/null and b/metaicl/llama/wikisql/wikisql_16_87_train.jsonl differ diff --git a/metaicl/llama/wino_grande/wino_grande_16384_100_train.jsonl b/metaicl/llama/wino_grande/wino_grande_16384_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2e41e7baa6ef5bd8a9bda255533ee52d1924a055 --- /dev/null +++ b/metaicl/llama/wino_grande/wino_grande_16384_100_train.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:8b36b39ac901de7a7df9410f2bf60e84f2b08dcbb65d9c487fabe68cf92ea84e +size 2100055 diff --git a/metaicl/llama/wino_grande/wino_grande_16_100_test.jsonl b/metaicl/llama/wino_grande/wino_grande_16_100_test.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d567b3eafa17c14b60ed30fd9485e1090c588f78 --- /dev/null +++ b/metaicl/llama/wino_grande/wino_grande_16_100_test.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:093fb8353759b08d6b2956970237cf78159cd941e4454ef6f1fecbd09ea03153 +size 163791 diff --git a/metaicl/llama/wino_grande/wino_grande_16_100_train.jsonl b/metaicl/llama/wino_grande/wino_grande_16_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..fa4a75059a0b11155fad6efbf5d11da66b158ee2 Binary files /dev/null and b/metaicl/llama/wino_grande/wino_grande_16_100_train.jsonl differ diff --git a/metaicl/llama/wino_grande/wino_grande_16_13_train.jsonl b/metaicl/llama/wino_grande/wino_grande_16_13_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..36689e2da82acd052dd9a523145e7c4467deb568 Binary files /dev/null and b/metaicl/llama/wino_grande/wino_grande_16_13_train.jsonl differ diff --git a/metaicl/llama/wino_grande/wino_grande_16_21_train.jsonl b/metaicl/llama/wino_grande/wino_grande_16_21_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..d137acd0fff02157fab0081fa326e1910c63db6b Binary files /dev/null and b/metaicl/llama/wino_grande/wino_grande_16_21_train.jsonl differ diff --git a/metaicl/llama/wino_grande/wino_grande_16_42_train.jsonl b/metaicl/llama/wino_grande/wino_grande_16_42_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..257ad18ab600ed39a9630b23ac0664579624d5a0 Binary files /dev/null and b/metaicl/llama/wino_grande/wino_grande_16_42_train.jsonl differ diff --git a/metaicl/llama/wino_grande/wino_grande_16_87_train.jsonl b/metaicl/llama/wino_grande/wino_grande_16_87_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..add9a6e0186210305cfa447924f5b422d4475c71 Binary files /dev/null and b/metaicl/llama/wino_grande/wino_grande_16_87_train.jsonl differ diff --git a/metaicl/llama/wiqa/wiqa_16384_100_train.jsonl b/metaicl/llama/wiqa/wiqa_16384_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..fde246f4dc2f67aaeeb64b6640d9fa4515b61b40 --- /dev/null +++ b/metaicl/llama/wiqa/wiqa_16384_100_train.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:8062452de2cff771ad23130eef6e55c1873cad8bcf549502f386facdf70a1d92 +size 5757129 diff --git a/metaicl/llama/wiqa/wiqa_16_100_test.jsonl b/metaicl/llama/wiqa/wiqa_16_100_test.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a5c78971584e45427391b1b470606fbf04f2984a --- /dev/null +++ b/metaicl/llama/wiqa/wiqa_16_100_test.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:bfa0f4274df570a1b4d933eac50dfd495cab5861a0b73336586417fc00c64484 +size 2295233 diff --git a/metaicl/llama/wiqa/wiqa_16_100_train.jsonl b/metaicl/llama/wiqa/wiqa_16_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6c2707b71723076954780ec493c62456f4e3346a Binary files /dev/null and b/metaicl/llama/wiqa/wiqa_16_100_train.jsonl differ diff --git a/metaicl/llama/wiqa/wiqa_16_13_train.jsonl b/metaicl/llama/wiqa/wiqa_16_13_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..61cbbbb7364a522fd8ebab6035af625b9b321843 Binary files /dev/null and b/metaicl/llama/wiqa/wiqa_16_13_train.jsonl differ diff --git a/metaicl/llama/wiqa/wiqa_16_21_train.jsonl b/metaicl/llama/wiqa/wiqa_16_21_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a7a59244157f0ba8e811c60e621a5ba74f1064fb Binary files /dev/null and b/metaicl/llama/wiqa/wiqa_16_21_train.jsonl differ diff --git a/metaicl/llama/wiqa/wiqa_16_42_train.jsonl b/metaicl/llama/wiqa/wiqa_16_42_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..cd329d61680e205f56448b23e63d45b0804b16b5 Binary files /dev/null and b/metaicl/llama/wiqa/wiqa_16_42_train.jsonl differ diff --git a/metaicl/llama/wiqa/wiqa_16_87_train.jsonl b/metaicl/llama/wiqa/wiqa_16_87_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e81f27770cab0632dfc98c5ffe319c238f1ce4f4 Binary files /dev/null and b/metaicl/llama/wiqa/wiqa_16_87_train.jsonl differ diff --git a/metaicl/llama/xsum/xsum_16384_100_train.jsonl b/metaicl/llama/xsum/xsum_16384_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4be7fc3e5a5949f6252ac761581cba178742db46 --- /dev/null +++ b/metaicl/llama/xsum/xsum_16384_100_train.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:0ba14e4b570bf483d0eeaeb310d4b11210009bf5de642fa02267531201c405eb +size 29006473 diff --git a/metaicl/llama/xsum/xsum_16_100_test.jsonl b/metaicl/llama/xsum/xsum_16_100_test.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9db2a9418d35a61679c1de55a5873b9d3e2b4d3c --- /dev/null +++ b/metaicl/llama/xsum/xsum_16_100_test.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:cb581c66ce98fae76317b1d2d73580329a4c4e2239399bcd7bb4acd13c25451a +size 19626049 diff --git a/metaicl/llama/xsum/xsum_16_100_train.jsonl b/metaicl/llama/xsum/xsum_16_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..bfccd9abf8aac9f7780391ddd370550f80e95ad6 Binary files /dev/null and b/metaicl/llama/xsum/xsum_16_100_train.jsonl differ diff --git a/metaicl/llama/xsum/xsum_16_13_train.jsonl b/metaicl/llama/xsum/xsum_16_13_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f8582993b6295a1d03d8349d637e4ed7364692e7 Binary files /dev/null and b/metaicl/llama/xsum/xsum_16_13_train.jsonl differ diff --git a/metaicl/llama/xsum/xsum_16_21_train.jsonl b/metaicl/llama/xsum/xsum_16_21_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..944a2b0b65532c174ff855c7338f9f136331c10e Binary files /dev/null and b/metaicl/llama/xsum/xsum_16_21_train.jsonl differ diff --git a/metaicl/llama/xsum/xsum_16_42_train.jsonl b/metaicl/llama/xsum/xsum_16_42_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..7351422d44b6c44497bcdc68e9d366ca913ffe54 Binary files /dev/null and b/metaicl/llama/xsum/xsum_16_42_train.jsonl differ diff --git a/metaicl/llama/xsum/xsum_16_87_train.jsonl b/metaicl/llama/xsum/xsum_16_87_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..badbd0f45eba2b2c259ea4ea6e2592e41f47d464 Binary files /dev/null and b/metaicl/llama/xsum/xsum_16_87_train.jsonl differ diff --git a/metaicl/llama/yahoo_answers_topics/yahoo_answers_topics_16384_100_train.jsonl b/metaicl/llama/yahoo_answers_topics/yahoo_answers_topics_16384_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..5096dd9925e585ef68331990a83463b79b451076 --- /dev/null +++ b/metaicl/llama/yahoo_answers_topics/yahoo_answers_topics_16384_100_train.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:8926a6c7cb801cf49f1667222f03a9d19182f0edaf8c42e1cd1914479d705dff +size 11181545 diff --git a/metaicl/llama/yahoo_answers_topics/yahoo_answers_topics_16_100_test.jsonl b/metaicl/llama/yahoo_answers_topics/yahoo_answers_topics_16_100_test.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ce77cf0cb0cb4e7513e927fb498faf1053502a4a --- /dev/null +++ b/metaicl/llama/yahoo_answers_topics/yahoo_answers_topics_16_100_test.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:26ea2ff3eacbf4fe61a07d49e71afb00699ba802a74e6e694c5b41e1f222469d +size 40853089 diff --git a/metaicl/llama/yahoo_answers_topics/yahoo_answers_topics_16_100_train.jsonl b/metaicl/llama/yahoo_answers_topics/yahoo_answers_topics_16_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..81953e1867e91d46eb52e534aa93179e0850d4cd Binary files /dev/null and b/metaicl/llama/yahoo_answers_topics/yahoo_answers_topics_16_100_train.jsonl differ diff --git a/metaicl/llama/yahoo_answers_topics/yahoo_answers_topics_16_13_train.jsonl b/metaicl/llama/yahoo_answers_topics/yahoo_answers_topics_16_13_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..9216c36933ba7742e30b5c0935538f89a0332fdb Binary files /dev/null and b/metaicl/llama/yahoo_answers_topics/yahoo_answers_topics_16_13_train.jsonl differ diff --git a/metaicl/llama/yahoo_answers_topics/yahoo_answers_topics_16_21_train.jsonl b/metaicl/llama/yahoo_answers_topics/yahoo_answers_topics_16_21_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..b0a42ef1c2f01130fe78fe75c085b0c9beae2856 Binary files /dev/null and b/metaicl/llama/yahoo_answers_topics/yahoo_answers_topics_16_21_train.jsonl differ diff --git a/metaicl/llama/yahoo_answers_topics/yahoo_answers_topics_16_42_train.jsonl b/metaicl/llama/yahoo_answers_topics/yahoo_answers_topics_16_42_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..addd150a4106ee48683efe99ecde47629f8e7e77 Binary files /dev/null and b/metaicl/llama/yahoo_answers_topics/yahoo_answers_topics_16_42_train.jsonl differ diff --git a/metaicl/llama/yahoo_answers_topics/yahoo_answers_topics_16_87_train.jsonl b/metaicl/llama/yahoo_answers_topics/yahoo_answers_topics_16_87_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..ce3443155bfc8b49f21de2632f2a1ee97d9cbcee Binary files /dev/null and b/metaicl/llama/yahoo_answers_topics/yahoo_answers_topics_16_87_train.jsonl differ diff --git a/metaicl/llama/yelp_polarity/yelp_polarity_16384_100_train.jsonl b/metaicl/llama/yelp_polarity/yelp_polarity_16384_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..e1f06459826792a056ddcba1f11a858e1da42d4d --- /dev/null +++ b/metaicl/llama/yelp_polarity/yelp_polarity_16384_100_train.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:18769f84d24ad4ec1745c0898a3202633c7fdebc2c35b84acdfbff763b70aeac +size 10102619 diff --git a/metaicl/llama/yelp_polarity/yelp_polarity_16_100_test.jsonl b/metaicl/llama/yelp_polarity/yelp_polarity_16_100_test.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..6de9b33737138229bad55dae8933a909e63d9fe8 --- /dev/null +++ b/metaicl/llama/yelp_polarity/yelp_polarity_16_100_test.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:6c9c7f7928d1df03ab783bc2ab4a782ae195b820b26e91bc81083a5ebc2fa983 +size 4717651 diff --git a/metaicl/llama/yelp_polarity/yelp_polarity_16_100_train.jsonl b/metaicl/llama/yelp_polarity/yelp_polarity_16_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..277e191fdbe5dfc648b8af82bce0c1baef7ba815 Binary files /dev/null and b/metaicl/llama/yelp_polarity/yelp_polarity_16_100_train.jsonl differ diff --git a/metaicl/llama/yelp_polarity/yelp_polarity_16_13_train.jsonl b/metaicl/llama/yelp_polarity/yelp_polarity_16_13_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..eb4d8eded06b6807e24b65cef12c1ff518985bd4 Binary files /dev/null and b/metaicl/llama/yelp_polarity/yelp_polarity_16_13_train.jsonl differ diff --git a/metaicl/llama/yelp_polarity/yelp_polarity_16_21_train.jsonl b/metaicl/llama/yelp_polarity/yelp_polarity_16_21_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..bbdbf63616ab27e0b580d46121dbf7ab81e6fbba Binary files /dev/null and b/metaicl/llama/yelp_polarity/yelp_polarity_16_21_train.jsonl differ diff --git a/metaicl/llama/yelp_polarity/yelp_polarity_16_42_train.jsonl b/metaicl/llama/yelp_polarity/yelp_polarity_16_42_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..a861febc4fd7ee17495d8db3dc9c23c205907c86 Binary files /dev/null and b/metaicl/llama/yelp_polarity/yelp_polarity_16_42_train.jsonl differ diff --git a/metaicl/llama/yelp_polarity/yelp_polarity_16_87_train.jsonl b/metaicl/llama/yelp_polarity/yelp_polarity_16_87_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..8ba2d3a6fc27c9082e01e71286e5b50b854fa4b9 Binary files /dev/null and b/metaicl/llama/yelp_polarity/yelp_polarity_16_87_train.jsonl differ diff --git a/metaicl/llama/yelp_review_full/yelp_review_full_16384_100_train.jsonl b/metaicl/llama/yelp_review_full/yelp_review_full_16384_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..244b03d3a630796ffa02f3d46e6d9ec16afae534 --- /dev/null +++ b/metaicl/llama/yelp_review_full/yelp_review_full_16384_100_train.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:ff7bd2d369f08d9b308d6450ad599bece55e24ab9d0f82eb0eb811101cb3bae2 +size 10998881 diff --git a/metaicl/llama/yelp_review_full/yelp_review_full_16_100_test.jsonl b/metaicl/llama/yelp_review_full/yelp_review_full_16_100_test.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..65aa3346f0d362218b93e70d5f455a92a01eb55a --- /dev/null +++ b/metaicl/llama/yelp_review_full/yelp_review_full_16_100_test.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:164c36be60c3111761da71d55dfe9dc15bfb436416cf0f1a6f49707de4594c40 +size 33867865 diff --git a/metaicl/llama/yelp_review_full/yelp_review_full_16_100_train.jsonl b/metaicl/llama/yelp_review_full/yelp_review_full_16_100_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..24ddcbc43bd6e13b6ca89d6c06cc2b4d98005e3e Binary files /dev/null and b/metaicl/llama/yelp_review_full/yelp_review_full_16_100_train.jsonl differ diff --git a/metaicl/llama/yelp_review_full/yelp_review_full_16_13_train.jsonl b/metaicl/llama/yelp_review_full/yelp_review_full_16_13_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..f5f2795355485cbcd5898f39abaa9a2473e9f4f0 Binary files /dev/null and b/metaicl/llama/yelp_review_full/yelp_review_full_16_13_train.jsonl differ diff --git a/metaicl/llama/yelp_review_full/yelp_review_full_16_21_train.jsonl b/metaicl/llama/yelp_review_full/yelp_review_full_16_21_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..bf04dbaf57887a69d3711bb41427a929a6b45013 Binary files /dev/null and b/metaicl/llama/yelp_review_full/yelp_review_full_16_21_train.jsonl differ diff --git a/metaicl/llama/yelp_review_full/yelp_review_full_16_42_train.jsonl b/metaicl/llama/yelp_review_full/yelp_review_full_16_42_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..2120ed4154bd6413778976bd2e98d280dd904f32 Binary files /dev/null and b/metaicl/llama/yelp_review_full/yelp_review_full_16_42_train.jsonl differ diff --git a/metaicl/llama/yelp_review_full/yelp_review_full_16_87_train.jsonl b/metaicl/llama/yelp_review_full/yelp_review_full_16_87_train.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..4d80d70d13229d83b0c795abffc22314d504abcb Binary files /dev/null and b/metaicl/llama/yelp_review_full/yelp_review_full_16_87_train.jsonl differ diff --git a/pretrain/llama2-8K-1B/data-00000-of-00025.arrow b/pretrain/llama2-8K-1B/data-00000-of-00025.arrow new file mode 100644 index 0000000000000000000000000000000000000000..d1566ae9a60a37543bbaf344110be7b913fb91cf --- /dev/null +++ b/pretrain/llama2-8K-1B/data-00000-of-00025.arrow @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:0de2817b9f4325fb20a35da31c444bd6e73fc5743d9ae592e8025f012b74014c +size 496687208 diff --git a/pretrain/llama2-8K-1B/data-00001-of-00025.arrow b/pretrain/llama2-8K-1B/data-00001-of-00025.arrow new file mode 100644 index 0000000000000000000000000000000000000000..9febef148147c6178a56d50c5b8af04957d129b0 --- /dev/null +++ b/pretrain/llama2-8K-1B/data-00001-of-00025.arrow @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:451dd247a849df719a254f5a9c2a824b5a8ed12a52d4177a0c69cc81b98e0149 +size 496687208 diff --git a/pretrain/llama2-8K-1B/data-00002-of-00025.arrow b/pretrain/llama2-8K-1B/data-00002-of-00025.arrow new file mode 100644 index 0000000000000000000000000000000000000000..5d37dffe80752a5247427ef0c95dd90f0b2c5e4d --- /dev/null +++ b/pretrain/llama2-8K-1B/data-00002-of-00025.arrow @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:34013349933ceb1cc981ba85d203cda12351f4777ad99c6dfa02706901156038 +size 496687208 diff --git a/pretrain/llama2-8K-1B/data-00003-of-00025.arrow b/pretrain/llama2-8K-1B/data-00003-of-00025.arrow new file mode 100644 index 0000000000000000000000000000000000000000..c469f9408d62ea20bd7700b034f6ce8a5a37ed62 --- /dev/null +++ b/pretrain/llama2-8K-1B/data-00003-of-00025.arrow @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:2a7b5f47cd3d0d9cf52e4d8961d51809e5e35c51e34a59968b4c7b40d0417c60 +size 496687208 diff --git a/pretrain/llama2-8K-1B/data-00004-of-00025.arrow b/pretrain/llama2-8K-1B/data-00004-of-00025.arrow new file mode 100644 index 0000000000000000000000000000000000000000..9fbea597b5adf924af2b6735c1e0267417ead9c2 --- /dev/null +++ b/pretrain/llama2-8K-1B/data-00004-of-00025.arrow @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:ec2464addc5bd0ee6bbbbbab6503e7726f93a549be31e85a3fe5f6a323df4fc6 +size 496687208 diff --git a/pretrain/llama2-8K-1B/data-00005-of-00025.arrow b/pretrain/llama2-8K-1B/data-00005-of-00025.arrow new file mode 100644 index 0000000000000000000000000000000000000000..d9c4abfc43706fa414ee5ac05036b0cf68fd8c64 --- /dev/null +++ b/pretrain/llama2-8K-1B/data-00005-of-00025.arrow @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:2aa41d7822f6c06647ef29b21f885e14f7d906dc91c9658dbcad6a171e471fa5 +size 496687208 diff --git a/pretrain/llama2-8K-1B/data-00006-of-00025.arrow b/pretrain/llama2-8K-1B/data-00006-of-00025.arrow new file mode 100644 index 0000000000000000000000000000000000000000..0bcf3b3157e5170403880e7d1281471a38505e95 --- /dev/null +++ b/pretrain/llama2-8K-1B/data-00006-of-00025.arrow @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:b0acd5046924fb4f49e95b87fb11981da3879c27818b248d75f1b4b897e8e6f9 +size 496687208 diff --git a/pretrain/llama2-8K-1B/data-00007-of-00025.arrow b/pretrain/llama2-8K-1B/data-00007-of-00025.arrow new file mode 100644 index 0000000000000000000000000000000000000000..12f7246a49244eb591246f0fbde8b4fcfb4ec1d1 --- /dev/null +++ b/pretrain/llama2-8K-1B/data-00007-of-00025.arrow @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:cf2eac70ec5207d13c7e9aca629b3fd4d414da6cf162b3de14222379b15d115c +size 496687208 diff --git a/pretrain/llama2-8K-1B/data-00008-of-00025.arrow b/pretrain/llama2-8K-1B/data-00008-of-00025.arrow new file mode 100644 index 0000000000000000000000000000000000000000..80875a8be5ed46e5577356b9ecb3e0c78fb22a84 --- /dev/null +++ b/pretrain/llama2-8K-1B/data-00008-of-00025.arrow @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:3978f494fb790f7785db2bca02aceabd458269091850085ecf8add5136c9e4da +size 496687208 diff --git a/pretrain/llama2-8K-1B/data-00009-of-00025.arrow b/pretrain/llama2-8K-1B/data-00009-of-00025.arrow new file mode 100644 index 0000000000000000000000000000000000000000..b042d403108dc0e64893f23d98da26e756900922 --- /dev/null +++ b/pretrain/llama2-8K-1B/data-00009-of-00025.arrow @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:f7159a6ad6099ecdd692ddd4a392ccf8764a86873942333eb997986b5f9d1305 +size 496687208 diff --git a/pretrain/llama2-8K-1B/data-00010-of-00025.arrow b/pretrain/llama2-8K-1B/data-00010-of-00025.arrow new file mode 100644 index 0000000000000000000000000000000000000000..c85e834c9b4c78a03f625b77f856488021056cf0 --- /dev/null +++ b/pretrain/llama2-8K-1B/data-00010-of-00025.arrow @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:bf2b8fd923eb9f74c2a75a16ce518d6dd648367c71f0ff91d33e7b8d6ccba867 +size 496687208 diff --git a/pretrain/llama2-8K-1B/data-00011-of-00025.arrow b/pretrain/llama2-8K-1B/data-00011-of-00025.arrow new file mode 100644 index 0000000000000000000000000000000000000000..dfab0212f7473bed4bd96e98d9e1f4bbd5ab8126 --- /dev/null +++ b/pretrain/llama2-8K-1B/data-00011-of-00025.arrow @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:4b9a12f30c3a757b78fc7d7bc380b28a9dc67dad8a01235a223d6eab7d195248 +size 496687208 diff --git a/pretrain/llama2-8K-1B/data-00012-of-00025.arrow b/pretrain/llama2-8K-1B/data-00012-of-00025.arrow new file mode 100644 index 0000000000000000000000000000000000000000..4a27c38213011e616b76e299ba7487c4d2a688f5 --- /dev/null +++ b/pretrain/llama2-8K-1B/data-00012-of-00025.arrow @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:467d56cf1538976224c5f90842ff5223bf9b3f3581f94f768fa8d0eaabce1735 +size 496687208 diff --git a/pretrain/llama2-8K-1B/data-00013-of-00025.arrow b/pretrain/llama2-8K-1B/data-00013-of-00025.arrow new file mode 100644 index 0000000000000000000000000000000000000000..46eddabc9cbc1a1397ac36e7ecc17515ccdb73a6 --- /dev/null +++ b/pretrain/llama2-8K-1B/data-00013-of-00025.arrow @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:d1370d1c6d821006381fc6a631730378bdbe4a0964d50f77927e292aba602bd3 +size 496687208 diff --git a/pretrain/llama2-8K-1B/data-00014-of-00025.arrow b/pretrain/llama2-8K-1B/data-00014-of-00025.arrow new file mode 100644 index 0000000000000000000000000000000000000000..cd15153564fbb7bf34a69dda5e0885dc8face7cd --- /dev/null +++ b/pretrain/llama2-8K-1B/data-00014-of-00025.arrow @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:741bbb09b2e5473cadda00dd021edcfba317972cebd7bfdb237fc831fba9dedc +size 496687208 diff --git a/pretrain/llama2-8K-1B/data-00015-of-00025.arrow b/pretrain/llama2-8K-1B/data-00015-of-00025.arrow new file mode 100644 index 0000000000000000000000000000000000000000..c6c1372b93ee399edc4851408d07e06f2e13dafc --- /dev/null +++ b/pretrain/llama2-8K-1B/data-00015-of-00025.arrow @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:aa928bac28aa281bcdd5a3a256f28382ea0e422ba82eeca9cdff64222f488228 +size 496687208 diff --git a/pretrain/llama2-8K-1B/data-00016-of-00025.arrow b/pretrain/llama2-8K-1B/data-00016-of-00025.arrow new file mode 100644 index 0000000000000000000000000000000000000000..a75e3c9eb9dc7d60cf177e4c79f47864ff09bde5 --- /dev/null +++ b/pretrain/llama2-8K-1B/data-00016-of-00025.arrow @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:cf41f6e8e8bff2db3845cdf8d3c60ab95b5eac3a7a2eddf94f35b562facd8040 +size 496687208 diff --git a/pretrain/llama2-8K-1B/data-00017-of-00025.arrow b/pretrain/llama2-8K-1B/data-00017-of-00025.arrow new file mode 100644 index 0000000000000000000000000000000000000000..0ba44de9ef1a5544afa61e1816b8caad82dafd74 --- /dev/null +++ b/pretrain/llama2-8K-1B/data-00017-of-00025.arrow @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:7d83d1eda252aab548465be79de84aacf50454bd6c621ac7e2986aebcf53fd85 +size 496687208 diff --git a/pretrain/llama2-8K-1B/data-00018-of-00025.arrow b/pretrain/llama2-8K-1B/data-00018-of-00025.arrow new file mode 100644 index 0000000000000000000000000000000000000000..ea386170ada59786c85bc41622fc2fb4cac807a8 --- /dev/null +++ b/pretrain/llama2-8K-1B/data-00018-of-00025.arrow @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:f1d500e1820a29351402c34a952414ceafe52c83e6af9df602ca281804b2337c +size 496687208 diff --git a/pretrain/llama2-8K-1B/data-00019-of-00025.arrow b/pretrain/llama2-8K-1B/data-00019-of-00025.arrow new file mode 100644 index 0000000000000000000000000000000000000000..f6be2fc5cca537d94c1bcaf3e6e8eef0be154425 --- /dev/null +++ b/pretrain/llama2-8K-1B/data-00019-of-00025.arrow @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:48a331245fedd73975b2c8de452a26bc539500ded52fde816d45e487bff2547c +size 496687208 diff --git a/pretrain/llama2-8K-1B/data-00020-of-00025.arrow b/pretrain/llama2-8K-1B/data-00020-of-00025.arrow new file mode 100644 index 0000000000000000000000000000000000000000..ed90c5a91c28657813139602f33eef92fe401275 --- /dev/null +++ b/pretrain/llama2-8K-1B/data-00020-of-00025.arrow @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:10d121f3f9a4c9a7d8768e1387063e114f0ebed196c5fc37f952a07da6408a47 +size 496580704 diff --git a/pretrain/llama2-8K-1B/data-00021-of-00025.arrow b/pretrain/llama2-8K-1B/data-00021-of-00025.arrow new file mode 100644 index 0000000000000000000000000000000000000000..ff12f73c26bf7b8c09bee9e67e195dc5d3e1dc64 --- /dev/null +++ b/pretrain/llama2-8K-1B/data-00021-of-00025.arrow @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:8c27ae200e91559dadc958145115694e18be206ece46680c07bb2cef73858251 +size 496580704 diff --git a/pretrain/llama2-8K-1B/data-00022-of-00025.arrow b/pretrain/llama2-8K-1B/data-00022-of-00025.arrow new file mode 100644 index 0000000000000000000000000000000000000000..25060cee4aa73237f53e4d1e081d23062a7c6652 --- /dev/null +++ b/pretrain/llama2-8K-1B/data-00022-of-00025.arrow @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:b93329575cdf00fe2e10df5ace5121ce1dd45b666d976e9a3c8e438205bd2752 +size 496580704 diff --git a/pretrain/llama2-8K-1B/data-00023-of-00025.arrow b/pretrain/llama2-8K-1B/data-00023-of-00025.arrow new file mode 100644 index 0000000000000000000000000000000000000000..b8ea60f2efc7a99ff7f97395548ddb7917fe8e8c --- /dev/null +++ b/pretrain/llama2-8K-1B/data-00023-of-00025.arrow @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:5bab553345ff18dae40e7e4209ee2b7462a94c418b879f35e8dc14284d033718 +size 496580704 diff --git a/pretrain/llama2-8K-1B/data-00024-of-00025.arrow b/pretrain/llama2-8K-1B/data-00024-of-00025.arrow new file mode 100644 index 0000000000000000000000000000000000000000..33affaba313f39c1b97c224715f1bdbe836d085a --- /dev/null +++ b/pretrain/llama2-8K-1B/data-00024-of-00025.arrow @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:476514115e09edb0aafb9dc268ab3db35bfda23f8117af131e6c00b604c34fdb +size 496580704 diff --git a/pretrain/llama2-8K-1B/dataset_info.json b/pretrain/llama2-8K-1B/dataset_info.json new file mode 100644 index 0000000000000000000000000000000000000000..239a3a8b0d0559bdaea0950b0df39c971af5ccc4 --- /dev/null +++ b/pretrain/llama2-8K-1B/dataset_info.json @@ -0,0 +1,33 @@ +{ + "citation": "", + "description": "", + "features": { + "input_ids": { + "feature": { + "dtype": "int32", + "_type": "Value" + }, + "_type": "Sequence" + }, + "attention_mask": { + "feature": { + "dtype": "int8", + "_type": "Value" + }, + "_type": "Sequence" + }, + "labels": { + "feature": { + "dtype": "int64", + "_type": "Value" + }, + "_type": "Sequence" + }, + "length": { + "dtype": "int64", + "_type": "Value" + } + }, + "homepage": "", + "license": "" +} \ No newline at end of file diff --git a/pretrain/llama2-8K-1B/state.json b/pretrain/llama2-8K-1B/state.json new file mode 100644 index 0000000000000000000000000000000000000000..9d12333035f6aef4d94454f2ce4276fc76bafa78 --- /dev/null +++ b/pretrain/llama2-8K-1B/state.json @@ -0,0 +1,85 @@ +{ + "_data_files": [ + { + "filename": "data-00000-of-00025.arrow" + }, + { + "filename": "data-00001-of-00025.arrow" + }, + { + "filename": "data-00002-of-00025.arrow" + }, + { + "filename": "data-00003-of-00025.arrow" + }, + { + "filename": "data-00004-of-00025.arrow" + }, + { + "filename": "data-00005-of-00025.arrow" + }, + { + "filename": "data-00006-of-00025.arrow" + }, + { + "filename": "data-00007-of-00025.arrow" + }, + { + "filename": "data-00008-of-00025.arrow" + }, + { + "filename": "data-00009-of-00025.arrow" + }, + { + "filename": "data-00010-of-00025.arrow" + }, + { + "filename": "data-00011-of-00025.arrow" + }, + { + "filename": "data-00012-of-00025.arrow" + }, + { + "filename": "data-00013-of-00025.arrow" + }, + { + "filename": "data-00014-of-00025.arrow" + }, + { + "filename": "data-00015-of-00025.arrow" + }, + { + "filename": "data-00016-of-00025.arrow" + }, + { + "filename": "data-00017-of-00025.arrow" + }, + { + "filename": "data-00018-of-00025.arrow" + }, + { + "filename": "data-00019-of-00025.arrow" + }, + { + "filename": "data-00020-of-00025.arrow" + }, + { + "filename": "data-00021-of-00025.arrow" + }, + { + "filename": "data-00022-of-00025.arrow" + }, + { + "filename": "data-00023-of-00025.arrow" + }, + { + "filename": "data-00024-of-00025.arrow" + } + ], + "_fingerprint": "9945ad0dececbf9e", + "_format_columns": null, + "_format_kwargs": {}, + "_format_type": null, + "_output_all_columns": false, + "_split": null +} \ No newline at end of file diff --git a/pretrain/llama3-8K-1B/data-00000-of-00023.arrow b/pretrain/llama3-8K-1B/data-00000-of-00023.arrow new file mode 100644 index 0000000000000000000000000000000000000000..5be365215f899feb772fad2efffa18573105e9d9 --- /dev/null +++ b/pretrain/llama3-8K-1B/data-00000-of-00023.arrow @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:18e256f39fce6713ba849cd0dc442a334a6dd2d0d781531806683cdd83905106 +size 489444120 diff --git a/pretrain/llama3-8K-1B/data-00001-of-00023.arrow b/pretrain/llama3-8K-1B/data-00001-of-00023.arrow new file mode 100644 index 0000000000000000000000000000000000000000..f7f3d6583c9835d757dc0a376a57625743b0c48b --- /dev/null +++ b/pretrain/llama3-8K-1B/data-00001-of-00023.arrow @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:8d47a7a2da8827650ce67ef41e416f651f59d8716a0f60f8719e7980b522453d +size 489444120 diff --git a/pretrain/llama3-8K-1B/data-00002-of-00023.arrow b/pretrain/llama3-8K-1B/data-00002-of-00023.arrow new file mode 100644 index 0000000000000000000000000000000000000000..771e3365c4f156cb62eea9044fcdf00afae9775e --- /dev/null +++ b/pretrain/llama3-8K-1B/data-00002-of-00023.arrow @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:d0ab85b77ab58bf01464bc4fbbad947a0688cab5f781ea608f7c0dd666b1cb48 +size 489444120 diff --git a/pretrain/llama3-8K-1B/data-00003-of-00023.arrow b/pretrain/llama3-8K-1B/data-00003-of-00023.arrow new file mode 100644 index 0000000000000000000000000000000000000000..a3e90352b85e85efac2429113cb709fb96d1a50c --- /dev/null +++ b/pretrain/llama3-8K-1B/data-00003-of-00023.arrow @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:dd899a4085d82f2fc67787d480bc7637bb955bad967a5f46ef1defdea3aee9e5 +size 489444120 diff --git a/pretrain/llama3-8K-1B/data-00004-of-00023.arrow b/pretrain/llama3-8K-1B/data-00004-of-00023.arrow new file mode 100644 index 0000000000000000000000000000000000000000..2dcb404d4fa1fe674826d85e3301b342af6232e2 --- /dev/null +++ b/pretrain/llama3-8K-1B/data-00004-of-00023.arrow @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:43eeb7822a4eb8d463e3c4f7ef3197f51505c1ecb45ceb4eb71c16160697f97a +size 489444120 diff --git a/pretrain/llama3-8K-1B/data-00005-of-00023.arrow b/pretrain/llama3-8K-1B/data-00005-of-00023.arrow new file mode 100644 index 0000000000000000000000000000000000000000..0687341fed9d3b144839b2ff7216ef8334e4376d --- /dev/null +++ b/pretrain/llama3-8K-1B/data-00005-of-00023.arrow @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:0ad93dba09159e7c05ef52dbfeb57bdaf797c341d772d3533b0b187a925cdc8e +size 489444120 diff --git a/pretrain/llama3-8K-1B/data-00006-of-00023.arrow b/pretrain/llama3-8K-1B/data-00006-of-00023.arrow new file mode 100644 index 0000000000000000000000000000000000000000..6431f87b6a4d4965c02e0c0f07cdaf8475feee54 --- /dev/null +++ b/pretrain/llama3-8K-1B/data-00006-of-00023.arrow @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:626bf69dd88131d5584e092e8ea45ffd585b335ee8fda59dc9ecb20119285a4d +size 489337616 diff --git a/pretrain/llama3-8K-1B/data-00007-of-00023.arrow b/pretrain/llama3-8K-1B/data-00007-of-00023.arrow new file mode 100644 index 0000000000000000000000000000000000000000..cfd5e0194332f101549bf7d09697c69abff5f49c --- /dev/null +++ b/pretrain/llama3-8K-1B/data-00007-of-00023.arrow @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:782d19e92c03bbb4e0fcdc2698e1a0d9fff9125ad8598a8bd02461575b23de1d +size 489337616 diff --git a/pretrain/llama3-8K-1B/data-00008-of-00023.arrow b/pretrain/llama3-8K-1B/data-00008-of-00023.arrow new file mode 100644 index 0000000000000000000000000000000000000000..5b3395df0ca73afd14424bd6bde7d33e8a125772 --- /dev/null +++ b/pretrain/llama3-8K-1B/data-00008-of-00023.arrow @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:c3e52c2d85315ffd660dba23472428b5b37d9c0d13a4cf2bd2eb0b2df91c5ca5 +size 489337616 diff --git a/pretrain/llama3-8K-1B/data-00009-of-00023.arrow b/pretrain/llama3-8K-1B/data-00009-of-00023.arrow new file mode 100644 index 0000000000000000000000000000000000000000..394ae8298c50f6b2d927fdefe0932fad272ca028 --- /dev/null +++ b/pretrain/llama3-8K-1B/data-00009-of-00023.arrow @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:e2dffe33758211d29223b8f36fde69b9dcef0bd9aaca1d32f6010c7f8c198777 +size 489337616 diff --git a/pretrain/llama3-8K-1B/data-00010-of-00023.arrow b/pretrain/llama3-8K-1B/data-00010-of-00023.arrow new file mode 100644 index 0000000000000000000000000000000000000000..2790f2c7b5033a8cfcb1aae3bafd78cbf0969c3d --- /dev/null +++ b/pretrain/llama3-8K-1B/data-00010-of-00023.arrow @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:812e1b8021eecfe9abb70ce2b38062a12c6c0b4e1584303fbaf7cc542a6489a4 +size 489337616 diff --git a/pretrain/llama3-8K-1B/data-00011-of-00023.arrow b/pretrain/llama3-8K-1B/data-00011-of-00023.arrow new file mode 100644 index 0000000000000000000000000000000000000000..73509e52e98b84bcf622660e18dbdd5429d7e08d --- /dev/null +++ b/pretrain/llama3-8K-1B/data-00011-of-00023.arrow @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:f3e2df389d18502bb971c35f81173308fdc6b745e9540e4746e8bd6dbf5fa498 +size 489337616 diff --git a/pretrain/llama3-8K-1B/data-00012-of-00023.arrow b/pretrain/llama3-8K-1B/data-00012-of-00023.arrow new file mode 100644 index 0000000000000000000000000000000000000000..2b414fe1d68ee6e01e329b6a317d20f0c38e4ebe --- /dev/null +++ b/pretrain/llama3-8K-1B/data-00012-of-00023.arrow @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:a2675d7fea4e956f6f5de35b672e0d8a7a248a9de03ce1647a8e4175e6166754 +size 489337616 diff --git a/pretrain/llama3-8K-1B/data-00013-of-00023.arrow b/pretrain/llama3-8K-1B/data-00013-of-00023.arrow new file mode 100644 index 0000000000000000000000000000000000000000..8c7101743bc342d6556f2e9c13cd1b6cf12a401f --- /dev/null +++ b/pretrain/llama3-8K-1B/data-00013-of-00023.arrow @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:824ffde5278e115978dd5858440b284eb6bc7274eafbfac0cda1aa24f7d4a228 +size 489337616 diff --git a/pretrain/llama3-8K-1B/data-00014-of-00023.arrow b/pretrain/llama3-8K-1B/data-00014-of-00023.arrow new file mode 100644 index 0000000000000000000000000000000000000000..e4f2c71d43a35fa1d9462879d9b448ad54731ced --- /dev/null +++ b/pretrain/llama3-8K-1B/data-00014-of-00023.arrow @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:6e9e7269257eff7b26dc65a21e20241794cc3cbaa330a3127d1534d30478b649 +size 489337616 diff --git a/pretrain/llama3-8K-1B/data-00015-of-00023.arrow b/pretrain/llama3-8K-1B/data-00015-of-00023.arrow new file mode 100644 index 0000000000000000000000000000000000000000..c3a60a40da4b27e55a101a177632d02d32c40f03 --- /dev/null +++ b/pretrain/llama3-8K-1B/data-00015-of-00023.arrow @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:0411120dda37f7eb6e4c4afcca2a9e8253b139d1d28e2ce158a7a97f8bad010c +size 489337616 diff --git a/pretrain/llama3-8K-1B/data-00016-of-00023.arrow b/pretrain/llama3-8K-1B/data-00016-of-00023.arrow new file mode 100644 index 0000000000000000000000000000000000000000..8449a443d98cdabbc828c673323e8285ec51ef4f --- /dev/null +++ b/pretrain/llama3-8K-1B/data-00016-of-00023.arrow @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:0d21ceea854b5a982ec2f01f3e51816f4ec88b68e3ec32bd74eee4f2b87d5c14 +size 489337616 diff --git a/pretrain/llama3-8K-1B/data-00017-of-00023.arrow b/pretrain/llama3-8K-1B/data-00017-of-00023.arrow new file mode 100644 index 0000000000000000000000000000000000000000..4c40acc2b119e53b83327dde7c92d9a221f05367 --- /dev/null +++ b/pretrain/llama3-8K-1B/data-00017-of-00023.arrow @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:81cd07dc4de5be5796b950b41bd8d06558b0eb6d3168b8fa52c0ea0cd64785be +size 489337616 diff --git a/pretrain/llama3-8K-1B/data-00018-of-00023.arrow b/pretrain/llama3-8K-1B/data-00018-of-00023.arrow new file mode 100644 index 0000000000000000000000000000000000000000..13bb4d73021a83cad8598395b3fdfc97f8749d46 --- /dev/null +++ b/pretrain/llama3-8K-1B/data-00018-of-00023.arrow @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:d0b7d2638f59c1510fc82010b918b28e651cf386aea482b52bff6655a997a771 +size 489337616 diff --git a/pretrain/llama3-8K-1B/data-00019-of-00023.arrow b/pretrain/llama3-8K-1B/data-00019-of-00023.arrow new file mode 100644 index 0000000000000000000000000000000000000000..de64be6fa348e799dc5f60103cc3541acfa0430a --- /dev/null +++ b/pretrain/llama3-8K-1B/data-00019-of-00023.arrow @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:da2cb8f188bcf64518c2057c813df9a420031f3983021dd4f764e10421ce826b +size 489337616 diff --git a/pretrain/llama3-8K-1B/data-00020-of-00023.arrow b/pretrain/llama3-8K-1B/data-00020-of-00023.arrow new file mode 100644 index 0000000000000000000000000000000000000000..0eaa8e22f9772ef2b85205cc7d9f258631ff9835 --- /dev/null +++ b/pretrain/llama3-8K-1B/data-00020-of-00023.arrow @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:4d9745ccaeb26a0e195403137b9a6f4bf21f8f764453b23a9d09d0d3dffc3f03 +size 489337616 diff --git a/pretrain/llama3-8K-1B/data-00021-of-00023.arrow b/pretrain/llama3-8K-1B/data-00021-of-00023.arrow new file mode 100644 index 0000000000000000000000000000000000000000..5eda2ed46f060def6a7ab75dc32149da718368e5 --- /dev/null +++ b/pretrain/llama3-8K-1B/data-00021-of-00023.arrow @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:48a105184ce3bdf4bfeac00e931a799861edce5904d66585cdf43d6f983a003c +size 489337616 diff --git a/pretrain/llama3-8K-1B/data-00022-of-00023.arrow b/pretrain/llama3-8K-1B/data-00022-of-00023.arrow new file mode 100644 index 0000000000000000000000000000000000000000..c7939d1fbeb792865a26955c64bca2ed0ff67378 --- /dev/null +++ b/pretrain/llama3-8K-1B/data-00022-of-00023.arrow @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:85ad60faa4e10fcb813eb780c07cb1135030e16d88c7b0118a535cadc40b9eb2 +size 489337616 diff --git a/pretrain/llama3-8K-1B/dataset_info.json b/pretrain/llama3-8K-1B/dataset_info.json new file mode 100644 index 0000000000000000000000000000000000000000..239a3a8b0d0559bdaea0950b0df39c971af5ccc4 --- /dev/null +++ b/pretrain/llama3-8K-1B/dataset_info.json @@ -0,0 +1,33 @@ +{ + "citation": "", + "description": "", + "features": { + "input_ids": { + "feature": { + "dtype": "int32", + "_type": "Value" + }, + "_type": "Sequence" + }, + "attention_mask": { + "feature": { + "dtype": "int8", + "_type": "Value" + }, + "_type": "Sequence" + }, + "labels": { + "feature": { + "dtype": "int64", + "_type": "Value" + }, + "_type": "Sequence" + }, + "length": { + "dtype": "int64", + "_type": "Value" + } + }, + "homepage": "", + "license": "" +} \ No newline at end of file diff --git a/pretrain/llama3-8K-1B/state.json b/pretrain/llama3-8K-1B/state.json new file mode 100644 index 0000000000000000000000000000000000000000..265bb013e163310f9fc0f17cfe45315a763d568a --- /dev/null +++ b/pretrain/llama3-8K-1B/state.json @@ -0,0 +1,79 @@ +{ + "_data_files": [ + { + "filename": "data-00000-of-00023.arrow" + }, + { + "filename": "data-00001-of-00023.arrow" + }, + { + "filename": "data-00002-of-00023.arrow" + }, + { + "filename": "data-00003-of-00023.arrow" + }, + { + "filename": "data-00004-of-00023.arrow" + }, + { + "filename": "data-00005-of-00023.arrow" + }, + { + "filename": "data-00006-of-00023.arrow" + }, + { + "filename": "data-00007-of-00023.arrow" + }, + { + "filename": "data-00008-of-00023.arrow" + }, + { + "filename": "data-00009-of-00023.arrow" + }, + { + "filename": "data-00010-of-00023.arrow" + }, + { + "filename": "data-00011-of-00023.arrow" + }, + { + "filename": "data-00012-of-00023.arrow" + }, + { + "filename": "data-00013-of-00023.arrow" + }, + { + "filename": "data-00014-of-00023.arrow" + }, + { + "filename": "data-00015-of-00023.arrow" + }, + { + "filename": "data-00016-of-00023.arrow" + }, + { + "filename": "data-00017-of-00023.arrow" + }, + { + "filename": "data-00018-of-00023.arrow" + }, + { + "filename": "data-00019-of-00023.arrow" + }, + { + "filename": "data-00020-of-00023.arrow" + }, + { + "filename": "data-00021-of-00023.arrow" + }, + { + "filename": "data-00022-of-00023.arrow" + } + ], + "_fingerprint": "28f18650a3fb2018", + "_format_columns": null, + "_format_kwargs": {}, + "_format_type": null, + "_output_all_columns": false, + "_split": null +} \ No newline at end of file diff --git a/pretrain/mistral-8K-1B/data-00000-of-00025.arrow b/pretrain/mistral-8K-1B/data-00000-of-00025.arrow new file mode 100644 index 0000000000000000000000000000000000000000..572a9c4a3ad8c5123e9b9515a58f4bb4ea9f3904 --- /dev/null +++ b/pretrain/mistral-8K-1B/data-00000-of-00025.arrow @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:ee478746a87d6cb1cbd6a17caf3d7a3c982ff13a46445949a84fff0537ea9f14 +size 488591992 diff --git a/pretrain/mistral-8K-1B/data-00001-of-00025.arrow b/pretrain/mistral-8K-1B/data-00001-of-00025.arrow new file mode 100644 index 0000000000000000000000000000000000000000..30878e6eb5ab5ef6136634cd1a732173a418f442 --- /dev/null +++ b/pretrain/mistral-8K-1B/data-00001-of-00025.arrow @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:f45f7817e2830017e4e8a438255f97c0a4c09f4ae6ba7735993a5d093b19f786 +size 488591992 diff --git a/pretrain/mistral-8K-1B/data-00002-of-00025.arrow b/pretrain/mistral-8K-1B/data-00002-of-00025.arrow new file mode 100644 index 0000000000000000000000000000000000000000..c34fd51eb0908e360c415d6c28d9a396e6b8fe1b --- /dev/null +++ b/pretrain/mistral-8K-1B/data-00002-of-00025.arrow @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:29265f6d43a0d5eb5918e1a23503a5f25a454627d1cd670cdecb1dcc812ef573 +size 488591992 diff --git a/pretrain/mistral-8K-1B/data-00003-of-00025.arrow b/pretrain/mistral-8K-1B/data-00003-of-00025.arrow new file mode 100644 index 0000000000000000000000000000000000000000..eadbf7390f16719e650c0d5564f7718c2ebc7431 --- /dev/null +++ b/pretrain/mistral-8K-1B/data-00003-of-00025.arrow @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:16d9bb6e582257f8ef99b38794da7a88eca1912ae55885ecba144a37b4e0c4c0 +size 488591992 diff --git a/pretrain/mistral-8K-1B/data-00004-of-00025.arrow b/pretrain/mistral-8K-1B/data-00004-of-00025.arrow new file mode 100644 index 0000000000000000000000000000000000000000..3ba37abd10722230cb94f924b7771235eef940d8 --- /dev/null +++ b/pretrain/mistral-8K-1B/data-00004-of-00025.arrow @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:539f6adf5e96510d3828aad79de43635b4ff7b957b4425efa0e643645a829c14 +size 488591992 diff --git a/pretrain/mistral-8K-1B/data-00005-of-00025.arrow b/pretrain/mistral-8K-1B/data-00005-of-00025.arrow new file mode 100644 index 0000000000000000000000000000000000000000..d10de13c9d19bc1f428ffd6ad2c90f191aaf58aa --- /dev/null +++ b/pretrain/mistral-8K-1B/data-00005-of-00025.arrow @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:0f4e1bff51301a349a8114c7b5f674114276078f2868f93272082b5b29d4adf1 +size 488485488 diff --git a/pretrain/mistral-8K-1B/data-00006-of-00025.arrow b/pretrain/mistral-8K-1B/data-00006-of-00025.arrow new file mode 100644 index 0000000000000000000000000000000000000000..ca38e91d990aa8907f4069ef049a42c5c2a50a21 --- /dev/null +++ b/pretrain/mistral-8K-1B/data-00006-of-00025.arrow @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:ab422f532aa0c6b00cc737576a5c5a69905969c7306f65838ea336984b3fd0db +size 488485488 diff --git a/pretrain/mistral-8K-1B/data-00007-of-00025.arrow b/pretrain/mistral-8K-1B/data-00007-of-00025.arrow new file mode 100644 index 0000000000000000000000000000000000000000..e9cb62e296b6aa010becf92caeda59065ff93f9f --- /dev/null +++ b/pretrain/mistral-8K-1B/data-00007-of-00025.arrow @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:a1a0a46ee180e7c6e5f9fc0529428930ddbdf99877cbffc2f2724bde5511af34 +size 488485488 diff --git a/pretrain/mistral-8K-1B/data-00008-of-00025.arrow b/pretrain/mistral-8K-1B/data-00008-of-00025.arrow new file mode 100644 index 0000000000000000000000000000000000000000..2b803177daefffd6b6604968112688227e217556 --- /dev/null +++ b/pretrain/mistral-8K-1B/data-00008-of-00025.arrow @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:9fc2311d330164c8898af301bbbf2478dc87415f28f1aa46c68b29ee3968106f +size 488485488 diff --git a/pretrain/mistral-8K-1B/data-00009-of-00025.arrow b/pretrain/mistral-8K-1B/data-00009-of-00025.arrow new file mode 100644 index 0000000000000000000000000000000000000000..c061b1241a2031decebc6291836bb4b0caa89c1b --- /dev/null +++ b/pretrain/mistral-8K-1B/data-00009-of-00025.arrow @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:6540d55543f9e09239a5b1c0409eb3043ab4c8f0740ea004945fd8cb96e5eba3 +size 488485488 diff --git a/pretrain/mistral-8K-1B/data-00010-of-00025.arrow b/pretrain/mistral-8K-1B/data-00010-of-00025.arrow new file mode 100644 index 0000000000000000000000000000000000000000..d4085a616373ab00af7283aa01d923a4d0d2cddb --- /dev/null +++ b/pretrain/mistral-8K-1B/data-00010-of-00025.arrow @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:4147ae286ad3ebc2596520ebe35a626b1517134a6867d508fadc44cac155b6ac +size 488485488 diff --git a/pretrain/mistral-8K-1B/data-00011-of-00025.arrow b/pretrain/mistral-8K-1B/data-00011-of-00025.arrow new file mode 100644 index 0000000000000000000000000000000000000000..c1710b69f27f1100730a7cf08ef5ee05f2f34fed --- /dev/null +++ b/pretrain/mistral-8K-1B/data-00011-of-00025.arrow @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:75a16c18c26c3296682212ba5e0ef99fb593a3f471ae0b9601befe3d2a7eb656 +size 488485488 diff --git a/pretrain/mistral-8K-1B/data-00012-of-00025.arrow b/pretrain/mistral-8K-1B/data-00012-of-00025.arrow new file mode 100644 index 0000000000000000000000000000000000000000..610728a25b4baa10be4433298955c3078fc55df2 --- /dev/null +++ b/pretrain/mistral-8K-1B/data-00012-of-00025.arrow @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:f80529f165df1788e5677714d7582c08ea8ddf8e90f471b789854c0864f2dafd +size 488485488 diff --git a/pretrain/mistral-8K-1B/data-00013-of-00025.arrow b/pretrain/mistral-8K-1B/data-00013-of-00025.arrow new file mode 100644 index 0000000000000000000000000000000000000000..0a14f50f2cceb06cae18b448e6851a697824b037 --- /dev/null +++ b/pretrain/mistral-8K-1B/data-00013-of-00025.arrow @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:4082161c50099c5ece90b898bd84e9bc2c079a357e3297459a1e0d42452940ce +size 488485488 diff --git a/pretrain/mistral-8K-1B/data-00014-of-00025.arrow b/pretrain/mistral-8K-1B/data-00014-of-00025.arrow new file mode 100644 index 0000000000000000000000000000000000000000..1607ed908e577e481975389152cecab517d8821e --- /dev/null +++ b/pretrain/mistral-8K-1B/data-00014-of-00025.arrow @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:be30d61be6eea1ff1ea14767c2b8be7faca67dc6c23f97ac6ca072a60f1efc5a +size 488485488 diff --git a/pretrain/mistral-8K-1B/data-00015-of-00025.arrow b/pretrain/mistral-8K-1B/data-00015-of-00025.arrow new file mode 100644 index 0000000000000000000000000000000000000000..dda659284d7fe6e5d06e85b0767481fd3ce2362c --- /dev/null +++ b/pretrain/mistral-8K-1B/data-00015-of-00025.arrow @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:16c9c347ca419a40807ed1253e5ceba2203998cc0fd579cb87dc34f4ee4e12a3 +size 488485488 diff --git a/pretrain/mistral-8K-1B/data-00016-of-00025.arrow b/pretrain/mistral-8K-1B/data-00016-of-00025.arrow new file mode 100644 index 0000000000000000000000000000000000000000..c3786edac95da8e91a6b6c8ca3d8dafca38906eb --- /dev/null +++ b/pretrain/mistral-8K-1B/data-00016-of-00025.arrow @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:d340849093a2557e39b71b6323cb85a27e81c16c8f76512b68b437e230d4f8d1 +size 488485488 diff --git a/pretrain/mistral-8K-1B/data-00017-of-00025.arrow b/pretrain/mistral-8K-1B/data-00017-of-00025.arrow new file mode 100644 index 0000000000000000000000000000000000000000..8315b610351e8f568d71e22753291a4d1abb0d04 --- /dev/null +++ b/pretrain/mistral-8K-1B/data-00017-of-00025.arrow @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:d91652667d727aa2abeda4f5052908373325c1d20881204057df54e8ccd32c92 +size 488485488 diff --git a/pretrain/mistral-8K-1B/data-00018-of-00025.arrow b/pretrain/mistral-8K-1B/data-00018-of-00025.arrow new file mode 100644 index 0000000000000000000000000000000000000000..eddb9f396e8becfd811ec479a7d4b13c1bbe5859 --- /dev/null +++ b/pretrain/mistral-8K-1B/data-00018-of-00025.arrow @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:c35902a82501ef1bc5998993c1db9b092c4ef562fcf8c0534e7ad894f130fa2b +size 488485488 diff --git a/pretrain/mistral-8K-1B/data-00019-of-00025.arrow b/pretrain/mistral-8K-1B/data-00019-of-00025.arrow new file mode 100644 index 0000000000000000000000000000000000000000..93aec07dc54a5484cd2200e3217f67ff06379dec --- /dev/null +++ b/pretrain/mistral-8K-1B/data-00019-of-00025.arrow @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:d391050f8fe6602603a5932832f941f4919968fa4fddfaef408e5ab59835495d +size 488485488 diff --git a/pretrain/mistral-8K-1B/data-00020-of-00025.arrow b/pretrain/mistral-8K-1B/data-00020-of-00025.arrow new file mode 100644 index 0000000000000000000000000000000000000000..9dad23d537bead0e427d08f47994a4799ac25cbe --- /dev/null +++ b/pretrain/mistral-8K-1B/data-00020-of-00025.arrow @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:48e1d7371d1f5cf9e633294786a997474608791f6f0afaa4f32f94983c3d1697 +size 488485488 diff --git a/pretrain/mistral-8K-1B/data-00021-of-00025.arrow b/pretrain/mistral-8K-1B/data-00021-of-00025.arrow new file mode 100644 index 0000000000000000000000000000000000000000..93b1297254fd19c3451341c3224bb9ddf69cee5f --- /dev/null +++ b/pretrain/mistral-8K-1B/data-00021-of-00025.arrow @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:211dca4a0a2c08c321f7be3e7a932e311d2ff4efaca312f5ed9aff1a4cc0c274 +size 488485488 diff --git a/pretrain/mistral-8K-1B/data-00022-of-00025.arrow b/pretrain/mistral-8K-1B/data-00022-of-00025.arrow new file mode 100644 index 0000000000000000000000000000000000000000..b3b6210d6011bea56b5b8bf3033af78a4d47ec1d --- /dev/null +++ b/pretrain/mistral-8K-1B/data-00022-of-00025.arrow @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:b33c596bc3e4917d5ff2469541f25db8d834ae026c71712d2d99ba3890b679f5 +size 488485488 diff --git a/pretrain/mistral-8K-1B/data-00023-of-00025.arrow b/pretrain/mistral-8K-1B/data-00023-of-00025.arrow new file mode 100644 index 0000000000000000000000000000000000000000..9dfb7df1a4819ed1c1ac3a4e32931d04b8cd43f7 --- /dev/null +++ b/pretrain/mistral-8K-1B/data-00023-of-00025.arrow @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:8744eaf3c76bee71ea2f9b8b70fc87e16fa94bb682829e4c6872df3928b84b48 +size 488485488 diff --git a/pretrain/mistral-8K-1B/data-00024-of-00025.arrow b/pretrain/mistral-8K-1B/data-00024-of-00025.arrow new file mode 100644 index 0000000000000000000000000000000000000000..6a6be743dc0bdeed436b7d86deef01c9d953ab2f --- /dev/null +++ b/pretrain/mistral-8K-1B/data-00024-of-00025.arrow @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:da3f09e277a29eac6b5496b3194b4f1d606127e31af7a1d67efe1112ae87dede +size 488485488 diff --git a/pretrain/mistral-8K-1B/dataset_info.json b/pretrain/mistral-8K-1B/dataset_info.json new file mode 100644 index 0000000000000000000000000000000000000000..239a3a8b0d0559bdaea0950b0df39c971af5ccc4 --- /dev/null +++ b/pretrain/mistral-8K-1B/dataset_info.json @@ -0,0 +1,33 @@ +{ + "citation": "", + "description": "", + "features": { + "input_ids": { + "feature": { + "dtype": "int32", + "_type": "Value" + }, + "_type": "Sequence" + }, + "attention_mask": { + "feature": { + "dtype": "int8", + "_type": "Value" + }, + "_type": "Sequence" + }, + "labels": { + "feature": { + "dtype": "int64", + "_type": "Value" + }, + "_type": "Sequence" + }, + "length": { + "dtype": "int64", + "_type": "Value" + } + }, + "homepage": "", + "license": "" +} \ No newline at end of file diff --git a/pretrain/mistral-8K-1B/state.json b/pretrain/mistral-8K-1B/state.json new file mode 100644 index 0000000000000000000000000000000000000000..20513fedaa32da7bea84e1193ca10121c8013ca6 --- /dev/null +++ b/pretrain/mistral-8K-1B/state.json @@ -0,0 +1,85 @@ +{ + "_data_files": [ + { + "filename": "data-00000-of-00025.arrow" + }, + { + "filename": "data-00001-of-00025.arrow" + }, + { + "filename": "data-00002-of-00025.arrow" + }, + { + "filename": "data-00003-of-00025.arrow" + }, + { + "filename": "data-00004-of-00025.arrow" + }, + { + "filename": "data-00005-of-00025.arrow" + }, + { + "filename": "data-00006-of-00025.arrow" + }, + { + "filename": "data-00007-of-00025.arrow" + }, + { + "filename": "data-00008-of-00025.arrow" + }, + { + "filename": "data-00009-of-00025.arrow" + }, + { + "filename": "data-00010-of-00025.arrow" + }, + { + "filename": "data-00011-of-00025.arrow" + }, + { + "filename": "data-00012-of-00025.arrow" + }, + { + "filename": "data-00013-of-00025.arrow" + }, + { + "filename": "data-00014-of-00025.arrow" + }, + { + "filename": "data-00015-of-00025.arrow" + }, + { + "filename": "data-00016-of-00025.arrow" + }, + { + "filename": "data-00017-of-00025.arrow" + }, + { + "filename": "data-00018-of-00025.arrow" + }, + { + "filename": "data-00019-of-00025.arrow" + }, + { + "filename": "data-00020-of-00025.arrow" + }, + { + "filename": "data-00021-of-00025.arrow" + }, + { + "filename": "data-00022-of-00025.arrow" + }, + { + "filename": "data-00023-of-00025.arrow" + }, + { + "filename": "data-00024-of-00025.arrow" + } + ], + "_fingerprint": "b9bca29e93479381", + "_format_columns": null, + "_format_kwargs": {}, + "_format_type": null, + "_output_all_columns": false, + "_split": null +} \ No newline at end of file diff --git a/pretrain/val-8K-1M.json b/pretrain/val-8K-1M.json new file mode 100644 index 0000000000000000000000000000000000000000..f7018de860797adcaf626f6024055868cf15f99f --- /dev/null +++ b/pretrain/val-8K-1M.json @@ -0,0 +1,97 @@ +{"id":"RedPajamaCommonCrawl.0000","text":"2009 Archival Education and Research Institute (AERI) Participant Biographies Amelia Abreau, University of Washington, Graduate Student ameliacabreu [at] gmail.com As a doctoral student in my second year of study, my current research draws on the descriptive work of libraries, archives, and museums and the emergent genres of digital media. I study descriptive practice as both a step in the development of digitization infrastructure, and a contextual process for social study. In earlier papers, I have critically and comparatively examined description across institutional and professional discourses by adapting analytic criteria to compare subject cataloging, archival description and social tagging. My goal is not to simply highlight key differences, but to articulate the values of descriptive schemes in context and design. Likewise, I am interested in the products of new media, and how their properties are served in new and existing archival information systems. In the long term, I hope to fully explore the means by which descriptive schemes may develop and adapt\u2014how communities may contribute to the description and curation of their cultural heritage, and new forms of materials adequately stored and accessed. That the institute is dedicated to both research and education is of particular interest to me. I am dedicated to not just producing research in this area, but also helping implement a new archival curriculum. In my teaching, I emphasize a socially-aware, and democratically-minded, perspective on the practice of archives. I have encouraged my students to question why we can't define things correctly for everyone in our society to understand, why is it so hard to find clear answers about history and culture, and how we'll access information about our society in the future. I encourage my students to examine their own experiences in studying these questions. My goal is to create an environment with my teaching that allows students to take seriously and learn from their own perspectives as well as their peers. Promoting diversity in Information Studies is crucial to the future of the field, and one of professional, as well as personal, interest to me. I have spent the past year working as research assistant and project manager on the Washington Doctoral Initiative, a grant from the Institute of Museum and Library Services dedicated to recruiting LIS doctoral students from underrepresented backgrounds and developing a comprehensive mentoring program. Prior to entering the doctoral program in 2007, I worked professionally as an archivist and academic librarian. I hold an MSIS from the University of Texas- Austin. Amelia Acker, University of California, Los Angeles, Graduate Student aacker [at] ucla.edu I am a recent MLIS graduate of UCLA's Department of Information Studies. For the past three years I have worked as an archival processor in the Department of Special Collections at UCLA. I began as a fellow in the Center for Research and Primary Training where I processed collections of faculty members from the School of Medicine. Currently, I am the Ralph J. Bunche collection archivist. My work is concerned with the cultural significance of shifting understandings of information and the ways scientific records are transmitted over time. In my doctoral studies, I want to look at the training of professional archivists, the role of archives and archivists in science, and the documentation of science and scientific communities. I want to know what archivists understand scientific documentation to be and how these ideas shape scientific archives. I am interested in looking at how ideas about archival records and structures become settled, stabilized, and transmitted between communities of record-creators and record-stewards. How do ideas about archival thinking, documentation practices, and existing archives shape our understandings of the scientific record? What will the consequences of long-term digital preservation and migration be for scientific documenta- tion and archives? How are we educated, apprenticed and initiated into the professional community of archives? How are we taught to make sense of the future of information and our profession? These are questions I want to ask in my doctoral research and in my future career. Dharma Akmon, University of Michigan, Graduate Student dharmrae[at]umich.edu My background in history is what initially drew me to the field of archival studies, but the challenges and opportunities of the digital era and its associated reorganization of work and social interaction are what compelled me to pursue an academic and research career in this area. Working as a professional in archives, the issues with digital materials can seem insurmountable. As a researcher, the same complex issues are what excite and inspire me. I was involved in research from the beginning of my studies in the masters program at the University of Michigan School of Information, where I studied Archives and Records Management. I feel fortunate to have had numerous research opportunities that significantly shaped my understanding of the challenges facing archives. Documenting Internet2: A Collaborative Model for Developing Electronic Records Capacities in the Small Archival Repository, a two-year project for which I served as a graduate research assistant, looked at one modern organization's use of records. Most compelling to me is how we might support new modes of work while at the same time ensuring preservation of the record. Further, what does it mean to preserve the context of records, when that context is dependent on proprietary software and technology? This interest has extended most recently for me in thinking about how scientists conduct research and how data archives can serve their present needs while ensuring that data can be reused in the future. Related to the issue of preserving context is the question of how to present digital materials to researchers. As a research assistant on the Polar Bears Next Generation Finding Aids Project and an interaction designer at JSTOR, I developed a keen interest in the end-use of digital archival holdings. With my research I hope to contribute knowledge of how researchers use digital materials. What kinds of functionality do they expect, and what role do more participatory tools, like \u2015tagging, have in digital archives? From the beginning of my studies in archival science I have been interested in research, however I chose to enter the professional world when I graduated. It was important for me to gain \u2015real-world experience in archives, which I felt strongly would help to better inform my research endeavors. All too often there is a vast distance between archival research and practice. I hope the practical experience I have gained will help me to close that chasm. Bruce Ambacher, University of Maryland, Faculty bambache[at]umd.edu I have a PhD in History, joined the National Archives in 1976, became an adjunct professor teaching archives courses in 1984 at George Mason University and in 2000 at the University of Maryland. I became a full-time visiting professor when I retired from NARA in January 2007. As one of the \u2015first generation of electronic records archivists I was thrown into developing the practice of accessioning, describing, preserving and providing reference for electronic records. A major part of my NARA career was devoted to developing standards for federal agencies to use in creating and transferring electronic records for preservation. I worked with the intelligence community on several aspects of recordkeeping and strategic planning for new electronic records applications. I represented NARA on several interagency bodies addressing electronic records such as the Federal Geographic Data Committee, the GILS development team, and the NARA review team for DoD 5015.2. I served as the only archivist on the international committee that developed the OAIS reference model. I served as the co-chair of the RLG-NARA taskforce that developed Trusted Repositories Audit and Certification (TRAC). I was the preservation officer for the Iran-Contra files and the federal email of the Reagan, Bush, and Clinton administrations. Thus I come to my current position with a strong background in electronic records processing and standards. I continue working with international experts working to turn TRAC into an ISO standard. My past positions also put me in a position to explain archival theory and practice to diverse audiences and have utilized the scholarly journals of other professions and satellite broadcasts to help other professions understand archives. My current research interests continue to be advancing electronic records standards. Kimberly Anderson, University of California, Los Angeles, Graduate Student kima[at]ucla.edu I received my MLIS from UCLA in 2007 and continued into the PhD program at UCLA where I have advanced to candidacy. From 1995 to the present, I have worked in a variety of archives and library settings. The bulk of my work as a practitioner took place in university archives and special collections with a focus on photograph collections. Since joining the PhD program, I have had the opportunity to work as a course reader for Master's students in both archives and general information studies classes. My chief interests are appraisal, the knowledge and skills of archivists, the social history and intellectual development of Archival Studies, and the Archive as a nexus of memory, community, and identity. I am also interested in the Archive and the personal: the subjectivities of archivists as individuals, the transformation from individual lives to historical subjects, and the use of archives by non-academics. My dissertation research is concerned with understanding how archivists learn to appraise. I am currently working with university archivists nationwide to explore how they learned to appraise through both formal and informal means. I am simultaneously using bibliometrics and network analysis to create a visualization of interpersonal influences on appraisal theory, education, and learning. As a subjective skill, I am trying to identify how appraisal is actually learned and used, if archivists are reflective about this practice and\/or what role appraisal has in their professional life, and what \u2015appraisal\" and the identification of enduring value mean in different contexts and for different people. I think the academic and the practitioner are each playing a specialized role in the same endeavor. As a future professor, I hope to encourage practitioners to see theory come to life in their work and to encourage other academics to learn with and from practitioners. Jeannette Bastian, Simmons College, Faculty bastian[at]simmons.edu I am an Associate Professor at the Graduate School of Library and Information Science, Simmons College, Boston, Massachusetts and I direct their Archives Management concentration. Archival education is my second career. For twenty-five years I was a librarian and archivist in the United States Virgin Islands, and was Director of the Virgin Islands Territorial Library and Archives from 1987 to 1998. I received my Ph.D. from the University of Pittsburgh in 1999 and began teaching at Simmons that same year. My writings and research interests have generally been in the areas of post-colonialism, collective memory and archival education. In addition to journal articles in all of these areas, my books include, West Indian Literature: An Index to Criticism,1930-1975 (under Jeannette Allis, 1981), Owning Memory, How a Caribbean Community Lost Its Archives and Found Its History (2003) and (with Donna Webber), Archival Internships: A Guide for Faculty, Supervisors, and Students (2008). I am currently editing a book of essays, \u2015Communities and Their Archives: Creating and Sustaining Memory (with Ben Alexander) to be published by Facet in 2009. In addition I have been the Reviews editor for the American Archivist since 2005. My current research interests include (1) records and online communities (2) celebrations as records of local memory. I am also continuing to collect data on archival education and am currently updating (with Elizabeth Yakel), the curriculum data that we collected and published five years ago. At Simmons, I am working with colleagues to build a digital repository for our Archives and Preservation curriculum that will enable us to expand and enhance our teaching dimensions. Snowden Becker, University of Texas at Austin, Graduate Student snowdenbecker[at]gmail.com Snowden Becker is a third-year doctoral student in the School of Information at the University of Texas, Austin. She is the recipient of both an IMLS Fellowship for doctoral study in the area of Preservation Administration and a Harrington Graduate Fellowship, one of the University's most prestigious financial awards. She also participates in the UT\/RGK Center for Nonprofit & Philanthropic Studies certificate program. Ms. Becker received a BFA in Printmaking from the Maryland Institute, College of Art in Baltimore in 1996. After working for several years in the museum community and as an Internet content editor, she returned to school in 1999, earning her MLIS degree from UCLA's Graduate School of Education & Information Studies in 2001. From 1999-2002, Becker worked as Digital & Media Archivist at the Japanese American National Museum. The museum's extensive collection of home movies and amateur films documenting the history of the Japanese American community inspired an interest in the neglected audiovisual records of our past, which continues to drive her research and professional career. Becker joined the Department of Interactive Programs at the J. Paul Getty Museum in 2002 as Editor\/Applications Analyst, then went on to become the first Public Access Coordinator for the film archive of the Academy of Motion Picture Arts & Sciences in 2003. Becker's ongoing research work investigates how audiovisual materials are integrated into our cultural heritage. She has written and presented on the use of home movies by the medical community in studies of autism and schizophrenia; the collector's market for home movies; preservation, legal, and access issues archivists encounter in collecting amateur films; and the increasing need for police departments to preserve large quantities of audiovisual materials as evidence in criminal cases. In 2001, she became the founding Chair of the Association of Moving Image Archivists' (AMIA) Small Gauge & Amateur Film interest group, a position she held until 2004; she has also served on the editorial board of the AMIA journal, The Moving Image, since 2004, and on the AMIA Scholarship Committee since 2006. Along with her colleague Katie Trainor, she has co-presented the Society of American Archivists' \u2015Becoming a Film Friendly Archivist workshop since 2004, teaching basic film preservation skills to over 200 archivists and other cultural heritage professionals. She has also taught Collection Development for the UCLA Moving Image Archive Studies Master's degree program and created new curriculum modules on amateur film for the NYU Moving Im- age Archiving and Preservation program. In August, 2003, Becker helped launch Home Movie Day, an annual international event that promotes public awareness and preservation of historic amateur footage. Three films rediscovered through Home Movie Day screenings have since been named to the Library of Congress's National Film Registry. In 2005, the Home Movie Day co-founders established a nonprofit organization, the Center for Home Movies, which coordinates Home Movie Day internationally and works to collect, preserve, provide access to, and promote the understanding of home movies and amateur motion pictures. Lloyd Beers, Jr., University of Maryland, Graduate Student labeers[at]umd.edu I entered the archival profession as a second career. After a life-long involvement with various facets of the maritime industry, I decided to pursue a long held desire to obtain an undergraduate degree in History. During the course of conducting historical research for my degree, I was aided in large measure by individuals engaged in the occupation of preserving information and making it readily accessible to those needing it. These contacts provided me with an introduction to the work of professional archivists. Because of my research experiences, I decided to join the profession. In order to attain the necessary level of education, I entered the combined History and Library Science program at the University of Maryland in College Park, graduating in May 2009 with a Masters of Arts in History and Masters of Library Science. Along the way, I was hired by the National Archives and Records Administration Archives II in College Park where I am employed as a processing archivist in the textual records division. My desire to make a larger contribution to the archival profession led to my application and acceptance into the iSchool at the University of Maryland where I am to pursue PhD in Archival Studies beginning in the fall term. My research interests center on issues of archival access and control of archival holdings. Joel Blanco-Rivera, University of Pittsburgh, Graduate Student joel.blanco[at]gmail.com I have a MSI with specialization in archives and records management from the University of Michigan School of Information (2003). After finishing my degree, I went back to Puerto Rico where I worked at the Archivo General de Puerto Rico. I also worked as a librarian at the Ana G. Mendez University System. From 2004 to 2005 I was a lecturer at the Escuela Graduada de Ciencias y Tecnolog\u00edas de la Informaci\u00f3n, located at the University of Puerto Rico, where I taught courses for the certificate in archives and records management. This excellent teaching experience, along with my strong belief that the role of archives and archivists in society is intrinsically linked to accountability, advocacy and justice, led me to pursue a doctoral degree. My research objectives and scholarship philosophy are framed around this belief. I am particularly interested in the role played by archives and archivists during the transitions from authoritarian rule and civil wars in Latin America. More specifically, I'm interested in how records creation, use, destruction and\/or access restrictions shape how Latin American communities remember this traumatic past. I'm studying the work of truth commissions and the use of records as evidence in trials against military officers and former presidents during the years of repression. In 2005, my paper \u2015The Forbidden Files: Creation and Use of Surveillance Files against the Independence Movement in Puerto Rico was published at the American Archivist (vol. 68, no. 2). Another research paper, Truth Commissions and the Construction of Collective Memory: The Chile Experience, will be published in the forthcoming book Communities and Their Archives: Creating and Sustaining Memory, edited by Ben Alexander and Jeannette Bastian. As a Teaching Assistant at the University of Pittsburgh, I have been able to apply my teaching philosophy, which is based on the principle that students better learn in an environment of trust and sincere dialogue. Therefore, students are encouraged to contribute to the discussion and share ideas with the instructor. Furthermore, it is important to include past and current developments in the archival profession that help students understand better and compare\/contrast theory and practice. This teaching philosophy will be further implemented when I teach my own course, \u2015An International Perspective on Archives, this coming summer. Heather Bowden, University of North Carolina at Chapel Hill, Graduate Student heather[at]longtermdata.com I am a first year doctoral student at the School of Information and Library Science at the University of North Carolina at Chapel Hill. I have a Master's degree in Library and Information Science from the University of Denver and a Bachelor of Fine Arts in painting from New Mexico State University. I became interested in the problem of long term digital preservation early in my master's degree studies and found the issues surrounding digital preservation and curation so compelling that I pursued further research under the tutelage of Dr. Helen Tibbo and Dr. Cal Lee. I am now the project manager for the DigCCurr II grant: Extending an International Digital Curation Curriculum to Doctoral Students and Practitioners. The primary impetus of this grant is to develop a PhD curriculum in digital curation, but also has significant focus on bringing the world's digital curation practitioners and educators together through a series of institutes, symposiums, and it's new web community portal at digitalcurationexchange.org. As the project manager of this grant, it is my responsibility to facilitate and manage all of these activities as well as the recruitment and supervision of five other PhD students in the next three years. My personal research interests in digital curation hinge most on the issues revolving around media and file format obsolescence. It is my goal to assess the needs of real digital archives in order to inform the development of tools which will directly aid in the long term preservation of their valuable digital assets. I am most interested in the development of a socially informed, automatic file format obsolescence notification and file format migration mechanism for digital repositories and archives. I believe that this is realizable and I plan to be instrumental in its development. I am currently working with Richard Marciano in the implementation of this idea within the iRODS distributed network environment. Also deeply important to this research and to the furthering of the digital curation profession, is my budding inter- est in online communities and how they are formed and managed, and how they are most useful to the communities they serve. There is tremendous potential to be harnessed from online communities; not only for social networking, but also for their ability to more organically inform what would normally be static automated processes in computer systems. Where I am passionate about my research, I am equally passionate about a career where I can educate future practitioners and educators in digital curation. It will be through my ability to empower the next generation of archivists and educators that I will be able to make the deepest impact. I also feel that not only will I be able to influence my students, but I will also be able to learn a great deal from them, which will in turn inform my research, which will inform my teaching, and on and on. Sarah Buchanan, University of California, Los Angeles, Graduate Student sarahab[at]ucla.edu Sarah is interested in the cultural use of archival documents to inform historical understanding, and seeks to enhance public appreciation of their value as primary materials for research and learning. Specifically she is interested in modern description and retrieval systems including online finding aids and the use of Encoded Archival Description (EAD) to allow greater dissemination of archival collection holdings. With an interest in student recordkeeping practice, her master's thesis analyzes the structure and scope of the Family Educational Rights and Privacy Act (FERPA) of 1974 as a form of policy affecting student records retention and filing taxonomy. She works as a cataloging assistant at the UCLA Law Library and served as co-President of the Society of American Archivists (SAA) student chapter at UCLA. She is currently a Master's of Library and Information Science student at UCLA (June 2009). She received a B.A. with Distinction in Classical Studies from the University of Pennsylvania in 2007. Jennifer Bunn, University College London, Graduate Student j.bunn[at]ucl.ac.uk I gained an archive qualification from University College London in 1995 and subsequently worked in a variety of institutions - the V&A Museum, The Royal Bank of Scotland, Glasgow University Archives and The National Archives. Increasingly, as part of my work, I found myself constantly struggling to balance traditional archival principles and theory with the new digital environment and user expectation, particularly in the area of archival description. I therefore welcomed the opportunity, in September 2007, to embark on a full-time PhD in this area. My PhD is funded by an Arts and Humanities Research Council Collaborative Doctoral Award and the partners are the Department of Information Studies at University College London and The National Archives. I believe archival description lies at the heart of many of the challenges facing the profession, and yet there is so little understanding of it. In the United Kingdom at least, it remains largely defined by traditional models, dating back to the nineteenth century and there is little conception of any theory of archival description. The aim of my research is to develop that theoretical understanding. It is hoped that this understanding will inform efforts to both improve practice and advance theory in the wider field of archival science. I therefore have the following objectives; -The development of a grounded theory identifying the main concerns of those interacting with archival description and the way in which those concerns are resolved. -Dissemination of the results of the research and knowledge transfer to strengthen ties between practitioners and academics. I have chosen to advance theoretical understanding through the development of a grounded theory because of its firm connection between data and conceptualisation. This is, I feel, particularly appropriate for a practice based discipline such as archival science. Also appropriate is the method's emphasis on the resulting theory being relevant and workable. One of my objectives is to strengthen ties between practitioners and academics and I will therefore need to overcome the mistrust some practitioners feel in regards to theory. By producing a grounded theory which will fit with their experiences, I hope to demonstrate that theory can be of practical use. Additionally the method utilises a balance of rigour and creativity that tunes in with my own personality such that I will not find myself fighting the method, but working with it. Michelle Caswell, University of Wisconsin, Madison, Graduate Student mcaswell[at]uwm.edu Ms. Caswell, who received her MLIS from the University of Wisconsin, Madison, will continue there to pursue her Ph.D. in Archival Science at the School of Library and Information Studies. Ms. Caswell's article \u2015Instant Documentation: Cell Phone Generated Records in Archives, will appear in the Spring\/Summer 2009 edition of American Archivist. She is a founding member of the South Asian American Digital Archive, a non-profit dedicated to building a digital repository that collects and provides access to the diverse history of South Asian Americans. She plans to focus her doctoral work on the complex intersection of archives and violence in South and Southeast Asia, with a particular emphasis on the impact of colonial recordkeeping practices on con- temporary archival repositories. More specifically, she intends to explore how archives in India and Cambodia have been targets for violence, have documented historic acts of violence, and have omitted or included the voices of the subaltern. Janet Ceja, University of Pittsburgh, Graduate Student essoru[at]gmail.com My academic and professional background is centered on the archiving and preservation of audiovisual media. My interest in audiovisual (AV) media dates back to my childhood and educational experiences with these technologies, as well as, the forms of communication they embody. The manner in which audiovisual media documents and captures moments, ideas, perspectives, stories and the such has always fascinated me, especially in relation to communities that practice oral and visual literacy in dynamic ways. This is an area I am exploring in the context of culture, identity and location as a doctoral student at the University of Pittsburgh. I believe that there are various methods by which communities value records\u2014factors that are highly dependent on socio-economic and cultural backgrounds, as well as, technological forms of dependency. Thus, to be archived comes in many forms and formats and is practiced in ways that fall into different systems of understanding. This idea has been sustained by some scholars in Archival Studies, particularly in the 1990s, and my dissertation research intends to add to this body of literature from the perspective of Mexican-Americans. Of particular interest to me are the methodologies that arise through community and institutionally based AV archiving endeavors as acts of social practice and resistance. The theoretical frameworks that inform my work are those used in Archival Studies, Film and Media Studies, Cultural Studies and Chicano Studies. Drawing from these, and the Mexican-American community I intend to build analysis from a transdisciplinary perspective. In general, I expect my dissertation research to allow me to expand upon the audiovisual archiving specialization. Clara Chu, University of California, Los Angeles, Faculty cchu[at]ucla.edu Dr. Clara M. Chu is an Associate Professor at the UCLA Department of Information Studies, and an affiliated faculty member at the UCLA Department of Asian American Studies. She specializes in the social construction of information systems, institutions, and access in order to understand the usage of and barriers to information in multicultural communities. As a Peruvian born, Chinese Canadian American, her transnational and ethnic minority experiences provide her a distinctive and critical lens to examine information issues, to learn with students, and to inform professional practice. Having published, presented and consulted internationally in English and Spanish, she is a leading voice on multicultural library and information issues, and serves on the editorial boards of various information and Asian Pacific American journals, including Library Quarterly, Counterpoise, AAPI Nexus Journal and Amerasia Journal. She actively recruits people of culturally diverse backgrounds into the information profession (http:\/\/www.gseis.ucla.edu\/faculty\/chu\/drmc\/) and initiated Program PRAXIS: A Pre-Doctoral and Recruitment Pro- gram for Tomorrow's Culturally Diverse Information Studies Faculty and Leaders (http:\/\/polaris.gseis.ucla.edu\/ cchu\/praxis\/praxis.htm), with a major federal grant (2002-03) and led the initiative to establish an Information Studies and Asian American Studies dual master's degrees program at UCLA. She is an active member of professional associations addressing multicultural librarianship and is currently a member of the Steering Committee of IFLA's Section on Library Services to Multicultural Populations. She is recipient of the American Library Association's 2008 Library Diversity Research Honor and its 2002 Equality Award, and was selected as the 2008 Dr. Jean E. Coleman Library Outreach Lecturer. She was named a 2005 Library Journal Mover & Shaker, which recognizes people who are shaping the future of libraries. (http:\/\/www.libraryjournal.com\/article\/CA510775.html?display=LJMS&pubdate=3%2F15%2F2005) I-Ting (Emily) Chu, New York University, Graduate Student emmypi[at]gmail.com As I continue to learn about and work with archives, I have become increasingly interested in community archives. At UC Davis, where I completed my undergraduate degree in Asian American Studies and Women and Gender Studies, I had the opportunity to work with some Asian\/Pacific Islander American student and local community groups. This work allowed me to see the complexities of defining, finding, and working with communities. My position as a Graduate Assistant at the Asian\/Pacific\/American Institute of New York University allowed me to combine my interest and experience with community work with the coursework in archives that I was learning. I learned a lot about the different needs of community members and repositories from this position, which has fueled my passion for continuing to study community archives. More specifically, I hope to build an Asian\/Pacific Islander American archive in Southern California that works with the community to define what it needs and wants from this archive. Kate Colligan, University of Pittsburgh, Faculty and Graduate Student colligank[at]edc.pitt.edu Kate Colligan received her MLIS with a concentration in archives and records management in 1998 and CAS with an emphasis on digital preservation in 1999 from the School of Information Sciences at the University of Pittsburgh. Kate first worked in the University Library System's Digital Research Library, researching and implementing Encoded Archival Description (EAD) in 1998-2000 before her faculty appointment as archivist at the University of Pittsburgh's Archives Service Center (ASC) in 2000. Her work concentrated on access issues including supervising the processing of manuscript collections, training and supervising staff and student assistants in descriptive practice, creating EAD finding aids, and other projects that enhanced the visibility of collections. Kate has worked on a variety of projects with students involving appraisal, processing, preservation, digital projects, and EAD supervising over 300 students in this period of her career. In January of 2009 Kate joined the faculty at the University of Pittsburgh's Graduate School of Public Health working on the collection and public archiving of infectious disease data from developing countries. In this new position she will be working on information access issues including digital preservation and data curation with a variety of international collaborators. Kate currently teaches the Archival Representation course for the Department of Library Information Sciences, and serves on the Women's Studies Steering Committee and the University Senate's Community Relations Committee. Kate has remained an active member of professional organizations and has held leadership positions in the Society of American Archivists, Mid-Atlantic Regional Archives Conference (MARAC) and the American Library Association (ALA) Rare Books and Manuscripts Section (RBMS). Kate has received funding to support the preservation and processing of manuscripts collections from the Pennsylvania Historical and Museum Commission as well as private donations and support for other projects through her collection development activities. Kate has also been a grant reviewer for the National Historical Publications and Records Commission (NHPRC), and the Public Archives and Records Infrastructure Support (PARIS) grant program of the New Jersey Division of Archives and Records Management. The past decade has seen continuous change and dynamics between the traditional concepts of archival documents (particularly paper based) and their electronic representation. Whether subtle or startling these surrogates run the gambit from high quality with standardized descriptive metadata to poor quality images with no contextualized information. Those entities responsible for creating and managing large scale digitization schemes depend on the objects, documents, and datasets that are already described. My own interest in this topic focuses on the blur in our collective descriptive practices when creating digital surrogates of original (paper or other format) records. As a manuscripts archivist for the past nine years I have seen the vast range of interpretations individual processors place in descriptive records now managed in the online environment. In many cases manuscripts processors (particularly project archivists or students) are ill equipped to identify let alone describe collections within their holdings yet the online information they create in some sense provides permanent identification for these items in the drive to digitize for access. Mass digitization is indeed a great boon to access, particularly in terms of access government records that allow for health intervention. Gaining access to and digitizing infectious disease data from developing countries is a current interest for me and I hope to bring insight from my experience with such records and collaborate with others at the AERI institute who are also working with these and other issues. Terry Cook, University of Manitoba, Faculty tcook3957[at]rogers.com Terry Cook is Visiting Professor (since 1998) in the graduate-level archival studies programme at the University of Manitoba, where he teaches appraisal, electronic records, and archival history; he is also a freelance archival consultant, editor, and writer (with Clio Consulting). He has taught at the School of Information, University of Michigan, and co-presented the first-ever advanced institutes for the Association of Canadian Archivists. Before 1998, he was a senior manager at the National Archives of Canada where he contributed to the appraisal and electronic records programmes for government records. He has published on every continent on a wide range of archival subjects; has conducted numerous workshops and seminars on appraisal, electronic records, and archival ethics across Canada and internationally; has engaged in extensive lecturing tours, especially of Australia and South Africa several times; and has served as General Editor of Archivaria as well as editor of two scholarly series\/journals of the Canadian Historical Association. His most recent publication activity has been editing the forthcoming Electronic Records Practice: Lessons from the National Archives of Canada and co-editing Imagining Archives: Essays by Hugh A. Taylor, With New Reflections, as well as working on books on the postmodern archive and the history of the National Archives of Canada. Richard Cox, University of Pittsburgh, Faculty rjcox111[at]comcast.net My research interests have been consistent over the past two decades and focus on the history of archives, recordkeeping, the archival mission, and the formation of the archival profession. As part of this interest, I often have become engaged in examining various trends in and challenges to archivists and their community. In the past decade, my attention has shifted to ethical and accountability issues in the work of archivists and the relationship between the archival impulse and public memory. I also have worked for a long time in investigating the shifts in the education of archivists, what I consider to be the most important archival function (appraisal), and changing recordkeeping technologies and all of the various issues generated by such changes. All of this builds off of a concern that the archivist is first and foremost a scholar of records and recordkeeping and that this scholarly pursuit is best carried out by interdisciplinary inquiry. Furthermore, I believe that the archival mission is not only about cultural and historical agendas, but that it involves the importance of records for evidence, accountability, and memory. As an educator, I believe that research and teaching is a synergic process, where one cannot be successful without the other. I seek to ground both masters and doctoral students in the research literature (and its strengths and weaknesses) about archives and archival work as a crucial part of building a knowledge foundation for their subsequent career. At present, I have two book-length projects I hope to complete in the next two years. One has the working title of Archival Anxiety and it focuses on the nature of professional calling, ethical issues, case studies in the failings of the profession to be stronger advocates for their mission, and critiques of current notions of professional activity such as in appraisal and representation. This book is a companion to several others I have written about the issues facing the archival community over the last two decades. The other book is a study about Lester J. Cappon has a pioneer public historian, building on his detailed personal diary maintained from 1954 through 1981 (the year he died). In many ways, Cappon was the model historian-archivist, easily moving between the disciplines of history, archival studies, and documentary editing and serving as a critic and commentator on all three. This book is tentatively organized to include chapters on his ideas about archives, his activity as a diarist (a records creator), as an educator, as an early public historian, as a documentary editor, as an expert on scholarly publisher, and as a collector. What intrigues me about Cappon are his struggles to come to terms with his professional and scholarly identity, issues that I believe remain present today (perhaps even in a more confused state). I am researching and writing about Cappon at the same age as he was writing his diary and entering into his most productive stage of scholarship. My research on Cappon is also, then, self-reflective about my own career and the state of the archival, historical, and documentary editing fields and the production of scholarly works. Amber Cushing, University of North Carolina, Chapel Hill, Graduate Student cushinga[at]email.unc.edu Amber Cushing is a doctoral student at the School of Information and Library Science at the University of North Carolina at Chapel Hill where she also serves as a research assistant for the Digccurr project and is currently co-teaching \u2015Access, Outreach and Public Service in Cultural Heritage Institutions in the MSLS\/MSIS program at UNCChapel Hill. Her current research interests include the thought process in which individuals engage as they attempt to curate and make value judgments about their personal digital archive as well as workforce issues in the archival field. Before entering the doctoral program in 2007, Cushing held the position of Librarian at the New Hampshire State Library, where she was the main contact person for manuscript and rare book inquires. Cushing holds an AB from Mount Holyoke College and an MLS with a concentration in archives management from Simmons Graduate School of Library and Information Science. She has completed internships at the Supreme Court of the United States and Harvard University Art Museums as well as a fellowship at the National Archives and Records Administration's Northeast Region. Morgan Daniels, University of Michigan, Graduate Student mgdaniel[at]umich.edu Morgan Daniels is a second year doctoral student in the School of Information at the University of Michigan. She has a BA in Sociology from Hampshire College and an MS in Information from the University of Michigan. Her professional background includes five years as an information specialist in corporate and law libraries. User studies in archives and museums, science and technology studies, and the intersections of these areas are primary among her research interests. Morgan has served as a research assistant on the Archival Metrics project, which developed standardized user-based evaluation tools for college and university archives. During this project, she gained a particular interest in the experiences of students in the archives and is developing two papers that make use of project data about student users. She is currently working as a research assistant on a project exploring collaboration, knowledge generation, and learning in an online scientific community, an opportunity to ex- plore information reuse issues through the framework of a specific online community of practice. Rebecca Dean, University of California, Los Angeles, Graduate Student becdean[at]gmail.com I am a doctoral student in the Department of Information Studies at UCLA with a concentration in Women's Studies. I received a BA from New York University and an MLIS at Pratt Institute. My research interests include critical and feminist approaches to notions of evidence, documentation, surveillance, infrastructure, and knowledge production. My current projects explore the issue of global public health surveillance through the case of documenting gender-based violence in humanitarian settings. Within this context is an opportunity to analyze and observe the intersectional politics and practices of information access and privacy rights as well as the role of standardization and classification in the monitoring of violence against women. I am also working on a community-based archival project that looks at the relationship between archives and feminist knowledge production in the case of transnational Filipina women's social movements. This research delves into postcolonial feminist notions of the archive and critiques of archival practices and paradigms. Before I started my doctoral education I was a librarian for the Brooklyn Public Library, and the digital resource specialist for the Gender-based Violence Unit at the International Rescue Committee. I currently work at the Center for the Study of Women at UCLA as a graduate student researcher. While pursuing a career in research and academia I stay deeply involved in activism, community organizing, and advocacy around the issue of labor and sex trafficking in addition to other human rights abuses against women. These experiences ground many of my research interests and inform my teaching and scholarship philosophy, which is to build a collective intellectual practice that examines the multitude and workings of power formations in politics, discourse, and practice. My aim is to engage in interdisciplinary research that achieves disciplinary objectives as well as community and human rights objectives. Lorraine (Lori) Dong, University of Texas at Austin, Graduate Student lorrie.d[at]gmail.com As a first-year doctoral student in preservation in the School of Information at the University of Texas at Austin (UT), I have been engaged in issues involving the protection and dissemination of cultural heritage for the past four years as a library employee and then as a graduate student. My appreciation of cultural artifacts as both objects and carriers of information, however, began during my time at the University of California, Berkeley, while studying English as an undergraduate. This deep respect continued while I pursued a Master's in Renaissance literature at the University of Cambridge. In addition to thinking about the ideas conveyed by the text, I used paleographic and bibliographic methods in order to gain insight into the historical context and provenance of books and manuscripts. After returning from England, I worked in the Preservation and Conservation Departments of the University Library at the University of Illinois, Urbana-Champaign. While there, I had the opportunity to work on a number of hands-on projects for the special and general collections, and government serials. Inspired by this work, I went on to earn a MSIS at UT with a focus in preservation administration. Through the generous support of an IMLS Preservation Doctoral Fellowship, I am now able to further pursue my research into the politics and socio-economic factors that affect international collaborations to preserve culture. My primary research interest is in the intersection of preservation, digitization, and access of cultural materials in developing countries. Scholarly research pertaining to these converging areas continues to be a growing field, especially when presented with the increasing demand for technological progress in non-first world countries and burgeoning nations. I am particularly interested in questions related to how to develop the ability of hosting institutions and organizations to manage and maintain cultural preservation initiatives, given the challenges of meeting the needs of their users while also facing limited resources and training. As a future faculty member of an information program, I would like to impart to students the importance of having well-planned and diligent preservation management in heritage institutions. Such diligence includes continually researching and evaluating new preservation methods and programs, maintaining strong communication with other cultural institutions, and staying responsive to the various needs of one's own institution. I believe in the value of students working on real-world projects within their communities because these activities provide them with heuristic experience as well as much-needed assistance to local archives, libraries, and museums. Currently, I am in the process of developing a curriculum for an undergraduate course I would like to teach next year at UT's School of Information on how cultural institutions in Austin, Texas, protect and care for heritage objects. My goal for the class is to inspire students who may not otherwise be exposed to heritage preservation to begin thinking about the decision-making and activities that must go on behind the scenes in order to protect our cultural past. Jean Dryden, University of Maryland, Faculty jdryden[at]umd.edu As a recent (2008) graduate of the doctoral program at the Faculty of Information at the University of Toronto, and having joined the faculty of the University of Maryland's i-School in August 2008 to teach in their Archives, Records, and Information Management specialization, I am a relative newcomer to the academic enterprise. However, I bring to this enterprise more than 25 years of professional experience as an archivist, archives administrator, and consultant; education and qualifications in librarianship and records management; and teaching experience at the graduate level. My research interests fall within two broad areas: copyright and digital heritage, and archival arrangement and description. My dissertation explored the copyright practices of Canadian repositories in digitizing their archival holdings and making them available on the Internet. Although practices vary greatly across the repositories studied, the research found that Canadian repositories' copyright practices in making their holding available online are more restrictive than copyright law envisages (1). Little research addressing how cultural heritage institutions operate within the constraints of copyright, particularly in the digital environment, is yet available; my dissertation suggests a number of fruitful areas for further investigation. After transforming my dissertation into a series of articles in order to disseminate my findings, I plan to continue to explore whether, and in what ways, copyright is a barrier to making cultural heritage available online by looking at aspects of the copyright practices of cultural heritage institutions, ongoing management and preservation of digital objects, and how users of heritage material deal with copyright. The second area of research interest arises out of my longstanding experience with the development of standards for the description of archival material, including my participation in the development of archival descriptive standards in Canada, and my experience as the manager of a project to produce a new standard for archival description (2). This work has made me realize how little we know about archival arrangement and description, and has raised a number of questions to be investigated, including archival arrangement, the development and institutional implementation of standards for archival description, and the representation of extent within archival description. Teaching Approach: While my teaching philosophy continues to evolve, it has matured considerably since my first teaching efforts, in which my goal was to fill those empty vessels (the students) with everything I knew. Not surprisingly, I had far too much material, the students were glassy-eyed, and I have since changed my approach. Realizing that most learning takes place outside the classroom, I have learned that my teaching is far more effective if my approach is to engage students in the topic, and encourage them to think about the issues through classroom discussion based on questions and real-life situations, and through carefully crafted assignments. In my view, excellent teaching is based upon mastery of the subject, thorough preparation, respect for students, and clear and consistent expectations of them. Within that framework, however, I am also mindful that preparing students for careers as effective stewards of digital objects presents a number of challenges in an environment in which we are still attempting to discover and establish standards and best practices. Given the pace of technological change, it is more important than ever that students learn to apply principles to evolving circumstances, think critically, and recognize the need for life-long learning. 1. Jean E. Dryden, \u2015Copyright in the Real World: Making Archival Material Available on the Internet. Ph.D. diss., University of Toronto, 2008, 244. (https:\/\/tspace.library.utoronto.ca\/) 2. Describing Archives: A Content Standard (Chicago: Society of American Archivists, 2004). Yanan Du, University of California, Los Angeles, Graduate Student bdd_duyanan[at]yahoo.com.cn Biography not submitted. Wendy Duff, University of Toronto, Faculty wendy.duff[at]utoronto.ca I obtained my BA (1979) from the University of Kings College, my MLS (1983) from Dalhousie University and my Ph.D. (1996) from the University of Pittsburgh. I am the Director of the Digital Duration Institute, and teach archives and records management with a focus on access to archival materials. I am a founding member of AX-NET, an evolving international team of researchers interested in facilitating access to primary materials. I have also served as a member of the ICA Adhoc Commission on Descriptive Standards, the Encoded Archival Description Working Group, and The Canadian Council of Archives Standards Committee. My research interests are user studies, archival metadata, and collaboration among libraries, archives and museums. My current research focuses on the development of generic user-based evaluation tools, the information seeking behaviour of archival users, archival reference and information technology needs of museum workers."} +{"id":"RedPajamaCommonCrawl.0001","text":"Egypt: Islamists hit Christian churches...3 Nuns Paraded as captives..! by: HAMZA HENDAWI CAIRO (AP) \u2014 After torching a Franciscan school, Islamists paraded three nuns on the streets like \"prisoners of war\" before a Muslim woman offered them refuge. Two other women working at the school were sexually harassed and abused as they fought their way through a mob. In the four days since security forces cleared two sit-in camps by supporters of Egypt's ousted president, Islamists have attacked dozens of Coptic churches along with homes and businesses owned by the Christian minority. The campaign of intimidation appears to be a warning to Christians outside Cairo to stand down from political activism. Christians have long suffered from discrimination and violence in Muslim majority Egypt, where they make up 10 percent of the population of 90 million. Attacks increased after the Islamists rose to power in the wake of the 2011 Arab Spring uprising that drove Hosni Mubarak from power, emboldening extremists. But Christians have come further under fire since President Mohammed Morsi was ousted on July 3, sparking a wave of Islamist anger led by Morsi's Muslim Brotherhood. Nearly 40 churches have been looted and torched, while 23 others have been attacked and heavily damaged since Wednesday, when chaos erupted after Egypt's military-backed interim administration moved in to clear two camps packed with protesters calling for Morsi's reinstatement, killing scores of protesters and sparking deadly clashes nationwide. One of the world's oldest Christian communities has generally kept a low-profile, but has become more politically active since Mubarak was ousted and Christians sought to ensure fair treatment in the aftermath. Many Morsi supporters say Christians played a disproportionately large role in the days of mass rallies, with millions demanding that he step down ahead of the coup. Despite the violence, Egypt's Coptic Christian church renewed its commitment to the new political order Friday, saying in a statement that it stood by the army and the police in their fight against \"the armed violent groups and black terrorism.\" While the Christians of Egypt have endured attacks by extremists, they have drawn closer to moderate Muslims in some places, in a rare show of solidarity. Hundreds from both communities thronged two monasteries in the province of Bani Suef south of Cairo to thwart what they had expected to be imminent attacks on Saturday, local activist Girgis Waheeb said. Activists reported similar examples elsewhere in regions south of Cairo, but not enough to provide effective protection of churches and monasteries. Waheeb, other activists and victims of the latest wave of attacks blame the police as much as hard-line Islamists for what happened. The attacks, they said, coincided with assaults on police stations in provinces like Bani Suef and Minya, leaving most police pinned down to defend their stations or reinforcing others rather than rushing to the rescue of Christians under attack. View gallery.\" Another Christian activist, Ezzat Ibrahim of Minya, a province also south of Cairo where Christians make up around 35 percent of the population, said police have melted away from seven of the region's nine districts, leaving the extremists to act with near impunity. Two Christians have been killed since Wednesday, including a taxi driver who strayed into a protest by Morsi supporters in Alexandria and another man who was shot to death by Islamists in the southern province of Sohag, according to security officials, who spoke on condition of anonymity because they weren't authorized to release the information. The attacks served as a reminder that Islamists, while on the defensive in Cairo, maintain influence and the ability to stage violence in provincial strongholds with a large minority of Christians. Gamaa Islamiya, the hard-line Islamist group that wields considerable influence in provinces south of Cairo, denied any link to the attacks. The Muslim Brotherhood, which has led the defiant protest against Morsi's ouster, has condemned the attacks, spokesman Mourad Ali said. Sister Manal is the principal of the Franciscan school in Bani Suef. She was having breakfast with two visiting nuns when news broke of the clearance of the two sit-in camps by police, killing hundreds. In an ordeal that lasted about six hours, she, sisters Abeer and Demiana and a handful of school employees saw a mob break into the school through the wall and windows, loot its contents, knock off the cross on the street gate and replace it with a black banner resembling the flag of al-Qaida. By the time the Islamists ordered them out, fire was raging at every corner of the 115-year-old main building and two recent additions. Money saved for a new school was gone, said Manal, and every computer, projector, desk and chair was hauled away. Frantic SOS calls to the police, including senior officers with children at the school, produced promises of quick response but no one came. The Islamists gave her just enough time to grab some clothes. In an hourlong telephone interview with The Associated Press, Manal, 47, recounted her ordeal while trapped at the school with others as the fire raged in the ground floor and a battle between police and Islamists went on out on the street. At times she was overwhelmed by the toxic fumes from the fire in the library or the whiffs of tears gas used by the police outside. Sister Manal recalled being told a week earlier by the policeman father of one pupil that her school was targeted by hard-line Islamists convinced that it was giving an inappropriate education to Muslim children. She paid no attention, comfortable in the belief that a school that had an equal number of Muslim and Christian pupils could not be targeted by Muslim extremists. She was wrong. The school has a high-profile location. It is across the road from the main railway station and adjacent to a busy bus terminal that in recent weeks attracted a large number of Islamists headed to Cairo to join the larger of two sit-in camps by Morsi's supporters. The area of the school is also in one of Bani Suef's main bastions of Islamists from Morsi's Muslim Brotherhood and ultraconservative Salafis. \"We are nuns. We rely on God and the angels to protect us,\" she said. \"At the end, they paraded us like prisoners of war and hurled abuse at us as they led us from one alley to another without telling us where they were taking us,\" she said. A Muslim woman who once taught at the school spotted Manal and the two other nuns as they walked past her home, attracting a crowd of curious onlookers. \"I remembered her, her name is Saadiyah. She offered to take us in and said she can protect us since her son-in-law was a policeman. We accepted her offer,\" she said. Two Christian women employed by the school, siblings Wardah and Bedour, had to fight their way out of the mob, while groped, hit and insulted by the extremists. \"I looked at that and it was very nasty,\" said Manal. The incident at the Franciscan school was repeated at Minya where a Catholic school was razed to the ground by an arson attack and a Christian orphanage was also torched. \"I am terrified and unable to focus,\" said Boulos Fahmy, the pastor of a Catholic church a short distance away from Manal's school. \"I am expecting an attack on my church any time now,\" he said Saturday. Bishoy Alfons Naguib, a 33-year-old businessman from Minya, has a similarly harrowing story. Egyptians walk in the ruins of the Evangelical Church of Malawi after it was ransacked, looted and b \u2026 His home supplies store on a main commercial street in the provincial capital, also called Minya, was torched this week and the flames consumed everything inside. \"A neighbor called me and said the store was on fire. When I arrived, three extremists with knifes approached me menacingly when they realized I was the owner,\" recounted Naguib. His father and brother pleaded with the men to spare him. Luckily, he said, someone shouted that a Christian boy was filming the proceedings using his cell phone, so the crowd rushed toward the boy shouting \"Nusrani, Nusrani,\" the Quranic word for Christians which has become a derogatory way of referring to them in today's Egypt. Naguib ran up a nearby building where he has an apartment and locked himself in. After waiting there for a while, he left the apartment, ran up to the roof and jumped to the next door building, then exited at a safe distance from the crowd. \"On our Mustafa Fahmy street, the Islamists had earlier painted a red X on Muslim stores and a black X on Christian stores,\" he said. \"You can be sure that the ones with a red X are intact.\" In Fayoum, an oasis province southwest of Cairo, Islamists looted and torched five churches, according to Bishop Ibram, the local head of the Coptic Orthodox church, by far the largest of Egypt's Christian denominations. He said he had instructed Christians and clerics alike not to try to resist the mobs of Islamists, fearing any loss of life. A damaged object lies on the floor of the Malawi Antiquities Museum after it was ransacked and loote \u2026 \"The looters were so diligent that they came back to one of the five churches they had ransacked to see if they can get more,\" he told the AP. \"They were loading our chairs and benches on trucks and when they had no space for more, they destroyed them.\" Coptic Christians praying in their burned out Church...! Coptic Christians praying in their church, burned and destroyed by the Obama supported Muslim Brotherhood. Over 40 churches have been burned in the last 24 hours. The Egyptian Army leaders have said they will 'dismantle' the Muslim Brotherhood, and will rebuild the Coptic Christian Churches. Prayers sent for the Coptic Christians in Egypt...the American people stand strong with you even if our president doesn't. Maryam Rustampoor and Marzieh Amirizadeh...tales from Tehran's Evin prison [Maryam Rustampoor and Marzieh Amirizadeh ] [ Tehran's Evin prison (photo: Radio Free Europe \/ Radio Liberty) ] oped: edited shortened version from\/ by:Chelsea Schilling After millions of prayers and numerous petitions from around the world, two Iranian women jailed for no other reason than being Christian were released from a Tehran prison today. Maryam Rustampoor and Marzieh Amirizadeh were imprisoned for 259 days \u2013 They were repeatedly told to recant their faith and that they would be executed as \"apostates,\" solely because they are Christians. Both were set free November 19,2009 and are making the circuit telling their story...both appeared on the Mike Huckabee Show [Fox News] today. Compass Direct News noted that the women may still face charges of proselytizing and \"apostasy,\" or leaving Islam. An Iranian source told Compass the Iranian government faced intense public pressure for imprisoning the women. \"It was from the international pressure, and also the government couldn't handle it anymore,\" said the source. \"Already their detention was illegal. At the same time, the government wasn't ready to prosecute them for apostasy. They already have many headaches. They cannot handle everything.\" According to Facebook groups that support the women, Rustampoor and Amirizadeh had been participating in religious gatherings and handing out Bibles prior to their detention. Iranian security officials searched their apartments in March, confiscated their Bibles and arrested them. As WND reported, Rustampoor and Amirizadeh appeared before a court in Iran and were charged with \"crimes of apostasy, and propagation of the Christian faith.\" In a display of raw courage, they told a government prosecutor that not only are they Christian, it is up to God, not a bureaucrat, to whom He talks. According to Elam, a dramatic part of the hearing came when they refused to deny their Christian faith. They explained that God had convicted them through the Holy Spirit. \"It is impossible for God to speak with humans,\" Haddad, a deputy prosecutor identified only by his surname, stated. \"Are you questioning whether God is Almighty?\" Amirizadeh asked him. To which Haddad then replied. \"You are not worthy for God to speak to you.\" \"It is God, and not you, who determines if I am worthy,\" she said. Haddad earlier had asked if the women were Christian. \"We love Jesus,\" they replied. \"You were Muslims and now you have become Christians,\" Haddad stated. \"We were born in Muslim families, but we were not Muslims,\" the women said. The deputy prosecutor asked about their regrets, and they said, \"We have no regrets.\" \"You should renounce your faith verbally and in written form,\" he warned. They refused. According to various reports, both woman suffered from lack of proper health care after they became sick and lost weight during their prison stay. They were subjected to solitary confinement and extended interrogations, with health problems resulting. According to an October Elam report, both women had become frail with ill health, and Rostampour recently had a severe bout with food poisoning. Amirizadeh suffered from ongoing problems with her spine, an infected tooth and severe headaches. Mission Network News reported the women have been in an overcrowded cell with more than 20 women. Evin prison is notorious for its hanging executions and brutal torture tactics. It is the same facility where Iranian-Canadian photojournalist Zahra Kazemi died only three weeks after she was arrested for simply photographing the prison during a student protest in 2003. According to CBC News, Iranian officials claimed she had died after suffering a stroke while she was being interrogated. Kazemi showed signs of torture, including evidence of a brutal rape, skull fracture, broken fingers, missing fingernails, crushed toe, broken nose, severe abdominal bruising, head swelling, bruising, deep scratches on the neck and evidence of flogging on her legs. Under Shariah law, the penalty for apostasy often is death or life imprisonment. According to reports about the punishment system within Iran, for women the execution often is preceded by rape. Read the full story : http:\/\/www.wnd.com\/2009\/11\/116259\/ Obama ..Man,myth,God,Satan,the 12th Imam,or the Duke of Earl...? Dunno for sure but Barry sure tries to claim all titles...he has made a mess of the USA and still sings his so boring song...you be the Judge: https:\/\/myoutube.com\/watch?=pkU6E1v4bhw My best guess would be 'The Great Pretender' Though silent, Israel remains worried by Egypt upheaval By Allyn Fisher-Ilan JERUSALEM (Reuters) - Israel has looked on at upheaval in Egypt largely in silence, keen to avoid disrupting strategic security cooperation with a military it sees as critical to curbing attacks by Islamist militants in neighboring Sinai, officials and analysts said. Prime Minister Benjamin Netanyahu had aides instruct cabinet ministers to avoid public comment about Egypt, according to an official who spoke on condition of anonymity. \"Israel and the United States see the situation in Egypt very, very differently and justifiably the prime minister wouldn't want Israeli cabinet ministers to publicly criticize American policy,\" Giora Eiland, a former national security adviser, said on Channel 2 television. In private, one senior Israeli official expressed alarm at U.S. President Barack Obama's condemnation of the bloodshed in Egypt and cancellation of a joint military exercise with Cairo. \"Eyebrows have been raised,\" the official said. Israel worries that any sign of wavering U.S. support for Egypt's military may embolden Islamist militants sympathetic with the Muslim Brotherhood, ousted by the Egyptian army after a year in power. Eiland backed the crackdown by Egyptian army chief General Abdel Fattah al-Sisi on the Brotherhood this week. \"Sisi in the situation he faced, had no choice but to do what he did,\" said Eiland, adding he thought Western outrage at the scale of the bloodshed was understandable. Almost 800 people have been killed so far. Israel wants to avoid any disruption of its security cooperation with Egypt, which stems from a 1979 peace treaty - the first of only two such accords between Israel and Arab countries. Military ties with Egypt have helped Israel strategically in a region where it is otherwise largely isolated, as well as rein in weapons smuggling to Palestinian militants in Gaza, which is ruled by Islamist group Hamas. That cooperation has remained intact despite turmoil since Hosni Mubarak was toppled in 2011. Both sides are anxious to curb growing lawlessness in Sinai and Eiland said intelligence officials continued to work together to curb attacks from Sinai. Israel says rocket strikes one towns across its southern border have increased from Sinai. An Israeli missile shield shot down a rocket fired at the resort of Eilat earlier this week. Magles Shoura al-Mujahideen, a hardline Islamist group, said it carried out the attack in retaliation for the deaths of four militants in an airstrike in Sinai a week ago. Israel denies any role in that attack. Eiland did not rule out \"a one-off Israeli action\" to take out a rocket launcher if Egypt were unable to prevent an attack in time, but thought Israel could rely on Egypt's military. Egypt considers outlawing Muslim Brotherhood by: MAGGIE MICHAEL and TONY G. GABRIEL CAIRO (AP) \u2014 Egyptian authorities are considering disbanding the Muslim Brotherhood group, a government spokesman said Saturday, once again outlawing a group that held the pinnacle of government power just more than a month earlier. The announcement comes after security forces broke up two sit-in protests this week by those calling for the reinstatement of President Mohammed Morsi, a Brotherhood leader deposed in a July 3 coup. The clashes killed more than 600 people that day and sparked protests and violence that killed 173 people Friday alone. Cabinet spokesman Sherif Shawki said that Prime Minister Hazem el-Beblawi, who leads the military-backed government, assigned the Ministry of Social Solidarity to study the legal possibilities of dissolving the group. He didn't elaborate. The Muslim Brotherhood group, founded in 1928, came to power a year ago when its Morsi was elected in the country's first free presidential elections. The election came after the overthrow of autocrat Hosni Mubarak in a popular uprising in 2011. The fundamentalist group has been banned for most of its 80-year history and repeatedly subjected to crackdowns under Mubarak's rule. While sometimes tolerated and its leaders part of the political process, members regularly faced long bouts of imprisonment and arbitrary detentions. Egyptians security forces provide a cordon around the al-Fatah mosque, after hundreds of Muslim Brot \u2026 Since Morsi was deposed in the popularly backed military coup, the Brotherhood stepped up its confrontation with the new leadership, holding sit-ins in two encampments for weeks, rallying thousands and vowing not to leave until Morsi is reinstated. On Wednesday, security authorities swept through the two protest camps, leaving hundreds killed and thousands others injured. The violent crackdown sparked days of street violence across the country where Islamist supporters stormed and torched churches and police stations. In the most recent standoff, Egyptian security forces exchanged heavy gunfire Saturday with armed men at top of a minaret of a Cairo mosque. The security forces fired tear gas, stormed the mosque and rounded up hundreds of Islamists supporters of Morsi who had been barricaded inside overnight. The confrontations Friday \u2014 around a Brotherhood call for a \"Day of Rage\" \u2014 killed at least 173 people, said Shawki, the Cabinet spokesman. He said 1,330 people were wounded in the protests. Egypt's Interior Ministry said in a statement that a total of 1,004 Brotherhood members were detained in raids across the country and that weapons, bombs and ammunition were confiscated with the detainees. A group of Egyptians gather at the al-Fatah mosque, after hundreds of Muslim Brotherhood supporters \u2026 Among the dead Friday was Ammar Badie, a son of Brotherhood spiritual leader Mohammed Badie, the group's political arm said in a statement. Also Saturday, authorities arrested the brother of al-Qaida chief Ayman al-Zawahri, a security official said Saturday. Mohammed al-Zawahri, leader of the ultraconservative Jihadi Salafist group, was detained at a checkpoint in Giza, the city across the Nile from Cairo, the official said. The official spoke on condition of anonymity as he wasn't authorized to brief journalists about the arrest. Curing The Liberals' Disease Join Dr. Ben as he diagnoses the worst ailment America has ever suffered. Get well soon with The Great Eight, from the Personal Liberty Digest\u2122! JakeBlakeProject They're not just Liberals aka Libtards anymore, Skippy... They're freaking Fascists or full-fledged Communists... The coup d' etat was a success... They own the WH, and much, much more... http:\/\/youtu.be\/yZrsEB1GAzA How The Corrupt Establishment Is Selling Moral Bankruptcy To America by Brandon Smith Morality is a highly misunderstood component of human nature. Some people believe they can create moral guidelines from thin air based on their personal biases and prejudices. Some people believe that morality comes from the force of bureaucracy and government law. Still, others believe that there is no such thing; that morality is a facade created by men in order to better grease the wheels of society. All of these world views discount the powerful scientific and psychological evidence surrounding Natural Law \u2014 the laws that human beings form internally due to inherent conscience, regardless of environmental circumstances. When a person finally grasps inborn morality, the whole of the world comes into focus. The reality is that we are not born \"good\" or \"evil.\" Rather, we are all born with the capacity for good AND evil, and this internal battle stays with us until the end of our days. Every waking moment we are given a choice, a test of our free will, to be ruled by desire and fear, or to do what we know at our very core is right. When a man silences his inner voice, the results can be terrible for him and those around him. When an entire culture silences its inner voice, the results can be catastrophic. Such a shift in the moral compass of a society rarely takes place in a vacuum. There is always a false shepherd, a corrupt leadership that seeks to rule. Rulership, though, is difficult in the face of an awake population that respects integrity and honor. Therefore criminals must follow these specific steps in order to take power: Pretend To Be Righteous: They must first sell the public on the idea that they hold the exact same values of natural law as everyone else. The public must at first believe that the criminal leaders are pure in their motives and have the best interests of the nation at heart, even if they secretly do not. Pretend To Be Patriotic: Despots often proclaim an untarnished love of their homeland and the values that it was founded upon. However, what they really seek is to become a living symbol of the homeland. They insist first that they are the embodiment of the national legacy, and then they attempt to change that national legacy entirely. A corrupt government uses the ideals of a society to acquire a foothold, and when they have gained sufficient control, they dictate to that society a new set of ideals that are totally contrary to the original. Offer To \"Fix\" The Economy: Tyrants do not like it when the citizens under them are self sufficient or economically independent. They will use whatever methods are at their disposal including subversive legislation, fiat currency creation, corporate monopoly and even engineered financial collapse in order to remove the public's ability to function autonomously. They will begin this process under the guise that the current less-controlled and less-centralized system is \"not safe enough,\" and that they have a better way to ensure prosperity. Offer To Lend A Hand: Once the population has been removed from its own survival imperative and is for the most part helpless, the criminal leadership moves in and offers to \"help\" using taxation and money creation, slowly siphoning the wealth from the middle class and raising prices through inflation. Eventually, everyone will be \"equal\"; equally poor that is. In the end, the whole nation will see the rulership as indispensable, for without them, the economy would no longer exist and tragedy would ensue. Create External Fear: Once in place, the criminal leadership then conjures an enemy for the people, or multiple enemies for the people. The goal here is to create a catalyst for mass fear. When the majority of people are afraid of an external threat, they will embrace the establishment as a vital safeguard. When a society becomes convinced that it cannot take care of itself economically, little coaxing is required to convince them that they are also not competent enough to take care of their own defense. At this point, the establishment has free reign to dissolve long cherished freedoms while the masses are distracted by a mysterious threat hiding somewhere over the horizon. Create Internal Fear: They move the threat from over the horizon, right to the public's front door, or even within their own home. The enemy is no longer a foreigner. Now, the enemy is the average looking guy two houses over, or an outspoken friend, or even a dissenting family member. The enemy is all around them, according to the establishment. The public is sold on the idea that the sacrifice needed in order to combat such a pervasive \"threat\" is necessarily high. Sell The People On The Virtues Of Moral Relativism: Now that the populace is willing to forgo certain liberties for the sake of security, they have been softened up enough for reprogramming to begin. The establishment will tell the people that the principles they used to hold so dear are actually weaknesses that make them vulnerable to the enemy. In order to defeat an enemy so monstrous, they claim, we must become monstrous ourselves. We must be willing to do ANYTHING, no matter how vile or contrary to natural law, in order to win. Honesty must be replaced with deceit. Dissent must be replaced with silence. Peace must be replaced with violence. The independent should be treated with suspicion. The outspoken treated with contempt. Women and children are no longer people to be protected, but targets to be eliminated. The innocent dead become collateral damage. The innocent living become informants to be tortured and exploited. Good men are labeled cowards because they refuse to \"do what needs to be done,\" while evil men are labeled heroes for having the \"strength of will\" to abandon their conscience. Thus, the criminal leadership makes once honorable citizens accomplices in the crime. The more disgusting the crime, the more apt the people will be to defend it and the system in general, simply because they have been inducted into the dark ceremony of moral ambiguity. The actions of the state become the actions of all society. A single minded collectivist culture is born, one in which every person is a small piece of the greater machine. And, that which the machine is guilty of, every man is guilty of. Therefore, it becomes the ultimate and absurd purpose of each person within the system to DENY the crime, deny the guilt, and make certain that the machine continues to function for generations to come. Though we have already passed though most of the above stages, Americans are still not yet quite indoctrinated into the realm of moral relativism. This is, though, swiftly changing. The Current Sales Pitch Just take a look at the attitude of the Barack Obama Administration and the mainstream media towards Edward Snowden and his recent asylum approved by Russia. The White House, rather than admitting wrongdoing in its support for the NSA's mass surveillance of American citizens without warrant, or even attempting to deny the existence of the PRISM program, is now instead trying to promote NSA spying as essential to our well being, and wag a shaming finger at Snowden and the Russian government for damaging their domestic spy network. Obama lamented on Russia's stance, stating that their thinking is \"backwards.\" Did I miss something here? I'm no fan of the Russian oligarchy, but shouldn't Obama and most of the NSA (let alone every other Federal alphabet agency) be sitting in a dark hole somewhere awaiting trial for violating the Constitution on almost every level? Yet, we are instead supposed to despise Snowden for exposing the crime they committed and distrust any country that happens to give him shelter? Due to public outcry, Obama has attempted to pacify critics by announcing plans to make NSA mass surveillance \"more transparent\". First, I would like to point out that he did not offer to end NSA spying on Americans without warrant, which is what a President with any ounce of integrity would have done. Second, Obama's calls for more transparency have come at the exact same time as the NSA announces its plans to remove 90 percent of its systems administrators to make sure another \"Snowden incident\" does not occur. Does this sound like an agency that plans on becoming \"more transparent\"? Second, would Obama have called for ANY transparency over the NSA whatsoever if Snowden had never come forward? Of course not! The exposure of the crime has led to lies and empty placation, nothing more. In the meantime, numerous other political miscreants have hit the media trail, campaigning for the NSA as well as other surveillance methods, bellowing to the rafters over the absolute necessity of domestic spy programs. Fifteen years ago, the government would have tried to sweep all of this under the rug. Today, they want to acclimate us to the inevitability of the crime, stating that we had better get used to it. Their position? That Snowden's whistleblowing put America at risk. My questions is, how? How did Snowden's exposure of an unConstitutional and at bottom illegal surveillance program used against hundreds of millions of innocent Americans do our country harm? Is it the position of the White House that the truth is dangerous, and deceit is safety? I suspect this is the case considering the recent treatment of military whistleblower Bradley Manning, who has been accused by some to have \"aided Al Qaeda's recruiting efforts\" through his actions. How did Manning do this? By releasing information, including battlefield videos, that were hidden from the public containing proof of U.S. war crimes in Iraq and Afghanistan. Perhaps I'm just a traditionalist and not hip to modern diplomatic strategy, but I would think that if you don't want to be blamed for war crimes, then you probably shouldn't commit war crimes. And, if you don't want the enemy to gain new recruits, you should probably avoid killing innocent civilians and pissing off their families. Just a thought. So, just to keep track, U.S. government commits war crimes, but is the good guy. Bradley Manning exposes war crimes, and is the bad guy. Moral relativism at its finest. Moving on\u2026 The shift towards moral bankruptcy is being implemented in the financial world as well. Investors, hedge funds, and major banks now surge into the stock market every time the private Federal Reserve hints that it may continue fiat stimulus. When bad news hits the mainstream feeds, people playing the Dow casino actually cheer with glee, exactly because bad economic news means more QE from the Fed. They know that the Fed is artificially propping up the markets. The Fed openly admits that it does this. And they know that our fiscal system is hanging by a thin thread. And you know what, very few of them care. The Fed created the collapse with easy money and manipulated interest rates, and now, some people cheer them as the heroes of the U.S. financial structure. The American narrative is quickly changing. There has long been criminality and degeneracy within our government and the corporate cartels surrounding it, but I believe what we are witnessing today is the final step in the metamorphosis that is totalitarianism. The last stage accelerates when the average citizen is not just complicit in the deeds of devils, but when he becomes a devil himself. When Americans froth and stomp in excitement for the carnival of death, and treat the truth as poison, then the transformation will be complete. Bad news for our 'Muslim' president by: Larry Klayman Finally, there is good news in the Middle East. The Egyptian military, having removed the Muslim Brotherhood President Mohamed Morsi after he and his terrorist group hijacked the democratic process, is now in the act of systematically destroying this Islamic cancer on the Arab state's secular body politic. But the good news for Egypt and by extension Israel, its Jewish neighbor, is bad news for Barack Hussein Obama, our so-called \"Muslim president.\" In a statement issued yesterday from the stronghold of the left, Martha's Vineyard, where the \"mullah in chief\" is vacationing on our dime, Obama bellowed, \"The United States strongly condemns the steps taken by the Egyptian interim government and security forces.\" In so doing, Obama also canceled yearly and crucial national security joint defense exercises with the Egyptian military. This is an outrage; for once strong action is taken to snuff out the Muslim Brotherhood, the granddaddy of all Islamic terrorist groups and the parent that houses al-Qaida, and our president condemns it, leaving no doubt where his loyalties lie \u2013 not that we needed any further proof after five years of his bowing down to Saudi kings, endorsing the Ground Zero Mosque, disrespecting Israeli Prime Minister Benjamin Netanyahu, doing all he can to harm Israel and a host of other anti-Semitic and anti-Christian actions by him and his administration. But this condemnation is the pinnacle of his pro-Muslim efforts to aid the Islamic revolution at the expense of Jews and Christians and our national security interests in the Middle East and worldwide. Obama's decidedly pro-Islamic policies are regrettably not limited to the fate of Egypt or Israel, for that matter. They have also crept into the way our nation has been and is fighting wars in the Middle East, most notably in Afghanistan. There, the overriding modus operandi of our military operations is not to win the war by killing as many Muslim jihadists as is necessary to clean out this Islamic terrorist rat hole run by the Taliban, but to \"win the hearts and minds\" of the enemy. Indeed, the military's rules of engagement for our servicemen so state, with even the inexplicably revered Gen. David Petraeus having written this to all the Armed Forces. These rules of engagement, which are consistent with Obama's policies toward the Muslim world, are why our fighting men and women are dying and being maimed at alarmingly increasing per capita rates in Afghanistan and elsewhere. By way of stark example, these rules of engagement, and the paranoiac deference paid to Muslims in battle, contributed greatly to the death of 30 U.S. servicemen, including 22 Navy SEALs and other special ops forces in the shoot down by the Taliban of a Chinook helicopter in Afghanistan shortly after Osama bin Laden was killed by SEAL Team VI. Prevented from engaging in pre-assault fire in particular, the 22 special ops who died on Aug. 6, 2011, were sitting ducks for the Taliban, who wanted badly to have a SEAL Team VI Judeo-Christian trophy in retaliation for the killing of their leader, Osama bin Laden. And, sure enough, they got it \u2013 likely handed to them on a silver platter by our own \"leader,\" whose administration not only revealed that SEAL Team VI had been the special ops who took out bin Laden to boost Obama's re-election prospects in the fall of 2012, but also failed to take preventive steps to safeguard these heroes from terrorist retaliation after this target was placed on their backs. This matter is currently under a congressional inquiry by the House Government Oversight and Reform Committee, as well as my efforts on behalf of SEALs and other special ops surviving family members to obtain all of the facts leading up to and which caused this tragedy. See www.freedomwatchusa.org. But the sad moral to this and other stories of their kind is that Obama and his pro-Muslim administration's coddling of Islamic interests is not only an affront to the Egyptian people and Israel, whose security forces have been working hand in hand with the Egyptian military after the ouster of Morsi, but to our own fighting men and women. The hard reality is that our nation, not just Egypt pre-Morsi, has been hijacked by Islam and our president is the leader of this Muslim revolution. It is no wonder Muslims have just in the last few days felt emboldened to declare that they will wage a \"Million Man Muslim March\" in Washington, D.C., this Sept. 11. They have been given a virtual green light to do so by the mullah in chief. And, even if he does not show his devilish face at this highly provocative demonstration of the growing Islamic influence in the United States and abroad, Obama will be there with his fellow Muslims in spirit. Perhaps Obama fears what the Egyptian military has done to Morsi and his Muslim Brotherhood because he knows that the American people and its military, who have been sacrificed to \"win the hearts and minds\" of the enemy, may one day rise up and oust him and his comrades. One can only pray \u2013 not to Allah, but to our Lord and Savior \u2013 that justice will be done and that We the People will soon be liberated from this modern-day pharaoh. While Obama's political opposition is no Moses, we hold our own future in our hands and must act soon before all is lost. Help Larry Klayman with his class-action suit against Obama's use of the NSA to violate Americans' rights A Chilly Place for the President by: Bill O'Reilly JUNEAU, Alaska -- Up here, many folks don't much like President Obama's vision of a big government colossus dictating health care, doling out entitlements and generally meddling in the affairs of the citizenry. Alaska voted against Obama by 14 percentage points in 2012, and if another election were held today, the anti-Obama vote would most likely be higher. This is a tough self-reliant state. The weather is harsh and expenses are high. But there is work. With a 6.1 percent unemployment rate, Alaska is doing much better than the nation as a whole (7.6 percent). The median household income in the 49th state is $69,000 -- $16,000 higher than the national average. Historically, Alaska is a place that attracts those who are fed up with conventionality. On my trip here, I did not see one person dressed in a jacket and tie. The prevailing wisdom promotes individuality. Alaskans are basically \"leave me alone\" types who respect and embrace different strokes. Maybe it's because nature is right on top of them that the folks don't seem to care much for trends. The weather changes dramatically and quickly, there are far more dirt than paved roads, and wild animals are everywhere. Nobody is really interested in the latest fashion when you can be snowed in for weeks at a time. I mean, who's gonna see you? With a population of 731,000, Alaska is ranked 47th in size, only beating out North Dakota, Vermont and Wyoming. Of course, Alaska is the largest state in the union by far, so there is plenty of space to get away from the trappings of modern America. Most everybody has a gun -- there are big bears around -- and the majority of folks are happy not to be dealing with bureaucracies. The Alaska mentality is directly opposite the federal intrusion that is being fostered by the Obama administration. Mention Obamacare, and you'll likely get icy stares, even in the summer. And while poor people do receive entitlements, and the oil industry kicks in some money for the folks, few Alaskans are asking for handouts. This is an old-fashioned place that still embraces the Klondike mentality: Take chances, and maybe you'll hit it big. But if you don't, don't whine about it. Alaska has some of the best scenery in North America, but it is the spirit of rugged individualism that I found most interesting. Capitalism is firmly embraced, and hard work is the order of the day. I visited a tourist dog-sledding site on top of a glacier where the young employees stay for weeks at a time. No showers, no computers, no TV. They make some good money but pay the price. And they seem happy to be up there, far away from the BS that's floating around this nation. There is something to be said for living life on your own terms. Many Americans simply don't want the pinheads in Washington or the various state capitals telling us how to live. But we are absolutely moving in that direction. Obama is hell-bent on imposing a bureaucracy that levels all playing fields at great expense to coin and freedom. Visit Alaska if you get a chance. It's far away from everything but well worth the trip. This is America the way it used to be. And the way things are going in the Lower 48, the way it used to be is likely gone forever. Christian Churches Attacked, Burn All Over Egypt oped: Just imagine if Mosques were being burned...The Obama administration would be on air...calling this a hate crime against Allah and Muhammad...the silence from Barry Barack Hussein Soetoro Davis Obama is deafining...! (Illustration: Prince Tadros church in Minya is now burning by protesters loyal to Ousted Morsi) List of churches that have been attacked: 1 \u2013 The Church of the Virgin Mary and Anba Abram of the Copts Orthodox village Dljh, the center of Deir Mawas, Minya Governorate burning church and demolished. 2 \u2013 The Church of St. Mina Coptic Orthodox neighborhood of Abu Hilal Kebly Minya Governorate burning church 3 \u2013 St. George's Church Copts \u0627\u0644\u0627\u0631\u062b\u0648\u0632\u0643\u0633 the land of the archbishopric, Sohag Governorate burning church 4 \u2013 Center Baptist Church Bani Mazar, Minya Governorate burning church 5 \u2013 Church of Our Lady of Copts \u0627\u0644\u0623\u0631\u062b\u0648\u0632\u0643\u0633 the village Nazlah, Yusuf Center, Fayoum governorate burning the church \u2026 6 \u2013 Monastery of the Sisters of the Good Shepherd + school Suez burning 7 \u2013 Church Street parents Alfrencescan the Suez burning 23 8 \u2013 The Bible Society of Friends Fayoum burning 9 \u2013 The Church of Saint Maximus 45th Street Alexandria harassment 10 \u2013 Church of Prince Taodharos Echatbi Fayoum burning 11 \u2013 Church of Our Lady of Copts \u0627\u0644\u0627\u0631\u062b\u0648\u0632\u0643\u0633 the street butchers Abu Hilal District Minia Governorate burning 12 \u2013 Church Marmriqs the Catholic Copts Abu Hilal District, Minya Governorate burning 13 \u2013 Church of the Jesuit Fathers Abu Hilal District, Minya Governorate burning 14 \u2013 Church of the Virgin and Abram news Sohag burning 15 \u2013 Church Marmriqs the building services electricity Street, Sohag burning 16 \u2013 a Father Onjelios home king pastor of the Church of the Virgin and Anba Abram Bdljh of Deir Mawas Dljh the center of the province of Minya house was completely burned 17 \u2013 the burning of the Greek Church in Suez Search warrants reveal letters from Hannah Anderson found at kidnap suspect's home. #AmberAlert Investigators also found boxes of camping gear and ammunition, a Yosemite camping printout, incendiary devices, arson wire, model rocket containers, cut electrical cords and two used condoms. READ MORE: http:\/\/ow.ly\/o0rIV Michelle Obama's School Lunch Plan Dropped; Students Refuse To Eat oped: Even the kids are fed up with the Obama's...past time to start Impeachment hearings! By Joseph R. Carducci Welcome to another round of the 'government will control every aspect of your life' show. This edition, just like all the prior editions since 2009, is being brought to you by the Obama's, with a special assist from the liberal elite everywhere! http:\/\/youtu.be\/vPkJnUuSRIc Did you know that Michelle Obama had recently come up with her version of a school lunch plan? Neither did I until a little bit ago. Actually, this should make us all wonder what exactly was wrong with the old or current school lunch plans? I'm sure we all remember back to our days in school and have a lot of memories of the cafeteria and the 'famous' school lunches we enjoyed! Of course, not being one to leave well enough alone, Michelle Obama had get her hand stuck into this one. Maybe since her husband was so bust saving the world that he allowed her to try and fix something on her own. This new plan is officially called the 'preferred lunch plan.' She has determined what our kids should be eating in order to remain healthy. Guess what? The kids absolutely hate her plan! A number of school districts across the country have already begun to drop the plan. Most of the school systems say the same thing: that their kids do not like the lunches and that many of them are going hungry. There were a number of foods that the students just simply would not purchase, plus it has been a bit of a nightmare for the schools to implement the plan. Not to mention expensive. In many districts, they even lost money. Hmmm\u2026a new program implemented by a liberal, designed to tell someone what is good for them and in 'their' best interests\u2026and amazingly enough, it loses money! That sounds like it came right out of the Democratic party play book. Even a medium sized school district would likely spend upwards of $100,000 to implement Michelle's plan. Oh, by the way, not only is it osing money hand over fist, but it also shows a complete lack of understand about kids. For starters, these lunches are very small. They include sections like a \"part\" of a chicken patty and a very small piece of bread. Come on, Michelle, give the kids some real food! Just because you do not like meat is no reason to force the kids into becoming psuedo-vegetarians! Bear in mind that these lunch plans cover students from elementary to high school. Obviously, the teenagers are going to complain when the portion sizes are incredibly tiny. So, the kids just simply refused to buy many things, and the district lost money\u2026because they followed Michelle's wonderful guidelines. Many students just decided it was better to bring their own lunches from home. I wonder if possibly that was her intention all along? Maybe the best way to get the students to eat healthy is by giving them what they do NOT want and will NOT pay for. How's that for convaluted thinking, courtesy of our amazing first couple. Get this, Michelle's program would cost over $3.2 billion to implement across the country. Amazing. I guess it is a good thing that a number of districts have already been exposed to this as a test market of sorts. This whole thing really just illustrates the fallacy and luncy of the liberal thought process. They are, at their very core, just simply incompetent. Nice try, Michelle, but no thanks, we can keep our own kids healthy, thank you very much! Judge: Foreigners can sue U.S. pastor over sermons oped: WTF over...Don't know about y'all but I am fed up with activist Homosexual Judges legislating law from the bench...I say Impeach one and all for violations of the US Constitution and Bill of Rights! by: Bob Unruh A federal judge has backed a homosexual-rights group in its claim that members were injured by an American pastor's biblical preaching in Uganda against homosexual behavior. But the ruling from Judge Michael Posner in a case brought by Sexual Minorities Uganda against Pastor Scott Lively of Abiding Truth Ministries could mean much more. It could establish that an international consensus disavowing long-held biblical standards could trump the U.S. Constitution. SMUG alleges Lively must be punished for criticizing homosexuality, calling his speech a \"crime against humanity\" in violation of \"international law.\" The plaintiffs allege that the Alien Tort Statute in the United States allows them to make the charge in the U.S. Lively's attorney, Horatio Mihet of Liberty Counsel, said his client's preaching is protected by the Constitution. \"We are disappointed with the decision because we believe SMUG's claims are firmly foreclosed, not only by the First Amendment right to free speech, but also by the Supreme Court's recent decision in Kiobel, which eliminated Alien Tort Statute claims for events that allegedly occurred in foreign nations.\" Mihet said his team is still reviewing the court's ruling \"and will continue to vigorously defend Mr. Lively's constitutional rights, with confidence that he will ultimately be vindicated.\" The judge took nearly 80 pages to say that he thought the allegations by SMUG were substantive and needed to be adjudicated. He sided with the \"gays\" in his first paragraph, explaining that while SMUG is made up of groups \"that advocate for the fair and equal treatment of lesbian, gay, bisexual, transgender and intersex (LGBTI) people,\" Lively is an \"American citizen residing in Springfield, Mass., who, according to the complaint, holds himself out to be an expert on what he terms the 'gay movement.'\" The judge cited \"many authorities\" who \"implicitly support the principle that widespread, systematic persecution of individuals based on their sexual orientation and gender identity constitutes a crime against humanity.\" The judge argued that the idea that Lively's statements are protected under the First"} +{"id":"RedPajamaCommonCrawl.0002","text":"Victims Can Be Strong My Story of Domestic Abuse \u2013 Sophia Cooke Category: My Story Post 10 \u2013 The final incident On 12th February 2017, I told my former partner that I had cheated on him while abroad. On 14th February, I spent five hours in a police station, after being persuaded to go there by my parents, giving a statement in which I alleged that, in response, he had subjected me to a two hour assault in which he beat me repeatedly and broke my phone and car stereo. I told the police that he had caused cuts to my upper lip, a large split along my lower lip, bruising around my mouth, a suspected fracture to my nose and bruising and swelling to my arm and groin. I also described how he had squeezed my eyes with his thumbs, pulled my hair and repeatedly spat on my face and in my mouth. I explained that I had thought he was going to kill me but, while I had made attempts to get away from him, blaming myself for his violence had led me to come back each time and continue apologising. At one point, I had even tried to climb into a tree to escape him but slipped out, falling one metre and bruising my lower back. I told them how he had helped me to my feet, only to lock me in his grip and punch me again. The police officer photographed me and collected other evidence and my former partner was arrested and charged for assault and criminal damage. Seven long months ensued, in which my former partner tried frequently to intimidate me and to convince my friends and family that I was crazy, telling them that all my injuries had come from me deliberately throwing myself seven metres out of a tree and that I had broken my own phone and car stereo. He even messaged my father multiple times to say he was concerned for my mental well-being and that I needed help. I suffered badly with PTSD, panic attacks, depression and intense anxiety and had to put my PhD on hold. I tried hard to get on with my life and went abroad to escape for a while but could never get it all out of my head. Counselling helped but I struggled on many days to achieve even simple tasks. Finally, the case was heard at Huntingdon Magistrates' Court on 14th September 2017. I am not including details of the trial or what has happened since in this post, but I thought it would be useful to add just a few comments for clarification in response to questions that people have asked me. (I have since published a separate article covering the trial in more detail.) In England a victim cannot get their own lawyer in the criminal courts. They have to rely on the Crown Prosecution Service (CPS) as the trial is technically the Crown vs the Defendant. The lawyer assigned to this case turned up ten minutes before the start of the trial, having never met or spoken to me before. This was in stark contrast to my former partner's lawyer who he was able to choose himself and prepare with for months in advance. Only the incident on 12th February was tried. Evidence of previous assaults (including the voice recording \u2013 which had been heard by police and supplied to the CPS un-cropped) was not considered. (In criminal trials evidence relating to incidents prior to the one in question usually cannot be used.) The defence lawyer suggested I seemed too strong and intelligent to be a victim of domestic abuse and stated that my behaviour of running away from him and then coming back to apologise was inconsistent. This behaviour, however, is typical of someone abused (who blames themselves for what is happening to them) but this was not explained by the CPS lawyer. I was forbidden to talk about the abusive nature of the relationship prior to 12th February and so could not explain to the Court why I wouldn't have simply tried to run away and get help. Key pieces of evidence were, I felt, poorly presented (e.g. photos of my injuries were printed in black and white which rendered some of the bruising much less visible) or not mentioned at all (e.g. phone records) and two prosecution witnesses who had been asked to attend court were never called to give evidence. My former partner was found guilty of criminal damage to my car but not-guilty of assaulting me. He was given a Conditional Discharge for 12 months and ordered to pay me \u00a3300 compensation, a fraction of the cost of the damage. No restraining order was put in place. After the trial, my former partner gave interviews to several national newspapers and I received a number of abusive messages from trolls (as well as, and for which I will always be extremely grateful, lots of kind messages of support, including a statement from my new college in Cambridge). I have struggled to come to terms with what happened to me and, although I am improving, I continue to suffer from PTSD symptoms, which became worse after the trial. My former partner has remained in Cambridge, and has continued to try to convince my friends I lied about everything. Victims Can Be Strong My Story November 15, 2017 April 9, 2019 3 Minutes Post 9 \u2013 My fieldwork trip (Content warning: sexual assault) For my first couple of weeks of my trip, I was very stressed. I was scared of losing him and convinced that he would change his mind about being with me while I was away. He messaged me with all these promises of a happy future but then we had a few conversations over the phone where he again threatened to break up with me unless I continued to change. He told me again that his parents didn't think he should be with me and that they didn't like me. On Christmas Eve, we had a huge argument, which began when I said I thought his parents were being unfair and that I thought it very harsh that he had gone and complained about me to them all, especially when we were meant to be getting married. He became very angry and said I deserved everything his parents had said about me and that in the circumstances they had been too nice to me. He said I was autistic and stupid and said again that he wished he had never met me and stayed with his ex. I felt so miserable, empty and worthless. That night I went out to a club with my friend and decided I didn't want to feel anymore. I had quite a lot to drink and, having become separate from my friend, wandered back by myself. Obviously the world felt I had not suffered enough at this point and a man followed me from the club. As I was walking down an empty street he grabbed me from behind and pushed me up against a wall. Pinning me in place he kissed me all over my face, began trying to undress me and touch me, while I struggled to get free. I tried to push him away but I was drunk and woozy, and he was taller and stronger than me. He stank \u2013 I can still smell him now. Luckily another man came along on his bike and told him to stop. He asked me where I was staying and offered to take me to my hotel. I felt nervous to trust him but also wanted to get far away from the other man so agreed. Fortunately he was kind and he took me to the hotel. Feeling scared and shaky I rang my partner, wanting comfort after what had happened. I still believed he was good and expected sympathy. But he was furious. He shouted at me, saying I was a whore and that it was my fault because I had been drinking. He said I had effectively cheated on him and betrayed his trust, after he had worked so hard to convince himself I was worth staying with. He said I was strong enough to fight someone off and was convinced that I had clearly wanted this man's attention. He couldn't understand that I had been taken by surprise or that my being drunk had affected my ability to fight back. He said he was going to leave me because I had cheated. I desperately tried to get him to believe me but he refused to listen. Whilst on the phone, I woke my dad up who came to comfort me and I ended the conversation with my former partner. In the morning, Christmas Day, I woke up to a large number of missed calls and messages from him, demanding that I speak to him. I rang him and received a torrent of abuse for around two hours, in which he called me a cunt multiple times and brought up everything from before I had left. When I tried to stand up for myself he told me he was leaving me and hung up. I was devastated but also felt a small, unexpected sense of relief. He then messaged me a little later, saying he was crazy to stay with me but that he would if I agreed to another list of things I was never allowed to say or do. He told me his parents believed I had cheated on him and thought he should leave me but that he had convinced them to give me another chance. He also made me state again that I believed he was on my side and was trying to help me. Feeling again like I needed to be with him, I agreed to everything. My parents started to question what was going on but I still felt that I couldn't tell them. However, something had finally woken up in me. Throughout the relationship, I had always found a way to justify his behaviour and blame myself. But I knew I had been sexually assaulted and I knew he had blamed me. I knew that it was wrong, that no one should be blamed for that. I began to resent him. I started to immerse myself in my fieldwork, enjoy time with my friends out there and started speaking to him less. As a result, he starting messaging me more and more and my phone was constantly going off. I started turning it off for periods during the day, so that I could get my work done. I still felt guilty though and a good part of me still wanted to be with him. I had such a confusing internal battle going on. I confided in my friend that he had hit me and some of the things he had said to me, all of which she said were wrong, but I still couldn't bring myself to leave him, which she couldn't understand. He kept insisting I call him and then would keep me on the phone for hours so I couldn't get my work done. If I ever hung up I would get a flood of messages making me feel very guilty. While I was away I found out he had offered to drive some friends from Cambridge to Devon in my car, without asking me if he could use it. When I questioned this, he insisted he had asked me and that I had agreed to it. He told me if I wanted him to tell our friends that I didn't want them using my car, he would, but that they would probably be upset at having to pay for a hire car last minute, after I had supposedly offered the use of mine. I gave in, not wanting our friends to think badly of me. On New Year's Eve I had a message from his step-mum, telling me she hoped I could sort myself out. I felt hurt and angry \u2013 I started to be more convinced that I didn't deserve all of this. One day he rang me and asked me to make a list of everything I thought I had done wrong in the relationship and how I could make up for it. He said he would do one too if it helped. I thought this was strange but perhaps a good idea \u2013 perhaps there was a still a chance we could put everything behind us and be happy. I agreed and wrote a list in which I apologised for a range of things including: not trusting him; being upset at his parents' treatment of me; snapping at him; making him feel guilty for sleeping when I couldn't; being violent by slapping him and pushing him away (the two events I mentioned previously); telling our friends he had hit me after the first two assaults; getting drunk on Christmas Eve and taking so long to accept how terrible I was. He responded with a list which included apologies for: calling me hormonal, calling me autistic and hitting me. For this last point he wrote \"Hitting you: I promise I will never lay a finger on you again\". He seemed sincerely sorry for these things and told me he was going to stop drinking. I felt hopeful that maybe things were going to work. A few days later I had messages from a friend of mine to say that my partner had become very drunk at a College event, thrown up and was screaming \"Where's Sophia, fuck that bitch\". My hopes were dashed and I decided I wanted to leave him. Out of fear of him destroying my belongings and spreading lies about me I decided to wait and do it when I got home. I tried hard to put him out of my mind, I answered his messages less frequently and started to really enjoy my time out there. He had convinced me that no one liked me, so I was surprised when people out there seemed to enjoy my company. Towards the end of the trip I became close to a friend of mine, who I had confided in about my partner's violence. We had a few conversations about it and he told me I should leave him and that I deserved better. I liked him, he was kind and funny and I really enjoyed having the company of a man who was kind to me. It reminded me how I used to feel with people I had been with in the past. I knew he was interested in me and, having decided I didn't want to be controlled anymore, I slept with him. I had already decided to leave my partner as soon as I got home and I felt relieved. When I returned home on 1st February, however, my former partner greeted me with a pile of presents, apologies and promises of change and a happy future. I felt my confidence disappear and started to feel immensely guilty about what I had done. My feelings of wanting to leave the relationship were replaced by thoughts that I was a terrible person. I slotted straight back into feeling that I had been awful, ruined this man's life and then cheated on him. I felt very nervous, like I was returning to a cage and didn't know what to do. One night we spoke to his Mum over Skype. It brought back all the memories of how he had turned his family against me before Christmas and I became upset after the conversation ended. He announced he was leaving me again and taking my car (I think after seeing that this had bothered me before). Once again he agreed to stay if I accepted he was nothing but a victim and that I was abusing him. At one point, he put one hand round my neck and lightly slapped my face with the other one. I felt completely controlled again and very trapped. Over the next few days I tried to keep him happy and make the relationship work but the guilt of having slept with someone else was eating at me constantly. Eleven days after I got back, I decided to tell him what I had done. \u2013> Post 10 \u2013 The final incident Victims Can Be Strong My Story November 15, 2017 November 18, 2018 7 Minutes Post 8 \u2013 Involvement of his parents During October and November the situation carried on much the same. He was nearing the end of his PhD and became more stressed with work, for which he blamed me. He said he hadn't worked enough during the year because we had spent too much time doing other things. He continued to offer to do things with me and then made me feel very guilty if I accepted. He made no attempt to stop drinking and I gave up asking him to. He also repeatedly told me he had been happier with his ex and regretted leaving her. When certain songs came on the radio or we looked at photos of us together he would say they reminded him of when I did things that upset him (such as driving him to harm himself) and make me feel guilty. I was always afraid to say the wrong thing and set him off, but nothing I did seemed to make him happy. I also caught him lying to me about little things and began to trust him less. Several times he threatened to commit suicide if I didn't back down in arguments. (I now understand this is a common feature of abusive relationships.) He became even more controlling, getting cross if I was ever later home from work than I said I would be, even if we had no plans. He would get upset if I was ever on my phone at home, saying my attention should be on him. He also lectured me about not wanting sex often enough and said I wasn't making him feel loved. In a desperate attempt to cheer myself up and make him happy, I started to focus more on planning the wedding, which only led me to feel even more trapped. We went to my parents' house one weekend and I snapped at him in front of them, burst into tears and ran upstairs. He acted entirely innocently and my Mum, unaware of what was going on, stood up for him. He was now succeeding in turning everyone against me. I tried to tell my Dad what he was doing but just couldn't, I didn't know how to explain it. Things came to a head at the end of November. I was planning fieldwork abroad again in January, combined with a holiday with my parents in December. He had told me he wanted to join us on the holiday and be my assistant again on my fieldwork. Both my parents and I had asked him several times if he could afford to take the time off work and he said he could. I told him I had a friend who could come instead of him to do the fieldwork but he insisted he wanted to do it. So we booked the trip, my parents kindly covering the cost of the holiday part for both of us as we could not afford it. Ten days before we were due to go, we had an argument which ended with him saying everything wrong with our relationship was my fault and that I was ruining his life. He then told me he was leaving me. When I begged him not to, he said he wasn't going to leave me but that he was going to go to his Mum's house and tell her everything I had been doing to him. While he was there, we had a conversation on the phone, in which he stood in front of his Mum and step-dad and loudly twisted everything I was saying (which only he could hear) into nasty things for them to hear. For example, when I tried to apologise for the things I had said in the argument, he announced that I was bringing it all up again and having a go at him. They then became cross with me and I felt completely helpless. So I decided to drive up there, to speak face to face with them, so my words could not be twisted. When I arrived, his step-dad shut the door in my face and wouldn't let me in, but his Mum, who I had always got on well with, came to find me. The four of us then had a conversation in which it was explained to me that I was treating my partner badly. In particular, the fact that I was making him feel guilty for sleeping when I couldn't and getting upset when he did things without me was brought up. I could see how this looked and apologised to them all. I couldn't tell them the reasons for my behaviour. Before I had driven up, I had spoken to his Mum on the phone and she had asked me why I had gone to my parents' house alone for a while (after the assault in September). I said to her, \"You don't know what he did\", to which she replied, \"What did he do?\" I told her I couldn't tell her, that it wasn't mine to tell. I was hoping this would kick-start a conversation between them but I was being stupid to think he would ever tell her. While we were at her house I asked him to tell his Mum about the violence as I thought she would be able to help us. He told me \"She will only think worse of you for driving me to it\". I believed him and kept quiet. During those few days at his parents', when we weren't with them, he told me again and again that I had problems and had to let him and his parents help me. He said I needed to trust him, stop questioning him and that he would help me to change \u2013 that he knew what was best for me and how to achieve it. He demanded I have unquestioning blind faith in him and told me I was never allowed to be cross with him, that I should act as if I worshipped him and fully accept him as a part of me. He said I was mentally ill and that I was lucky he was staying with me, that no one would ever like me unless I changed. He told me he was a saint for being with me and that no one else would ever want me. He recited a list of things I was never allowed to say or do if I wanted him to stay with me, and explained which parts of my personality I had to change. He said if I worked hard to change he would let my behaviour go and forgive me. It was so easy for him to convince me I was terrible because I felt so guilty about having been so snappy. I didn't recognise that it had all been in response to his attempts to control me. He told me that my Mum was poisoning me and I had to spend less time with her. He also told me he would only stay with me if I admitted to his parents that I was bullying him and that my behaviour was due to my relationship with my Mum. He insulted my Dad frequently too, saying he had brought me up badly. I could not make sense of who was right and who wasn't. I found myself desperately apologising for everything I could think of. I broke down multiple times with his Mum and told her I was doing everything wrong. I just couldn't understand what was happening. I was trying so hard to convince myself and them that I was entirely in the wrong. I pushed down any feelings of him being in the wrong and told myself they were due to me being mentally unwell and that I had deserved the violence. His Mum comforted me when I told her how awful I thought I had been. She also told me that she had seen her son's temper before and stuck up for me when he was shouting at me, but, having only heard one side of the story, continued largely to believe I was the problem. He also told me he had spoken to his Dad and step-mum and that they had tried to convince him to leave me, but that he had stood up for me. This confused me even more. He then broke it to me that he was no longer coming on my fieldwork trip or the holiday, which his parents backed him up on, as he had told them I had forced him to agree to it. I couldn't believe what was happening. I had asked him so many times if he was happy to come along and he had insisted it was fine. He knew I needed the extra pair of hands for my work and that it was probably too late to find anyone else. When I pointed this out he told me just to go and find someone on the street to help me. Fortunately, one of my friends agreed to take his place, which he seemed furious about (I can only assume he was hoping I wouldn't be able to complete my work out there). The flights cost \u00a3600 to change but he refused to pay anything towards this. He also refused to pay my parents back for his holiday that they had paid for. When I tried to complain about any of this he would become furious, explain how in the wrong I was and make me state that he was the victim and that I had no right to complain about anything. He said any negative thoughts I had about him were in my head and that I was paranoid, but again, he was going to fix me. I was absolutely miserable and felt completely lost, but I felt so tied to him and too much of me believed he was trying to help me. I believed I had driven him to be nasty and now had to pay the price. Above all, I was terrified of him leaving me as felt I couldn't exist without him. Just before I left he told me he was broke because I had made him live in a flat where the rent was too high. In reality, we had found the flat together and both chosen it, but he convinced me I had forced him so, out of guilt, I loaned him the money to cover his rent for December. In addition I left my engagement ring with him as I did not want it to get damaged on fieldwork. I have never had either the rent money or the ring back. \u2013> Post 9 \u2013 My fieldwork trip Post 7 \u2013 The voice recording Two nights later, he became very drunk again. I was still angry and upset from being hit again and this time I decided not to let it go. I was fed up of being treated like that. As we walked home I told him I was very upset that he was drunk after he had promised to stop drinking. I also asked him to sleep on the spare mattress because I was scared of him hitting me again. He started a barrage of verbal abuse at me, which continued after we got home. He repeatedly called me a cunt, among other things, and said he wished he had stayed with his ex-girlfriend. He told me she never questioned him like I did and that she was always lovely to him. After about an hour, I decided to record him on my phone, with the thought that I could play it to him the next day and show him how nasty he was being, as sometimes he claimed he didn't remember things he had said or done whilst drunk. The next morning, he was very apologetic again and nice and I realised that if I told him I had recorded him he would probably be furious, so I chose not to play it to him. During the recording, he is very emotionally abusive, telling me that all unhappiness and arguments were my fault as well as his drinking and violence. The violence comes up multiple times in the conversation, and he frequently tells me to \"let it go\". He pleads with me to trust him more, tells me I am ruining his life and that I was \"supposed to be better\" and \"supposed to have learnt\". He tells me things are in my head, threatens to leave me, says that I would have to repay him for everything he has done for me and that I was a bad person. I remember wishing he would leave me and it would all be over. I was so fed up and hurt by this point and at times get annoyed with him and am sarcastic, trying to stand up for myself, but at other times drop back to being meek. I even say I'm going to leave him if he doesn't stop drinking, but this was an empty threat. Part way through the recording he comes towards me aggressively which scares me, but then he tries to comfort me \u2013 a behaviour I have mentioned before. The recording ends with him slapping himself round the face and bursting into tears, something he frequently did to induce guilt in me. I have decided to share this recording here. As it is very long (approx. 30 mins), has long gaps where no one is speaking and other people are mentioned frequently, I have created a shortened version (approx. 6 mins) of the most significant parts and a transcript (below) as some parts are muffled. In the first section, when I say \"you hit me twice\" and he replies, \"yes, you put me in counselling\", he is referring to me suggesting that he go and see someone after he started being violent. He never did go. VOICE RECORDING: https:\/\/victimscanbestrong.files.wordpress.com\/2017\/11\/voice-recording.mp3 Him: \"Be nice for fuck's sake. It's not hard, it's not hard\" Me: \"I have been\" Him: \"Chill out then, let me sleep in the bed, let me cuddle you, let me be happy\" Me: \"When you drink, you get..\" Him: \"I am fine, fuck off with it please, it's never going to help my recovery if you won't let it go\" Me: \"You hit me, twice\" Him: \"Yes, you put me in counselling, well done you, fucking let it go!\" Him: \"I was a happy person before I met you. Now life seems shit, fuck off. You're supposed to be better, you're supposed to be nice, you're supposed to have learnt. Fuck off, done\" Me: \"I am nice\" Him: \"You're a f.. You can, you have the capacity to be so nice\" Me: \"I'm lovely\" Him: \"And lovely and kind and brilliant, so be that\" Me: \"I am, but not when someone hits me round the head, then I get scared, then I'll put myself first\" Him: \"If you'll never let that go, then we'll never move past. If you can never let that go, then we'll never move past it. You have to let it go.\" Him: \"You're just a bad, you're just a bad person, you're just a bad person Soph\" Me: \"No, No I'm not\" Him: \"Yeah you are you fucking are\" Me: \"I'm wonderful and you waste me\" Him: \"Fuck off you've wasted me\" Me: \"You waste me\" Him: \"Ruined my life, turn the light off and go to sleep, you utter cunt you've ruined my life\" Me: \"No I didn't\" Him: \"Yes you did\" Him: \"You bitch fuck off, fuck off\" Me: \"See\" Him: \"I'm sick of it, I'm sick of making all this effort for you, all of this time and love and care and affection\" Me: \"This is you being drunk\" Him: \"You're just the worst fucking person ever, fuck off.\" Me: \"Because most people are harmless when they're drunk, you're not, and most people..\" Him: \"Let it go, let it go, please let it go, we can never get anywhere if you don't put it down and stop\" Me: \"Shhh (blanked) is next door\" Him: \"We could be a happy couple, we could be a happy couple if you could just let that go\" Me: \"You promised me you wouldn't drink much\" Him: \"I'm not! We're getting nowhere, turn the light out, go to sleep, I'm sorry, I'm not out of control, I'm never going to touch you again, I'm never going to harm you again\" Me: \"How the hell am I meant to believe that?\" Him: \"You just have to make an effort, Soph, you just have to make an effort.\" Him: \"Fuck off, trust me, please\" Me: \"How can I when, what happened last time\" Him: \"Put that behind you for fuck's sake. I can't recover, I can't heal, I can't get past all the shit you did to me if you keep tormenting me with the fucking guilt. Fuck, stop.\" Him: \"Please trust me, I can never heal if you won't trust me. Please trust me\" Me: \"You wouldn't have said those things to me\" Him: \"I've said worse things sober, I've done worse things sober, I am sorry you really rile me, and the two times it happened it was because of this bullshit, that we were happy, I just want to be happy relaxed couple and you come at me with nonsense. I just want you to fucking chill out.\" Me: \"Because you're drunk and you promised me you wouldn't be\" Him: \"I'm not drunk, you cunt, I'm not drunk\" Me: \"Why are you calling me a cunt?\" Him: \"Because you're being a dick\" Me: \"I'm not\" Him: \"Stop ruining my life Soph, please just fucking be relaxed, stop it.\" Him: \"We were happy until you started on me, you didn't need to start on me, you started this, everything was fine until you started it\" Me: \"Because I'm scared and have a right to be\" Him: \"Then drop that! Drop it and you'll see how everything is fine!\" Me: \"You called me a cunt\" Him: \"Because you started on me, separate the two fucking things, if you hadn't started on me, none of this would have happened.\" Him: \"You're being a.., you've been a dick to me all night\" Me: \"How?\" Him: \"Since we got back\" Me: \"What have I done?\" Him: \"The whole way you've been with me, you forced me to sleep on a separate bed\" Me: \"I'm scared\" Him: \"And I'm sorry, I'm never going to heal if you don't trust me, it's going to take a leap from you, a bit of effort.\" Me: \"You promised me that you'd never do it again\" Him: \"I'm not hammered, I'm not drunk\" Me: \"You promised me..\" *He comes at me aggressively* Me: \"Don't don't, stay away, no no no, please no, please not again\" Him: \"Soph, soph\" Me: \"Please not again\" Him: \"Soph, Soph, you've been doing this all day, tipsy yes, kind and caring and loving you and never wanting to lay a finger on you\" Him: \"I'm sorry, you started on me, you wound me up\" Me: \"I didn't\" Him: \"I'm sorry I'm sorry I apologise unreservedly, come here, I'm sorry. I'm tipsy yes, I'm drunk yes, we had fun, we were having fun. Don't wind me up when I'm relaxing, I'm in love with you, I care about you\" Me: \"You can't expect me not to be scared of you when you drink, you promised that you wouldn't get drunk\" Him: \"I'm not drunk, Soph I'm not drunk, I promised you I would never get out of control, I'm not out of control\" Me: \"You called me a cunt which means you're out of control, you only ever do that when you're drunk, you've never done that sober\" Him: \"I've called you cunt several times when I'm sober, it happened many many times.\" Him: \"Because you fucking started on me, I was happy, I was trying to give you love all..\" Me: \"Shhh\" *He slaps himself round the face* Me: \"Yeah that helps\" *He cries* Him: \"Please, just trying to give you love all fucking night\" *I turn recording off and went to comfort him*. \u2013> Post 8 \u2013 Involvement of his parents Post 6 \u2013 The third assault on me He never did try to stop or reduce his drinking, despite my frequent pleas. One night in September, he became very drunk towards the end of another College event. Since the first assault, I had been nervous every time he drank, which he hated, and this time was no different. When we got home he asked me what was wrong and I told him I was nervous and upset because he had promised me he would stop getting drunk. He flipped and started shouting at me that he wasn't drunk and that I had to trust him not to hit me again. I told him I was trying to, but that it was difficult and I couldn't help being scared when he drank. I was sitting on the side of the bed and he pushed me back onto it, then stood over me, pushing me down with his left hand tightly around my neck. As I was struggling to get free, he punched me twice in quick succession in the left side of the head, the same place as before. He then told me \"you didn't trust me not to hit you, so I ended up hitting you. This was your fault\". I ran downstairs crying and sat on the sofa with a bag of frozen peas against my head, which was throbbing. I have never felt as alone as I did that night. I came so close to leaving him, grabbing my things and leaving. But I couldn't think where to go and something so strong was tying me to him. I felt as though I had no choice, that even if I hated being with him, I had to stay. My confidence was gone, my ability to function on my own or make my own choices was gone. It felt a bit like being stuck in a moving car with no way to operate it. All I felt I could do was wait and see what direction my life would go in next. In the morning my housemate came downstairs. As she had been involved in the aftermath of the first assault, she knew that he had been violent before. She told me she had heard me run downstairs crying and asked me what had happened. I panicked and said nothing as I was worried that if I told her the violence had continued, she would want to move out of the flat. But then, as she went on to make her breakfast, I felt so miserable and alone that I decided to tell her. I remember half-hoping she might make him leave or tell someone, that perhaps the relationship could end without me having to find the strength to end it. She was furious and spoke to her boyfriend, our other housemate, about it. When my partner awoke at midday, he came downstairs. He apologised to my housemate, who told him it wasn't him he should be apologising to. In front of them, he said sorry to me, but once we were alone, he explained to me how I had to trust him more not to be violent and that my distrust was harming him and causing him to do these things. I told him that I would forgive him if he promised to stop drinking, at least for a little while, which he agreed to. I convinced my housemates that it was again my fault and that everything would be fine. \u2013> Post 7 \u2013 The voice recording Post 5 \u2013 The effect of his violence on me, his worsening emotional abuse and the second assault on me For the first few days after the assault, he was hugely apologetic and talked all about how things would be different now, how things were going to change. But then there was a shift. He began to suggest that it was indeed my fault and that I was right to blame myself. He said I had damaged him and needed to help him to heal. He changed from saying he would stop drinking to saying he wouldn't get drunk again. He also told me that I couldn't be annoyed with him because I had been violent first \u2013 reminding me that I had slapped him when we were away. I tried to point out the difference between the incidents \u2013 that I had slapped him while in a state of panic, after begging him to leave me alone and him repeatedly coming towards me, whereas he had strangled and punched me while holding me down so I could not escape and that before he did that, I had not been physically threatening him in anyway. But he would not listen and continued to blame me for his violence. If I ever brought it up he would tell me I was damaging him further and that I had to let it go. That assault had a strange effect on me. I had always thought that if a man ever hit me, I would leave him. Yet here I was, still in a relationship with someone who had hit me. I felt his behaviour was unfair but believed it was, at least in part, my fault. I felt that this huge thing had happened and I couldn't talk to anyone about it. I knew that if I were to tell my parents, they would convince me to leave him and I didn't want that. I loved him, I saw the good parts in him, and thought I could fix our relationship. But the assault had made me more insecure than ever, and also very fearful. I stopped sleeping almost completely, lying awake next to him each night feeling panicky. I sometimes would ask for one of us to sleep on the spare mattress we had on the floor, which helped, but caused me to feel even more like I was ruining our relationship. We moved into a new flat, sharing with the couple who had been involved in the first assault. I thought moving would help and that things would sort themselves out but they became worse. He was more impatient with me, always cross that I wasn't happy and cheerful. I remember he once had a huge go at me because I didn't get up and greet him cheerfully enough when he came home from the office one day. He continued to be extremely volatile and would often shout at me, calling me a fucker, a cunt, a hormonal crazy bitch. The smallest of things would set him off. He would often wrench my engagement ring off my finger, saying I didn't deserve it. Sometimes he would put his hands around my neck, not enough to strangle, but enough to make me feel scared. I began to struggle to talk to other people and didn't know how to relate to them. I became unmotivated in my work. I felt as though a glass screen separated me from the rest of the world and interacting with people felt very fake. I remember wondering whether life was just about ticking days off until you die. I knew something was very wrong but the only person I felt I could turn to was him. He agreed that there was something wrong with me and told me he would keep me safe and I had to trust him. He said that only if I truly trusted him and stopped fighting it would I be able to be happy. He would often buy me gifts, things to make me feel happier, but then if I annoyed him he would say I didn't deserve them. I found myself desperate to please him and annoyed at myself that I seemed incapable of it. Feeling dependent on him made me become very clingy and needy. I found myself getting upset if he did anything without me and panicked if he was away from me, which would cause him to say I was trying to control him. My sleep became even worse, as now I felt very fearful around him. Sometimes I would get upset with him, for falling asleep when I could not, having no care for the reasons I struggled. Often he would fall asleep while I lay crying next to him. He told me it was my problem I couldn't sleep and I shouldn't make him feel guilty. I saw the logic in his arguments and hated myself more. He continued to be very kind and sweet when not annoyed with me and I began to need his approval and affection. (I have since learnt that dependence on an abuser is a recognised phenomenon, called Traumatic Bonding. I understand it better now, but at the time I couldn't make any sense of what I was thinking or feeling, which rendered me helpless.) I felt as though I was going completely mad. He continued to make me feel guilty for things I had supposedly said and done which I had no memory of. He would offer to help me with things such as the bar work I did in College, but then if I accepted, would say I made him do it and was making him behind in his own work. He started bringing me lunch and working at the desk next to me in my office most days. As my dependence became worse, I began to feel I couldn't go to the office without him and so would ask him to come with me, which he would use as another example of me trying to control him. In attempt to convince the world that everything was fine, I continually put happy photos of us on social media and told everyone how much I adored him. I felt too ashamed to tell anyone what was happening \u2013 to be defined as not only a woman who had been hit by her partner, but as one who then continued to stay with him. Also I was convinced that if I told anyone, they would believe I had driven him to it and think badly of me. My reactions to his behaviour started to vary. I still felt hugely angry that he had assaulted me and that he showed so little remorse for it, but I blamed myself too much to leave him. Sometimes, because I wasn't allowed to speak about the thing that was upsetting me, I would get frustrated and angry at him for small things, such as often forgetting to do things he said he would. He would make me feel so guilty and I would apologise. I kept telling myself to just be happy, but I didn't know how. One day he came towards me, seemingly to pin my wrists and I pushed him away. He had such a look of hurt on his face and told me he had just wanted to hug me and I instantly felt guilty. Not long after, in another argument, he grabbed the front of my t-shirt and bra and yanked so hard that he tore them. I remember feeling annoyed, but didn't bother saying much about it and instead made another mental note to stop winding him up. He was beginning to completely take over my mind. The second assault on me occurred when we were alone in our College MCR (common room) one day. An argument started and he pushed me onto one of the sofas, and squeezed his hands around my neck. Rather than fight back this time, I went limp and lifeless, in the hope it would make him stop quicker. This seemed to annoy him more and he started screaming in my face. When that didn't work he started pleading, still with his hands around my neck. I didn't know what to do, so remained still until he gave up and let go. He didn't apologise this time. \u2013> Post 6 \u2013 The third assault on me Post 4 \u2013 The first assault on me One night in July 2016, we went to a social event at College together, and he became very drunk. Once we were back in my room, an argument started. We both got into bed but he was shouting at me. Suddenly he got on top of me, straddled me and put both hands around my neck. He squeezed hard. I remember the look"} +{"id":"RedPajamaCommonCrawl.0003","text":"Review of Neovascular Age-Related Macular Degeneration Treatment Options By Nancy M. Holekamp, MD Supplements and Featured PublicationsA Managed Care Review: Approaches to Mitigate Blindness Associated with Neovascular Age-Related Macular Degeneration Due to an aging population, visual impairment from neovascular age-related macular degeneration (nAMD) is increasing in the United States. Despite unprecedented improvements in vision preservation that patients can achieve with anti-vascular endothelial growth factor (VEGF) agents, innovations are needed to reduce the burden of intravitreal injections and improve outcomes in patients who do not respond adequately to currently available agents. The best present option for vision preservation is a \"zero-tolerance for fluid\" schedule of monitoring and intravitreal injections that patients may need to follow for many years. This treatment burden has resulted in patients not achieving optimal benefit or even falling through the cracks. This article reviews state-of-the-art management approaches including as-needed and treat-and-extend dosing regimens designed to reduce treatment burden. Am J Manag Care. 2019;25:-S0 Age-related macular degeneration (AMD) causes irreversible destruction of the macula, which leads to loss of the sharp, fine-detail, \"straight ahead\" vision that is required for activities such as reading, driving, recognizing faces, and seeing in color. It is a leading cause of irreversible visual impairment in the world.1,2 Over the past 15 years, anti-vascular endothelial growth factor (VEGF) agents have profoundly transformed the management of neovascular AMD (nAMD) and are credited with unprecedented improvements in vision preservation and quality of life for millions of patients in the United States. After 2 years of treatment with an anti-VEGF agent, more than 95% of patients can expect to remain within 3 lines of their baseline visual acuity, and up to 40% can expect an improvement of 3 lines in the affected eye over baseline.3 Evidence suggests that real-world outcomes lag behind those documented in clinical trials.4 Analysis of medical claims data in the United States has found that patients with newly diagnosed nAMD receive fewer anti-VEGF injections and less frequent monitoring.5 Additionally, a recent cohort study in the United States found that more than 20% of patients receiving an anti-VEGF agent discontinued treatment and did not follow up.6 The relentless chronicity of nAMD most likely contributes to less than optimal outcomes. Some patients require regular anti-VEGF agent injections despite already receiving treatment for at least 10 years.7 Even with the profound benefits that available anti-VEGF agents have provided, innovations are needed in nAMD management. Investigational agents that could improve outcomes include a continuous delivery system for ranibizumab, an FDA-approved source of intravitreal bevacizumab, new anti-VEGF agents that extend the dosing interval, gene therapy to deliver anti-VEGF proteins,8 and agents with new mechanisms of action. This article provides an overview of AMD epidemiology, pathophysiology, diagnosis, and prevention, while also reviewing current and emerging anti-VEGF agents and management approaches. Staging and Pathophysiology of AMD AMD stages are characterized as early, intermediate, and late. In general, early AMD, also referred to as age-related maculopathy, has multiple small lipid deposits called drusen (<63 \u00b5m) and a smaller number of medium drusen (63-125 \u00b5m) under the retina, or mild pigmentation abnormalities of the retinal pigment epithelium (RPE) in at least 1 eye.9 Intermediate AMD is characterized by at least 1 large druse (>125 \u00b5m), retinal pigment abnormalities, or geographic atrophy of the RPE that does not involve the center of the fovea. Late AMD is vision-threatening. As shown in Table 1,9 it is categorized as either pure geographic atrophy involving the foveal center (eg, dry) or neovascular (eg, wet).9 In geographic atrophy, degeneration of the RPE in the foveal center leads to photoreceptor apoptosis and a loss of central vision; there is no current treatment. In nAMD (eg, wet AMD), choroidal neovascularization (CNV) leads to uncontrolled growth of new leaky blood vessels under the macula.9 VEGF-A, -B, -C, -D, virally encoded VEGF-E, and placental growth factor are members of a family of proteins that regulate vascular permeability in the retina.10 VEGF-A, the principal driver of neovascularization in AMD, induces angiogenesis and increases vascular permeability and inflammation. Over time, this causes progressive degeneration of photoreceptors and the RPE, and retinal fluid can accumulate, leading to edema and functional deterioration. Epidemiology of AMD The risk of late AMD, including nAMD and geographic atrophy, increases exponentially in advanced age.1,2,11 The Beaver Dam Eye Study examined the incidence of disease in a cohort of patients aged 43 to 86 years.11 The 15-year cumulative incidence in the entire cohort was 14.3% for early AMD and 3.1% for late AMD. For those aged 75 years or older, the cumulative incidence was 24% for early and 8% for late AMD.11 A meta-analysis of studies that used fundus photography and standardized protocols to assess disease prevalence found a progressive increase in the incidence of both early and late AMD with age.2 Prevalence increased rapidly after age 75 years, especially in those of European descent. The overall prevalence of late AMD across all ethnicities was 0.15% for those aged 50 to 59 years, 0.47% for those aged 60 to 69 years, 1.46% for those aged 70 to 79 years, and 3.21% for those aged 80 to 84 years.2 AMD is more prevalent in individuals of European descent compared with Asian descent.2 Late AMD affects white individuals more than other racial groups.1 The racial make-up of patients with late AMD was 89% white, 4% African American, and 4% Hispanic American. Women, who usually have longer life expectancy than men, accounted for 65% of late AMD cases in 2010.1 Due to an aging population and increasing life expectancy, the number of Americans with late AMD, including nAMD and geographic atrophy, is increasing.1 The number of cases rose from 1.75 million in 2000 to 2.07 million in 2010, an increase of 18%, and is expected to increase to almost 3.7 million in 2030 and 5.4 million in 2050. Although white individuals will continue to account for the majority of patients, cases of AMD in Hispanic Americans are expected to increase almost 6-fold by 2050.1 Whereas the incidence of late AMD is increasing, a study that examined the 5-year risk of disease across generations in the 20th century suggests that the incidence of early or intermediate AMD has declined by 60% with each successive generation.12 This suggests that modifications in environment, behavior, or lifestyle may reduce the risk of AMD. Risk Factors for Progression to Late AMD Genetic and environmental factors contribute to the development of late AMD.13 Modifiable risk factors for progression to nAMD, identified in the Age-Related Eye Disease Study (AREDS), include smoking and body mass index.14 White race and less secondary education were among other risk factors.14 Occupational sunlight exposure has been identified as a potential risk factor for AMD.15 However, a recent meta-analysis of almost 44,000 patients found that sunlight exposure was not associated with an increased risk of disease (odds ratio [OR], 1.1; 95% CI, 0.98-1.23).16 Although aspirin was identified as a possible risk factor for AMD in some observational studies, a meta-analysis based on more than 171,000 patients did not find an association between aspirin use and AMD.17,18 The American Academy of Ophthalmology (AAO) recommends that patients who have been told by their physician to take aspirin should continue to take it.9 The largest genome-wide association study conducted to date identified 52 common and rare AMD gene variants distributed across 34 loci.19 The authors reported that susceptibility for progression to advanced AMD varies widely among individuals based on their gene variants. For example, individuals who rank in the top 10% of genetic risk have a 44-fold higher relative risk of developing advanced AMD compared with individuals in the lowest 10%. The identification of genetic variants is advancing our understanding about the complex biology of AMD and pinpointing mechanisms of disease that are potential therapeutic targets.19 Diagnosis and Monitoring of Neovascular AMD A comprehensive dilated eye examination is often necessary to diagnose early or intermediate AMD because it is usually asymptomatic.9 AMD is generally diagnosed through a dilated fundus examination, during which the retina is examined for drusen, which appear as yellow deposits, and pigmentary changes caused by waste products from damaged retinal cells. Diagnostic tools used by retinal specialists for diagnosis and monitoring treatment response to anti-VEGF agents include optical coherence tomography (OCT), fluorescein angiography, and more recently OCT-angiography.9 Fluorescein angiography detects leaky blood vessels characteristic of late AMD. Signs and symptoms of nAMD that can appear and progress over days to weeks include loss of both far and near vision, sudden visual distortion (particularly wavy lines), central vision loss, and changes in color vision.20 AMD may be underdiagnosed in the United States, as it was found in a recent cross-sectional study that approximately 25% of eyes were found to have AMD despite there being no diagnosis of the disease by primary eye care ophthalmologists or optometrists in the medical record.21 Thirty percent of patients with undiagnosed AMD had large drusen, indicating intermediate AMD. Early diagnosis of nAMD is crucial because patients can lose an average of 3 to 5 lines of vision during progression from intermediate to nAMD.22 Further, vision outcomes 1 and 2 years after initiation of an anti-VEGF agent are strongly predicted by visual acuity at the time treatment is started.23 Patients with intermediate AMD who are at high risk for progression to nAMD can self-monitor for changes in central vision that herald this development. The traditional method, practiced since the 1950s, is to periodically check an Amsler grid to test if lines on the grid disappear or appear wavy.24 However, Amsler grid monitoring has low detection rates, likely because of low sensitivity and patient adherence. Monitoring with a macular visual-field testing method, preferential hyperacuity perimeter (PHP), has greater sensitivity and specificity.24 PHP home monitoring is emerging as a telemedicine solution to more efficiently monitor the growing population of elderly patients at risk for late AMD.25 In the 2018 annual American Society of Retina Specialists (ASRS) survey, 25% of US retinal specialists reported using PHP home monitoring.26 The ForeseeHome program (Notal Vision) is the first validated and FDA-approved PHP home monitoring system to detect visual distortions in nAMD.27 It is indicated for use by patients with intermediate AMD in both eyes, or those with intermediate AMD in 1 eye and CNV in the other. Patients with best corrected vision of 20\/60 can monitor PHP daily with a device at home, a task that takes approximately 3 minutes per eye.28 The data are transmitted to a central data center via telemonitoring where they are compared with a normative database and the patient's previous history. A significant change in vision triggers notification of the patient's ophthalmologist.28 Medicaid previously covered the program, but that is currently being challenged. The development of more advanced at-home monitoring technology is expected to change the treatment paradigm in nAMD. The FDA recently granted breakthrough device designation to Notal Home OCT (Notal Vision), a home-based OCT device that is being developed to monitor nAMD.29 This system uses artificial intelligence and a machine-learning algorithm to detect retinal fluid changes on OCT performed by the patient at home. Results are relayed via a cloud-based platform similar to the one used by ForeseeHome. The company expects it to reach the market in 2020.29 Technology similar to this has the potential to substantially reduce the monitoring burden associated with zero-tolerance for fluid OCT monitoring. Prevention of AMD The use of supplements to prevent progression in selected patients with AMD is based on the single clinical trial AREDS. In this study of more than 4700 patients who were followed for a mean of 6.3 years, a supplement containing vitamins C and E, beta-carotene, and zinc reduced progression of intermediate or advanced AMD in the fellow eye to advanced AMD.30 Patients with intermediate AMD in 1 or both eyes or advanced AMD in 1 eye had reduced progression to advanced AMD (OR, 0.66; 99% CI, 0.47-0.91) and reduced risk for vision loss (OR, 0.73; 99% CI, 0.54-0.99). Participants with less severe disease had no benefit.30 Treatment of 13 patients with immediate or advanced AMD with this supplement for 5 years is expected to prevent 1 patient from progressing to severe AMD.31 The AREDS2 study altered the original AREDS formula in different study arms.32 In the AREDS2 study, beta-carotene was replaced with lutein and zeaxanthin because of the association between beta-carotene and lung cancer in smokers. Omega-3 fatty acids (DHA 350 mg, EPA 650 mg) were added to determine if there would be a benefit. These formulation changes did not impact results with the original formulation. In other words, substituting lutein plus zeaxanthin for beta-carotene is reasonable; however, adding omega-3 fatty acids was found not to be beneficial to prevent progression of intermediate AMD to advanced AMD.32 The AAO recommends that an antioxidant vitamin and mineral supplement consistent with the products used in the AREDS and AREDS2 trials be considered in patients with intermediate or advanced AMD.9 Patients with an earlier stage of AMD or individuals who do not have the disease should be advised that there is no evidence that supplementation is helpful in these cases. Current Treatment Options and Management Approaches Anti-VEGF agents have had a significant impact on the management of nAMD, which was illustrated by the explosive growth in intravitreal injections given to Medicare part B recipients over the past 15 years. Whereas fewer than 3000 intravitreal injections (this includes diabetic retinopathy) were given in the year 2000, at least 2.6 million injections of ranibizumab and aflibercept were administered in 2014.33 Clinical practice guidelines from medical organizations in the United States and Europe concur that anti-VEGF agents are first-line treatment of nAMD because they have been shown to improve visual and anatomic outcomes over other therapies.9,20,34,35 The use of earlier treatment strategies for nAMD, including laser photocoagulation and photodynamic therapy, have largely been supplanted by anti-VEGF agents.9,33 Anti-VEGF treatment options for nAMD have evolved since pegaptanib, the first intravitreal anti-VEGF formulation, received FDA approval in 2004. Pegaptanib is no longer routinely used in clinical practice because it did not substantially improve visual acuity in clinical trials of new-onset nAMD.9 Since then, the FDA approved ranibizumab in 2006 and aflibercept in 2011.34 Off-label prescribing of bevacizumab is also a treatment option,36,37 and it has remained a possibility since then because demonstrated efficacy is noninferior to ranibizumab.34 The properties of current anti-VEGF agents are compared in Table 2.33,38-42 Anti-VEGF Agent Safety Ocular severe AEs of intravitreal anti-VEGF therapy include rare reports of infectious and noninfectious endophthalmitis, retinal detachment, and increased intraocular pressure.9,34 Whereas systemic AEs have periodically been raised as a concern, a large body of evidence indicates that the risk of systemic AEs with intravitreal injections of anti-VEGF agents remains below the level of detection.43,44 A 2014 Cochrane review did not find a difference in the risk of serious systemic AEs between intravitreal ranibizumab and bevacizumab.45 Results of a 2019 Cochrane review that evaluated aflibercept, bevacizumab, and ranibizumab found no difference in serious systemic AEs between anti-VEGF agents or control groups.46 Formulation Issues in Product Selection Despite a cost benefit for intravitreal bevacizumab, there are important caveats to its use. The sterile compounding that is needed to prepare intravitreal injections provides an opportunity for contamination to occur. Periodically, outbreaks of bacterial and fungal endophthalmitis involving preservative-free bevacizumab have been associated with morbidity and vision loss.47 In addition, variable concentrations of active drug and silicone oil droplets have been reported with repackaged syringes of bevacizumab from compounding pharmacies.48,49 Managed care organizations that obtain intravitreal bevacizumab from compounding pharmacies must comply with state legislation and FDA sterile compounding guidelines that were adopted after the New England Compounding Center multistate fungal meningitis outbreak in 2012. Traditionally, anti-VEGF agents for intravitreal injection have been provided in glass vials. The transfer from vial to syringe before the injection is an extra step in the process that poses a risk for bacterial contamination. While packaging in prefilled syringes is more efficient and can potentially reduce the risk of endophthalmitis, ranibizumab is the only agent that is currently available as a prefilled syringe. A recent multicenter retrospective study conducted in the United States and Japan compared the incidence of endophthalmitis with conventional vials and prefilled syringes of ranibizumab.50 It was found that culture-positive endophthalmitis was significantly reduced with prefilled syringes (OR, 0.19; 95% CI, 0.045-0.82; P = .025). This represented an incidence of 0.013% (1 in 7516 injections) with vials and 0.0026% (1 in 39,204 injections) with prefilled syringes. Vision loss after culture-positive endophthalmitis was significantly greater with vials than prefilled syringes (4.45 vs 0.38 lines lost; P = .0062).50 Periodic clusters of ocular inflammation cases have been reported with aflibercept since it became available in the United States.51-53 The first cluster of 15 cases occurred within 3 months of marketing, prompting the ASRS to form a subcommittee to monitor and report on these events.51 The committee recently summarized the most recent clusters of cases reported to the organization.53 Between May 2017 and February 2018, sterile inflammation was reported in 68 eyes in 66 patients. Although a total of 26 aflibercept lots were involved, 4 lots accounted for 56% of cases.53 Analysis by the manufacturer found an association between certain batches of syringes that were co-packaged with aflibercept.54 The annualized rate of intraocular inflammation with the identified syringes was 8 to 12 reports per 10,000 vials. After the lots and syringes were removed from the market, the annualized rate of intraocular inflammation returned to the usual rate of 1 to 4 reports per 10,000 vials.54 The syringes used to inject anti-VEGF agents are not designed for intravitreal administration. Some of them have been reported to release silicone droplets that have the potential to cause \"floaters\" that obstruct the patient's vision.49 A recent study suggests the risk of silicone droplets is increased with certain syringe brands and flicking the syringe.55,56 Among syringes available in the United States, silicone oil was released the most by Terumo 0.5 mL and BD Ultra-Fine 0.3 mL, and the least by BD Tuberculin 1 mL and Exel 0.3 mL.55 A case-control study in Brazil linked inflammation after aflibercept intravitreal injections with silicone oil droplets from a specific brand of syringe.56 All of the issues raised here illustrate the complexity of intravitreal administration and the potential for formulation-specific problems to impact product selection. Medical Society Recommendations for Anti-VEGF Agents in Neovascular AMD Clinical practice guidelines from the United States and Europe commonly agree that 2 years of treatment with an available intravitreal anti-VEGF agent is safe and effective.7,9,20,34,35 Bevacizumab and ranibizumab had comparable efficacy in the Comparison of AMD Treatment Trial (CATT), the Inhibition of VEGF in Age-related Choroidal Neovascularization (IVAN) trial, and the Groupe d'Etude Fran\u00e7ais Avastin versus Lucentis dans la DMLA n\u00e9ovasculaire (GEFAL) study. Aflibercept and ranibizumab had comparable efficacy in the VEGF Trap-Eye: Investigation of Efficacy and Safety in Wet AMD (VIEW 1, VIEW 2) trials.34 A caveat is that bevacizumab and aflibercept have not been compared head-to-head.7 In the 2018 ASRS survey, the first-line agent of US retinal specialists for nAMD was bevacizumab (70.2%), followed by aflibercept (16.4%), and ranibizumab (12.8%).57 Dosing and Monitoring of Anti-VEGF Agents FDA-approved regimens of anti-VEGF agents require an injection every 4 weeks or as needed after 3 loading doses for ranibizumab.40 For aflibercept, injections are FDA approved to be administered every 4 weeks or every 8 weeks after 3 loading doses.39 In August 2018, the aflibercept prescribing information was revised to allow the dosing interval to stretch to every 12 weeks in the second year of treatment.39 This change is based on data from the second year of the VIEW trials in which patients were treated \"as needed\" based on monitoring every 4 weeks, with a maximum dosing interval of every 12 weeks.58 Criteria for early retreatment included new or persistent fluid on OCT, an increase in central retinal thickness of greater than or equal to 100 mm over the lowest previous value, loss of 5 or more letters from the best previous score in conjunction with recurrent fluid on OCT, new-onset classic neovascularization, new or persistent leak on fluorescein angiography, or new macular hemorrhage.58 Regular OCT monitoring is a crucial aspect of regimens that extend the dosing interval because detection of intraretinal cystoid spaces or subretinal fluid (SRF) during maintenance anti-VEGF therapy signals CNV activity and the need to intensify anti-VEGF therapy.9,58 In the 2018 ASRS survey, almost half of US retinal specialists considered recurrent intraretinal or subretinal fluid to be the most important indicator of disease activity.26 OCT also detects central retinal thickness and other signs of disease activity such as pigment epithelial detachment. The coalescence of small soft drusen into a large mass, referred to as a drusenoid pigment epithelial detachment, is a predictor of vision loss.59 Because any fluid accumulation indicates disease activity that requires more intensive anti-VEGF therapy, close monitoring with zero-tolerance for fluid has become the principle of OCT monitoring.58 As-Needed versus Treat-and-Extend Approach A treat-and-extend regimen gradually extends the dosing interval in stable patients who demonstrate no disease activity on regular OCT monitoring.60 In a treat-and-extend algorithm, the treatment interval is gradually increased in 2-week or 4-week increments until a maximum interval of 12 to 16 weeks is reached. If disease activity is observed, depending on severity, the treatment interval is reduced or reverts to monthly dosing. Treat-and-extend regimens may theoretically reduce the risk of intraocular pressure elevation over time compared with monthly dosing.60 As-needed regimens monitor patients closely and give another injection when recurrent disease activity is detected, whereas treat-and-extend regimens maintain treatment at an extended interval with the goal of preventing disease recurrence.60,61 Although as-needed regimens may reduce the number of injections, patients must still adhere to monthly disease activity monitoring. Because as-needed dosing is not as proactive as treat-and-extend dosing, it may allow for recurrence of disease activity and may culminate in vision loss for some patients.60,61 Clinicians may prefer an as-needed regimen for patients who have a very high risk of geographic atrophy.60 Evolving data suggest that greater anti-VEGF exposure may predispose patients to develop vision loss from geographic atrophy, which is now referred to as macular atrophy in treated eyes.62 Notably, undertreatment with anti-VEGF agents remains a significant problem in managing patients with wet AMD.5 In a 2015 ASRS survey, almost 65% of US respondents preferred treat-and-extend regimens for managing active nAMD.7 Individualization of Anti-VEGF Therapy Retinal specialists need access to different anti-VEGF agents to individualize therapy. Although they may be clinically equivalent in large-scale clinical trials, patients may respond differently to specific anti-VEGF agents. Patients with nAMD are a heterogenous group who differ widely according to needed treatment intensity. Disease activity can be suppressed with an injection interval ranging from 4 to 12 weeks in approximately 10% to 20% of patients.7 The duration of VEGF suppression varies among patients and anti-VEGF agents.61 This could relate to differences in size and affinity for VEGF-A.34,39-41 Therefore, matching an individual patient to the appropriate anti-VEGF agent, dosing approach (ie, fixed, as-needed, or treat-and-extend), and dosing interval is complicated and should not be constrained by limiting clinician access to treatment options. Anti-VEGF agents have specific attributes that may benefit individual patients based on their priorities and goals for treatment. For example, bevacizumab is an option for patients with end-stage AMD with poor visual acuity and whose highest priority is avoiding out-of-pocket expenses. An analysis based on data from the CATT found it more cost-effective compared with ranibizumab in newly diagnosed patients aged 80 years or older.63 On the basis of potentially greater safety, ranibizumab may be the preferred agent for patients who are aged 85 years or older. Results from a European Medicines Agency Public Assessment report for aflibercept demonstrated a potentially higher rate of cerebrovascular events with aflibercept compared with ranibizumab in patients aged 85 years or older.64 In a meta-analysis of ranibizumab AEs in this age group, there were no reports of an increase in the risk of total nonocular serious AEs, arterial thromboembolic events, cardiovascular events, or Antiplatelet Trialists' Collaboration events compared with controls. There were too few cerebrovascular events or deaths to evaluate these end points.65 It is essential for retinal specialists to have ready access to treatment options for patients who do not respond adequately to initial treatment. In the 2018 ASRS survey, almost 80% of US retinal specialists considered switching to another anti-VEGF agent when the response is inadequate after 3 to 6 injections.57 An estimated 10% to 25% of patients do not respond adequately to initial treatment.66,67 Retinal specialists need to be able to access treatment alternatives, as treatment delays are associated with worsened visual acuity.68 As the third agent to reach the market, aflibercept has been evaluated in patients with persistent disease activity despite treatment with bevacizumab or ranibizumab. In a post hoc analysis of the VIEW trials, patients with early persistent retinal fluid had greater visual gains and less vision loss with aflibercept 2 mg every 4 weeks than with ranibizumab 0.5 mg every 4 weeks or aflibercept 2 mg every 8 weeks.69 A meta-analysis of 28 studies in more than 2200 eyes found that aflibercept stabilizes vision loss in patients with treatment resistance to bevacizumab or ranibizumab.67 Pigment epithelial detachment during treatment with bevacizumab or ranibizumab was also found to stabilize after switching to aflibercept.59 Emerging Treatment Options for Age-Related Macular Degeneration Emerging anti-VEGF treatment options may help to reduce the burden of frequent injections. This can be beneficial for many stakeholders, including patients and their caregivers, overextended ophthalmology practices, and payers. Reducing the burden of anti-VEGF injections may also decrease the risk of rare complications, including endophthalmitis, retinal detachment, and increased intraocular pressure.34 Results of the 2018 ASRS survey found that the majority US retinal specialists considered the greatest unmet need of patients with nAMD to be a reduced treatment burden (73.2%) followed by long-acting or sustained delivery options (56%).57 An additional unmet need is the treatment gap with currently available agents. More than half of patients have vision loss that may limit daily activities despite receiving an anti-VEGF agent.70 This suggests that agents with different mechanisms of action would benefit patient care. Innovative agents in phase 3 clinical development for nAMD are discussed in later sections. This does not include gene therapy as these agents are still in early phases of development. Abicipar Pegol Abicipar pegol (formerly AGN-150998) specifically binds with high affinity to all soluble isoforms of VEGF-A.71 Properties that may account for the longer duration of action include a longer ocular half-life, pegylated molecular structure, and high target-binding affinity.71 Initial results have been reported from 2 phase 3 clinical trials (SEQUOIA and CEDAR) that compared abicipar pegol and ranibizumab in treatment-na\u00efve patients with nAMD.72 Patients were randomized to 3 arms: abicipar pegol every 4 weeks for 3 doses, followed by every 8 weeks; abicipar pegol every 4 weeks for 2 doses, with a subsequent dose after 8 weeks followed by every 12 weeks; or ranibizumab every 4 weeks. The prespecified primary end point was noninferiority to ranibizumab for stable vision (vision loss of \u226415 letters in best corrected visual acuity [BCVA] from baseline) at 1 year. The efficacy and the overall AE rate were similar after 1 year of treatment that required 6 to 8 injections of abicipar pegol compared with 13 injections of ranibizumab. However, those treated with abicipar pegol had a substantial incidence of intraocular inflammation, with roughly 15% of abicipar-treated eyes experiencing this AE. The manufacturing process has been modified in an effort to reduce intraocular inflammation with abicipar pegol. The MAPLE Study suggests these efforts have been modestly successful. This follow-up 100-patient study had a reduced intraocular inflammation (IOI) rate of 8.9%, and only 1.6% of the IOI cases were deemed moderately severe or severe.73 Brolucizumab Brolucizumab (formerly RTH258 and ESBA1008) is a humanized single-chain antibody fragment that inhibits all forms of VEGF-A.4 A low molecular weight (26 kDa) and high concentration gradient between vitreous and retina may enhance retinal delivery of brolucizumab.74 Brolucizumab has high stability and solubility, allowing delivery of a higher dose in the usual volume of an intravitreal injection.4 Two published phase 3 trials (HAWK and HARRIER) compared brolucizumab with aflibercept in treatment-na\u00efve patients with nAMD.74 The primary end point in both studies was noninferiority to aflibercept in mean change in BCVA from baseline to week 48. Patients were randomized to brolucizumab 3 mg, brolucizumab 6 mg, or aflibercept 2 mg in HAWK; HARRIER randomized patients to brolucizumab 6 mg or aflibercept 2 mg. After doses at weeks 0, 4, and 8, brolucizumab was given every 12 weeks unless disease activity was found at week 16. After doses at weeks 0, 4, and 8, aflibercept was given every 8 weeks. At week 16, a masked investigator assessed disease activity using specific criteria for central subfield thickness (CST) and intraretinal fluid (IRF) on spectral domain OCT. If disease activity was present, the dosing interval of brolucizumab was permanently reduced to every 8 weeks. During the HAWK trial, a prespecified superiority analysis was conducted at week 16, when both brolucizumab and aflibercept had the same treatment exposure.74 Brolucizumab was noninferior to aflibercept in the primary outcomes in both studies.74 More than half of patients receiving brolucizumab 6 mg continued on the 12-week dosing interval through week 48, a reduction of 2 injections per year. In the prespecified superiority analysis of HAWK at week 16, the incidence of disease activity was lower with brolucizumab 6 mg compared with aflibercept (24.0% vs 34.5%; P = .001). Superiority was also demonstrated for CST reduction and presence of IRF\/SRF.74 Overall rates of ocular and nonocular AEs were similar with brolucizumab and aflibercept.74 Uveitis and iritis occurred somewhat more frequently with brolucizumab than aflibercept. The rate of uveitis was 2.2% with brolucizumab 6 mg and 0.3% with aflibercept in HAWK, and <1% with both drugs in HARRIER. The incidence of iritis was 2.2% with brolucizumab 6 mg and 0% with aflibercept in HAWK, and <1% with both drugs in HARRIER.74 A biologics license application has been submitted to the FDA. If approved, it could reach the market by the end of 2019.75 Faricimab Faricimab (formerly RG7716 or RO 6867461) is a bispecific antibody that binds both VEGF-A and Ang-2 with high affinity and specificity.76 Preliminary data from phase 2 clinical trials suggest that faricimab has the potential to extend the dosing interval to every 16 weeks during maintenance therapy. Phase 3 clinical trials in nAMD, TENAYA and LUCERNE, are currently underway.77 ONS-5010 ONS-5010 is an intravitreal bevacizumab formulation that entered phase 3 development for nAMD in late 201878 that is also being evaluated for treatment of diabetic macular edema and branch retinal vein occlusion. Although it met bioequivalency criteria compared with both US and European reference products in a phase 1 trial, ONS-5010 is not being developed as a biosimilar. Two phase 3 trials will be comparing ONS-5010 with ranibizumab. The first trial is currently enrolling patients in Australia and New Zealand, and the second 11-month trial began recruiting 180 patients in the United States in the second quarter of 2019.79 Ranibizumab Port Delivery System An investigative approach that intends to provide sustained intraocular delivery of an anti-VEGF agent is the ranibizumab port delivery system (PDS).80,81 The PDS, which is slightly longer than a grain of rice, is implanted through a small incision in the sclera at the pars plana. Insertion occurs in a surgical procedure under local anesthesia. The procedure includes laser ablation of the choroidal vessels at the incision line to reduce the risk of vitreous hemorrhage. After implantation, the PDS continuously releases ranibizumab via passive diffusion into the vitreous cavity. Refilling the port is an office procedure that is slightly more complex than an intravitreal injection. A customized needle, which must be held perpendicular to the device, injects ranibizumab into a self-sealing septum in the center of the implant. The needle has a dual lumen to remove and replace any remaining ranibizumab from the implant.80 Published results of the phase 2 LADDER trial provide insights about this approach.80 After 9 months, patients receiving ranibizumab 100 mg\/mL and monthly ranibizumab injections had similar increases in BCVA (adjusted mean change from baseline of +5.0 vs +3.9 letters) and reductions in central foveal thickness. In patients receiving the implant, rates of ocular serious AEs and postoperative vitreous hemorrhage were 8.9% and 4.5%, respectively. The ranibizumab PDS is currently being evaluated in ARCHWAY, a phase 3 clinical trial enrolling patients with recently diagnosed nAMD who have responded to anti-VEGF therapy.80 Intravitreal Anti-VEGF Biosimilars In addition to the new molecular entities discussed here, managed care will likely need to adapt to the entry of anti-VEGF biosimilars in the market. Patent expiration dates in the United States are in July 2019 for bevacizumab,82 June 2020 for ranibizumab,83 and June 2020 for aflibercept.84 Bevacizumab-awwb (Mvasi), a biosimilar for the treatment of colorectal, lung, brain, kidney, and cervical cancers,85 received FDA approval in 2017.86 Patent litigation concerns have prevented bevacizumab-awwb from reaching the US market, but it is forecasted to launch in July 2019.87 Another bevacizumab biosimilar, SB8, is currently in phase 3 development.88 It is unclear how bevacizumab biosimilars intended for use in oncology will affect the repackaging of bevacizumab for intravitreal administration by compounding facilities. Any impact may be temporary, depending on whether the FDA grants approval to ONS-5010. Ranibizumab biosimilars in phase 3 development include FYB201, SB11, and Xlucane.84 Development of FYB201 is on track for FDA approval by the time patents for ranibizumab expire. Aflibercept biosimilars are also in development.84 Management of Neovascular AMD in Managed Care The cost of providing care to patients with nAMD is a key issue for the Centers for Medicare & Medicaid Services (CMS), as anti-VEGF agents account for a large portion of the CMS budget.89 In August 2018, CMS released a memo that allows Medicare Advantage plans to implement step therapy for physician-administered part B drugs starting January 1, 2019.90 A previous 2012 memo had prohibited this practice for Medicare Advantage plans.91 This policy change has raised awareness among medical organizations that represent retinal specialists and other ophthalmologists that the policy could cause sight-threatening delays in accessing appropriate and necessary anti-VEGF agents, based on clinical judgment. Dialogue between payers and providers about the latest advancements in nAMD management is a key tool in helping to provide optimal and cost-effective healthcare services to patients with this disease. The impact of anti-VEGF agent cost efficacy and other cost- and quality-related issues will be discussed in detail in the second section of this supplement. To serve the needs of patients with nAMD, retinal specialists need immediate access to new treatment options with longer dosing intervals due to sustained delivery or increased durability of anti-VEGF drugs. Agents with new mechanisms of action are also needed for patients who do not respond adequately to current anti-VEGF agents. Anti-VEGF agents that address these needs are expected to reach the market over the next few years. Brolucizumab and abicipar pegol are anti-VEGF agents proven to be effective with extended dosing intervals and are expected to be considered for FDA approval sooner than faricimab or ranibizumab PDS. Development of abicipar pegol may be impeded by a high rate of intraocular inflammation. The ranibizumab PDS phase 3 clinical trial (ARCHWAY) is expected to show whether continuous (as opposed to pulsatile with injections) exposure to anti-VEGF therapy can improve the treatment response. Clinical trials with faricimab, the bispecific antibody that binds both VEGF-A and Ang-2, will elucidate the role of Ang-2 in nAMD. FDA approval of ONS-5010, the first bevacizumab formulation designed for intravitreal administration, could eliminate the need for bevacizumab compounding by 503B compounding pharmacies. As clinical development of these agents progresses, optimism is building that patients with nAMD will soon have a lighter burden of injections and monitoring while still maintaining their vision. Author affiliations: Director of Retinal Services, Pepose Vision Institute, Chesterfield, MO; Professor of Clinical Ophthalmology, Washington University School of Medicine, St Louis, MO. Funding source: This activity is supported by an independent medical education grant from Regeneron Pharmaceuticals, Inc. Author disclosure: Dr Holekamp has the following relevant financial relationships with commercial interests to disclose: BOARD MEMBERSHIP: Gemini Clinical Advisory Board; Consultancies: Allegro, BioTime, Clearside, Genentech, Katalyst, Novartis, Regeneron GRANTS: Gemini, Gyroscope, Roche\/Genentech SPEAKERS BUREAU: Alimera Sciences, Allergan, Genentech, Regeneron, Spark PATENTS: Katalyst STOCK OWNERSHIP: Katalyst Authorship information: Concept and design, critical revision of the manuscript for important intellectual content, and supervision. Address correspondence to: nholekamp@peposevision.com. Medical writing and editorial support: Jill E. Allen, PharmD, BCPS. Age-related macular degeneration (AMD). National Eye Institute website. www.nei.nih.gov\/eyedata\/amd. Accessed April 10, 2019. Wong WL, Su X, Li X, et al. Global prevalence of age-related macular degeneration and disease burden projection for 2020 and 2040: a systematic review and meta-analysis. Lancet Glob Health. 2014;2(2):e106-e116. doi: 10.1016\/S2214-109X(13)70145-1. Ho AC, Albini TA, Brown DM, Boyer DS, Regillo CD, Heier JS. The potential importance of detection of neovascular age-related macular degeneration when visual acuity is relatively good. JAMA Ophthalmol. 2017;135(3):268-27 doi: 10.1001\/jamaophthalmol.2016.5314. Holz FG, Dugel PU, Weissgerber G, et al. Single-chain antibody fragment VEGF inhibitor RTH258 for neovascular age-related macular degeneration: a randomized controlled study. Ophthalmology. 2016;123(5):1080-1089. doi: 10.1016\/j.ophtha.2015.12.030. Holekamp NM, Liu Y, Yeh WS, et al. Clinical utilization of anti-VEGF agents and disease monitoring in neovascular age-related macular degeneration. Am J Ophthalmol. 2014;157(4):825-833.e821. doi: 10.1016\/j.ajo.2013.12.018. Obeid A, Gao X, Ali FS, et al. Loss to follow-up among patients with neovascular age-related macular degeneration who received intravitreal anti-vascular endothelial growth factor injections. JAMA Ophthalmol. 2018;136(11):1251-1259. doi: 10.1001\/jamaophthalmol.2018.3578. Brown D, Heier JS, Boyer DS, et al. Current best clinical practices\u2014management of neovascular AMD. J VitreoRetin Dis. 2017;1(1):1-4. doi: 10.1177\/2474126417725946. Adverum Biotechnologies provides clinical program update on ADVM-022 gene therapy for wet AMD [news release]. Menlo Park, CA: Adverum Biotechnologies, Inc; April 15, 2019. www.globenewswire.com\/news-release\/2019\/04\/15\/1804030\/0\/en\/Adverum-Biotechnologies-Provides-Clinical-Program-Update-on-ADVM-022-Gene-Therapy-for-Wet-AMD.html. Accessed June 11, 2019. American Academy of Ophthalmology. Age-Related Macular Degeneration Preferred Practice Pattern\u2014Updated 2015. American Academy of Ophthalmology website. aao.org\/preferred-practice-pattern\/age-related-macular-degeneration-ppp-2015. Updated January 2015. Accessed April 10, 201 Apte RS, Chen DS, Ferrara N. VEGF in signaling and disease: beyond discovery and development. Cell. 2019;176(6):1248-1264. doi: 1016\/j.cell.2019.01.021. Klein R, Klein BEK, Knudtson MD, Meuer SM, Swift M, Gangnon RE. Fifteen-year cumulative incidence of age-related macular degeneration: the Beaver Dam Eye Study. Ophthalmology. 2007;114(2):253-262. doi: 10.1016\/j.ophtha.2006.10.040. Cruickshank KJ, Nondahl DM, Johnson LJ, et al. Generational differences in the 5-year incidence of age-related macular degeneration. JAMA Opthalmol. 2017;135(12):1417-1423. doi: 10.1001\/jamaophthalmol.2017.5001. Seddon JM, Rosner B. Validated prediction models for macular degeneration progression and predictors of visual acuity loss identify high-risk individuals. Am J Ophthalmol. 2019;198:223-261. doi: 10.1016\/j.ajo.2018.10.022. Clemons TE, Milton RC, Klein R, Seddon JM, Ferris FL 3rd; Age-Related Eye Disease Study Research Group. Risk factors for the incidence of advanced age-related macular degeneration in the Age-Related Eye Disease Study (AREDS) AREDS report no. 19. Ophthalmology. 2005;112(4):533-539. doi: 10.1016\/j.ophtha.2004.10.047. Modenese A, Gobba F. Macular degeneration and occupational risk factors: a systematic review. Int Arch Occup Environ Health. 2019;92(1):1-11. doi: 10.1007\/s00420-018-1355-y. Zhou H, Zhang H, Yu A, Xie J. Association between sunlight exposure and risk of age-related macular degeneration: a meta-analysis. BMC Ophthalmol. 2018;18(1):331. doi: 10.1186\/s12886-018-1004-y. Klein BE, Howard KP, Gangnon RE, Dreyer JO, Lee KE, Klein R. Long-term use of aspirin and age-related macular degeneration. JAMA. 2012;308(23):2469-2478. doi: 10.1001\/jama.2012.65406. Zhu W, Wu Y, Xu D, et al. Aspirin use and risk of age-related macular degeneration: a meta-analysis. PLoS One. 2013;8(3):e58821. doi: 10.1371\/journal.pone.0058821. Fritsche LG, Igl W, Bailey JN, et al. A large genome-wide association study of age-related macular degeneration highlights contributions of rare and common variants. Nat Genet. 2016;48(2):134-143. doi: 10.1038\/ng.3448. Tuuminen R, Uusitalo-Jarvinen H, Aaltonen V, et al. The Finnish national guideline for diagnosis, treatment and follow-up of patients with wet age-related macular degeneration. Acta Ophthalmol. 2017;95(A105 suppl):1-9. doi: 10.1111\/aos.13501. Neely DC, Bray KJ, Huisingh CE, Clark ME, McGwin G Jr, Owsley C. Prevalence of undiagnosed age-related macular degeneration in primary eye care. JAMA Ophthalmol. 2017;135(6):570-575. doi: 10.1001\/jamaophthalmol.2017.0830. Ho AC, Albini TA, Brown DM, Boyer DS, Regillo CD, Heier JS. The potential importance of detection of neovascular age-related macular degeneration when visual acuity is relatively good. JAMA Opthalmol. 2017;135(3):268-273. doi: 10.1001\/jamaophthalmol.2016.5314. Ying GS, Huang J, Maguire MG, et al. Baseline predictors for one year visual outcomes with ranibizumab or bevacizumab for neovascular age-related macular degeneration. Ophthalmology. 2013;120(1):122-129. doi: 10.1016\/j.ophtha.2012.07.042. Isaac DL, Avila MP, Cialdini AP. Comparison of the original Amsler grid with the preferential hyperacuity perimeter for detecting choroidal neovascularization in age-related macular degeneration. Arq Bras Oftalmol. 2007;70(5):771-776. Holekamp NM. Moving from clinic to home: what the future holds for opthalmic telemedicine. Am J Ophthalmol. 2018;187:28-35. doi: 10.1016\/j.ajo.2017.11.003. Kunzmann K. ASRS preferences and trends survey documents state of AMD, retina care. MD Magazine. MD Magazine website. www.mdmag.com\/conference-coverage\/asrs-2018\/asrs-preferences-and-trends-survey-documents-state-of-amd-retina-care. Published July 25, 2018. Accessed April 22, 2019. Pershing S, Stein JD. Determining the value of home monitoring of patients with age-related macular degeneration. JAMA Ophthalmol. 2017;135(5):459-460. doi: 10.1001\/jamaophthalmol.2017.0133. ForeseeHome AMD monitoring program. ForeseeHome website. www.foreseehome.com. Accessed April 20, 2019. Notal Vision announces FDA grants breakthrough device designation for pioneering patient operated home optical coherence tomography (OCT) system [news release]. Manassas, VA: Notal Vision, Ltd; December 3, 2018. notalvision.com\/production\/wp-content\/uploads\/2018\/12\/Notal-Vision-Announces-FDA-Grants-Breakthrough-Device-Designation-for-Pioneering-Patient-Operated-Home-Optical-Coherence-Tomography-OCT-System.pdf. Accessed April 25, 2019. Age-Related Eye Disease Study Research Group. A randomized, placebo-controlled, clinical trial of high-dose supplementation with vitamins C and E, beta carotene, and zinc for age-related macular degeneration and vision loss: AREDS report no. 8. Arch Ophthalmol. 2001;119(10):1417-1436. Kolber MR, Tennant M, Nickonchuk T. Vitamins for age-related macular degeneration demonstrate minimal differences. Can Fam Physician. 2013;59(5):503. Age-Related Eye Disease Study 2 (AREDS2) Research Group. Lutein + zeaxanthin and omega-3 fatty acids for age-related macular degeneration: the Age-Related Eye Disease Study 2 (AREDS2) randomized clinical trial. JAMA 2013;309(19):2005-2015. doi: 10.1001\/jama.2013.4997. McLaughlin MD, Hwang JC. Trends in vitreoretinal procedures for Medicare beneficiaries, 2000 to 2014. Ophthalmology. 2017;124(5):667-673. doi: 10.1016\/j.ophtha.2017.01.001. Bakri SJ, Thorne JE, Ho AC, et al. Safety and efficacy of anti-vascular endothelial growth factor therapies for neovascular age-related macular degeneration: a report by the American Academy of Ophthalmology. Ophthalmology. 2019;126(1):55-63. doi: 10.1016\/j.ophtha.2018.07.028. Schmidt-Erfurth U, Chong V, Loewenstein A, et al. Guidelines for the management of neovascular age-related macular degeneration by the European Society of Retina Specialists (EURETINA). Br J Ophthalmol. 2014;98(9):1144-1167. doi: 10.1136\/bjophthalmol-2014-305702. Michels S, Rosenfeld PJ, Puliafito CA, Marcus EN, Venkatraman AS. Systemic bevacizumab (Avastin) therapy for neovascular age-related macular degeneration twelve-week results of an uncontrolled open-label clinical study. Ophthalmology. 2005;112(6):1035-1047. doi: 10.1016\/j.ophtha.2005.02.007. Avery RL, Pieramici DJ, Rabena MD, Castellarin AA, Nasir MA, Giust MJ. Intravitreal bevacizumab (Avastin) for neovascular age-related macular degeneration. Ophthalmology. 2006;113(3):363-372. doi: 10.1016\/j.ophtha.2005.11.019. Avastin [prescribing information]. South San Francisco, CA: Genentech, Inc; 2019. www.gene.com\/download\/pdf\/avastin_prescribing.pdf. Accessed May 16, 2019. Eylea [prescribing information]. Tarrytown, NY: Regeneron Pharmaceuticals, Inc; 2019. www.regeneron.com\/sites\/default\/files\/EYLEA_FPI.pdf. Accessed May 16, 2019. Lucentis [prescribing information]. South San Francisco, CA: Genentech, Inc; 2018. www.gene.com\/download\/pdf\/lucentis_prescribing.pdf. Accessed May 16, 2019. Papadopoulos N, Martin J, Ruan Q, et al. Binding and neutralization of vascular endothelial growth factor (VEGF) and related ligands by VEGF Trap, ranibizumab and bevacizumab. Angiogenesis. 2012;15(2):171-185. doi: 10.1007\/s10456-011-9249-6. Simo R, Sundstrom JM, Antonetti DA. Ocular anti-VEGF therapy for diabetic retinopathy: the role of VEGF in the pathogenesis of diabetic retinopathy. Diabetes Care. 2014;37(4):893-899. doi: 10.2337\/dc13-2002. Ueta T, Noda Y, Toyama T, Yamaguchi T, Amano S. Systemic vascular safety of ranibizumab for age-related macular degeneration: systematic review and meta-analysis of randomized trials. Ophthalmology. 2014;121:2193-203.e1-7. doi: 10.1016\/j.ophtha.2014.05.022. Thulliez M, Angoulvant D, Pisella PJ, Bejan-Angoulvant T. Overview of systematic reviews and meta-analyses on systemic adverse events associated with intravitreal anti-vascular endothelial growth factor medication use. JAMA Ophthalmol. 2018;136(5):557-566. doi: 10.1001\/jamaophthalmol.2018.0002. Moja L, Lucenteforte E, Kwag KH, et al. Systemic safety of bevacizumab versus ranibizumab for neovascular age-related macular degeneration. Cochrane Database Syst Rev. 2014(9):Cd011230. doi: 10.1002\/14651858.CD011230.pub2. Soloman SD, Lindsley K, Vedula SS, Krzystolik MG, Hawkins BS. Anti-vascular endothelial growth factor for neovascular age-related macular degeneration (review). Cochrane Database Syst Rev. 2019;3:CD005139. doi: 10.1002\/14651858.CD005139.pub4. Staes C, Jacobs J, Mayer J, Allen J. Description of outbreaks of health-care-associated infections related to compounding pharmacies, 2000-12. Am J Health Syst Pharm. 2013;70(15):1301-1312. doi: 10.2146\/ajhp130049. Yannuzzi NA, Klufas MA, Quach L, et al. Evaluation of compounded bevacizumab prepared for intra- vitreal injection. JAMA Ophthalmol. 2015;133(1):32-39. doi: 10.1001\/jamaophthalmol.2014.3591. Khurana RN, Chang LK, Porco TC. Incidence of presumed silicone oil droplets in the vitreous cavity after intravitreal bevacizumab injection with insulin syringes. JAMA Ophthalmol. 2017;135(7):800-803. doi: 10.1001\/jamaophthalmol.2017.1815. Storey PP, Tauqeer Z, Yonekawa Y, et al. The impact of prefilled syringes on endophthalmitis following intravitreal injection of ranibizumab. Am J Ophthalmol. 2019;199:200-208. doi: 10.1016\/j.ajo.2018.11.023. Hahn P, Kim JE, Stinnett S, et al; American Society of Retina Specialists Therapeutic Surveillance Committee. Aflibercept-related sterile inflammation. Ophthalmology. 2013;120(5):1100-1101. doi: 10.1016\/j.ophtha.2012.11.018. Hahn P, Chung MM, Flynn HW Jr, et al. Postmarketing analysis of aflibercept-related sterile intraocular inflammation. JAMA Ophthalmol. 2015;133(4):421-426. doi: 10.1001\/jamaophthalmol.2014.5650. Greenberg JP, Belin P, Butler J, et al; Aflibercept Sterile Inflammation (ASI) Research Group. Aflibercept-related sterile intraocular inflammation outcomes. Ophthalmol Retina. Published online April 11, 2019. doi: 10.1016\/j.oret.2019.04.006. Regeneron Pharmaceuticals. Letter to health care providers: update on post-marketing reports of intraocular inflammation (IOI) following administration of Eylea (aflibercept) injection. hcp.eylea.us\/retina-disease-news. May 1, 2018. Accessed April 20, 2019. Melo GB, Emerson GG, Dias CS Jr, et al. Release of silicone oil and the off-label use of syringes in ophthalmology. Br J Ophthalmol. Published online March 25, 2019. doi: 10.1136\/bjophthalmol-2019-313823. Melo GB, Dias CS Jr, Carvalho MR, et al. Release of silicone oil droplets from syringes. Int J Retin Vitr. 2019;5(7):1. doi: 10.1186\/s40942-018-0153-8. Singh RP. Global trends in retina. American Society of Retina Specialists website. www.asrs.org\/content\/documents\/2018-global-trends-in-retina-survey-highlights-website.pdf. Accessed April 22, 2019. Schmidt-Erfurth U, Kaiser PK, Korobelnik JF, et al. Intravitreal aflibercept injection for neovascular age-related macular degeneration: ninety-six-week results of the VIEW studies. Ophthalmology. 2014;121(1):193-201. doi: 10.1016\/j.ophtha.2013.08.011. Blanco-Garavito R, Jung C, Uzzan J, et al. Aflibercept after ranibizumab intravitreal injections in exudative age-related macular degeneration: the ARI2 study. Retina. 2018;38(12):2285-2292. doi: 10.10197\/IAE.0000000000001928. Freund KB, Korobelnik JF, Devenyi R, et al. Treat-and-extend regimens with anti-VEGF agents in retinal diseases: a literature review and consensus recommendations. Retina. 2015;35(8):1489-1506. doi: 10.1097\/IAE.0000000000000627. Lanzetta P, Loewenstein A; the Vision Academy Steering Committee. Fundamental principles of an anti-VEGF treatment regimen: optimal application of intravitreal anti-vascular endothelial growth factor therapy of macular diseases. Graefes Arch Clin Exp Ophthalmol. 2017;255(7):1259-1273. doi: 10.1007\/s00417-017-3647-4. Gemenetzi M, Lotery AJ, Patel PJ. Risk of geographic atrophy in age-related macular degeneration patients treated with intravitreal anti-VEGF agents. Eye (Lond). 2017;31(1):1-9. doi: 10.1038\/eye.2016.208. Stein JD, Newman-Casey PA, Mrinalini T, Lee PP, Hutton DW. Cost-effectiveness of bevacizumab and ranibizumab for newly diagnosed neovascular macular degeneration. Ophthalmology. 2014;121(4):936-945. doi: 10.1016\/j.ophtha.2013.10.037. European Medicines Agency Committee for Medicinal Products for Human Use. Assessment report: Eylea (aflibercept). Procedure No. EMEA\/H\/C\/002392\/. www.ema.europa.eu\/en\/documents\/assessment-report\/eylea-epar-public-assessment-report_en.pdf. Published September 20, 2012. Accessed May 7, 2019. Dugel PU, Singh N, Francom S, Cantrell RA, Grzeschik SM, Fung AE. The systemic safety of ranibizumab in patients 85 years and older with neovascular age-related macular degeneration. Ophthalmol Retina. 2018;2(7):667-675. doi: 10.1016\/j.oret.2018.01.010. Ferris FL 3rd, Maguire MG, Glassman AR, Ying GS, Martin DF. Evaluating effects of switching anti-vascular endothelial growth factor drugs for age-related macular degeneration and diabetic macular edema. JAMA Ophthalmol. 2017;135(2):145-149. doi: 10.1001\/jamaophthalmol.2016.4820. Spooner K, Hong T, Nair R, et al. Long-term outcomes of switching to aflibercept for treatment-resistant neovascular age-related macular degeneration. Acta Ophthalmol. Published online Feb 11, 2019. doi: 10.1111\/aos.14046. Lim JH, Wickremasinghe SS, Xie J, et al. Delay to treatment and visual outcomes in patients treated with anti-vascular endothelial growth factor for age-related macular degeneration. Am J Ophthalmol. 2012;153(4):678-686, 686.e2. doi: 10.1016\/j.ajo.2011.09.013. Jaffe GJ, Kaiser PK, Thompson D, et al. Differential response to anti-VEGF regimens in age-related macular degeneration patients with early persistent retinal fluid. Ophthalmology. 2016;123(9):1856-1864. doi: 10.1016\/j.ophtha.2016.05.016. Peden MC, Suner IJ, Hammer ME, Grizzard WS. Long-term outcomes in eyes receiving fixed-interval dosing of anti-vascular endothelial growth factor agents for wet age-related macular degeneration. Ophthalmology. 2015;122(4):803-808. Callanan D, Kunimoto D, Maturi RK, et al; REACH Study Group. Double-masked, randomized, phase 2 evaluation of abicipar pegol (an anti-VEGF DARPin therapeutic) in neovascular age-related macular degeneration. J Ocul Pharmacol Ther. 2018;34(10):700-709. doi: 10.1089\/jop.2018.0062.
Allergan and Molecular Partners announce two positive phase 3 clinical trials for abicipar pegol 8 and 12-week regimens for the treatment in patients with neovascular age-related macular degeneration [news release]. Dublin, Ireland: Allergan; July 19, 2018. www.molecularpartners.com\/allergan-and-molecular-partners-announce-two-positive-phase-3-clinical-trials-for-abicipar-pegol-8- and-12-week-regimens-for-the-treatment-in-patients-with-neovascular-age-related-macular- degeneration. Accessed April 17, 2019. Allergan and Molecular Partners announce topline safety results from MAPLE study of abicipar pegol [news release]. Dublin, Ireland: Allergan; April 2, 2019. www.molecularpartners.com\/allergan-and-molecular-partners-announce-topline-safety-results-from-maple-study-of-abicipar-pegol\/. Accessed April 17, 2019. Dugel PU, Koh A, Ogura Y, et al. HAWK and HARRIER: phase 3, multicenter, randomized, double-masked trials of brolucizumab for neovascular age-related macular degeneration. Opthalmology. 2019. Published online April 12, 2019. pii: S0161-6420(18)33018-5. doi: 10.1016\/j.ophtha.2019.04.017. Novartis announces FDA filing acceptance and Priority Review of brolucizumab (RTH258) for patients with wet AMD [news release]. Basel, Germany: Novartis; April 15, 2019. www.novartis.com\/news\/media-releases\/novartis-announces-fda-filing-acceptance-and-priority-review-brolucizumab-rth258-patients-wet-amd. Accessed April 18, 2019. Klein C, Schaefer W, Regula JT, et al. Engineering therapeutic bispecific antibodies using CrossMab technology. Methods. 2019;154:21-31. doi: 10.1016\/j.ymeth.2018.11.008. New STAIRWAY study data shows potential for extended durability with faricimab in wet age-related macular degeneration (AMD) [news release]. South San Francisco, CA: Genentech; October 27, 2018. www.gene.com\/media\/press-releases\/14762\/2018-10-27\/new-stairway-study-data-shows-potential-. Accessed April 18, 2019. Outlook Therapeutics submits IND application for ONS-5010 to the FDA [news release]. Cranbury, NJ: Outlook Therapeutics; March 1, 2019. ir.outlooktherapeutics.com\/node\/8016\/pdf. Accessed April 23, 2019. Outlook Therapeutics announces FDA acceptance of IND for ONS-5010 [news release]. Cranbury, NJ: Outlook Therapeutics; April 1, 2019. www.globenewswire.com\/news-release\/2019\/04\/01\/1790614\/0\/en\/Outlook-Therapeutics-Announces-FDA-Acceptance-of-IND-for-ONS-5010.html. Accessed April 23, 2019. Campochiaro PA, Marcus DM, Awh CC, et al. The port delivery system with ranibizumab for neovascular age-related macular degeneration: results from the randomized phase 2"} +{"id":"RedPajamaCommonCrawl.0004","text":"The Episcopal Church Crisis... ...and the ELCA Is Rushing to Catch Up Fr. Jonathan Millard, rector at the Church of the Ascension, Oakland, Penn., offered this diagnosis of the crisis in the Episcopal Church as a defense for the Diocese of Pittsburgh to depart TEC and realign with another province within the Anglican Communion. You can read his entire statement here, but what he describes is all to familiar for those of us in the ELCA since at least the \"Call to Faithfulness\" free conferences in 1990 and 1991. Lutheran CORE has been founded so we will not have to reach the point of having votes to leave in order to be part of a faithful church body. Ten examples of how the essentials of the Christian Faith are being eroded, challenged, or contradicted by The Episcopal Church: 1. There is confusion concerning who God is: Over the past 40 years there has been a drift away from orthodox ways of speaking about God. In some places in TEC instead of God being referred to as Father, Son and Holy Spirit, He is addressed only by function as creator, redeemer and sustainer, and not in personal ways. The problem with this approach is that it makes God more remote and the fact is God has revealed himself to us through the Scriptures not just by function, but in personal terms as Father, Son and Holy Spirit. Another example is when the name LORD is replaced with \"God.\" So instead of the Liturgical greeting: \"The Lord be with you,\" you may encounter in some parts of TEC \"God be with you\" or even \"God is in you\" with the response: \"and also in you.\" The word LORD apparently is perceived as too male, and too authoritarian. The earliest creedal statement was simply \"Jesus is Lord.\" And yes, it was meant to be authoritarian. I was very sad when I attended the Interfaith service at Calvary last week, to see precisely such a change had been made to the liturgy. When it came to share the Peace, the wording was not: \"The peace of the Lord\", but rather \"The Peace of God.\" 2. There is a lack of clear teaching about the divinity of Christ: In answer to a question referencing the divinity of Jesus, in an article published earlier this year, the Presiding Bishop, Katharine Jefferts Shori, said this: \"If you begin to explore the literary context of the first century and the couple of hundred years on either side, the way that someone told a story about a great figure was to say 'this one was born of the gods.' That is what we're saying. This carpenter from Nazareth or Bethlehem \u2013 and there are different stories about where he came from \u2013 shows us what a godly human being looks like, shows us God coming among us.\" At best that is ambiguous or confusing, and at worst it is false teaching. Jesus was much more than someone who \"shows us what a godly human being looks like.\" And the Church does not say that he was \"born of the gods.\" The biblical witness and the faith of the church is that Jesus is the Son of God: fully God and fully man. The Word became flesh (John 1). We proclaim this truth weekly in the Nicene Creed. 3. There is a lack of clear teaching about Salvation and Sin: Questioned about selfishness and falleness, the Presiding Bishop said this: \"The human journey is about encouraging our own selves to move up into higher consciousness, into being able to be present in a violent situation without responding with violence ...\" and in the same interview she went on to say: \"The question is always how can we get beyond our own narrow self-interest and see that our salvation lies in attending to the needs of other people.\" This is not the Gospel story of sin and redemption. The Scriptures teach that all have sinned and fall short of the glory of God. (Rom. 3:23). The Scriptures teach that salvation is not through our works, or our efforts to move up to a higher consciousness, or even through attending to the needs of others. Our salvation lies in Jesus, \"who while we were still sinners, died for us.\" (Rom. 5:8); and all who believe in the LORD and call upon his name will be saved. (Rom. 10:13) 4. There is a drift towards universalism: The Presiding Bishop says of Jesus: \"we who practice the Christian tradition understand him as our vehicle to the divine. But for us to assume that God could not act in other ways is, I think, to put God in an awfully small box\" (Time Magazine: July 17,2006). Jesus said: I am the way the truth and the life no one comes to the Father except through me.\" (John 14:6). When, some years ago, I first heard Bishop Duncan speak of us living in a time of Reformation of the Church throughout the world, I confess I wondered if that was a little grandiose. I now believe, without a doubt, that he was right. This was illustrated for me, once again, just last week. I was deeply saddened to hear Archbishop Emeritus Desmond Tutu deny the particularity of the Christian Faith, mocking the idea that Jesus could possibly be the only way to God, and declaring that all religions are worshipping the same God, just by different names. The archbishop is a great man who has done wonderful work for reconciliation and peace. I salute him for all the good he has done, but I am sad and troubled that he would be so dismissive of the supreme work of love and salvation that our Lord Jesus Christ did for us on the cross. 5. There is a loss of confidence in the Gospel as Good News for all: The official teaching of the Anglican Church on the issue of human sexuality is that which has been set out by the Lambeth Conference in 1998 (Resolution 1:10). But here's the key point concerning the Gospel that I want to make: [The Conference] \"recognises that there are among us persons who experience themselves as having a homosexual orientation. Many of these are members of the Church and are seeking the pastoral care, moral direction of the Church, and God's transforming power for the living of their lives and the ordering of relationships.\" [emphasis added]. It is that confidence in the transforming power of God that the actions of TEC now challenge. So instead of welcoming and loving all into the church so that they might experience transformation, TEC simply welcomes and affirms people just as they are \u2013 denying them the healing and hope and transforming power of God. 6. There is erroneous teaching and practice regarding human sexuality: Over the past couple of decades there has been a serious rejection of the clear teaching of the Bible and the Church on human sexuality and marriage. The clear teaching of Scripture and tradition and of the one, Holy, Catholic and Apostolic church is that sex is for marriage. The only sexually intimate relationships that are good and holy according to Scripture and tradition are those between a man and a woman, within an intended life long, faithful covenant of marriage. That means that pre-marital sex, extra-marital sex, gay sex, any sex outside of marriage is all contrary to God's will. This is the clear teaching of the Bible and of Jesus. 7. There is a seemingly 'social justice only' view of the mission of the church: I have struggled to find any clear statements from the Presiding Bishop about the basics of the faith. From her inaugural sermon through to all kinds of talks and sermons and interviews that I've seen or heard extracts from she seems to be concerned primarily with a political and social gospel. She seems to be concerned principally about the United Nations' Millennium Development Goals. There is much to be commended about these goals and much to challenge us \u2013 but they are by no means the same thing as the message of salvation for those who are perishing. (John 3: 16). If the Millennium Goals are our gospel message it falls seriously short of the message of proclaiming \"Christ and him crucified.\" (1 Corinthians 2:1-5). 8. There is contempt for the Authority of the Bible: Bishop Bennison has said: \"\"The church wrote the Bible, and the church can rewrite the Bible.\" No, that is a serious error. 9. There is failure by Bishops to defend the faith: The role of a bishop in the words of the 1662 ordinal is: ''to banish and drive away from the church all erroneous and strange doctrine contrary to the Word of God.\" \u2013 Here in the States, the very opposite is true. Rather than drive away false teaching many of the bishops of TEC embrace it, celebrate it and declare to be good and holy that which God declares to wrong. To ordain an openly gay, non-celibate man \u2013 when the rest of the world urged TEC not to do this \u2013 is not only contrary to Scripture but is also an arrogant display of American intransigence. 10. There is a lack of respect for truth or unity: There seems to be a cavalier spirit among many in TEC that disregards the mandate for unity with the one holy, catholic and apostolic church. Claims are made by 'progressives' that they are putting truth ahead of unity. However the 'truth' they claim is that it's a matter of social justice and Christian virtue to bless same sex unions and permit practicing gay and lesbian people to hold any office within the church. This is, of course, is contrary to the truth as revealed in Holy Scripture. And the only unity they secure is among a tiny minority of the church worldwide. Sounds an awful lot like the direction the ELCA is being led, doesn't it? You probably know that the Diocese of Pittsburgh's vote to begin leaving the Episcopal Church passed by a wide margin. Thanks to Shrimp over at the Shellfish blog for bringing this to my attention. Labels: Anglican, Bishops, Blogs, ELCA, Holy Bible, Sexuality Which Church Father Are You? And now for something a bit different. You are St. Melito of Sardis! You have a great love of history and liturgy. You're attached to the traditions of the ancients, yet you recognize that the old world \u2014 great as it was \u2014 is passing away. You are loyal to the customs of your family, though you do not hesitate to call family members to account for their sins. Find out which Church Father you are at The Way of the Fathers! Thus far, it seems that St. Melito of Sardis is a most popular answer for those I hang around with -- say over at Touchstone's Mere Comments and ALPB Forum Online. I suspect that prior to this, none of us had ever heard of him. Here is what I've discovered, courtesy the good folks at Catholic Online: Little is known about the life of St. Melito of Sardis, a II Century exegete and apologist who served as bishop of Sardis near Lydia, Asia Minor (near modern Izmir, ancient Smyrna). Thought to have been a hermit and a eunuch, he travelled in Palestine, but the reasons for his journey and the details of his itinerary are lost. Most of his work is also lost. What little survives exists in quotations in the works of others or in fragments. Eusebius preserves Melito's list of Old Testament scriptures, the first such list known to scholars, and fragments of his discourse recommending that Marcus Aurelius adopt Christianity as the religion of the Roman Empire. Melito's best-known work is the Peri-Pascha, a Holy (Good) Friday sermon pieced together from manuscript fragments in the XX Century which shows parallels between Easter (the new passover) and the Passover haggadah. Melito's contemporaries praise his skill in exegesis and comment on his ability to demonstrate parallels between the Old and New Testaments. His contemporaries also called Melito a prophet or a beacon, but his rhetorical style caused later writers to question the soundness of his theology, some of which seems to akin to the philosophy of the Stoics. Melito's work, which fell out of favor in the IV Century, influenced the thinking of Iren\u00e6us of Lyons, Clement of Alexandria, and Tertullian. I wonder how we should consider that his feast day is April 1? Labels: Blogs, Church Fathers, Picture Gay Pastor in the Bronx Could Lose Her Collar That's the headline of an article in Sunday's New York Times featuring Katrina Foster, pastor at Fordham Evangelical Lutheran Church in the Bronx. I got to know her a little bit this summer during the ELCA Churchwide Assembly, where she was a Voting Member (delegate) and I was a microphone page during the discussions and debates related to sexuality. I did my best in a frequently chaotic situation to enable her to speak before the Assembly (that was my job and she was appreciative of that), which she did eloquently for her position. She appreciated my efforts. Nevertheless, it will be clear to you in a moment that I believe her position is very wrong. The article begins: In 1994, when the Rev. Katrina D. Foster became pastor of Fordham Evangelical Lutheran Church in the Bronx, she threw herself into ministering to her small, mostly Caribbean-born congregation. She not only preached to them on Sundays but lived in the neighborhood and showed up to support them in everything from surgeries to legal matters. But Pastor Foster was keeping a secret from her congregation. She held onto it even after a woman came to live with her in the parsonage, then joined the church choir. \"Some people would say, 'It's so nice you have someone to live with you in that 11-room house,' \" said Pastor Foster, 39. But in 2002, when the woman, Pamela Kallimanis, became pregnant, they knew the time had come. So Pastor Foster sat her congregants down one by one and told them that she and Ms. Kallimanis were partners and were expecting a child. Not one person openly criticized her, she said. Instead, \"they threw us the most wonderfully outrageous baby shower in the side yard next to the church,\" she said. \"The woman I was most anxious about telling\" \u2014 the church president \u2014 \"I thought she was going to leap across the table and hug me.\" The response, however, was not all positive. A small number of families trickled away. Pastor Foster said only one member told her outright why she had stopped coming. \"I got her on the phone one day and she said she couldn't sit under a pastor who was a homosexual,\" she said. Now Pastor Foster and her roughly 100 congregants face a new challenge: the possibility that she, along with four other pastors in the New York area and 81 nationwide, could be defrocked in 2009 by the Evangelical Lutheran Church in America. The country's largest Lutheran denomination, it allows openly gay pastors but forbids them from being in same-sex relationships, according to the Rev. Stephen P. Bouman, bishop of the denomination's New York-area synod. In August, Pastor Foster was among the clerics who disclosed that they were in such relationships at the church's biennial national assembly in Chicago, where church policy was decided. The assembly voted to urge synod leaders not to discipline those pastors until the issue of pastors in same-sex relationships could be voted on at the next meeting, in 2009. Bishop Bouman said he would not have disciplined Pastor Foster anyway. \"She is someone whose faith is genuine and she lives it in a very bold and inclusive way,\" he said. \"She's not afraid to tell people that she loves God and that God loves them.\" When Bishop Bouman leaves to take a national church position in Chicago in March, however, whoever succeeds him in New York may aim to defrock Pastor Foster before the 2009 assembly. Another pastor in the synod, the Rev. Paul Hagen, of St. Peter's Lutheran Church in the Bronx, isn't supportive. He said that the \"the Bible clearly defines homosexuality as a sin. Read it all here -- note, you may need to register on the Times' site to do so. Bishop Bouman's new position is Executive Director of ELCA Evangelical Outreach and Congregational Mission. As for Katrina Foster, it will take a miracle for the Metropolitan New York Synod to elect as Bishop someone who would even consider disciplining her. Alas, she's in no danger of \"losing her collar.\" And I wonder, are we going to be seeing this sort of headline and story more and more over the next couple of years? Labels: ELCA, Holy Ministry, Homosexuality, Newspapers, Religion Media Schism and Heresy Background: Last Tuesday, Zion's Parish Secretary brought me Page B3 of the Peoria Journal-Star page to show me the rather prominent placing of the AP's report of Jen Rude's ordination. And during our Romans Bible Sudy, a couple of people commented on the photo from that ordination (also from the AP) that was in this morning's PJS \"Faith & Values\" section. Near the end of my Wednesday entry, I quoted an ELCA News Release on Presiding Bishop Mark Hanson report to the ELCA Church Council: Hanson identified four challenges for the ELCA: building trust throughout the church, creating awareness by telling the ELCA's \"story,\" raising expectations for what the Holy Spirit is doing, and lowering anxiety about sexuality as the church prepares a social statement on human sexuality for consideration at the 2009 ELCA assembly. \"We cannot let that social statement define solely the life and work of this church or our leadership,\" Hanson told the council. \"That's going to take shared leadership. If we become so preoccupied with 2009, we are conveying a message that sexuality defines this church, and (because of) sexuality, this church could potentially be divided. Frankly, that's heresy. That's absolute heresy. The gospel of Jesus Christ defines this church.\" It appears that the Presiding Bishop is accusing those who would \"divide\" the ELCA over matters of sexuality of heresy. Exactly who those potential heretics are is not clear, however. Is he speaking of those associated with, say, Extraordinary Lutheran Ministries, who are are arranging for ELCA congregations to call persons ineligible to serve under call in ELCA congregations? Is it those associated with, for instance, Lutheran CORE who object to the apparent non-enforcement of ELCA standards when it comes to homosexual relationships? Bishop Hanson doesn't exactly say. He has said, however, that he favors the so-called \"full inclusion\" of gay and lesbian people in the ELCA, following a definition that \"full inclusion\" means no bar blessing homosexual relationship or ordaining those in them. And a look at those he has placed in positions of authority both in the Churchwide ELCA and (before that) in the Synod he was Bishop clearly showed that long before he finally said so in public during the 2006 Hein-Fry Lectures. Suggesting to me and others with whom I am associated that we who call the ELCA to faithfulness are the more likely target of his accusation. This would parallel what has been happening in the Episcopal Church, whose leaders have committed the that church to \"full inclusion\" of gay and lesbians. More and more faithful members, priests, congregations, and now dioceses are preparing to depart, and they are regularly being accused of schism. And in this thread on Canon Kendall Harmon's TitusOneNine, a correspondent called \"The Gordian\" made this important observation: Once again you confuse schism with heresy. Once again you tar the opponents of false teaching - even blasphemous and immoral teaching that endagers the souls of men and women - as 'heretics'. And you don't even recognize how much these Christians have suffered at the hands of putative bishops, in the loss of buildings, jobs and homes, in maintaining this faithful witness for the gospel. If that makes you feel superior and above the fray, well bully for you. But the rest of us are not really concerned with keeping a liturgical choral society going. There's too much of real importance at stake. A couple of years ago, I observed that in this debate the schismatics are not the people who will leave the ELCA should it vote to ordain practicing gays and approve blessing gay unions. Rather, those who would (like the Anglican Communion Network) leave would merely be recognizing what had been true for some time, that the church is already in schism. Those who depart the Church's teaching on marriage and sexuality and cause the ELCA to formally embrace false teaching will be the schismatics. We continue to pray that it doesn't even go that far. Labels: Anglican, Bishops, Blogs, Ecclesiology, Homosexuality, Marriage, Newspapers, Religion Media, TitusOneNine The Big Lie: ELCA Celibacy Requirement A couple of days ago when I wrote about the latest irregular ordination in the ELCA, I quoted from this press release of Extraordinary Lutheran Ministries, the first paragraph of which reads: On November 17, 2007, The Rev. Jen Rude was set aside for Word and Sacrament ministry by laying on of hands. Pastor Rude's ordination is the fourth time in 13 months that a Lutheran congregation has directly challenged the Evangelical Lutheran Church in America's (ELCA) policy requiring lifelong celibacy of gay and lesbian clergy. There is nothing particularly remarkable about that statement -- ELM's predecessors have been campaigning against the ELCA's \"celibacy requirement\" ever since the PLTS Three had their \"Approval for Ordination\" status effectively revoked circa 1988-89. There's only one problem: there is no such requirement. No, I'm not referring to the several ELCA Synod Bishops who this last summer finally started admitting that they had not been applying the church's standards for homosexual clergy or congregations that called and ordained them. I'm referring to the ELCA's actual standards. As I wrote in the TitusOneNine thread on the Chicago Tribune report of Miss Rude's ordination: The actual standard in the ELCA (see the document Vision and Expectations) is: \"Single ordained ministers are expected to live a chaste life. Married ordained ministers are expected to live in fidelity to their spouses, giving expression to sexual intimacy within a marriage relationship that is mutual, chaste, and faithful. Ordained ministers who are homosexual in their self-understanding are expected to abstain from homosexual sexual relationships.\" No one is asked to take a \"vow of celibacy.\" ELCA Pastors vow to \"lead [God's people] by your own example in faithful service and holy living\" when we are ordained. There is only one appropriate context for Christians, especially those set apart for the Holy Ministry, to engage in sexual relations: Holy Matrimony (marriage). Chastity is expected for all of us -- straight, gay, married, single. Chastity; not celibacy. Labels: Blogs, Holy Ministry, Homosexuality, Marriage, TitusOneNine Thanksgiving Day, 2007 A Proclamation by the President of the United States of America Americans are a grateful people, ever mindful of the many ways we have been blessed. On Thanksgiving Day, we lift our hearts in gratitude for the freedoms we enjoy, the people we love, and the gifts of our prosperous land. Our country was founded by men and women who realized their dependence on God and were humbled by His providence and grace. The early explorers and settlers who arrived in this land gave thanks for God's protection and for the extraordinary natural abundance they found. Since the first National Day of Thanksgiving was proclaimed by President George Washington, Americans have come together to offer thanks for our many blessings. We recall the great privilege it is to live in a land where freedom is the right of every person and where all can pursue their dreams. We express our deep appreciation for the sacrifices of the honorable men and women in uniform who defend liberty. As they work to advance the cause of freedom, our Nation keeps these brave individuals and their families in our thoughts, and we pray for their safe return. While Thanksgiving is a time to gather in a spirit of gratitude with family, friends, and neighbors, it is also an opportunity to serve others and to share our blessings with those in need. By answering the universal call to love a neighbor as we want to be loved ourselves, we make our Nation a more hopeful and caring place. This Thanksgiving, may we reflect upon the past year with gratefulness and look toward the future with hope. Let us give thanks for all we have been given and ask God to continue to bless our families and our Nation. NOW, THEREFORE, I, GEORGE W. BUSH, President of the United States of America, by virtue of the authority vested in me by the Constitution and laws of the United States, do hereby proclaim Thursday, November 22, 2007, as a National Day of Thanksgiving. I encourage all Americans to gather together in their homes and places of worship with family, friends, and loved ones to reinforce the ties that bind us and give thanks for the freedoms and many blessings we enjoy. IN WITNESS WHEREOF, I have hereunto set my hand this fifteenth day of November, in the year of our Lord two thousand seven, and of the Independence of the United States of America the two hundred and thirty-second. Labels: America, Holidays, Picture, President, Thanksgiving The Assault Continues Yes, that's a provocative title. But it is also how I see what happened last Saturday when Jen Rude was ordained in a Chicago ELCA congregation. Read the press release from Extraordinary Lutheran Ministries, an organization whose sole purpose is to provide \"qualifications\" for \"sexual minorities\" who want to be pastors in ELCA congregations while openly and enthusiastically endorsing and living lives contrary to the Christian Faith: For the fourth time in 13 months a Lutheran congregation will directly challenge the Evangelical Lutheran Church in America's (ELCA) policy requiring lifelong celibacy of gay and lesbian clergy. On October 28, Jen Rude was called to ministry by Resurrection Lutheran Church in Chicago. On November 17, Rude will become the first pastor to be ordained in the newly formed Extraordinary Lutheran Ministries (ELM) and the first official challenge to the new ELCA policy of \"Refrain and Restraint\" that was passed at its biennial assembly August 6-11 in Chicago. Rude will be ordained in an \"Extraordinary Ordination\" service on November 17. The service is called such because it is performed outside the ordinary guidelines for Lutheran ordinations. Facing increasing pressure to revisit its policy banning partnered gay, lesbian, bisexual and transgender persons from serving as pastors, the five-million member Evangelical Lutheran Church in American (ELCA) took up the issue at their biennial assembly August 6-11 in Chicago. In January of this year, a popular openly gay Atlanta pastor, the Rev. Bradley Schmeling, was placed on church trial after telling his bishop that he was in a same-sex relationship. While the ELCA disciplinary committee recommended Schmeling's removal, they expressed opposition to the policy and recommended it be overturned. Twenty-one synods passed recommendations that the policy be overturned by the national assembly. The biennial assembly fell short of overturning the policy, but instead passed a resolution recommending bishops \"refrain from or show restraint\" in discipline of gay, lesbian, bisexual and transgender pastors and their congregations. Read the whole release here, as well as the Chicago Sun-Times article based on it. ELM trumpeted the actual ordination in this press release, which begins: Jen Rude's Ordination Only the First Test of the ELCA's \"Refrain or Restraint\" Extraordinary Ordination November 17, 2007 (Chicago) On November 17, 2007, The Rev. Jen Rude was set aside for Word and Sacrament ministry by laying on of hands. Pastor Rude's ordination is the fourth time in 13 months that a Lutheran congregation has directly challenged the Evangelical Lutheran Church in America's (ELCA) policy requiring lifelong celibacy of gay and lesbian clergy. Pastor Rude was ordained in an \"Extraordinary Ordination.\" The service is called such because it is performed outside the ordinary guidelines for Lutheran ordinations. Pastor Rude is on the roster of Extraordinary Lutheran Ministries and was called by Resurrection Lutheran Church on Reformation Sunday (Oct. 28, 2007). \"Between 1990 and 2005 there have been eight extraordinary ordinations. Since 2006 there have already been four extraordinary ordinations and a fifth is scheduled for January 19th in Minneapolis. This trend signals that congregations are no longer willing to abide by the ELCA's policy of discrimination as they join members of the Extraordinary Lutheran Ministries in principled non-compliance.\" Rev. Erik Christensen, Co-Chair of Extraordinary Lutheran Ministries. Note the lack of \"restraint\" in ELM's language, or in its actions as it promises more and more and more attacks on the fragile unity of the ELCA in one faith. See also the Chicago Tribune article, which begins: Sitting in sight of her father and grandfather, both Lutheran ministers, Jen Rude on Saturday became the first ordained lesbian pastor since the Evangelical Lutheran Church in America urged bishops to not penalize congregations who violate the celibacy requirement for gay clergy. Several of the more than 100 congregants present wept as the 27-year-old stood before them, a beaming smile drawn across her face. Actually, weeping seems like the best response. For new Metro-Chicago Synod Bishop Miller has declared that he will do nothing. And through this article we discover that Paul Landahl, the recently-retired Metro-Chicago Bishop who is one of the too many ELCA Bishops who have been rebuffing ELCA's standards for years, is the interim Director for Candidacy at the ELCA's Lutheran School of Theology at Chicago, where he will be able to help seminarians avoid the standards at a different level. Remember this photo I took last August, when I wrote here and here of how deeply that moment touched me. That photo gave me hope for the ELCA. But then I read the advocates of \"full inclusion\" (though there is nothing excluding gay and lesbian people from the ELCA) and their relentless demand that this church bow to their every demand, NOW!! And I hear the silence of this church's leadership, except for the movement of people in and out of positions of authority, so that those who would teach in the ELCA what the Church has always taught about sexuality as a part of a doctrine of marriage and family are marginalized from having an effect on this church's public voice. It may seem completely unrelated, but ELCA News reported this about Presiding Bishop Mark Hanson's report to the ELCA Church Council + Hanson identified four challenges for the ELCA: building trust throughout the church, creating awareness by telling the ELCA's \"story,\" raising expectations for what the Holy Spirit is doing, and lowering anxiety about sexuality as the church prepares a social statement on human sexuality for consideration at the 2009 ELCA assembly. \"I think this (the social statement) is hugely important work for us in these next two years. I'm committed to it, but I will not let it solely define my leadership of this church, because I think that's not responsible,\" he said. Find it here. The problem, my good Bishop, is that you are one who is responsible for letting anxiety about sexuality preoccupy this church by mouthing the church's policies and winking when they are ignored. You could stop it. But you don't. As one more ELCA congregation decides to go its own way, at whom are you aiming your \"heresy\" accusation? Labels: Bishops, ELCA, Holy Ministry, Homosexuality, Newspapers, Picture, Religion Media We Have the Same Parents Dad keeps asking me, \"Have you been on the Canoga Web site lately?\" I finally made it over there tonight and found the article he wanted me to see. It's about one of our high school's history teachers and Dad's favorite line is, \"He was also an advanced auto-shop major.\" While that's a great line, this is better: \u2022 What does Mr. Tibbetts do in his spare time?? o He is in charge of restoring our redwoods in our school. We are the only school in the Los Angeles Unified School District that still has redwoods. The reason that he got involved was because an alumnus stated that all of the history of Canoga and historic items were gone. He decided to change that. He wants to make our history something that we remember and that continues through time. I'm actually quite proud my brother for that. My little brother. Do you think he looks 4 years younger than me? ;-) Labels: Canoga Park, Family, Picture A Call to Liberate the Church of Sweden I've been alerted to the latest article by Father Yngve Kalin, priest in the Church of Sweden and Chairman of the Church Coalition for the Bible and Confession (Kyrklig samling kring Bibeln och bek\u00e4nnelsen). It appears as an op-ed in today's Svenska Dagbladet, the main newspaper of Moderaterna (the Moderate Party, a non-socialist party that heads the current coalition government in Sweden) and one of Sweden's leading daily papers. Father Kalin, who I have posted earlier, has long been exposing the plight of the faithful in the Swedish Church. Here he describes how the \"separation of church and state\" in Sweden has actually given the Swedish political establishment more control over the Church. What follows is what appears on Fr. Kalin's website. (Or read it in Swedish here or as it appears on the newspaper's site.) My friend from the Society of St. Birgitta, Dr. Birgitta Peterson, writes, \"Read it and please spread it around! Particularly among your Lutheran friends who need to know what happens to the Lutherans in Sweden.\" One last note: a colleague suggests that the Swedish words translated here as \"consequence\" would be better understood as \"consistency.\" spt+ The political parties still keep their grip on the Church of Sweden. That is a paradox and an inconsistency of the separation between the church and the state which is deeply embarrassing and a cause of a great deal of surprise abroad. This amounts to political double-dealing, writes the Church of Sweden priest Yngve Kalin, who has long-standing experience as a member of the Church of Sweden General Synod. Politicians in the Church Amounts to Sheer Parody The current Swedish government, which is constituted by a political coalition, are seeking to introduce a legislation that would prohibit every aspect of religious education in the curriculum of the schools. Such sentiments show a clear resemblance to the way things work in the USA, where the Constitution lays down the principle that church and state must be kept separate coupled with some clear statements about religious liberty. In Sweden however, the details of these government proposals are being prepared while the political parties continue unabated to hold a firm grip on the Church of Sweden and unashamedly to make use of the Church in order to promote their own political programmes. This is a paradox and an inconsistency of the formal separation between the church and the state in the year 2000, which is a cause of embarrassment for the political establishment and a fact that gives rise to considerable surprise abroad. This political double-dealing is a cause of great embarrassment. For anyone who would stand for a clear separation between the church and the state, such a position requires consequence in every aspect and must be followed all down the line. It is now high time for the political parties to withdraw and stop acting as attorneys for the church \u2014 not only for the sake of the church, but also for the sake of their own credibility. When the business of the Church of Sweden are debated by its own highest decision-making body, the Church of Sweden General Synod, it is in fact Social Democrats, right wing Moderates and members of the Centre Party, etcetera, etcetera, who meet to take decisions on issues of all kind, ranging from statements of faith and doctrine to everyday humdrum matters, and their decisions permeate every aspect of the work of the Church of Sweden at every level. The parishes as well as the dioceses and the national level are consequently the object rather than the subject in this altogether unique manner of decision-making that is unheard of in any other part of Christendom. There is no real separation between the church and the state in Sweden. The political parties have made sure of that, mainly due to their innate fear of permitting too many independent players in the public arena. All this is only too obvious, not least in the current debate about possible new legislation about marriage, in which the political agenda increasingly gains the upper hand, making it blatantly obvious how the church is currently being used to legitimize politically based positions and viewpoints. BUT: What will these statements and expressed positions really be worth, when it is only too obvious to everyone that they only represent a duplication of decisions taken by the party congress? To begin with, things were different: the uniqueness of the church used to be respected. When the Church of Sweden General Assembly (as it was called until the formal separation of church and state in the year 2000) met for the first time in 1868, following the Abolition of the Parliament of the Four Estates, it consisted of 30 priests, 30 lay members and the bishops were members ex officio. The Church Assembly was charged to express \"the common thought of the guarantors of the faith and doctrine and of the parishes\" and should lift church matters above \"such political differences that always shift within a national assembly.\" In those days the awareness prevailed that the manner of making decisions in the church \u2014 even in an established church \u2014 must consider the responsibility inherent in the stewardship of the tradition of faith, confession and doctrine that had been handed down and received, and that the parishes must be accorded some real influence on the matters of the Church of Sweden and its government. However, the manner of decision-making was gradually changed. A reform in 1949 changed the constitution of the Church Assembly and put the laity in the majority. The ex officio membership of representatives for the theological faculties was abolished in 1970. The role and influence of theology was markedly weakened. The next decisive reform took place in 1982, when the Church Assembly became openly political on the model of the parochial church councils that had been developed particularly at the local level in the city parishes. From then on, elections took place by a system of electors, but the number of members was more than trebled and the party groups appeared openly as nominators and as membership groups. That meant that the politically independent members, who had nevertheless been elected, found it necessary to organise themselves into a politically independent group. At the same time the bishops were divested of their right to vote in the Church Assembly but were charged with the duty to be present. It was left to the political parties and groupings to take decisions about any possible representation of the clergy on the membership. When all this had been achieved, a way had been found to continue to exert control while at the same time the out-dated bonds between the church and the state could cease to exist in any formal sense. That decision was taken in 1997. Later on the Church Order, which provides the tools for the domination of the church, was laid down. Through the introduction of direct elections at all levels, the parties no longer need to take the \"long way\" via the parishes in order to ensure that their representatives become members of the diocesan governing bodies and what is nowadays called the Church of Sweden General Synod. The Church of Sweden Church Order no longer recognises any independent responsibility for the ordained ministry. The entire framework for the exercise of ordained ministry has been established with great consequence and the limits have been effectively imposed by politically elected bodies. The control of the church is now totalitarian and complete. How long can this parody be allowed to continue? Should there be a separation between the church and the state or not? Could we please have at least an ounce of consequence, thank you! YNGVE KALIN Priest in Hyssna and a member of the Church of Sweden Church Assembly 1995-2000 and of the Church of Sweden General Synod 2000-2001, currently a member of the Nomination Group \"Confident Church\" and called upon to serve at the recently held sessions of the Church of Sweden General Synod this autumn. \u00a9 Yngve Kalin & Svenska Dagbladet 10 nov 2007 Labels: Ecclesiology, Newspapers, Swedish Church Lutheran CORE News 1.5 Note: Lutheran CORE's latest update includes: 1) Gary Diers from the Churchwide Assembly Floor 2) Steering Committee Update from Bp. Paull Spring, Chair 3) Financial Support? by Mr. Ryan Schwarz 4) Forming a Chapter by Pr. Mark Chavez, Director 5) 2009 Churchwide Assembly Voting Members (Please copy and distribute as widely as possible.) Boundaries and discipline by Mr. Gary Diers [Note: Gary Diers is an active Lutheran from Waverly, Minnesota, who was a lay voting member to the Evangelical Lutheran Church in America Churchwide Assembly in Chicago this year. He spoke these powerful words as part of the debate.] First I would like to say that listening to the debate on this [homosexuality] issue this week just breaks my heart, but having said that, Mr. Chairman: In this post-modern world in which we now live, which says everyone defines what is right or wrong for himself or herself, the idea of discipline by someone else for violating boundaries is viewed as an injustice. We however cannot, whether young or adult, live our lives without boundaries. I'm a farmer and work daily around large animals and, especially today, large equipment. My wife and I raised five children in that environment, and those children always wanted to be with Dad. But because I loved them and was concerned for their safety, I built a fence in the front yard and they had to stay within the boundaries of that fence even if they begged, cried, threw a tantrum, etc. They could, however, with some effort climb out. When that happened they were disciplined and returned to the fenced-in yard. It did not matter how much they wanted to be with me, nor in fact did it matter how much I wanted them to be with me. Our Creator has given us boundaries within which to live our lives and if we could just live our lives within those boundaries, most if not all evil and need for discipline would not exist. Lutheran CORE steering committee update by Pr. Paull E. Spring, steering committee chair The Steering Committee of Lutheran CORE met September 28 and 29, immediately following the Lindenhurst gathering. We were all very encouraged by the attendance at Lindenhurst and the spirit of commitment to our concerns that was so evident. Our most important work at the steering committee meeting was to complete a strategy for the 2009 churchwide assembly in Minneapolis. Our chief goals are to focus on the social statement on human sexuality and the elections for the churchwide assembly and the Church Council. Our most urgent need now is to identify synod coordinators in all sixty-five synods of the Evangelical Lutheran Church in America. Effective synod coordinators are key contacts within the synods. The coordinator's job, for now, is to work for the election to the churchwide assembly of voting members who share our perspectives on marriage and the Bible. If you are willing to serve as a synod coordinator or as a part of a synodical team within your synod, please contact me at pastorspring@pennswoods.net or Pastor Mark Chavez, Lutheran CORE director at wordalone@popp.net. All the members of the steering committee have agreed to provide guidance and support for synod coordinators. A job description is available from Pr. Chavez or me if it will help you make your decision. Right now, the most important work is to elect voting members for the churchwide assembly. In some synods this process has already begun. We need your help. Now is the time to pray without ceasing for our church and for our cause. Now is the time for all of us to work hard and do our part for the sake of our church's fidelity to the Word of God. Will your congregation support Lutheran CORE? by Mr. Ryan Schwarz, steering committee member and fundraising coordinator In many congregations, it is now budget season. Council, finance teams and staff are hard at work preparing financial plans for 2008. Could Lutheran CORE become one of your benevolence initiatives in 2008? We have a most ambitious action plan for the next two years, a critical time for the future of the ELCA. We must assist synod organizers across the country, pay our staff, prepare newsletters, produce teaching materials, organize local events, and do all the things that are necessary to have an impact. All this costs money, and our opponents are raising literally millions of dollars for their efforts. Lutheran CORE needs your congregation's support. Even a relatively modest contribution is quite meaningful to us. Beyond financial support, we are also seeking to grow the number of congregations that formally join Lutheran CORE. Can you help us? Are you willing to advocate for Lutheran CORE in your congregation? We can assist you with explanatory materials and procedural advice. Contact me at rschwarz@mba1994.hbs.edu, or any member of the Lutheran CORE Steering Committee. Informational resources are also available on our website www.lutherancore.org. Consider forming a Lutheran CORE chapter by Pr. Mark Chavez, director If there is not an organized group in your area, you might consider following the example of the Ebenezer Conference Committee on Sexuality in Georgia. Pastor Don Rieder, the Southeastern synod coordinator for Lutheran CORE, reported that the committee was formed in 2004 to consider all the groups that were opposed to the trend in the ELCA to move away from our biblical foundations. Pastor Rieder has chaired the group since it began and it had met 15 times in the past few years. At their meeting in October, when they reviewed their group's history and the present situation in their area and in the ELCA, the members of the committee decided to form an Ebenezer Chapter of Lutheran CORE. If you would like suggestions for how you might start a chapter in your area, contact me at wordalone@popp.net. New groups of Lutheran CORE supporters have begun meeting in two synods, Rocky Mountain and Indiana-Kentucky. Pastor Tom Renquist in Aurora, CO, has helped convene two meetings in the Denver area this fall and Pastor Blair Fields in Florence, KY, helped convene a meeting in the Indianapolis area last month. These are encouraging developments in areas where there have not been many public meetings in the past. If you know of other new groups being formed or meeting, please report the news to the Lutheran CORE steering committee. How can you make a difference in 2009? It is urgent that you contact your synod office NOW to learn what the election procedures are for 2009 CWA voting members, and then getting yourself or other confessional folk who fit the criteria in a position to be elected. Do the same for conference and synod positions. Until we get a significant number of our people in places of influence, nothing much is going to change. An anonymous saying (often wrongly attributed to Edmund Burke) reminds us, \"All that is needed for the triumph of evil is for enough good people to do nothing.\" Now is the time for you to do something. Decisions are made by the people who show up for meetings. Be there in your congregation, your conference or district, your synod, and if possible at churchwide assembly. Take the profound yet kind and simple speech by Gary Diers (reported above) as your example. Speak the truth in love. And pray constantly for this Church and all its leaders. We are most thankful for your prayers and welcome your financial contributions. We are grateful that the WordAlone Network, a member group of Lutheran CORE, provides administrative support. Tax-deductible donations may be sent to: c\/o WordAlone Network 2299 Palmer Drive, Suite 220 New Brighton, MN 55112 Please make checks payable to \"WordAlone Network\" and write \"Lutheran CORE\" on the memo line. Pastor W. Stevens Shipman, steering committee member and communications committee Ministry: A Call from God to become Holy Thanks to Professor (and ELCA Pastor) Karl Donfried (he's the guy who came in second in the last election for ELCA Presiding Bishop) for calling attention to this from Luke Timothy Johnson: Particularly for those called to a life of ministry within the church, 2 Timothy poses some powerful challenges. It proposes that ministry is not a career choice, but a call from God to become holy. Neither is ministry a body of"} +{"id":"RedPajamaCommonCrawl.0005","text":"Legislature(2017 - 2018)GRUENBERG 120 03\/13\/2018 03:15 PM STATE AFFAIRS House STA 03\/13\/2018 15:19 03:22:16 PM HB325 04:14:31 PM Indirect Expenditure Hearing += HB 325 PRISONER COMPUTER USE; REENTRY SERVICES TELECONFERENCED + Indirect Expenditure Hearing TELECONFERENCED += HB 310 MARRIAGE AND MINIMUM AGE FOR MARRIAGE TELECONFERENCED Scheduled but Not Heard += HB 400 FEES FOR FIRE PREVENTION MEASURES TELECONFERENCED HOUSE STATE AFFAIRS STANDING COMMITTEE Representative Jonathan Kreiss-Tomkins, Chair Representative Gabrielle LeDoux, Vice Chair Representative Chris Tuck Representative Adam Wool Representative Chris Birch Representative DeLena Johnson Representative Gary Knopp Representative Andy Josephson (alternate) Representative Chuck Kopp (alternate) \"An Act relating to computer use by prisoners; and relating to an exemption from the State Procurement Code for contracts for rehabilitation and reentry services.\" INDIRECT EXPENDITURE HEARING \"An Act relating to the collection of fees by the Department of Public Safety for fire and explosion prevention and safety services.\" \"An Act relating to the minimum age of eligibility for marriage.\" - SCHEDULED BUT NOT HEARD BILL: HB 325 SHORT TITLE: PRISONER COMPUTER USE; REENTRY SERVICES SPONSOR(s): RULES BY REQUEST OF THE GOVERNOR 02\/02\/18 (H) READ THE FIRST TIME - REFERRALS 02\/02\/18 (H) STA, JUD 02\/13\/18 (H) STA AT 3:15 PM GRUENBERG 120 02\/13\/18 (H) Heard & Held 02\/13\/18 (H) MINUTE(STA) SHORT TITLE: FEES FOR FIRE PREVENTION MEASURES SPONSOR(s): STATE AFFAIRS 02\/28\/18 (H) STA, FIN DEAN WILLIAMS, Commissioner Department of Corrections (DOC) POSITION STATEMENT: Presented HB 325 on behalf of the House Rules Committee by request of the governor and summarized the issues to be addressed by the proposed legislation. BROOKE IVY, Staff Representative Jason Grenn POSITION STATEMENT: Provided information on the recommendations of the House Finance Committee's Subcommittee on the Department of Administration (DOA) during the indirect expenditure hearing. HEATHER HEBDON, Executive Director Alaska Public Offices Commission (APOC) POSITION STATEMENT: Testified during the indirect expenditure hearing. CHERI LOWENSTEIN, Director Division of Administrative Services (DAS) Department of Administration (DOA) POSITION STATEMENT: Testified during the indirect expenditure GREG SMITH, Staff Representative Gabrielle LeDoux POSITION STATEMENT: Provided information on the recommendations of the House Finance Committee's Subcommittee on the University of Alaska (UA) during the indirect expenditure hearing. ALEXEI PAINTER, Fiscal Analyst Legislative Finance Division (LFD) Legislative Affairs Agency (LAA) of Revenue (DOR) and answered questions during the indirect expenditure hearing. MILES BAKER, Associate Vice President of Government Relations University of Alaska (UA) POSITION STATEMENT: Answered questions during the indirect DAVID TYLER, Director State Fire Marshall Division of Fire and Life Safety (DFLS) Department of Public Safety (DPS) POSITION STATEMENT: Answered questions during the hearing on HB LLOYD NAKANO, Assistant State Fire Marshal POSITION STATEMENT: Answered questions on during the hearing on HB 400. CATHY SCHLINGHEYDE, Staff Representative Jonathan Kreiss-Tomkins POSITION STATEMENT: Presented the forthcoming Amendment 2 on behalf of the House State Affairs Standing Committee, prime sponsor of HB 400. NANCY MEADE, General Counsel Alaska Court System (ACS) POSITION STATEMENT: Answered questions on the forthcoming Amendment 2 during the hearing on HB 400. CHAIR JONATHAN KREISS-TOMKINS called the House State Affairs Standing Committee meeting to order at 3:19 p.m. Representatives Tuck, Wool, Birch, Johnson, Knopp, and Kreiss- Tomkins were present at the call to order. Representative LeDoux arrived as the meeting was in progress. HB 325-PRISONER COMPUTER USE; REENTRY SERVICES CHAIR KREISS-TOMKINS announced that the first order of business would be HOUSE BILL NO. 325, \"An Act relating to computer use by prisoners; and relating to an exemption from the State Procurement Code for contracts for rehabilitation and reentry DEAN WILLIAMS, Commissioner, Department of Corrections (DOC), explained that the community residential center (CRC) - or halfway house - model has been in existence for 20 years with no changes. The CRCs are where inmates go who are exiting the prison system; some are on furlough; some are on electronic monitoring; they are trying to find a job and a place to live. He stated that currently there is one option for where inmates can live while transitioning from prison to home or to wherever they will live; and that is within the CRC halfway house model. COMMISSIONER WILLIAMS stated that the problem with the CRC model is that there has been a 60-65 percent recidivism rate in Alaska for the past 15-20 years despite changes in the prison system. He asserted that when people don't have a place to live or a job when they have finished their sentences, the chance of failure is high. He said that almost half of these failures occur within the first six months of release. This occurs because the process of transitioning from a \"hard cell\" environment to one in which the person is productive must have a strategic and stepdown plan; Alaska does not have that. COMMISSIONER WILLIAMS said that another reason the halfway house model is fundamentally \"broken\" is the \"walk-away\" rate, or escape rate. Every time someone escapes from the halfway facility, it could result in a felony charge. In 2016, there were 222 escapes from halfway houses; under his leadership and with the assistance of staff, that number was reduced to 83 in 2017; however, every one of those escapes represents a new potential felony charge against the person who walked away from the halfway house. COMMISSIONER WILLIAMS related a third reason for a broken system: the cost of the CRC halfway house model is very expensive. He recommended that the committee members not look at the budgeted rate for a halfway house bed but look at the actual cost. He offered to share the breakout of the cost with the committee. He gave examples: at Cordova Center [in Anchorage], the bed rate is $117 per day per person; at Tundra Center in Bethel, the rate is $312 per day per person; at Northstar Center in Fairbanks, the rate is $176 per day per person; at Seaside Center in Nome, the rate is $145 per day per person; and at Glacier Manor Half-Way House in Juneau, the rate is $206 per day per person. He concluded that it is a costly model, which is the reason he is looking for innovations. COMMISSIONER WILLIAMS continued by relating other problems with the model: the inmates don't want to go to the halfway houses; it is difficult to fill the beds due to problems at the facility such as drug trafficking; and there isn't enough for the residents to do. He maintained that without work to do or places to go, the temptation is to escape or use drugs. CHAIR KREISS-TOMKINS passed the gavel to Vice Chair LeDoux. COMMISSIONER WILLIAMS gave a final cause contributing to the [halfway house] model being broken: the procurement requirements that DOC is currently under. He pointed out that the request for proposal (RFP) for DOC is 150 pages; it represents the boilerplate procurement procedures; and anything over $100,000 requires a very cumbersome and bureaucratic process. He maintained that the places where he wants inmates to go when exiting prison are smaller locations and smaller facilities. People do much better in those locations, and they are cheaper. He referred to testimony during the 2\/13\/18 House State Affairs Standing Committee meeting from operators of some of those small places. COMMISSIONER WILLIAMS summarized by saying that it is his desire that the committee members understand the scope of the issue and why there are problems with the current halfway houses. He mentioned that he appreciated the discussion and concerns raised during the 2\/13\/18 committee meeting hearing. He maintained that he is requesting an exception to the procurement rules, not for the entire department but just for a small amount of money, $17-18 million, to allow him to pilot a different model. COMMISSIONER WILLIAMS stated that the model in place has benefited the DOC contractor for 20 years, and millions of dollars are \"on the line.\" He emphasized that this initiative in no way is meant to disrespect the DOC contractor: this is the contract DOC requested; it is the bid DOC awarded; and the contractor provided the service. He maintained that DOC could do better. He is requesting to be allowed an exception to the procurement rules - if not for $17-18 million, then for $5 million - to try a pilot project to demonstrate improved results. He said, \"Put requirements on me if you must about where that money was spent and how that was put together.\" He reiterated that the current model is not working, and that is why he is making this request to the committee. REPRESENTATIVE JOHNSON referred to Commissioner Williams's testimony that there are drugs inside the halfway houses. She asked if there is legal action that could be taken against a contractor if drugs are allowed inside the halfway house. COMMISSIONER WILLIAMS answered that the contractors are as deeply concerned about this issue as is he. He maintained that the problem lies in the halfway house model: it houses 50 people with no common purpose; some are using drugs and bring them into the halfway house; some are recovering drug addicts that don't want to have drugs around. He asserted that the contractors are not allowing the presence of drugs but are fighting it like he is. REPRESENTATIVE JOHNSON expressed her concern regarding establishing a halfway house in a neighborhood without notice to the neighborhood and the possibility that the proposed legislation would allow the requirement of public notice to be circumvented. She added that halfway house residents are criminals and putting them into neighborhoods would understandably make residents unhappy. COMMISSIONER WILLIAMS replied that the proposed legislation would not preclude any local ordinances, requirements, or controls regarding the locations of the halfway houses. There would be discussions at the municipal level, prospective providers would be heard, as well as objections, and it would be a community decision. He stated that another consideration is that the residents of the halfway houses are being released to the communities regardless. He offered that his proposal addresses a choice: either an inmate will spend the last six months of his\/her sentence in a halfway house with a 65 percent recidivism rate upon release due to insecure employment and housing; or the inmate will live in a local, innovative housing unit that is smaller, under the control of local ordinances, but where escapes and drugs are less likely. He added that people in the smaller locations have problems, but there are fewer problems. There are many more problems in the large places with 50-100 men, who have nothing in common; some want to continue trafficking in drugs and some want to get well. REPRESENTATIVE KNOPP expressed his concern that if halfway houses are placed in communities with no economic opportunities, an inmate who was not productive before prison, would not be productive upon release even if he\/she was in a smaller residential facility. He offered that if procurement is an issue, it could be addressed administratively. He referred to the communities - Bethel, Cordova, and Nome - and questioned what could be done in a halfway facility - whether it housed six or sixty men - that would result in the residents being productive. He maintained that there are drugs in prisons, hospitals, and schools; the size of the facility would not make a difference; if the residents are using drugs, then it is impossible to keep the drugs out of the facility. He concluded that he is unable to make the connections between procurement codes, smaller living facilities, and the type of rehabilitation that Commissioner Williams is seeking. COMMISSIONER WILLIAMS replied that research shows that for peer- oriented returning citizens, who have a common issue that they are working on together, a six-bed facility is better than a sixty-bed facility. He described the larger halfway houses: sixty people housed in one place; four to six people to a room; varied sleeping and employment schedules; and residents who are not working. He stated that they are a \"hodge-podge\" of individuals who don't have \"a lot pulling together.\" COMMISSIONER WILLIAMS said that the reason that smaller locations work better is because the residents support each other; they help each other find jobs; and they are held accountable by a house parent. He said that this model is used in Norway; the recidivism rate is 25 percent. He maintained that the success in that country is not just because of the money that is spent on prison treatment programs. Their prisons are not that much better that those of the U.S., although there are a few things they do better. He said, \"What they are better at is how they step people down.\" The prisoners start out at a maximum-security facility; they work their way out; they go into a halfway house in downtown Oslo with a maximum of 15-20 beds; and they all have jobs. He continued by saying that finishing one's prison sentence in one of these halfway houses is a privilege; the residents all have a lot to lose. He reiterated that the research on the success of the small peer-oriented facilities is very clear; and the operators of these small facilities have testified that the results are good. COMMISSIONER WILLIAMS mentioned a facility in the Kenai area: it is a faith-based organization; there are three individuals just out of prison at the facility; the operator is helping them to secure jobs and \"keep on track\"; and the individuals go to Narcotics Anonymous Alcoholics Anonymous (NAAA) meetings. He maintained that the operator is barely able to keep the facility operating. He stated, \"It's all on a shoestring. It's amazing the results.\" He asked to be given the opportunity and flexibility to pilot this initiative, because he sees already that it is working. REPRESENTATIVE KNOPP commented that he has put many of the men whom Commissioner Williams referenced to work and has seen very limited success. He said that the men worked for a while; they did very well; they were hard-working and smart; they were happier than they had ever been; and they were making more money than they had ever made. He stated that after about 30-60 days of good paychecks, they don't make it to work on Monday; then lose more days of work; then don't show up again; and Representative Knopp gets a phone call that they are incarcerated. He maintained that he is not as optimistic as the faith-based [organization] that is doing this work every day. He conceded that there have been a few successes with the men being actively involved with the church. REPRESENTATIVE BIRCH referred to sixty men in a halfway house with ten units and six people to a unit. He conceded that a small housing unit offers a more normal lifestyle for the residents but suggested that there would be efficiencies in having 60 men under one roof; having the men in ten different properties would be very labor intensive and require additional oversight, administration, and management. COMMISSIONER WILLIAMS responded that the larger facility might be operationally efficient; however, it is not economical. He said that the larger facilities are very costly due to requirements regarding cameras, doors, staffing, and many other \"hard\" costs. He reiterated that he has broken out the costs and can demonstrate the actual cost of the beds. COMMISSIONER WILLIAMS relayed that the other consideration is that the failure rate is high [for the large facilities]. He maintained that the smaller nonprofits are better at transitioning inmates back into society: these facilities are in smaller peer-oriented communities; the facilities are run by well-intentioned and seasoned people who are in recovery and have been for five to ten years; the involvement of the operators in helping people reenter society is not only different, but better. He explained that inmates do not want to go to halfway houses, and their issues and concerns about going to halfway houses are \"real.\" COMMISSIONER WILLIAMS expressed his belief that the current halfway house model is the cornerstone of the failure to control the high recidivism rate; and his staff is convinced of this as well. He said that when asked why he is not putting more people in halfway houses, he responds that there is a problem with the model; the model was developed for relief for population control; it is no longer used for that purpose but as a step- down unit. He summarized that the easiest course of action for him is to do nothing; however, continuing to follow the same failed model after 20 years will not produce different results. He stated that his job is to bring problems to the forefront and attack them with new solutions. He asked the committee for its help and for any suggestions it might offer. REPRESENTATIVE BIRCH stated that his principle objection to HB 325 is bypassing the procurement guidelines. He expressed his belief that there are administrative remedies, which the Department of Law (DOL) could provide. He offered that absent the procurement waiver proposed by HB 325, a competitive bid document could be drafted by DOC that defines exactly what is wanted. He expressed that Commissioner Williams appears to have a very clear idea of what he wants for DOC and that it is a model that Representative Birch supports. Representative Birch offered his belief that there are people willing to operate small halfway houses who could meet the standard established by DOC, and the competitive bid process would work. He maintained that the state gets into trouble when it waives procurement guidelines; it has at times had a poor track in that area. REPRESENTATIVE WOOL expressed that he understands being intimidated by a ream of paper with requirements. He commented that the halfway house model is broken, as evidenced by the recidivism rates, and the state should not allow \"some old methodology of 100 pages of procurement\" stop it from trying something new. He mentioned that he spoke to Kara Nelson [Director, Haven House Juneau] who testified during the hearing on HB 325 [during the House State Affairs Standing Committee meeting of 2\/13\/18]. He referred to the public television [360 North] documentary, [entitled \"Inside Out Leaving Prison Behind\"]; he recommended that the committee members see the documentary. He repeated the question he asked Ms. Nelson after the meeting, which was: Haven House is operating well; therefore, what is the problem? COMMISSIONER WILLIAMS replied that the scope of the problem is expecting someone from Haven House to work through an RFP. He said that he appreciates the suggestion to shorten the RFP but maintained that he doesn't know how to do that. Even if the RFP is soliciting a proposal for a six-bed facility, if the bid is for over $100,000, the entire process must still be followed. COMMISSIONER WILLIAMS stated that he is working on a \"Plan B\" if HB 325 doesn't pass. He maintained that there is a reason that the small facility operators don't apply and expend the great effort. REPRESENTATIVE WOOL said that he learned [from Ms. Nelson] the state can't pay Haven House to house inmates transitioning to life outside, because the organization has not fulfilled the procurement obligation; Haven House is operating on a volunteer, nonprofit, donation basis; and it is not getting money from the state. He mentioned that the state is paying the Northstar Center in Fairbanks, $176 per day per person. He added that the center is across the street from his business; the center has \"walk-aways\", but that doesn't impact him because they don't stay in the area. He mentioned that in the neighborhood where he lives, there are a couple group homes for troubled youth, and he doesn't really notice them either. REPRESENTATIVE WOOL maintained that he likes the Haven House model as a method of transitioning prisoners to functioning on the outside world. He asserted that he does not agree with the statement, \"Because they're once prisoners, they're forever deemed unproductive, and you can never get them functioning in society.\" He stated that he knows people who have been incarcerated and are now out of prison and functioning well. There are different reasons for people to go to jail; not all are destined to a life of nonproductivity; people can be helped, as Norway has demonstrated. He said that he believes that downsizing and allowing for closer interactions is a good model. He said that he applauds Commissioner Williams for exploring a different model; and he supports circumventing the procurement codes to allow for a limited pilot project. He said, \"What's the hurt in trying, because we're doing pretty poorly as it is?\" He mentioned the expense of one person supervising six residents but maintained that there is a high cost associated with a 60-70 percent recidivism rate, that is, the added expense of public safety, court, and prison. Vice Chair LeDoux stated that before supporting HB 325, she wants to hear someone from the Department of Administration (DOA) say that there is no way for smaller projects to have a fast track or \"lighter\" procurement policy. She maintained that if there is no way, then that is a problem. She offered that rather than address this problem on a department-by-department, project-by-project basis, there should be a mandate that the administration adopt realistic procurement codes. She maintained that she supports the model that Commissioner Williams has presented; however, she claimed that she wants to make sure there is no way the change could be made in the procurement code. She stated that she would rather spend her legislative time on something that resulted in a simpler procurement code so that the requests from departments didn't come in one by one and each need separate legislation. She offered that projects under a certain amount could have a streamlined procurement process. COMMISSIONER WILLIAMS responded by saying that for under $100,000, there is a fast track; however, that amount is spread out between three to five years. He gave an explanation using a hypothetical situation: DOC signs a contract with Haven House; it awards Haven House $50 per night per individual; there are four to five people who are still serving sentences but are now housed at Haven House; the amount exceeds $100,000 over the course of three to five years - the length of the contracts. He suggested that perhaps there should be more flexibility on the fast track dollar amount. COMMISSIONER WILLIAMS said that $17 million is spent on halfway houses. He asked that as an alternative to the proposed legislation, he be allowed to bypass the procurement rules for $5 million; institute a pilot project; track the results after three years; and try to improve the halfway house model. VICE CHAIR LEDOUX maintained that if DOC has a problem with the fast track, there are probably other departments with that problem. She suggested that the procurement code should be revised not just for DOC, but for all departments; and without that, she cannot support the proposed legislation. VICE CHAIR LEDOUX passed the gavel back to Chair Kreiss-Tomkins. REPRESENTATIVE TUCK acknowledged the high recidivism rate; he expressed that he is shocked by the escape rate at the halfway houses. He suggested that the contracts require the halfway houses not to allow escapes or to be penalized for them. He offered that DOC could do better with the escape rate. REPRESENTATIVE TUCK stated that he looked through the DOC halfway house RFP and was not able to identify anything that could be eliminated. He mentioned two provisions - facilities must pay utilities and they must be bonded - and offered that they are necessary. He asked what in the RFP specifications could be eliminated. He also asked why DOC couldn't write the RFP specifications to set a limit for the number of residents in a halfway house. He maintained that a large part of a prisoner's success upon leaving the corrections system is oversight by proper peers - parole officers and probation officers. He conceded that more focused attention on the inmates does lose \"economies of scale\"; however, the greater personal attention may help reduce the recidivism rate. REPRESENTATIVE TUCK summarized the reasons for the failures of the current system: the expense per inmate is high; the stepdown plan is inadequate stepdown; there is a high rate of escapees; people don't want to live there because of the atmosphere of drug trafficking; and there is nothing for the residents to do. REPRESENTATIVE BIRCH cited Section 3 of HB 325, [page 3, lines 19-23], which read in part: (b) In authorizing a contract for rehabilitation and reentry services made under AS 36.30.850 and (a) of this section, the commissioner or the commissioner's designee shall make a determination that the payment for rehabilitation and reentry services will promote the use of community-based and culturally relevant rehabilitative and reentry services most suited to provide support for the individual REPRESENTATIVE BIRCH suggested that at some point DOC needs to quantify what is being asked for in a contract: number of square feet for a room; smoke detectors; and supervision requirements. He maintained that DOC could describe what it wants in detail; however, he conceded that quantifying the qualifications of staff to provide rehabilitation and reentry services would be more difficult. He stated that he supports looking for options within the existing procurement code; he expressed his belief that those options exist. He mentioned that the commissioner's objective is meritorious; however, the \"safest bet\" is for DOC to decide what it wants, put out an RFP, and rely on a competitive bid process. CHAIR KREISS-TOMKINS announced that HB 325 would be held over. REPRESENTATIVE TUCK asked for the various ways that people are put into halfway houses. COMMISSIONER WILLIAMS answered that the walk-away rate decreased by about one-third from the prior year due to being \"smarter\" about who was allowed into a halfway house. He stated that he has been criticized for not releasing more inmates to halfway houses; however, he maintained that to avoid the escape rate of 2016, DOC has pared down who was eligible for halfway houses. He relayed that except for very few exceptions, halfway house residents are people still serving sentences with six months to a year remaining. The two main groups of halfway house residents are inmates who are furloughed, as determined by statute, and inmates on electronic monitoring. REPRESENTATIVE JOHNSON stated that she got involved in government because of someone trying to circumvent the procurement code and has reservations about allowing it to happen. She suggested that DOA staff provide information on the procurement code and the committee explore possible changes to the code. She also suggested that the committee hear testimony from the halfway house contractors and get their input on possible solutions to the halfway house problems. CHAIR KREISS-TOMKINS concurred with the suggestions. REPRESENTATIVE WOOL referred to the phrase \"culturally relevant rehabilitative and reentry services\" and asked for the percentage of halfway house inmates who are from outside of Alaska's urban areas, who might receive a greater benefit by being in a place with people from their own cultural background and closer to home. He mentioned that there are a fair number of Alaska Natives incarcerated; someone from a rural area paroled in Anchorage must stay in Anchorage to be close to his\/her parole officer; rural halfway houses could help this urban-rural divide, if there are such places willing to bid on halfway house contracts. COMMISSIONER WILLIAMS replied that another reason why the current model is broken is that there are not smaller facilities in rural areas; people do not want to go to halfway houses in one location and try to get a job, knowing that eventually they will be leaving. He added that even the Matanuska-Susitna (\"Mat-Su\") Valley does not have stepdown housing. COMMISSIONER WILLIAMS mentioned Unalakleet and similar rural communities and emphasized the benefits of financially supporting even one stable home in such a region to allow Alaska Natives to return to that location. An operator of a home that size would never be able to prepare a bid according to the current procurement code; the specification of square footage is much less important than the location of the home; and closeness to home and one's support system is more important. He stated that the commissioner of DOC still has full custody of halfway house inmates; in the smaller halfway houses, any problems can be immediately and appropriately addressed with a measured response. He agreed that the current halfway house model is not culturally relevant to many inmates, and there are very few options for finding a culturally relevant environment. REPRESENTATIVE KNOPP clarified his earlier question: For a person who was nonproductive before jail, what would make them productive upon release? He expressed his belief that smaller halfway houses would have no effect on encouraging an inmate to become productive. People who have had a lifetime of being productive are likely to be productive after incarceration. REPRESENTATIVE KNOPP stated that there are two reasons for his disagreement with the proposal in HB 325: one is waiving the procurement code; the other is that contracting with smaller facilities loses economies of scale. If the [hypothetical] house in Unalakleet is not full, the price per square foot or per bed would have to increase. He relayed that the discussions on Senate Bill 91, [passed during the Twenty-Ninth Alaska State Legislature (2015-2016) and signed into law 7\/11\/16], and the discussions of HB 325 both noted the disproportionately higher incarcerations rates of rural Alaska Natives and a need for culturally relevant treatment. He maintained that if housing inmates in a small rural community to attain cultural relevance results in just one or two inmates, DOC has lost all economies of scale. REPRESENTATIVE KNOPP stated that he does not support HB 325 for two reasons. He maintained that he does not support an exception to the procurement code, however, would support a review of the procurement code. He stated that secondly, he does not agree with the overall plan behind the proposed [HB 325 was held over.] ^INDIRECT EXPENDITURE HEARING CHAIR KREISS-TOMKINS announced that the next order of business would be the Indirect Expenditure Hearing. He stated that first to be considered are the recommendations from the House Finance Committee's Subcommittee on the Department of Administration (DOA) (\"House DOA budget subcommittee\") related to the Alaska Public Offices Commission (APOC) and the Division of Motor Vehicles (DMV). BROOKE IVY, Staff, Representative Jason Grenn, Alaska State Legislature, reviewed the statutory change recommendations offered by the House DOA budget subcommittee in the fiscal year 2018 (FY 18) closeout report, with the use of a handout, entitled \"Statutory Recommendations of DOA Finance Subcommittee:\" included in the committee packet. MS. IVY relayed that the first two recommendations refer to APOC. The first recommendation is to streamline some of the reporting statutes. She mentioned that the APOC office has been reduced by six positions since FY 16; therefore, workload has become a problem. Five areas of the statute were identified in which small changes could be made to create efficiencies and streamline the workload. A revision to AS 15.13.374(c) would extend the response time for advisory opinion requests from seven days to ten working days. This change would avoid pulling staff from time-sensitive projects. An additional four areas of statute were identified for possible amendments. In AS 15.13.030(7), the elimination of the word \"all\" would allow the agency some discretion in choosing the documents to be investigated, examined, and compared for audits. A revision to AS 15.13.040(g) would extend to \"groups\" the exemption from certain filings for contributions to small campaigns; it would apply to groups raising no more than $2,500 in a calendar year. There was a recommendation to repeal AS 15.13.040(k), which requires a filing for a report that is redundant. A new subsection added by AS 15.13.090(c) would clarify some size requirements for the \"paid for by\" identifiers. MS. IVY relayed that the second recommendation relates to exploring increases to APOC fee collection. In the FY 18 proposed governor's budget, there was an effort to increase designated general fund (DGF) program receipts; however, APOC testified that it would be unable to collect those receipts unless it has statutory authority to do so. Certain user groups were identified as requiring the most significant portion of APOC's time, and these groups were not included in statute; therefore, the recommendation was to ensure that these user groups were addressed in statute to be able to collect fees from them. Registration fees were considered for other user groups, such as public officials, legislators, and candidates for registration, which is addressed under HB 91. CHAIR KREISS-TOMKINS asked where HB 91 is currently in the MS. IVY expressed her understanding that HB 91 has passed out of the House Finance Committee and is currently in the House Rules Standing Committee. REPRESENTATIVE WOOL asked Ms. Ivy to identify HB 91. MS. IVY replied that HB 91 was sponsored by Representative Sam Kito; it creates fees for lobbyists filing with APOC; and it establishes a $50 registration fee for public officials, with an exception for those in communities of 15,000 population or less. She added that persons not qualifying as a group or non-group entity would be subject to a $100 registration fee; and this would include the previously mentioned entities not captured in statute. REPRESENTATIVE BIRCH asked for clarification on the recommendations and asked if they support HB 91. MS. IVY explained that the recommendations she related were offered by the House DOA budget subcommittee in FY 18 based on an amendment process that took place in the committee; however, the subcommittee is not explicitly offering support for HB 91; it is simply noting that the issues raised in the recommendation would be being partially addressed by HB 91. She added that she cannot relay the rate of the fee, since it was not addressed in the subcommittee. CHAIR KREISS-TOMKINS added that the finance subcommittees look at what the agencies are doing and try to cut the budget where possible. Sometimes previous legislatures have passed statutes that direct agencies to perform activities that are superfluous; therefore, eliminating those statutes can help those agencies streamline and reduce the budget. He stated that the recommendations represent ideas for the legislators; it is their choice whether to act on them. REPRESENTATIVE BIRCH asked if these are just suggestions from some members of the subcommittee. CHAIR KREISS-TOMKINS answered that they specifically came from the House Finance Committee's Subcommittee on DOA. He offered that the introduction of HB 400 [which relates to fees for fire prevention measures], resulted from recommendations of the House Finance Committee's Subcommittee on the Department of Public Safety (DPS). He maintained that some of these ideas can be rolled into a committee bill and be acted upon; however, it is at the discretion of the committee. REPRESENTATIVE KNOPP explained that in the finance subcommittee process, one of the conversations was about expenses of the state, but it also addressed [lost] revenue called \"indirect expenditures\" due to subsidies, waivers, or exemptions for something for which the state would typically charge a fee. He maintained that the process of looking at indirect expenditures is to determine if they are being utilized, if the state is being too generous with them, and whether they should continue. He added that HB 91, also referred to as the \"lobbyist bill,\" addresses the recommendations for generating revenues for APOC. CHAIR KREISS-TOMKINS concurred. HEATHER HEBDON, Executive Director, Alaska Public Offices Commission (APOC), stated that APOC is in support of the statutory recommendations, which would alleviate some of the heavy workload due to staff reduction. MS. IVY referred to the second page of the handout, entitled \"Statutory Recommendations from DOA Finance Subcommittee:\" included in the committee packet, to describe the third and fourth recommendations, which relate to DMV. She relayed that the third recommendation is to amend AS 18.65.310(g) to change eligibility for identification (ID) card fee waiver from 60 years of age and older to 65 years of age and older. She explained that it currently is a $15 waiver. She said that making this change would make the age for this waiver consistent with the other DMV related waiver - the $100 registration fee waiver - specified in AS 28.10.411(f). She added that the Legislative Finance Division (LFD) supported this change. CHERI LOWENSTEIN, Director, Division of Administrative Service (DAS), Department of Administration (DOA), relayed that by establishing the $15 waiver at age 65 instead of 60, there would be approximately 11,925 ID cards that would not be waived for the next five years, which would amount to $178,875 in additional revenue to the state. MS. IVY stated that the fourth recommendation is to amend AS 28.10.421(d) to increase the vehicle registration fee for municipal governments and charitable organizations from $10 to $50; under the current waiver, they pay $10 - a $90 deduction. She added that there are many users of that exemption. MS. IVY relayed that the fourth recommendation includes also the repeal of AS 28.10.481(i), which would remove the $100 per vehicle exemption for those with amateur mobile radios. REPRESENTATIVE WOOL referred to the 5,543 vehicles mentioned in the handout as the number of vehicles for which the discount was used. He asked Ms. Ivy if she has a breakdown of the vehicles - municipal versus charitable. MS. IVY replied that she did not have that breakdown. She mentioned that the numbers on the handout are directly from the closeout report from the House DOA budget subcommittee. She said that she has since learned that the total number of vehicles in FY 17 for which the exemption was used was 9,008, but it was for a period of over two years. MS. LOWENSTEIN responded that she did not have the breakdown of vehicles receiving the exemption but would provide that REPRESENTATIVE WOOL referred to the $498,870 in lost annual revenue incurred by the $90 discount per vehicle, stated on the handout, and said that by reducing the discount to a $50 discount, DMV will not recoup the full half a million [dollars]. He asked if Ms. Ivy had the revised revenue amounts. MS. IVY answered that she has calculated the FY 15 savings; an additional $40 per vehicle would have resulted in $221,720 in additional revenue. She stated that these recommendations were passed via the amendment process in the House DOA budget subcommittee. CHAIR KREISS-TOMKINS clarified by saying that eliminating the exemption entirely would result in about half of a million dollars in savings; changing the exemption to $50 would result in about quarter of a million dollars in savings. MS. IVY concurred. CHAIR KREISS-TOMKINS stated that the recommendations from the House Finance Committee's Subcommittee on the University of Alaska (UA) (\"House UA budget subcommittee\") would be presented, which relates to the Alaska \"Washington, Wyoming, Alaska, Montana, and Idaho\" (WWAMI) Program. GREG SMITH, Staff, Representative Gabrielle LeDoux, Alaska State Legislature, referred to the handout, entitled \"2018 Session Operating Budget Statutory Change Proposal,\" and reviewed the recommendations of the House UA budget subcommittee related to the WWAMI Program. He relayed that the recommended statutory change would impact AS 14.43.510(a); currently students that do not return to the state pay 50 percent of the state financial assistance; under the proposal, students would pay 100 percent of the state assistance. He explained that currently students pay 50 percent of what can be $150,000 state share, if they do not return to practice in the state. He expressed his belief that they must also pay 100 percent if they don't complete the schooling. MR. SMITH stated that he has heard that graduates not returning to the state pay about $400,000 annually; however, he expressed his belief that even with doubling the percentage of repayment, the amount to be paid would not double due to \"behavior change.\" CHAIR KREISS-TOMKINS asked for a restatement of the statutory MR. SMITH stated that the purpose of the recommendation is to increase the amount that a WWAMI student, who does not return to the state, must pay from 50 percent to 100 percent. CHAIR KREISS-TOMKINS asked what the fiscal impact of the proposed change would be. MR. SMITH referred to page 51 of the Indirect Expenditure Report [January 2017, LFD], included in the committee packet, and said that the estimated revenue impact stated in the report represents the total loan forgiveness for WWAMI graduates; for those students returning to Alaska, a percentage of the state assistance [owed] is removed every year depending on the student being in a rural or urban setting. He said that the amounts shown on the report account for that adjustment. He expressed his belief that doubling the percentage owed by non-returning WWAMI students would not result in the state recouping the approximately $1.5 million in estimated revenue for FY 15 shown on the report [page 51(8)]. He said that WWAMI students not returning to the state are currently paying about $400,000 per year; with the repayment at 100 percent, the amount would be close to $800,000; however, the question is, \"Would some return if the full amount was being required?\" CHAIR KREISS-TOMKINS asked for the estimated impact of the statutory change. ALEXEI PAINTER, Fiscal Analyst, Legislative Finance Division (LFD), Legislative Affairs Agency (LAA), answered that the estimate would have to be determined via a fiscal note; the behavioral change is difficult to estimate. He stated that currently students are awarded \"forgiveness\" based on the years that they practice medicine in Alaska; therefore, if the benefits of doing that are significantly larger, more students would do that. He maintained that it would be misleading to assume that the state would \"capture\" all those savings. He said that the $400,000 figure is the current amount of repayment going into the general fund (GF); it represents the repayment of students not returning to the state. He added that the size of WWAMI was increased in 2007 from 10 students to 20 students per year; therefore, there should be larger classes and a larger impact over time. The impact would have to be determined via a fiscal note. The numbers in the report are from FY 15, and therefore, outdated. REPRESENTATIVE BIRCH stated that he is uneasy about this recommended change. Alaska has no law school and no medical program, and the WWAMI Program has had a [positive] impact on UA. He maintained that he would like input from UA to determine if the proposed change would compromise a program that has worked very well. He asked if UA has been contacted regarding the proposal. CHAIR KREISS-TOMKINS answered that the recommendation came from the House Finance Committee's Subcommittee on UA, and Representative LeDoux offered the amendment. REPRESENTATIVE BIRCH asked for the genesis of the proposal. He opined that it is not a good idea and asked if the sponsor has a specific reason for proposing it. REPRESENTATIVE KNOPP expressed his understanding that the WWAMI Program offers students a loan to attend Western Washington University (WWU); currently if the students do not return to the state, they must repay 50 percent of the loan; under the amendment, they would be required to repay 100 percent of the loan. MR. PAINTER explained that through the WWAMI Program, the students pay tuition at an in-state rate; all the states in the program pay a cost per student as a member of the WWAMI cooperative. He continued by saying that the State of Alaska considers half of the cost to be a loan, and that loan is repaid by the students unless they return to Alaska and practice medicine for three years in rural Alaska or five years in urban Alaska. He stated that the other half of the cost is considered a subsidy and is not repaid. He summarized that the payment is structured as a loan but is really a subsidy for which the state requires a partial payback. REPRESENTATIVE KNOPP offered that the proposed change would eliminate the subsidy if the student does not return. MR. PAINTER replied, \"That is correct.\" He said that part of the reason LFD recommended a review rather than made an outright recommendation is because it would constitute a strong disincentive to join the WWAMI Program due to the cost being too high. He maintained that LFD does not know if that is true or REPRESENTATIVE KNOPP asked, \"Why would we care what the cost is?\" He said that the program was an incentive program to get students to return and practice in the state and asked, \"Why would we pay, if there's no benefit to us?\" REPRESENTATIVE WOOL clarified that the program includes Washington, Wyoming, Alaska, Montana, and Idaho. He reiterated that students pay in-state State of Washington tuition; therefore, is not a \"free ride\" on tuition. The cost to Alaska is the cost of joining WWAMI so that Alaska does not have to build a medical school or create an entire medical school program. It represents an additional cost; the fee would not even exist if the student attended the University of Colorado Medical School, because there would be no state buy-in. He referred to page 51 of the Indirect Expenditure Report and cited the amount of estimated annual monetary benefit to recipients shown in (2) of the section entitled, \"Legislative Finance Analysis per AS 24.20.235,\" which reports the amount of $8,641. He asked for the cost per student that Alaska pays to be included in the WWAMI cooperative. MR. PAINTER replied that he does not know the cost per student; however, the approximate cost of the WWAMI Program to the State of Alaska is $3 million; there are 20 students in each class; it is a three-year program, which calculates to roughly $50,000 per student. REPRESENTATIVE WOOL asked what the \"$8,600\" amount represents. He asked if it is the annual payment of a loan that is paid off in 20 years, or if it is the amount incurred every year while in MR. PAINTER responded that $8,641 is the amount per recipient lifetime per year. He explained that if a student graduates, has a reduced cost, and holds the loan for many years, that amount represents the benefit per year that the student holds the loan; there are 183 people identified holding these loans and the total cost is divided by 183. REPRESENTATIVE WOOL asked for confirmation that the loan period is not a set number of years; therefore, the amount owed by the student is not known upon graduation. MR. PAINTER agreed that he does not know that amount. REPRESENTATIVE WOOL referred to Representative Knopp's comment: Why should we care? Why should we give them any incentive if they're not going to come back? He asked if he could be provided with the difference in economic impacts for an Alaska student who chooses the WWAMI Program and most likely returns to Alaska, or for one who goes to Colorado and doesn't know if he\/she will return. MR. PAINTER replied that it is a discussion for the committee to have. The recommendation was based on data from FY 15; the cost of medical school has changed since then; and the subcommittee did not want to make a recommendation that would not stand up CHAIR KREISS-TOMKINS asked that the amounts be calculated for the current fiscal year [FY 18]. MR. PAINTER answered that the figures could be updated; however, LFD is not equipped to compare the costs of medical schools. REPRESENTATIVE BIRCH asked, \"How much discussion has gone on between ... the sponsor of this proposal and the University of Washington (UW) or UA or whoever is ... coordinating the WWAMI Program?\" He maintained that there is great cost associated with starting a medical school; Alaska does not have a medical school; and the program has provided Alaska with physicians. MILES BAKER, Associate Vice President of Government Relations, University of Alaska (UA), relayed that the statutory change was a recommendation from the House UA budget subcommittee; it was not a recommendation put forward by UA. He stated that there have been many questions from legislators this year regarding the WWAMI Program; UA has provided legislators information in response to those questions. He offered that the program can be complicated: it is operated by the UW on behalf of the State of Alaska to allow the state to be part of a medical school; the agreement is among the Alaska Commission on Postsecondary Education (ACPE), UW, and UA. He relayed that the state pays a fee to be in the WWAMI coalition; if a student does not adhere to the obligation of serving in Alaska, some of that fee is recouped through an agreement between ACPE and the student. He suggested that the committee hear from Jane Shelby, Ph.D., Director of the Alaska WWAMI Program, and Stephanie Butler, Executive Director of ACPE. REPRESENTATIVE BIRCH expressed his interest in hearing from people involved with the WWAMI Program to ensure that the program is not comprised. REPRESENTATIVE KNOPP expressed his understanding that Alaska pays a fee for its students to participate under an in-state resident rate; the fee Alaska pays compensates for the non- resident rate; the students do, however, pay tuition. He asked for clarification on the amount that is forgiven and the amount required to be repaid. He said, \"Is it simply ..."} +{"id":"RedPajamaCommonCrawl.0006","text":"CH 14: Health CHAPTER 14: HUMAN HEALTH Climate Change Affects the Health of All Americans The health and well-being of Americans are already affected by climate change, with the adverse health consequences projected to worsen with additional climate change. Climate change affects human health by altering exposures to heat waves, floods, droughts, and other extreme events; vector-, food- and waterborne infectious diseases; changes in the quality and safety of air, food, and water; and stresses to mental health and well-being. Exposure and Resilience Vary Across Populations and Communities People and communities are differentially exposed to hazards and disproportionately affected by climate-related health risks. Populations experiencing greater health risks include children, older adults, low-income communities, and some communities of color. Adaptation Reduces Risks and Improves Health Proactive adaptation policies and programs reduce the risks and impacts from climate-sensitive health outcomes and from disruptions in healthcare services. Additional benefits to health arise from explicitly accounting for climate change risks in infrastructure planning and urban design. Reducing Greenhouse Gas Emissions Results in Health and Economic Benefits Reducing greenhouse gas emissions would benefit the health of Americans in the near and long term. By the end of this century, thousands of American lives could be saved and hundreds of billions of dollars in health-related economic benefits gained each year under a pathway of lower greenhouse gas emissions. KM 1: Health Impacts KM 2: Vulnerable Populations KM 3: Adaptation Benefits KM 4: Mitigation Benefits Climate-related changes in weather patterns and associated changes in air, water, food, and the environment are affecting the health and well-being of the American people, causing injuries, illnesses, and death. Increasing temperatures, increases in the frequency and intensity of heat waves (since the 1960s), changes in precipitation patterns (especially increases in heavy precipitation), and sea level rise can affect our health through multiple pathways. Changes in weather and climate can degrade air and water quality; affect the geographic range, seasonality, and intensity of transmission of infectious diseases through food, water, and disease-carrying vectors (such as mosquitoes and ticks); and increase stresses that affect mental health and well-being. Changing weather patterns also interact with demographic and socioeconomic factors, as well as underlying health trends, to influence the extent of the consequences of climate change for individuals and communities. While all Americans are at risk of experiencing adverse climate-related health outcomes, some populations are disproportionately vulnerable. The risks of climate change for human health are expected to increase in the future, with the extent of the resulting impacts dependent on the effectiveness of adaptation efforts and on the magnitude and pattern of future climate change. Individuals, communities, public health departments, health-related organizations and facilities, and others are taking action to reduce health vulnerability to current climate change and to increase resilience to the risks projected in coming decades. The health benefits of reducing greenhouse gas emissions could result in economic benefits of hundreds of billions of dollars each year by the end of the century. Annual health impacts and health-related costs are projected to be approximately 50% lower under a lower scenario (RCP4.5) compared to a higher scenario (RCP8.5). These estimates would be even larger if they included the benefits of health outcomes that are difficult to quantify, such as avoided mental health impacts or long-term physical health impacts. Examples of populations at higher risk of exposure to adverse climate-related health threats are shown along with adaptation measures that can help address disproportionate impacts. When considering the full range of threats from climate change as well as other environmental exposures, these groups are among the most exposed, most sensitive, and have the least individual and community resources to prepare for and respond to health threats. White text indicates the risks faced by those communities, while dark text indicates actions that can be taken to reduce those risks. From Figure 14.2 (Source: EPA). Federal Coordinating Lead Authors: John M. Balbus, National Institute of Environmental Health Sciences George Luber, Centers for Disease Control and Prevention Kristie L. Ebi, University of Washington Aparna Bole, University Hospitals Rainbow Babies & Children's Hospital, Ohio Allison Crimmins, U.S. Environmental Protection Agency Gregory Glass, University of Florida Shubhayu Saha, Centers for Disease Control and Prevention Mark M. Shimamoto, American Geophysical Union Juli Trtanj, National Oceanic and Atmospheric Administration Jalonne L. White-Newsome, The Kresge Foundation David D'Onofrio, Atlanta Regional Commission Technical Contributor: Stasia Widerynski, Centers for Disease Control and Prevention Ashley Bieniek-Tobasco, Health Program Coordinator Sarah Zerbonne, Adaptation and Decision Science Coordinator Natalie Bennett, Adaptation and Assessment Analyst Ebi<\/b>, K.L., J.M. Balbus, G. Luber, A. Bole, A. Crimmins, G. Glass, S. Saha, M.M. Shimamoto, J. Trtanj, and J.L. White-Newsome, 2018: Human Health. In Impacts, Risks, and Adaptation in the United States: Fourth National Climate Assessment, Volume II<\/i> [Reidmiller, D.R., C.W. Avery, D.R. Easterling, K.E. Kunkel, K.L.M. Lewis, T.K. Maycock, and B.C. Stewart (eds.)]. U.S. Global Change Research Program, Washington, DC, USA, pp. 539\u2013571. doi: 10.7930\/NCA4.2018.CH14 U.S. Climate Resilience Toolkit Climate & Health Assessment Scenarios for the National Climate Assessment USGCRP Indicators A comprehensive assessment of the impacts of climate change on human health in the United States concluded that climate change exacerbates existing climate-sensitive health threats and creates new challenges, exposing more people in more places to hazardous weather and climate conditions.1 This chapter builds on that assessment and considers the extent to which modifying current, or implementing new, health system responses could prepare for and manage these risks. Please see Chapter 13: Air Quality for a discussion of the health impacts associated with air quality, including ozone, wildfires, and aeroallergens. Figure 14.1: Climate Change and Health A flow chart illustrates the pathways by which climate change could affect human health. That is, climate drivers, such as increased temperatures and precipitation extremes, can expose humans to conditions like extreme heat and reduced food and water quality. In turn, this exposure can lead to negative health outcomes, including heat-related illness; food-, water-, and vector-borne diseases; and mental health issues. Environmental and institutional factors, such as infrastructure condition and geography, and social and behavioral factors, such as age, race and ethnicity, and education, can further influence vulnerability. Figure 14.1: This conceptual diagram illustrates the exposure pathways by which climate change could affect human health. Exposure pathways exist within the context of other factors that positively or negatively influence health outcomes (gray side boxes). Key factors that influence vulnerability for individuals are shown in the right box and include social determinants of health and behavioral choices. Key factors that influence vulnerability at larger scales, such as natural and built environments, governance and management, and institutions, are shown in the left box. The extent to which climate change could alter the burden of disease in any location at any point in time will depend not just on the magnitude of local climate change but also on individual and population vulnerability, exposure to changing weather patterns, and capacity to manage risks, which may also be affected by climate change. Source: Balbus et al. 2016.2 The first paragraph in each of the following sections summarizes findings of the 2016 U.S. Climate and Health Assessment,1 and the remainder of each section assesses findings from newly published research. Extreme Events More frequent and\/or more intense extreme events, including drought, wildfires, heavy rainfall, floods, storms, and storm surge, are expected to adversely affect population health.3 These events can exacerbate underlying medical conditions, increase stress, and lead to adverse mental health effects.4 Further, extreme weather and climate events can disrupt critical public health, healthcare, and related systems in ways that can adversely affect health long after the event.3 Recent research improves identification of vulnerable population groups during and after an extreme event,5 including their geographic location and needs (e.g. Bathi and Das 2016, Gotanda et al. 2015, Greenstein et al. 20166,7,8). For example, the 2017 hurricane season highlighted the unique vulnerabilities of populations residing in Puerto Rico, the U.S. Virgin Islands, and other Caribbean islands (Ch. 20: U.S. Caribbean, Box 20.1).9 Box 14.1: Health Impacts of Drought and Periods of Unusually Dry Months In late 2015, California was in the fourth year of its most severe drought since becoming a state in 1850, with 63 emergency proclamations declared in cities, counties, tribal governments, and special districts.10,11 Households in two drought-stricken counties (Tulare and Mariposa) reported a range of drought-related health impacts, including increased dust leading to allergies, asthma, and other respiratory issues and acute stress and diminished peace of mind.10 These health effects were not evenly distributed, with more negative physical and mental health impacts reported when drought negatively affected household property and finances. Drier conditions can increase reproduction of a fungus found in soils, potentially leading to the disease coccidioidomycosis, or Valley fever.3,12 Coccidioidomycosis can cause persistent flu-like symptoms, with over 40% of cases hospitalized and 75% of patients unable to perform their normal daily activities for weeks, months, or longer. Higher numbers of cases in Arizona and California are associated with periods of drier conditions as measured by lower soil moisture in the previous winter and spring.13 Overall, the impacts of drought on hospital admissions and deaths depend on drought severity and the history of droughts in a region.14 Complex relationships between drought and its associated economic consequences, particularly the interactions among factors that affect vulnerability, protective factors, and coping mechanisms, can increase mood disorders, domestic violence, and suicide.15,16,17 Temperature Extremes High temperatures in the summer are conclusively linked to an increased risk of a range of illnesses and death, particularly among older adults, pregnant women, and children.18 People living in urban areas may experience higher ambient temperatures because of the additional heat associated with urban heat islands, exacerbating heat-related risks.19 With continued warming, increases in heat-related deaths are projected to outweigh reductions in cold-related deaths in most regions.18 Analyses of hospital admissions, emergency room visits, or emergency medical services calls show that hot days are associated with an increase in heat-related illnesses,20,21 including cardiovascular and respiratory complications,22 renal failure,23 electrolyte imbalance, kidney stones,24 negative impacts on fetal health,25 and preterm birth.26 Risks vary across regions (Ch. 18: Northeast, Box 18.3).27 Health risks may be higher earlier in the summer season when populations are less accustomed to experiencing elevated temperatures, and different outcomes are observed at different levels of high temperature.28,29 See Chapter 13: Air Quality for a discussion of the associations between temperature, air quality, and adverse health outcomes. Climate change is expected to alter the geographic range, seasonal distribution, and abundance of disease vectors, exposing more people in North America to ticks that carry Lyme disease or other bacterial and viral agents, and to mosquitoes that transmit West Nile, chikungunya, dengue, and Zika viruses.30,31,32 Changing weather patterns interact with other factors, including how pathogens adapt and change, changing ecosystems and land use, demographics, human behavior, and the status of public health infrastructure and management.33,34 El Ni\u00f1o events and other episodes of variable weather patterns may indicate the extent to which the risk of infectious disease transmission could increase with additional climate change.33,35,36 Increased temperatures and more frequent and intense extreme precipitation events can create conditions that favor the movement of vector-borne diseases into new geographic regions (e.g., Belova et al. 2017, Monaghan et al. 2016, Ogden and Lindsay 201631,37,38). At the same time, very high temperatures may reduce transmission risk for some diseases.39,40 Economic development also may substantially reduce transmission risk by reducing contacts with vector populations.41 In the absence of adaptation, exposure to the mosquito Aedes aegypti, which can transmit dengue, Zika, chikungunya, and yellow fever viruses, is projected to increase by the end of the century due to climatic, demographic, and socioeconomic changes, with some of the largest increases projected to occur in North America.31,32 Similarly, changes in temperature may influence the distribution and abundance of tick species that transmit common pathogens.38,42,43 Box 14.2: Transboundary Transmission of Infectious Diseases Outbreaks occurring in other countries can impact U.S. populations and military personnel living abroad and can sometimes affect the United States. For example, the 2015\u201316 El Ni\u00f1o, one of the strongest on record,44 may have contributed to the 2014\u201316 Zika epidemic in the Americas.31,45,46,47,48 Warmer conditions may have facilitated expansion of the geographic range of mosquito populations and increased their capacity to transmit Zika virus.40 Zika virus can cause a wide range of symptoms, including fever, rash, and headaches, as well as birth defects. The outbreak began in South America and spread to areas with mosquitoes capable of transmitting the virus, including Puerto Rico, the U.S. Virgin Islands, Florida, and Texas. Water-Related Illnesses and Death Increasing water temperatures associated with climate change are projected to alter the seasonality of growth and the geographic range of harmful algae and coastal pathogens, and runoff from more frequent and intense rainfall is projected to increasingly compromise recreational waters and sources of drinking water through increased introductions of pathogens and toxic algal blooms.49,50,51,52,53,54 Projected increases in extreme precipitation and flooding, combined with inadequate water and sewer infrastructure, can contribute to viral and bacterial contamination from combined sewage overflows and a lack of access to potable drinking water, increasing exposure to pathogens that lead to gastrointestinal illness.55,56,57,58,59 The relationship between precipitation and temperature-driven transmission of waterborne diseases is complex and site-specific, with, for example, some areas finding increased numbers of cases associated with excessive rainfall and others finding stronger associations with drought.60,61,62,63,64,65 Heavy rainfall, flooding, and high temperatures have been linked to increases in diarrheal disease62,64,66,67 and can increase other bacterial and parasitic infections such as leptospirosis and cryptosporidiosis.65,68 Increases in air temperatures and heat waves are expected to increase temperature-sensitive marine pathogens such as Vibrio.60,69,70,71 Food Safety and Nutrition Climate change, including rising temperatures and changes in weather extremes, is projected to adversely affect food security by altering exposures to certain pathogens and toxins (for example, Salmonella, Campylobacter, Vibrio parahaemolyticus in raw oysters, and mycotoxigenic fungi).72 Climate change, including changes in some extreme weather and climate events, can adversely affect global and U.S. food security by, for example, threatening food safety,73,74,75 disrupting food availability, decreasing access to food, and increasing food prices.76,77,78,79,80,81,82 Food quality also is expected to be affected by rising CO2 concentrations that decrease dietary iron,83 zinc,84 protein,85 and other macro- and micronutrients in crops86,87,88 and seafood.89,90 Projected changes in carbon dioxide concentrations and climate change could diminish expected gains in global nutrition; however, any impact on human health will depend on the many other drivers of global food security and factors such as food chain management, human behavior, and food safety governance.91,92,93,94 Mental health consequences, ranging from minimal stress and distress symptoms to clinical disorders, such as anxiety, depression, post-traumatic stress, and suicidality, can result from exposures to short-lived or prolonged climate- or weather-related events and their health consequences.4 These mental health impacts can interact with other health, social, and environmental stressors to diminish an individual's well-being. Some groups are more vulnerable than others, including the elderly, pregnant women, people with preexisting mental illness, the economically disadvantaged, tribal and Indigenous communities, and first responders.4 Individuals whose households experienced a flood or risk of flood report higher levels of depression and anxiety, and these impacts can persist several years after the event.95,96,97,98 Disasters present a heavy burden on the mental health of children when there is forced displacement from their home or a loss of family and community stability.99 Increased use of alcohol and tobacco are common following disasters as well as droughts.15,16,100,101 Higher temperatures can lead to an increase in aggressive behaviors, including homicide.102,103 Social cohesion, good coping skills, and preemptive disaster planning are examples of adaptive measures that can help reduce the risk of prolonged psychological impacts.102,104,105 The health impacts of climate change are not felt equally, and some populations are at higher risk than others.106 Low-income communities and some communities of color are often already overburdened with poor environmental conditions and are disproportionately affected by, and less resilient to, the health impacts of climate change.106,107,108,109,110 The health risks of climate change are expected to compound existing health issues in Native American and Alaska Native communities, in part due to the loss of traditional foods and practices, the mental stress from permanent community displacement, increased injuries from lack of permafrost, storm damage and flooding, smoke inhalation, damage to water and sanitation systems, decreased food security, and new infectious diseases (Ch. 15: Tribes; Ch. 26: Alaska).111,112 Across all climate risks, children, older adults, low-income communities, some communities of color, and those experiencing discrimination are disproportionately affected by extreme weather and climate events, partially because they are often excluded in planning processes.113 Other populations might experience increased climate risks due to a combination of exposure and sensitivity, such as outdoor workers, communities disproportionately burdened by poor environmental quality, and some communities in the rural Southeastern United States (Ch. 19: Southeast).114,115,116 Additional populations with increased health and social vulnerability typically have less access to information, resources, institutions, and other factors to prepare for and avoid the health risks of climate change. Some of these communities include poor people in high-income regions, minority groups, women, pregnant women, those experiencing discrimination, children under five, persons with physical and mental illness, persons with physical and cognitive disabilities, the homeless, those living alone, Indigenous people, people displaced because of weather and climate, the socially isolated, poorly planned communities, the disenfranchised, those with less access to healthcare, the uninsured and underinsured, those living in inadequate housing, and those with limited financial resources to rebound from disasters.107,109,117,118 Figure 14.2 depicts some of the populations vulnerable to weather, climate, and climate change. Figure 14.2: Vulnerable Populations Figure 14.2: Examples of populations at higher risk of exposure to adverse climate-related health threats are shown along with adaptation measures that can help address disproportionate impacts. When considering the full range of threats from climate change as well as other environmental exposures, these groups are among the most exposed, most sensitive, and have the least individual and community resources to prepare for and respond to health threats. White text indicates the risks faced by those communities, while dark text indicates actions that can be taken to reduce those risks. Source: EPA. Projections of climate change-related changes in the incidence of adverse health outcomes, associated treatment costs, and health disparities can promote understanding of the ethical and human rights dimensions of climate change, including the disproportionate share of climate-related risk experienced by socially marginalized and poor populations. Such projections can also highlight options to increase population resilience.119,120,121 The ability of a community to anticipate, plan for, and reduce impacts is enhanced when these efforts build on other environmental and social programs directed at sustainably and equitably addressing human needs.122 Resilience is enhanced by community-driven planning processes where residents of vulnerable and impacted communities define for themselves the complex climate challenges they face and the climate solutions most relevant to their unique vulnerabilities.110,123,124,125 A flood-related disaster in central Appalachia in spring 2013 highlighted how community-based coping strategies related to faith and spirituality, cultural values and heritage, and social support can enhance resilience post-disaster.126 Communities in Louisiana and New Jersey, for example, are already experiencing a host of negative environmental exposures coupled with extreme coastal and inland flooding. Language-appropriate educational campaigns can highlight the effectiveness of ecological protective measures (such as restoring marshes and dunes to prevent or reduce surge flooding) for increasing resilience. Resilience also can be built by creating institutional readiness, recognizing the importance of resident mobility (geographic movements at various scales such as commuting, migration, and evacuation), acknowledging the importance and support of social networks (such as family, church, and community), and facilitating adaptation to changing conditions.127,128 Adapting to the Health Risks of Climate Change Individuals, communities, public health departments, healthcare facilities, organizations, and others are taking action to reduce health and social vulnerabilities to current climate change and to increase resilience to the risks projected in coming decades.129 Examples of state-level adaptation actions include conducting vulnerability and adaptation assessments, developing comprehensive response plans (for example, extreme heat),110,130 climate-proofing healthcare infrastructure, and implementing integrated surveillance of climate-sensitive infectious disease (for example, Lyme disease). Incorporating short-term to seasonal forecasts into public health programs and activities can protect population health today and under a warming climate.129 Over decades or longer, emergency preparedness and disaster risk reduction planning can benefit from incorporating climate projections to ensure communities are prepared for changing weather patterns.131 Local efforts include altering urban design (for example, by using cool roofs, tree shades, and green walkways) and improving water management (for example, via desalination plants or watershed protection). These can provide health and social justice benefits, elicit neighborhood participation, and increase resilience for specific populations, such as outdoor workers.107,132,133 Adaptation options at multiple scales are needed to prepare for and manage health risks in a changing climate. For example, options to manage heat-related mortality include individual acclimatization (the process of adjusting to higher temperatures) as well as protective measures, such as heat wave early warnings,134 air conditioning at home, cooling shelters,135 green space in the neighborhood,136,137 and resilient power grids to avoid power outages during extreme weather events.138 Early warning and response systems can protect population health now and provide a basis for more effective adaptation to future climate.139,140,141 Improvements in forecasting weather and climate conditions and in environmental observation systems, in combination with social factors, can provide information on when and where changing weather patterns could result in increasing numbers of cases of, for example, heat stress or an infectious disease.31,45,142,143,144 Such early warning systems can provide more time to pre-position resources and implement control programs, thereby preventing adverse health outcomes. For example, to help communities prepare for extreme heat, federal agencies are partnering with local entities to bring together stakeholders across the fields of public health, meteorology, emergency management, and policy to develop useful information systems that can prevent heat-related illnesses and deaths.145 Adaptation efforts outside the health sector can have health benefits when, for example, infrastructure planning is designed to cool ambient temperatures and attenuate storm water runoff146,147 and when interagency planning initiatives involve transportation, ecosystem management, urban planning, and water management.148 Adaptation measures developed and deployed in other sectors can harm population health if they are developed and implemented without taking health into consideration. Box 14.3: Healthcare The U.S. healthcare sector is a significant contributor to climate change, accounting for about 10% of total U.S. greenhouse gas emissions.149 Healthcare facilities are also a critical component of communities' emergency response system and resilience to climate change. Measures within healthcare institutions that decrease greenhouse gas emissions could significantly reduce U.S. emissions, reduce operating costs, and contribute to greater resilience of healthcare infrastructure. For example, U.S. hospitals could save roughly $15 billion over 10 years by adopting basic energy efficiency and waste-reduction measures (cumulative; no discount rate reported).150 Combined heat and power systems can enhance hospitals' resilience in the face of interruptions to the power grid while reducing costs and emissions in normal operations.151 Figure 14.3: Hospitals at Risk from Storm Surge by Hurricanes Hurricane Flooding Hospital Flooding by Hurricane Category 1 2 3 4 5 None Figure 14.3: These maps shows the locations of hospitals in Charleston County, South Carolina, and Miami-Dade County, Florida, with respect to storm surge inundation for different categories of hurricanes making landfall at high tide. Colors indicate the lowest category hurricane affecting a given location, with darker blue shading indicating areas with the greatest susceptibility to flooding and darker red dots indicating the most vulnerable hospitals. Four of the 38 (11%) hospitals in Miami-Dade County face possible storm surge inundation following a Category 2 hurricane; this could increase to 26 (68%) following a Category 5 hurricane. Charleston hospitals are more exposed to inundation risks. Seven of the 11 (64%) hospitals in Charleston County face possible storm surge inundation following a Category 2; this could increase to 9 (82%) following a Category 4. The impacts of a storm surge will depend on the effectiveness of resilience measures, such as flood walls, deployed by the facilities. Data from National Hurricane Center 2018152 and the Department of Homeland Security 2018.153 In addition, healthcare facilities may benefit from modifications to prepare for potential consequences of climate change. For example, Nicklaus Children's Hospital, formerly Miami Children's, invested $11.3 million in a range of technology retrofits, including a hurricane-resistant shell, to withstand Category 4 hurricanes for uninterrupted, specialized medical care services.151 The hospital was able to operate uninterrupted during Hurricane Irma and provided shelter for spouses and families of storm-duty staff and some storm evacuees. Assessment of climate change related risks to healthcare facilities and services can inform healthcare sector disaster preparedness efforts. For example, analyses in Los Angeles County suggest that preparing for increased wildfire risk should be a priority for area hospitals.154 Reducing greenhouse gas emissions (Ch. 29: Mitigation) would benefit the health of Americans in the near and long term.1,155 Adverse health effects attributed to climate change have many potential economic and social costs, including medical expenses, caregiving services, or lost productivity, as well as costs that are harder to quantify, such as those associated with pain, suffering, inconvenience, or reduced enjoyment of leisure activities.156 These health burdens are typically borne by the affected individual as well as family, friends, employers, communities, and insurance or assistance programs. Under a lower scenario (RCP4.5) by the end of this century, thousands of lives could be saved and hundreds of billions of dollars of health-related costs could be avoided compared to a higher scenario (RCP8.5).157 Annual health impacts (including from temperature extremes, poor air quality, and vector-borne diseases) and health-related costs are projected to be approximately 50% less under a lower scenario (RCP4.5) than under a higher scenario (RCP8.5) (methods are summarized in Traceable Accounts) (see also Ch. 13: Air Quality).37,157,158,159,160,161,162,163,164,165,166,167 The projected lives saved and economic benefits are likely to underestimate the true value because they do not include benefits of impacts that are difficult to quantify, such as mental health or long-term health impacts (see the Scenario Products Section in App. 3 for more on scenarios). Temperature-Related Mortality The projected increase in the annual number of heat wave days is substantially reduced under a lower scenario (RCP4.5) compared to a higher scenario (RCP8.5), reducing heat wave intensities161,168 and resulting in fewer high-mortality heat waves162,168 without considering adaptation (Figure 14.4). In 49 large cities in the United States, changes in extreme hot and extreme cold temperatures are projected to result in more than 9,000 additional premature deaths per year under a higher scenario by the end of the century, although this number would be lower if considering acclimatization or other adaptations (for example, increased use of air conditioning). Under a lower scenario, more than half of these deaths could be avoided each year. Annual damages associated with the additional extreme temperature-related deaths in 2090 were projected to be $140 billion (in 2015 dollars) under a higher scenario (RCP8.5) and $60 billion under a lower scenario (RCP4.5).157 Figure 14.4: Projected Change in Annual Extreme Temperature Mortality Two maps of the continental United States show estimated changes in annual net mortality (in deaths per 100,000 people) due to extremely hot and cold days in 49 U.S. cities for 2080 to 2099 (compared to 1989 to 2000) under a lower scenario (RCP4.5) and a higher scenario (RCP8.5). Under the lower scenario, mortality rates across most cities are projected to increase by 210,000 to 600,000 deaths per year. Orlando, Florida, is projected to experience the greatest change\u2014an additional 610,000 to 800,000 deaths per year. Under the higher scenario, the majority of major U.S. cities are projected to experience an additional 610,000 to 1 million deaths per year. Under both scenarios, mortality rates are higher in the eastern half of the United States. Figure 14.4: The maps show estimated changes in annual net mortality due to extremely hot and cold days in 49 U.S. cities for 2080\u20132099 as compared to 1989\u20132000. Across these cities, the change in mortality is projected to be an additional 9,300 deaths each year under a higher scenario (RCP8.5) and 3,900 deaths each year under a lower scenario (RCP4.5). Assuming a future in which the human health response to extreme temperatures in all 49 cities was equal to that of Dallas today (for example, as a result of availability of air conditioning or physiological adaptation) results in an approximate 50% reduction in these mortality estimates. For example, in Atlanta, an additional 349 people are projected to die from extreme temperatures each year by the end of century under RCP8.5. Assuming residents of Atlanta in 2090 have the adaptive capacity of Dallas residents today, this number is reduced to 128 additional deaths per year. Cities without circles should not be interpreted as having no extreme temperature impact. Data not available for the U.S. Caribbean, Alaska, or Hawai'i & U.S.-Affiliated Pacific Islands regions. Source: adapted from EPA 2017.157 Under a higher scenario (RCP8.5), almost two billion labor hours are projected to be lost annually by 2090 from the impacts of temperature extremes, costing an estimated $160 billion in lost wages (in 2015 dollars) (Ch. 1: Overview, Figure 1.21).157,167,169 States within the Southeast and Southern Great Plains regions are projected to experience higher impacts, with labor productivity in jobs with greater exposure to heat projected to decline by 3% (Ch. 19: Southeast).164,170 Some counties in Texas and Florida are projected to experience more than 6% losses in annual labor hours by the end of the century.157,160 Annual national cases of West Nile neuroinvasive disease are projected to more than double by 2050 due to increasing temperatures, among other factors,30,171 resulting in approximately $1 billion per year in hospitalization costs and premature deaths under a higher scenario (RCP8.5; in 2015 dollars).37 In this same scenario, an additional 3,300 cases and $3.3 billion in costs (in 2015 dollars) are projected each year by the end of the century. Approximately half of these cases and costs would be avoided under a lower scenario (RCP4.5).37,157 By the end of the century, warming under a higher scenario (RCP8.5) is projected to increase the length of time recreational waters have concentrations of harmful algal blooms (cyanobacteria) above the recommended public health threshold by one month annually; these bacteria can produce a range of toxins that can cause gastrointestinal illness, neurological disorders, and other illnesses.157,165 The increase in the number of days where recreational waters pose this health risk is almost halved under a lower scenario (RCP4.5). The chapter evaluated the scientific evidence of the health risks of climate change, focusing primarily on the literature published since the cut off date (approximately fall 2015) of the U.S. Climate and Health Assessment.1 A comprehensive literature search was performed by federal contractors in December 2016 for studies published since January 1, 2014, using PubMed, Scopus, and Web of Science. An Excel file containing 2,477 peer-reviewed studies was provided to the author team for it to consider in this assessment. In addition to the literature review, the authors considered recommended studies submitted in comments by the public, the National Academies of Sciences, Engineering, and Medicine, and federal agencies. The focus of the literature was on health risks in the United States, with limited citations from other countries providing insights into risks Americans are or will likely face with climate change. A full description of the search strategy can be found at https:\/\/www.niehs.nih.gov\/CCHH_Search_Strategy_NCA4_508.pdf. The chapter authors were chosen based on their expertise in the health risks of climate change. Teleconferences were held with interested researchers and practitioners in climate change and health and with authors in other chapters of this Fourth National Climate Assessment (NCA4). The U.S. Climate and Health Assessment1 did not consider adaptation or mitigation, including economic costs and benefits, so the literature cited includes research from earlier years where additional information was relevant to this assessment. For NCA4, Air Quality was added as a report chapter. Therefore, while Key Messages in this Health chapter include consideration of threats to human health from worsened air quality, the assessment of these risks and impacts are covered in Chapter 13: Air Quality. Similarly, co-benefits of reducing greenhouse gas emissions are covered in the Air Quality chapter. Key Message 1: Climate Change Affects the Health of All Americans The health and well-being of Americans are already affected by climate change (very high confidence), with the adverse health consequences projected to worsen with additional climate change (likely, high confidence). Climate change affects human health by altering exposures to heat waves, floods, droughts, and other extreme events; vector-, food- and waterborne infectious diseases; changes in the quality and safety of air, food, and water; and stresses to mental health and well-being. Multiple lines of evidence demonstrate statistically significant associations between temperature, precipitation, and other variables and adverse climate-sensitive health outcomes, indicating sensitivity to weather patterns.1 These lines of evidence also demonstrate that vulnerability varies across sub-populations and geographic areas; populations with higher vulnerability include poor people in high-income regions, minority groups, women, children, the disabled, those living alone, those with poor health status, Indigenous people, older adults, outdoor workers, people displaced because of weather and climate, low-income residents that lack a social network, poorly planned communities, communities disproportionately burdened by poor environmental quality, the disenfranchised, those with less access to healthcare, and those with limited financial resources to rebound from disasters.108,109,110,111,118,172 Recent research confirms projections that the magnitude and pattern of risks are expected to increase as climate change continues across the century.173 The role of non-climate factors, including socioeconomic conditions, population characteristics, and human behavior, as well as health sector policies and practices, will continue to make it challenging to attribute injuries, illnesses, and deaths to climate change. Inadequate consideration of these factors creates uncertainties in projections of the magnitude and pattern of health risks over coming decades. Certainty is higher in near-term projections where there is greater understanding of future trends. There is very high confidence that climate change is affecting the health of Americans. There is high confidence that climate-related health risks, without additional adaptation and mitigation, will likely increase with additional climate change. Key Message 2: Exposure and Resilience Vary Across Populations and Communities People and communities are differentially exposed to hazards and disproportionately affected by climate-related health risks (high confidence). Populations experiencing greater health risks include children, older adults, low-income communities, and some communities of color (high confidence). Multiple lines of evidence demonstrate that low-income communities and some communities of color are experiencing higher rates of exposure to adverse environmental conditions and social conditions that can reduce their resilience to the impacts of climate change.106,107,108,109,110 Populations with increased health and social vulnerability typically have less access to information, resources, institutions, and other factors to prepare for and avoid the health risks of climate change.107,132,133 Across all climate-related health risks, children, older adults, low-income communities, and some communities of color are disproportionately impacted. There is high agreement among experts but fewer analyses demonstrating that other populations with increased vulnerability include outdoor workers, communities disproportionately burdened by poor environmental quality, communities in the rural southeastern United States, women, pregnant women, those experiencing gender discrimination, persons with chronic physical and mental illness, persons with various disabilities (such as those affecting mobility, long-term health, sensory perception, cognition), the homeless, those living alone, Indigenous people, people displaced because of weather and climate, low-income residents who lack a social network, poorly planned communities, the disenfranchised, those with less access to healthcare, the uninsured and underinsured, those living in inadequate housing, and those with limited financial resources to rebound from disasters.106,107,108,110,118 Adaptation can increase the climate resilience of populations when the process of developing and implementing policies and measures includes understanding the ethical and human rights dimensions of climate change, meeting human needs in a sustainable and equitable way, and engaging with representatives of the most impacted communities to assess the challenges they face and to define the climate solutions.124,125 The role of non-climate factors, including socioeconomic conditions, discrimination (racial and ethnic, gender, persons with disabilities), psychosocial stressors, and the continued challenge to measure the cumulative effects of past, present, and future environmental exposures on certain people and communities will continue to make it challenging to attribute injuries, illnesses, and deaths to climate change. While there is no universal framework for building more resilient communities that can address the unique situations across the United States, factors integral to community resilience include the importance of social networks, the value of including community voice in the planning and execution of solutions, and the co-benefits of institutional readiness to address the physical, health, and social needs of impacted communities. These remain hard to quantify.127,128 There is high confidence that climate change is disproportionately affecting the health of children, older adults, low-income communities, communities of color, tribal and Indigenous communities, and many other distinct populations. And there is high confidence that some of the most vulnerable populations experience greater barriers to accessing resources, information, and tools to build resilience. Key Message 3: Adaptation Reduces Risks and Improves Health Proactive adaptation policies and programs reduce the risks and impacts from climate-sensitive health outcomes and from disruptions in healthcare services (medium confidence). Additional benefits to health arise from explicitly accounting for climate change risks in infrastructure planning and urban design (low confidence). Health adaptation is taking place from local to national scales.129,148,174 Because most of the health risks of climate change are also current public health problems, strengthening standard health system policies and programs, such as monitoring and surveillance, are expected to be effective in the short term in addressing the additional health risks of climate change. Modifications to explicitly incorporate climate change are important to ensure effectiveness as the climate continues to change. Incorporating environmentally friendly practices into healthcare and infrastructure can promote resilience.151 Overall, while there is considerable evidence of the effectiveness of public health programs,110,129,130 the effectiveness of policies and programs to reduce future burdens of climate-sensitive health outcomes in a changing climate can only be determined over coming decades. The relatively short time period of implementing health adaptation programs means uncertainties remain about how to best incorporate climate change into existing policies and programs to manage climate-sensitive health outcomes and about which interventions will likely be most effective as the climate continues to change.174,175 For example, heat wave early warning and response systems save lives, but it is not clear which components most effectively contribute to morbidity and mortality reduction. There is medium confidence that with sufficient human and financial resources, adaptation policies and programs can reduce the current burden of climate-sensitive health outcomes.110,151,176,177 There is low confidence that the incorporation of health risks into infrastructure and urban planning and design will likely decrease climate-sensitive health impacts. Key Message 4: Reducing Greenhouse Gas Emissions Results in Health and Economic Benefits Reducing greenhouse gas emissions would benefit the health of Americans in the near and long term (high confidence). By the end of this century, thousands of American lives could be saved and hundreds of billions of dollars in health-related economic benefits gained each year under a pathway of lower greenhouse gas emissions (likely, medium confidence). Benefits of mitigation associated with air quality, including co-benefits of reducing greenhouse gas emissions, can be found in Chapter 13: Air Quality. This Key Message is consistent with and inclusive of those findings. Multiple individual lines of evidence across several health topic areas demonstrate significant benefits of greenhouse gas emission reductions, with health impacts and health-related costs reduced by approximately half under RCP4.5 compared to RCP8.5 by the end of the century, based on comprehensive multisector quantitative analyses of economic impacts projected under consistent scenarios (Ch. 13: Air Quality).37,157,158,159,160,161,162,163,164,165,166,167 The economic benefits of greenhouse gas emissions reductions to the health sector could be on the order of hundreds of billions of dollars annually by the end of the century. Heat: Greenhouse gas emission reductions under RCP4.5 could substantially reduce the annual number of heat wave days (for example, by 21 in the Northwest and by 43 in the Southeast by the end of the century);161 the number of high-mortality heat waves;162,168 and heat wave intensities.161,168 The EPA (2017)157 estimated city-specific relationships between daily deaths (from all causes) and extreme temperatures based on historical observations that were combined with the projections of extremely hot and cold days (average of three years centered on 2050 and 2090) using city-specific extreme temperature thresholds to project future deaths from extreme heat and cold under RCP8.5 and RCP4.5 in five global climate models (GCMs). In 49 large U.S. cities, changes in extreme temperatures are projected to result in over 9,000 premature deaths per year under RCP8.5 by the end of the century without adaptation ($140 billion each year); under RCP4.5, more than half these deaths could be avoided annually ($60 billion each year).157 Labor productivity: Hsiang et al. (2017)167 and the EPA (2017)157 estimated the number of labor hours from changes in extreme temperatures using dose\u2013response functions for the relationship between temperature and labor from Graff Zivin and Neidell (2014).169 Under RCP8.5, almost 2 billion labor hours are projected to be lost annually by 2090 from the impacts of extreme heat and cold, costing an estimated $160 billion in lost wages. The Southeast164,170 and Southern Plains are projected to experience high impacts, with labor productivity in high-risk sectors projected to decline by 3%. Some counties in Texas and Florida are projected to experience more than 6% losses in annual labor hours by the end of the century.157,160 Vector-borne disease: Belova et al. (2017)37 and the EPA (2017)157 define health impact functions from regional associations between temperatures and the probability of above-average West Nile neuroinvasive disease (WNND) incidence to estimate county-level expected WNND incidence rates for a 1995 reference period (1986\u20132005) and two future years (2050: 2040\u20132059 and 2090: 2080\u20132099) using temperature data from five GCMs. Annual national cases of WNND are projected to more than double by 2050 due to increasing temperatures, resulting in approximately $1 billion per year in hospitalization costs and premature deaths. In 2090, an additional 3,300 annual cases are projected under RCP8.5, with $3.3 billion per year in costs. Greenhouse gas emission reductions under RCP4.5 could avoid approximately half these cases and costs. Water quality: Chapra et al. (2017)165 and the EPA (2017)157 evaluate the biophysical impacts of climate change on the occurrence of cyanobacterial harmful algal blooms in the contiguous United States using models that project rainfall runoff, water demand, water resources systems, water quality, and algal growth. In 2090, warming under RCP8.5 is projected to increase the length of time that recreational waters have concentrations of harmful algal blooms (cyanobacteria) above the recommended public health threshold by one month annually; greenhouse gas emissions under RCP4.5 could reduce this by two weeks. Food safety and nutrition: There is limited evidence quantifying specific health outcomes or economic impacts of reduced food safety and nutrition. While projections consistently indicate that changes in climate are expected to have negative health consequences, quantifying specific health outcomes (for example, number of cases, number of premature deaths) remains challenging, as noted in Key Message 1. Economic estimates only partially capture and monetize impacts across each health topic area, which means that damage costs are likely to be an undervaluation of the actual health impacts that would occur under any given scenario. Economic estimates in this chapter do not include costs to the healthcare system. There is a high confidence that a reduction in greenhouse gas emissions would benefit the health of Americans. There is medium confidence that reduced greenhouse gas emissions under RCP4.5 compared to RCP8.5 will likely reduce lost labor hours by almost half and avoid thousands of premature deaths and illnesses projected each year from climate impacts on extreme heat, ozone and aeroallergen levels (Ch. 13: Air Quality), and West Nile neuroinvasive disease. There is medium confidence that the economic benefits of greenhouse gas emissions reductions in the health sector could likely be on the order of hundreds of billions of dollars each year by the end of the century. Including avoided or reduced benefits of risks that are difficult to quantify, such as mental health or long-term health consequences, would increase these estimates. Adelaine, S. A., M. Sato, Y. Jin, and H. Godwin, 2017: An assessment of climate change impacts on Los Angeles (California USA) hospitals, wildfires highest priority. Prehospital and Disaster Medicine, 32 (5), 556\u2013562. doi:10.1017\/S1049023X17006586. \u21a9 Ahdoot, S., and The Council on Environmental Health, 2015: Global climate change and children's health. Pediatrics, 136 (5), 992\u2013997. doi:10.1542\/peds.2015-3232. \u21a9 Akil, L., H. A. Ahmad, and R. S. Reddy, 2014: Effects of climate change on Salmonella infections. Foodborne Pathogens and Disease, 11 (12), 974\u2013980. doi:10.1089\/fpd.2014.1802. \u21a9 Aldunce, P., R. Beilin, J. Handmer, and M. Howden, 2016: Stakeholder participation in building resilience to disasters in a changing climate. Environmental Hazards, 15 (1), 58\u201373. doi:10.1080\/17477891.2015.1134427. \u21a9 Anderson, H., C. Brown, L. L. Cameron, M. Christenson, K. C. Conlon, S. Dorevitch, J. Dumas, M. Eidson, A. Ferguson, E. Grossman, A. Hanson, J. J. Hess, B. Hoppe, J. Horton, M. Jagger, S. Krueger, T. W. Largo, G. M. Losurdo, S. R. Mack, C. Moran, C. Mutnansky, K. Raab, S. Saha, P. J. Schramm, A. Shipp-Hilts, S. J. Smith, M. Thelen, L. Thie, and R. Walker, 2017: Climate and Health Intervention Assessment: Evidence on Public Health Interventions to Prevent the Negative Health Effects of Climate Change. Climate and Health Technical Report Series. Centers for Disease Control and Prevention, Climate and Health Program, Atlanta, GA, 92 pp. URL. \u21a9 Aziz, R. K., M. M. Khalifa, and R. R. Sharaf, 2015: Contaminated water as a source of Helicobacter pylori infection: A review. Journal of Advanced Research, 6 (4), 539\u2013547. doi:10.1016\/j.jare.2013.07.007. \u21a9 Baker-Austin, C., J. Trinanes, N. Gonzalez-Escalona, and J. Martinez-Urtaza, 2017: Non-cholera vibrios: The microbial barometer of climate change. Trends in Microbiology, 25 (1), 76\u201384. doi:10.1016\/j.tim.2016.09.008. \u21a9 Balbus, J., A. Crimmins, J. L. Gamble, D. R. Easterling, K. E. Kunkel, S. Saha, and M. C. Sarofim, 2016: Ch. 1: Introduction: Climate change and human health. The Impacts of Climate Change on Human Health in the United States: A Scientific Assessment., U.S. Global Change Research Program, Washington, DC, 25\u201342. doi:10.7930\/J0VX0DFW. \u21a9 Banks, L. H., L. A. Davenport, M. H. Hayes, M. A. McArthur, S. N. Toro, C. E. King, and H. M. Vazirani, 2016: Disaster impact on impoverished area of US: An inter-professional mixed method study. Prehospital and Disaster Medicine, 31 (6), 583\u2013592. doi:10.1017\/S1049023X1600090X. \u21a9 Barreau, T., D. Conway, K. Haught, R. Jackson, R. Kreutzer, A. Lockman, S. Minnick, R. Roisman, D. Rozell, S. Smorodinsky, D. Tafoya, and J. A. Wilken, 2017: Physical, mental, and financial impacts from drought in two California counties, 2015. American Journal of Public Health, 107 (5), 783\u2013790. doi:10.2105\/ajph.2017.303695. \u21a9 Bathi, J. R., and H. S. Das, 2016: Vulnerability of coastal communities from storm surge and flood disasters. International Journal of Environmental Research and Public Health, 13 (2), 239. doi:10.3390\/ijerph13020239. \u21a9 Battilani, P., P. Toscano, H. J. Van der Fels-Klerx, A. Moretti, M. Camardo Leggieri, C. Brera, A. Rortais, T. Goumperis, and T. Robinson, 2016: Aflatoxin B1 contamination in maize in Europe increases due to climate change. Scientific Reports, 6, 24328. doi:10.1038\/srep24328. \u21a9 Baussan, D., 2015: When You Can't Go Home: The Gulf Coast 10 Years after Katrina. Center for American Progress, Washington, DC, 10 pp. URL. \u21a9 Becker, E., 2016: June 2016 ENSO Discussion: The New Neutral. National Oceanic and Atmospheric Administration, Climate.gov, Silver Spring, MD. URL. \u21a9 Bell, J. E., S. C. Herring, L. Jantarasami, C. Adrianopoli, K. Benedict, K. Conlon, V. Escobar, J. Hess, J. Luvall, C. P. Garcia-Pando, D. Quattrochi, J. Runkle, and C. J. Schreck III, 2016: Ch. 4: Impacts of extreme events on human health. The Impacts of Climate Change on Human Health in the United States: A Scientific Assessment., U.S. Global Change Research Program, Washington, DC, 99\u2013128. doi:10.7930\/J0BZ63ZV. \u21a9 Belova, A., D. Mills, R. Hall, A. S. Juliana, A. Crimmins, C. Barker, and R. Jones, 2017: Impacts of increasing temperature on the future incidence of West Nile neuroinvasive disease in the United States. American Journal of Climate Change, 6 (1), 75278. doi:10.4236\/ajcc.2017.61010. \u21a9 Berisha, V., D. Hondula, M. Roach, J. R. White, B. McKinney, D. Bentz, A. Mohamed, J. Uebelherr, and K. Goodin, 2017: Assessing adaptation strategies for extreme heat: A public health evaluation of cooling centers in Maricopa County, Arizona. Weather, Climate, and Society, 9 (1), 71\u201380. doi:10.1175\/wcas-d-16-0033.1. \u21a9 Berman, J. D., K. Ebisu, R. D. Peng, F. Dominici, and M. L. Bell, 2017: Drought and the risk of hospital admissions and mortality in older adults in western USA from 2000 to 2013: A retrospective study . The Lancet Planetary Health, 1 (1), e17\u2013e25. doi:10.1016\/S2542-5196(17)30002-5. \u21a9 Berm\u00fadez, R., Y. Feng, M. Y. Roleda, A. O. Tatters, D. A. Hutchins, T. Larsen, P. W. Boyd, C. L. Hurd, U. Riebesell, and M. Winder, 2015: Long-term conditioning to elevated pCO2 and warming influences the fatty and amino acid composition of the diatom Cylindrotheca fusiformis. PLOS ONE, 10 (5), e0123945. doi:10.1371\/journal.pone.0123945. \u21a9 Bobb, J. F., Z. Obermeyer, Y. Wang, and F. Dominici, 2014: Cause-specific risk of hospital admission related to extreme heat in older adults. JAMA, 312 (24), 2659\u20132667. doi:10.1001\/jama.2014.15715. \u21a9 Bogoch, I. I., O. J. Brady, M. U. G. Kraemer, M. German, M. I. Creatore, M. A. Kulkarni, J. S. Brownstein, S. R. Mekaru, S. I. Hay, E. Groot, A. Watts, and K. Khan, 2016: Anticipating the international spread of Zika virus from Brazil. The Lancet, 387"} +{"id":"RedPajamaCommonCrawl.0007","text":"Time of death: 11:08 Troy Anthony Davis has been legally murdered by the state of Georgia. I was going to write something about the death penalty, this badge of brutality, this symbol of savagery, which has stayed with us even as most of the world has long since left it behind - but I find I'm too depressed. Depressed not only by the whole enterprise of officially-sanctioned murder, not only by the particulars of this case, where there is at least a fair chance that the man who was killed tonight was innocent, but right now perhaps most of all by the sheer banality of how it was done, the emotionless announcements that \"the execution is in progress\" and later of \"time of death,\" that being followed - literally immediately - by an explanation of where media interviews would be conducted. All of it presented as equally routine, equally everyday, equally unremarkable. It was all so neat, so tidy, so clean, so antiseptic, so proper, all according to procedure as we satisfy our blood lust vengeance while doing our best to eliminate any actual blood so we can pat ourselves on the back about how \"civilized\" and \"humane\" we are. That is where the Fellowship of Reconciliation's old line of \"Why do we kill people who kill people to show that killing people is wrong,\" as pointed and poignant as it is, fails: The death penalty is not about showing that killing people is wrong. It's about \"getting back at them,\" about violent revenge, about the emotional satisfaction of causing pain to those you think did you wrong. \"Justice was served,\" some said tonight. No, it wasn't. Certainly not in Georgia and not even in Texas, where convicted murderer and white supremacist Lawrence Russell Brewer was killed by the state. There is never justice where the death penalty is concerned. It seems I have written something; more than I thought I would at the top, less that I would have under different conditions. Whatever; it will have to do for now. Labels: death penalty Getting jobbed So Barack Obama has announced his jobs program. There are, let it be said right at the top, some good things about it. Unfortunately, there are also some really sucky things about it. The good parts involved extension of unemployment insurance ($49 billion) and federal investments in school modernization ($30 billion) and infrastructure ($50 billion), the latter of which would involve at least some direct hiring of workers to do the jobs. Another good feature is extending $35 billion in aid to states, which, while it will not create any new jobs, is intended to prevent the loss of some which would otherwise vanish in the midst of state attempts to balance budgets. The sucky part is most everything else: The bulk of the proposal, some $240 billion, more than half, is made up of tax cuts - or, as they are nowadays rebranded by PR outfits and focus groups, tax \"relief.\" And I expect they will work the same as they have in the past - which is, generally, \"not.\" Economists estimate the plan, which would cost about $447 billion if fully adopted, could create anywhere from 500,000 to nearly 2 million jobs next year. At least one progressive economist said the plan was bolder than he expected. Maybe so, maybe it is \"bolder\" than we've come to expect from President Back-Down-Before-the-Battle-Even-Begins, but how good is it really? How much will it do for average schmucks like us? Before the speech, lots of folks were wondering what direction PHC* would take: Would he get tough on the GOPpers, slam them for their obstructionism, demand that they shut up and get in line? Or would he, as his political advisors were reportedly pressing him to, go \"pragmatic\" by proposing stuff that was more likely to pass even if it didn't do much because getting something, anything, passed would look better for him in 2012? Well, it appears he managed to do both. He talked tough, said some version of \"pass this bill right now\" more than a dozen times, setting the hearts of his adoring fans all a-flutter - but the things he proposed are small and will do little, even if they all get passed, which they won't. In fact, related it this, the plan contains one really odd thing: He proposed to pay for it by some tax increases on the rich. Now, that is a definitely good thing and good for him for proposing it, but he knows, just like everyone else knows, such a plan has no chance in the House and maybe not in the Senate. Since I for one do not think this represents a brand new and genuine populism on O.'s part and really doubt he plans to fight for this (I notice he didn't say \"Tax the rich!\" a dozen times in his speech, or even once for that matter), why did he propose it? Was it for the PR effect? Just red meat to his base? Or so he can later use it to run against GOPpers on it? (Maybe - the GOPpers are certainly concerned about that prospect.) Leaving that aside to get to the program proposals themselves, I seems to me that they are diddly-squat. Remember, for example, that the claim is that their effect could be to create nearly two million jobs next year. But it will take 2.7 million new jobs just to drop the unemployment rate by a single percentage point. By a very crude calculation, that means that the most optimistic forecast is that next year will see an unemployment rate of about 8.4%. What's more, I don't have a lot of faith is those optimistic predictions. One reason is that the biggest part of the plan is, again, tax cuts - which always seem to be the first resort in such plans. The problem is, they don't work as serious stimulus except under special circumstances, ones which do not exist now. Tax cuts can provide a big stimulus if you have an economy that is ready to go, operating a new full capacity, ready to take off with just a nudge. What we have now is not like a horse straining at the bit, where you can let up on the reins a bit and let it run; we have an economy more like a horse that is sound asleep and we're trying to wake up. Easing up on the reins is not going to get that horse moving. In fact, over the past couple of years, there have been several hiring tax credits as well as some 16 small business tax cuts measures, all aimed at getting businesses to hire. And they have failed. You want a longer-term example? Here's one: The Bush tax cuts, the ones that were supposed to be temporary but were extended last December, went into effect on June 7, 2001. At that time, the national unemployment rate was 4.5%. (The good old days.) Since then, through August 2011, we have had 122 months of unemployment data. In all that time, unemployment never went below 4.4%. In fact, it was at 4.4% or 4.5% in a total of eight of those months, all of those is one nine-month stretch from September 2006 to May 2007. That is, for 114 of those 122 months, over 93% of time, unemployment was above where it was when these \"job-producing\" tax cuts went into effect. Just recently, the New York Times had a big article on the possible real-world effect of the Obama plan, and in it, stated the obvious: The dismal state of the economy is the main reason many companies are reluctant to hire workers, and few executives are saying that President Obama's jobs plan \u2014 while welcome \u2014 will change their minds any time soon. ... [M]any employers dismissed the notion that any particular tax break or incentive would be persuasive. Instead, they said they tended to hire more workers or expand when the economy improved. All the blather about \"job creators\" and \"improving the business climate\" is utter crap. These people, these corporations, have as their prime concern maximizing their profit. They are not going to take the lead. They are going to follow. As that same article points out, there is in the White House plan a $4,000 tax credit for employers that hire people who have been out of work for six months or longer. To the extent these measures could be used, many employers said they would most likely support people whom companies were planning to hire anyway. That is, all the proposal does is increase profits of companies by handing them $4000 for what they would have done anyway without creating one extra job or doing one thing to reduce unemployment. But why in all that's rational would anyone think it would be otherwise? Corporations - I've said this before - are already sitting on over $2 trillion in ready cash reserves thanks to record profits. They already have more than enough money to invest, to expand, to hire if they were going to do that. But they're not and they won't and putting more money into the hands of people who already have more than enough is not going to change things. That because of something else I've said before and will say it as many times as necessary: Corporations do not create jobs. The rich do not create jobs. There is only one thing that creates jobs, and that is demand. Demand, demand for goods and services to be supplied in the economy is only thing that creates jobs. Corporations are all about profit. Rich investors are all about return on investment. Businesses are not going to hire people they don't need to make more profits. In an economy like this one, there is only one agency that can effectively spur creation of demand, and that is government. It can do it by, essentially, taking money from people who have it, don't need it, and aren't spending it and giving it to people who don't have it, do need it, and will spend it - spend it on goods and services the private economy can supply, creating greater demand for those goods and services, sparking the hiring of people to meet that demand, people who will then have money to spend, creating more demand. But still, still, what we keep hearing about is how we should - must - cut costs for corporations even though we have already done that repeatedly to no avail, even though it will accomplish nothing except make the filthy rich filthier and richer, and even though cutting corporate taxes is one of the worst ways to stimulate demand. And the latter is not just a philosophical statement, it's a mathematical one. For example, just last month, Mark Zandi, who is the chief economist for Moody's Analytics, released an analysis of how well various government measures work as economic stimulus. Zandi, it should be noted, is by no means some sort of lefty; in fact, he advised John McCain's campaign in 2008. Even so, his study showed that government spending is a much better economic stimulus than tax cuts. Indeed, the single most effective form of stimulus, he found, is increased outlays for Food Stamps: Those expenditures produce $1.71 in economic activity for each dollar in federal spending. It provides that greatest bang for the buck. Rounding out the top three measures were spending on unemployment benefits and on infrastructure. And this is no outlier; earlier studies, including on by the CBO, have found much the same thing. As economic stimulus, spending beats tax cuts hands down. But the fact remains that the biggest part of O.'s program is, again, tax cuts. According to the Moody's study, each dollar lost by the Treasury due to the kinds of tax cuts for workers the White House proposes will create just $1.27 in new economic activity. The cuts for employers fare even worse, creating just $1.05 in economic activity for each dollar lost - essentially a wash. Another important point here is the kinds of tax cuts envisioned: They are cuts in payroll taxes, the taxes that go to support Social Security and Medicare. The proposal is to cut payroll taxes for employees in half next year and trimming employer payroll taxes as well. That is, Barack Obama is looking to stimulate the economy by draining away money that should have gone to the trust funds backing those programs. In the midst of increasingly-shrill claims that the programs are going bust, Obama is proposing to make their long-term financing worse by over $200 billion. That actually answers a question some people were asking in the wake of his speech: Why did he bring Medicare into it? The thing is, why wonder? Barack Obama wants to cut Social Security and Medicare. He's made it clear, he's even said it out loud: At a town hall meeting in Illinois on August 11, Obama said he would personally push for such cuts as part of any deal for deficit reduction or job creation. He wants to cut them. So he's only doing what he said. So why the surprise? (Unless it's surprise that in this case he actually is doing what he said he would.) Another part of all this is calls to lower the corporate income tax, which, again, seems always to be part of the first resort. But, getting back to the Moody's study for one more mathematical moment, it found that such a tax cut would create a mere 32 cents of economic activity for each dollar spent. It's a net loser economically. Which only goes to show one more time that cutting taxes to corporations is one of worst ways to stimulate demand, one of the worst ways to stimulate the economy. Federal spending is, simply, factually, mathematically, a much better option. And what's even better than federal spending on the top two stimulative programs (Food Stamps and unemployment)? Why, direct public jobs programs: the government directly hiring people and paying them to do needed work. In a recent study, economist Philip Harvey modeled the effects of spending $100 billion on direct job creation versus the same investment in Food Stamps and unemployment. He found that that amount of federal spending on those two programs would create nearly 570,000 jobs. (Note that is within the range of predictions for the White House's program at less than a quarter the cost.) On the other hand, spending that amount on direct hiring would produce over a million jobs plus another more than 440,000 private sector jobs due to the in-direct stimulus effect: over 1.5 million overall. This would not even be the first time we've done something like this. As just one example, my father was in the Civilian Conservation Corps - the CCC - during the Depression. Part of the WPA, this was a direct federal hiring program for unemployed, single young men who were set to work on a large variety of conservation projects. During its lifetime, it provided 2.5 million men with work for anywhere from six month to two years. So a direct public jobs program is not even a new thing. But all the exact numbers of employment totals and relative stimulative effects and all the rest are not important. What's important is the relations among them. And what they come down to is that the single most effective thing the federal government can do to get people back to work, the single most effective thing it can do to get unemployment down, to spur economic activity, is to hire people and pay them to do needed productive work. Period. And if getting the economy moving is what you are actually concerned about rather than ideological rigidity or election-year posturing, that is what you will advocate. The second best way is to support Food Stamps and insure getting them to everyone legally entitled to them. However, that's going to be a minority of people, sort of a limited universe, so you can go on to include the next best ways: extending unemployment assistance and supporting infrastructure programs. What you will not do, because it is one of worst, if not the worst, way to advantage the economy, is to push for tax cuts to the rich and the corporations. So why are those sorts of tax cuts always high on the agenda? How can it be that they don't understand, that they don't understand the plain, repeatedly found, facts, facts based on both studies and actual experience, facts staring them right in the face? Don't let your head explode, rather realize that the question has already been answered: They do understand. They do know. It's just that when the choice comes down to the vast majority of us or the handful of the powerful who pay the campaign bills and hire the armies of lobbyists to make sure it's known among those writing and signing the laws what side that handful is on, it's no contest. So instead of thinking about how can they do this, think instead about what this reveals about who is in charge, who makes decisions, who is really in control, who is really responsible for the mess we are in. Yet something else I've said before: Make sure that you are angry at the right targets. But there is a lot of anger around, a great deal of angry frustration, and, as is usual, it reveals itself in amoral callousness. I know you've heard about the moments at the GOPper presidential debate when Ron Paul was asked a hypothetical question about a healthy 30-year-old man without health insurance who goes into a coma and requires intensive care for six months. Paul was cheered for his answer that it's not the government's responsibility - and when he was then asked if \"society should just let him die,\" there were shouts of \"Yeah!\" followed by laughter from the audience. I expect you also heard about the crowd that cheered Rick Perry's record of having executed more people than any other governor, any time, anywhere. It's easy to condemn people like that, and such moral condemnation would certainly not be undeserved. But as I said something over a year ago, I have a certain sympathy for these people, many of who are - like too many Americans - not very well informed and thus easily manipulated into blaming the wrong people - into being angry at the wrong targets. What's more, they are under stress, constant stress, and it shows, as stress usually does, in anger and coldness and indifference to others. What stress? To begin with, I know you heard about the poverty numbers: According to the Census Bureau's annual report, a record 46 million Americans suffered in poverty in 2010, more than in any other year since the Bureau started making the estimate. The poverty rate rose to 15.1%, the third consecutive increase; it is now as high as it was in 1993 - and you would have to go back another 10 years, to 1983, to find one higher. The poverty rate for children under 18 was 22% in 2010, making them more likely than any other age group to be poor. For children under the age of six, the poverty rate is a shocking 25.3%. (The fact is, the US has long had one of highest poverty rates in developed world. Among 34 industrialized nations tracked by the Organization for Economic Cooperation and Development, only Chile, Israel, and Mexico have higher rates of poverty. But that this is not a new problem only adds to the economic stresses involved.) Now go beyond that to remember that the broader economy sucks: For one thing, there was a net gain of zero jobs in August and the official unemployment rate persisted at 9.1%. Signs of sluggish (at best) growth abound. In August, the average workweek for all employees edged down, as did the average hourly earnings for private employees. At the same time, the number of involuntary part-time workers, those who are working part-time only because they can't find full-time work, swelled by 400,000 to 8.8 million - meaning the total un- and under-employment rate went up. More than six million of the officially unemployed have been out of work for at least six months - some 42.9% of the total number, tied for the record high. And an additional roughly 30,000 people reached 99 weeks without work, up to 2.04 million. Meanwhile, the number of Americans with no health insurance is at 49.9 million, up nearly 2% from the year before. And the real point here, the important point, is that this is not just now, this is not just the economic crunch of the past couple of years. This has been going on for decades. Lost decades - literally - of no gains, only the struggle to keep up. In 2010, working Americans saw the annual median income decline 2.3% percent to $49,445. That was the third year in a row that the median income dropped. Adjusted for inflation, it is now roughly where it was in 1996: Fifteen years of getting nowhere. Meanwhile, inflation-adjusted household income is now down 7.1% from its peak in 1999. Twelve years down the road and if you're an average family you are worse off than when you started. Here's a stunner: Adjusted for inflation, the average male worker, that is, one at the median level, now makes less than he did - is worse off than he was - in 1968! Back then, the median income of male workers was $32,844. In 2010, it was $32,137, or $607 less. That's 43 years of work to wind up with no gain. For all too many among us, our hopes are shriveling; worse, our hopes for the future of our children are seeming to evaporate. Under that kind of stress, it is natural to look for someone to blame, to look for someone who \"did this to you.\" And the unfortunate, the sad, but the true fact is that it is easier, it is always easier, to blame those weaker than yourself. Prejudices and fears emerge easily. So a lot of these folks are angry, frightened, frustrated, economically stressed people who have been manipulated by powerful voices around them into being angry at the wrong targets. At the poor, at the unemployed, at undocumented immigrants, at unions, at public employees, even at teachers. So who should they be angry at? Here are a few ideas: How about the 25 of the 100 highest paid U.S. CEOs who earned more last year than their companies paid in fed. income tax? How about the companies that spent more on lobbying than on taxes? How about the companies that have decided that \"labor is just too expensive,\" and want to move to \"a labor-less society,\" because as their profits increasingly come from overseas they have decided they damn well can do without you altogether? How about the politicians in DC who, analysts say, just don't care about poverty-related issues? How about the business leaders and former government officials who wrote to that super committee, that select committee to find ways to slash budget - aptly dubbed the Joint Select Committee on Human Sacrifice by Lambert Strether - calling on it to \"go big\" and cut far more than the $1.5 trillion in cuts it's tasked with finding? How about Sen. Jon Kyl of Arizona, a member of that committee, who threatened to in effect blow up the whole process if the committee considered a single dime in additional cuts in military spending? How about those - mostly but not exclusively GOPpers - who are willing to let the economy go to hell and your life into the trash in order to protect their fat head, fat ass, fat cat cronies from having to pay a single extra penny in taxes? Or how about the economic system itself, one that celebrates selfishness and applauds amorality? Now, there is a target worthy of our concentrated anger - and while it surely is for the vast majority of our fellow citizens not a visible target, it just as surely is the right one. *PHC = President Hopey-Changey Labels: activism, classism, corporations, democratic socialism, economics, GOPpers, health care, labor, military spending, Obama, poverty, prejudice, right-wing foolishness, social justice, Social Security 9\/11 - 3 This third panel of the triptych is based on what I said about 9\/11 on my weekly cable TV show. It starts by saying I grew up in New Jersey and worked in New York City for several years. I remember when the World Trade Center went up. And, as I remarked to a couple of people in the wake of the attacks, now I can remember when and how it came down. When the towers were being built, they were actually somewhat controversial. Most of the space to be available was not pre-rented so the buildings, when completed, would be pretty much empty shells. Because of that there was a fair amount of feeling that the height of the buildings was pure ego - that it was being done not because of demand for that much office space but just to to be taller than the Empire State Building. A bitterly ironic note, considering how events turned out, is that there was concern about the possibility of a misguided plane crashing into one of the towers: The site was, after all, pretty close to the flight paths of three major airports - Newark, Kennedy, and LaGuardia. I was driving down to New Jersey a few weeks after the attack and going down the Turnpike, there is an area where you can seen the skyline of southern Manhattan. I have to confess I felt a real wrench when I looked in that direction and saw sky where the towers should have been. But I said then and I say now that as deeply as I mourned the victims of the attacks, as much as I admired and still admire the dedication and courage of the first responders, of the police and firefighters, the rescue workers, the EMTs and RNs, who rushed to get to the place everyone else was rushing to get away from, I still have to insist that the question for us as Americans is not, cannot be, what Osama bin Laden could have previously thought or should have then thought or done differently, but what we could have previously or should have then thought or done (or should now think or do) differently. As hard as our misleaders try to tell us otherwise, the fact is that the clock of history did not start on September 11, 2001, and refusing to face our own complicity in creating and maintaining the conditions of desperation-driven fanaticism (because that, again, is what terrorism is), refusing to face our own criminal complicity in creating and maintaining the conditions in which such as al-Qaeda can take root and grow and recruit, refusing to face our own share of responsibility, is the surest way we as a nation can guarantee a continuation of a legitimate threat of terrorism directed against us. \"Nine-eleven changed everything,\" we were told (over and over, particularly by those who wanted to exploit if for their own political ends). We still hear that cry sometimes. No, it didn't. The world did not change. Maybe our awareness of it did - or more exactly our conscious awareness of parts of it did - but the world didn't. Although there doubtless are those to who it would come as a surprise, the fact is that there are nations, peoples, cultures, all over the world who can deal with their lives, their highs and lows, their hopes and fears, their pains and joys, who can deal with the problems involving their neighbors down the block or their neighbors across the border without always thinking \"How will this affect the US?\" On the other hand, there was one change: In the wake of the attacks, I remarked to more than one person that Osama bin Laden had done something that would have seemed impossible just days earlier: He had turned the US into the victim in the eyes of the world. In that moment, we had become the wronged innocents in the eyes of the world, including much of the Muslim world. Did we take advantage of that opening? Did we take advantage of the opportunity that the outburst of sympathy provided to chart new courses, set new patterns, mend our ways, whatever clich\u00e9 you might prefer to describe repairing our relations with much of the world by saying \"We're grateful for your sympathy and we pledge to do more to deserve it?\" Of course not. Instead, we doubled down on the same damn fool and damned immoral courses we had already pursued. Albert Einstein once said of atomic bomb that it had changed everything except our way of thinking. It might be said that 9\/11 changed nothing except our way of thinking. That's because 9\/11 affected how we thought about the world and our place in it as a country and as a people and in so doing revealed something about us as a people, something about our nature as a society. And what it revealed was, to put it mildly, not very complimentary. I mentioned two posts down a couple of emails I sent two days after the attacks. In them I made a prediction about questions about the motivations behind the attack that went beyond notions of unreasoning (and of course entirely unjustified) hatred: I said that raising them would get you branded a terrorist-lover - a prediction that proved prophetic in short order, as just a week later, on September 20, 2001, George Bush told a joint session of Congress that you \"are either with us or you're with the terrorists.\" As I expect you remember, there were massive arrests of Muslims in the US in the wake of the bombings, arrests of people charged with no crime, questioned, arrested, detained, often held incommunicado, solely on the grounds of being Muslim. And less than a month after the attack, the so-called \"Patriot Act,\" which I dubbed the \"Traitor Act\" for its effects on civil liberties, was passed, passed with a complete lack of any Congressional debate worthy of the word. It expanded government power to invade our privacy, to restrict our freedoms, to track our movements; expanded the ability to substitute suspicion for proof - and did it while reducing any form of judicial oversight. Well, if you raised questions about the civil liberties impacts of any of that, you were, in the words of then-Attorney General John Ashcroft testifying to the Senate Judiciary Committee in January 2002, \"aiding terrorists,\" \"eroding our national unity,\" and \"giving ammunition to America's enemies.\" We were cowed into silence, cowed into carefully measuring every word, every expression, for fear of what it would suggest about us. And the sad part, the revealing part, is how easily we were cowed. How little opposition, how little resistance, was raised to the stripping away of freedoms and rights -even as it became obvious in the months after the attack that the failure to stop 9\/11 was not because of lack of police powers but due to a lack of using those that were already there. You want a recent example of that last point? I'll give you one. A few weeks ago, it was revealed that in 2009 former White House counterterrorism czar Richard Clarke, who worked in that capacity in both the Clinton and Bush administrations, said in a radio interview to be aired as part of a 10th anniversary documentary on 9\/11 that the CIA intentionally withheld information from the White House and FBI in 2000 and 2001 that two Saudi-born terrorists were in the US, two men who went on to be among the hijackers. The CIA knew the two were here, knew they had attended a so-called \"terrorist summit meeting\" in Malaysia (a meeting the CIA monitored) just days before coming to the US. Clarke speculates that CIA withheld the information because the agency had been trying to recruit the terrorists, who were living in San Diego, California under their own names, to work as CIA agents inside Al Qaeda. Clarke admits he can't prove this, but says a cover-up is \"the only conceivable reason that I've been able to come up with\" as to \"why, when I had every other detail about everything related to terrorism,\" he was never told about the two. He said it is fair to conclude \"there was a high-level decision in the CIA ordering people not to share information.\" The former FBI director of the San Diego field office doubts the \"trying to recruit them\" idea but confirms that he was never informed of the presence of the two. Even so, no matter the cause, the fact remains that the CIA knew these guys were in the US and never told anyone, which if they had, might - we can't of course be certain, but might - have prevented 9\/11. But it didn't happen that way, so instead we were told that police and government had to have more power and we had to surrender civil liberties and we had to accept all of it unquestioningly or risk being thought \"objectively pro-terrorist.\" We fell silent. The left, to its shame, was not immune. Within weeks of 9\/11, leading voices on the left were on the offensive (in both senses), talking about how an ill-defined (actually, undefined) \"Hate America left,\" composed of those who dared to speak out with any energy, should be \"rejected.\" How questioners were \"reflexive anti-Americans\" who were to be dismissed as \"a vocal minority.\" How, when the attack on Afghanistan began, those who opposed it had \"lost their moral compass\" and constituted a \"blame America first\" crowd. While certainly not true of all the left, it is still a fact that a significant part of it went running around, waving its arms about, and shouting of war opponents and civil liberties advocates \"Oh no no no, they're not with us!\" They were, that is, cowed. Over the last 10 years, even as some of the passion has died down and even as some of those supposed lefties who condemned opponents of our wars now sort of mumble and shuffle and try to change the subject, what has been revealed about us as a people remains, a revelation made plain by the overt changes: We have seen the Traitor Act repeatedly renewed, we have seen the \"temporary\" parts of it, the parts to be sunsetted, made permanent. We have seen increased police powers to poke, prod, and pry into our privacy, we have seen increased powers to suppress and limit dissent such as the notorious \"free speech zones,\" better called \"silenced speech zones\" - and no, that is not an \"old\" issue. We have seen warrantless wiretapping made legal, no longer even requiring the rubber stamp of the FISA court. This has become accepted, routine, a \"new normal.\" We have gone from a nation of people who pat themselves on the back for their traditional independence and individuality to one where it is not just accepted, it is advised to submit to authority no matter how arbitrary it may be and if you don't passively submit and something happens to you - like the 72-year old woman who got tasered because she mouthed off to a cop - you can be damn sure that there will be a chorus saying it's your own damn fault. Submission to arbitrary, even illegal, authority becomes not even advisable, it becomes laudable. We have gone from a nation that at least respected its whistleblowers to one that sets new records for prosecuting them. We have gone from a nation that rejected entrapment - that is, of officials encouraging someone to commit a crime in order to arrest them - as illegal and immoral to one where it is just another tool in the law enforcement kit, a tool where government informants actively encourage acts of terrorism and then report back when they convince someone to go along so that person can be busted. From a nation that put \"trial by a jury of one's peers\" in a well-deserved place of honor, a nation that declared \"justice delayed is justice denied,\" to a nation that tolerates, even urges, detention, imprisonment, without time limit, without trial, without even charge, sometimes even in the admitted absence of any evidence, as soon as some official invokes the magic phrase \"suspected terrorist.\" From a nation that prided itself on its morality, a nation that condemned torture and prosecuted war criminals to a nation that embraces torture to the point where Dick Cheney's open admission that he personally approved of waterboarding - that is, torturing - prisoners gets a collective yawn. A nation where a clear majority of teenagers say that torture can be okay. And prosecute war criminals? Hell, we re-elect them. From a nation that proudly proclaimed \"the rule of law\" and \"no one is above the law\" to a nation that added the phrase \"except the president.\" We tell ourselves tales of our daring, our resourcefulness, our courage, on how we braved oceans in search of freedom and a \"new world\" - tales of how we crossed mountains and plains and stared down deserts as we expanded westward, a people too vibrant to be contained. (Yes, I know, I'm omitting native culture - I'm talking about the dominant US culture.) But now we will stand in line, shuffling along like sheep into the fold, stripping off our shoes and our belts, dumping our gels in small plastic bags, powering up our laptops to prove they aren't bombs, and surrendering our privacy and our dignity as we get scanned and groped in ways once reserved for suspected criminals, all just to get on a damn airplane. That is who we have become - or, perhaps more accurately, who we were beneath the surface until directed, unreasoning fear brought it out. And the fear merchants, those who profit by power by keeping us in fear, continue their work, continue broadcasting their message of \"be afraid, be very afraid,\" a message designed to keep us in a state of sufficient fear that we will continue to be cowed into silence as our rights are gradually eroded away. On September 3, the FBI and Homeland Security issued a nationwide warning about a supposed al-Qaeda threat to undertake attacks using small airplanes loaded with explosives. They admit there is no specific or credible threat and later called the warning just a normal bureaucratic bulletin - but you should just go ahead and be scared anyway, scared now of any small plane you might see flying over any populated area. Then, the middle of this past week - Omigosh omigosh omigosh! - there was a \"specific and credible\" threat of a terrorist attack to coincide with 9\/11, a threat involving \"a vehicle\" and aimed at New York. Or maybe Washington, DC. Maybe involving a bridge. Or a tunnel. Or something. And just like before, the threat, having done its work, seemed to dissipate like a mist on a sunny morning. A possible Al Qaeda plot to launch an attack during the 10th anniversary weekend of the Sept. 11 terrorist attacks is \"looking more and more like a goose chase,\" a senior U.S. official told Fox News on Saturday. Federal authorities have been questioning all day the credibility of a tip from a previously reliable source that Al Qaeda had planned to attack Washington or New York, putting though both cities on high alert. ... \"The threat is looking less and less credible,\" the official said, adding that the entire plot as outlined by the source \"doesn't seem feasible.\" None of this, of course, should be taken to say that there is no such thing as terrorism or that the threat of an attack somewhere, sometime, in the US is nonexistent. It is, however, to say that the fear of terrorism has been actively manipulated in the service of expanded government power over our private lives and that our shameful, cowering submission to that fear has done more damage to our political and personal freedoms than actual attacks ever could - and that the revelation of how easily and how far we could be manipulated and cowed by that fear is the real, lasting, legacy of 9\/11. One last thing: It wouldn't surprise me if you didn't know - I didn't until just recently - that the Traitor Act created a new government body as a means to ensure that the government didn't go overboard with its new terrorism-fighting powers and stomp too hard on civil liberties. It's called the Privacy and Civil Liberties Oversight Board. It has no members, no staff, and no office. Footnote, Unintentional Humor Div.: Juliette Kayyem, a former assistant secretary at the Department for the Protection of the Fatherland, said that by publicizing the \"credible\" threat, DHS has added millions of potential tipsters who can help confirm the information.... \"There is a sense of empowerment that the public is being used,\" said Kayyem.... Yup, I feel so empowered! On the other hand, she is right: We are being used. Posted by Lotus at 11:17 AM 0 comments Labels: Constitutional rights, foreign policy, free speech, human rights, international, loss of freedom, movement attitudes, privacy, terrorism, torture, unintentional humor The second part of my own observance of the anniversary of 9\/11 is quoting an unpublished op-ed I wrote, dated October 2, 2001. In the wake of September 11, a blunt truth: Barring divine intervention, and I for one do not count on that, we will never \"rid the world of terrorism.\" As long as there are people there will be those, both individuals and governments, prepared to commit the most venal cruelties against innocents to gain political ends. What we can hope to do is control terrorism, limit it, minimize it. But if the history of the Middle East over the last 30 years proves nothing else, it proves beyond question that neither terrorism nor \"counter\"-terrorism, neither retaliation nor counter-retaliation nor counter-counter-retaliation will stop the circle of death - particularly not so long as those on each side insist on seeing themselves at the wronged innocents only defending themselves against unreasoning violence or oppression or exploitation (or all three) while viewing their adversaries as evil brutes fully aware of their own brutality. Another cycle of mayhem is simply not an answer. If we want to limit, to minimize, terrorism, we have to understand the roots of it, understand what produces it, understand what moves people to embrace such desperation-driven fanaticism, because that it was terrorism is. And that in turn requires seeing the world through someone else's eyes, which is where most of the commentaries attempting to answer the now-popular question \"Why do they hate us?\" have failed. The authors have projected themselves into the Muslim world and tried to think of what they might resent about the West in general or the US in particular. That is, they have changed their imagined location but not their eyes, still seeing the world through the filter of their own perceptions and desires. So they wind up producing answers like \"They hate us because we're rich\" or \"They hate us because we're modern\" or \"They hate us because we support Israel.\" Such answers are so removed from context that even to the extent they're right, they're useless, the more so because they add up to the unintentionally-revealing \"They're backward, jealous, anti-Semites who hate us because we're better than they are.\" So for a moment, just for a moment, try to see the world through the eyes of an average person on the ground in the Middle East. This is how the world might look to you: For centuries the West has looked down on you, regarding you, your culture, and, if non-Christian, your religion as inferior. (There is a reason bin Laden keeps referring to American \"crusaders.\") They think of you as \"ragheads\" or \"towelheads.\" Every time a strong Arab leader rises and tries to become independent of the West, they get slapped down. The only regimes that survive are those too weak or too corrupt to threaten Western interests. (One such \"threatening\" government was that of Mohammad Mossadegh in Iran, who was overthrown in a CIA-engineered coup in 1953 after he attempted to nationalize oil reserves. The result was the 26-year reign of the Shah, whose army was practically stamped \"Made in the USA.\") Yes, you resent the West's wealth but it's not so much that they're rich and you're poor, it's that they're rich because you're poor, that their wealth is built on exploitation and economic domination. In just the past 20-plus years, you've seen the US pick a fight with Libya in the Gulf of Sidra, bomb Tripoli, openly try to kill Moammar Qadaffi, bomb a pharmaceutical plant in Sudan on the spurious claim it was a chemical weapons factory (leading to thousands, perhaps tens of thousands, of deaths due to inadequate supplies of medicines), stand by along with the rest of the West while Muslims were slaughtered in Bosnia (stepping in only when European interests were threatened), shell Beirut, shoot down a civilian Iranian airliner, and fire cruise missiles into Afghanistan. Then there's Iraq, it's infrastructure systematically destroyed in a war which it seems to you had nothing to do with the West except to humiliate another strong Arab leader. In the run-up to that war you saw foreign troops stationed near the holy sites of Islam at the insistence of the US despite Saudi Arabia's reluctance and warnings that doing so would be deeply offensive to conservative Muslims - which it was. (One thus offended being Osama bin Laden.) For 10 years you have seen the bombing of Iraq continue, so much so that a few months ago a Pentagon press representative referred to one such raid as \"routine.\" Sanctions imposed by the West have cost the lives (by UN estimate) of 500,000 Iraqi children over the last 10 years, a death toll which then-Secretary of State Madeline Albright described in 1996 as \"worth it.\" Worth it, yes, you say - as long as it's Arab children who are doing the dying. And you see the US justify both the bombing and the sanctions on the grounds that Iraq \"defies UN resolutions\" while at the same time it pours billions of dollars in economic and military aid into Israel despite the fact that for 30 years Israel has openly defied UN resolutions about Palestinians and the occupied territories. It's not even so much that the US supports Israel, it's that the US does it to the detriment, the denigration, the denial, of the Palestinians. If that was your world, what would the West, what would the US, look like to you? Like a noble friend? Or like a selfish, conceited, arrogant bully which figures it can do as it damn well pleases without cost to itself? And amid all this, what is the only force that has offered you hope, offered you help, offered you a model that has defied the West, offered you self-respect? Islamic fundamentalism. Seen through such eyes, the question \"Why do they hate us?\" answers itself. This doesn't mean excusing the terrorists who brought such ruin and pain to the streets of New York on September 11. We are all responsible for what we do and their acts deserve nothing but condemnation: Understanding does not mean approving. What it does mean is that our best targets for \"attack\" in this \"extended campaign\" are not the actual terrorists (who likely number no more than a few thousand) but the tens of thousands, the millions, among who they recruit and from who they draw their strength. Our best weapons are bread and butter, not bombs; our best tactic reconstruction, not retaliation; our best strategy justice, not jingoism. The best way to minimize terrorism is to ensure that the dispossessed have a genuine stake in the world and don't see us as grasping bullies - and the best way not to be seen as a grasping bully is not to be one. I freely admit that one reason for posting this piece and the previous one is ego: I think the analysis I made at the time has stood up pretty well from the vantage point of 10 years down the road. Labels: foreign policy, human rights, Israel, Middle East, militarism, Palestinians, prejudice, racism, Sudan, terrorism 9\/11 -1 So the 10th anniversary of 9\/11 is upon us. And we will be awash in touching stories of loss and daring and a plethora of reminders from officialdom that \"we live in a dangerous world\" and how \"we all must remain vigilant\" and how civil liberties and privacy rights"} +{"id":"RedPajamaCommonCrawl.0008","text":"Weekend Update: Claremont Folk Fest, American Composers Fest, Workshops, Concerts & plenty more * LATE ADDITION... Sun, May 31, in WeHo: 5:30-11 pm Weekly \"NASHVILLE NIGHTS\" showcase musically hosted by ROBBIE DAVIS, this week brings performances by top Southern Cal alt & trad country artists MICHAEL ANN AZOULAI, DAVID SERBY & THE LATEST SCAM, GRANT LANGSTON & THE SUPERMODELS, and THE ROBBIE DAVIS BAND, at the House of Blues Sunset Strip, 8430 W Sunset Blvd, West Hollywood 90069. 5 dollar whiskey and vodka specials. $10 cover. All ages. Now, here's the weekend update edition as originally published... May 30th in history... On this day in 1431, 19-year-old Joan of Arc was burned at the stake for her beliefs, and for recanting her prior \"confession\" obtained under torture. The fact that she led the armies of France to drive-out the English conquerers made her a hero to the French people and a danger to the hegemony of the church. Nearly 500 years later, the same Catholic church that killed her made her a saint (in 1920). Throughout the world today, there are still prisoners of conscience, incarcerated and sometimes tortured or killed \u2014 for their beliefs. Some are honored in song, like John Brown, Joe Hill, Sitting Bull, Chief Joseph, and Joan herself, and some have been jailed for writing or singing political, satirical, blasphemous, revolutionary or anti-revolutionary songs, like Russia's Pussy Riot. A little reminder to never take freedom of speech, freedom of expression, or freedom of assembly for granted. Whoo-eee. The AMERICAN COMPOSERS FESTIVAL features, in person, ANDRE PREVIN, Friday through Sunday. There's the CLAREMONT FOLK FESTIVAL, a purely delightful folk-Americana event on Saturday, May 30. Whether or not you made it out to any of the SIX festivals on Memorial Day Weekend in Southern Cal, you'll want to get to this one. And maybe even sneak out a bit early for Saturday night's concert action. That and more in this UPDATED edition. Guide to this edition\u2026 1) NEWS: \u2022 WINNERS at the 56th Annual TOPANGA BANJO FIDDLE CONTEST & FOLK FESTIVAL \u2022 CD release news: remarkable success right out of the starting gate for JOHN M \u2022 Keeping the Blues Alive on the CBS Evening News 2) FESTIVALS THIS WEEKEND \u2022 15th Annual \"AMERICAN COMPOSERS FESTIVAL\" with ANDRE PREVIN, Fri-Sat, May 28-30, in OC (Costa Mesa). \u2022 32nd Annual \"CLAREMONT FOLK FESTIVAL\" Sat, May 30, in Claremont (E of L.A.). \u2022 Weekly \"MONROVIA FAMILY FESTIVAL\" includes the \"KATTYWOMPUS CONCERT \/ JAM,\" Fri, May 29, PSEUDO-FESTIVAL, in SGV (Monrovia). \u2022 Annual \"REDWOOD MOUNTAIN FAIRE\" in Roaring Camp (Northern Cal), Sat & Sun, May 30 & 31. 3) WORKSHOPS for ARTISTS this weekend 4) Friday night's MUSIC & ARTS EVENTS 5) This Weekend's CONCERTS & ARTS EVENTS, Saturday & Sunday 6) TICKET ALERTS\u2026 \u00f7 \u00f7 \u00f7 \u00f7 \u00f7 \u00f7 \u00f7 \u00f7 \u00f7 \u00f7 \u00f7 \u00f7 \u00f7 \u00f7 \u00f7 \u00f7 \u00f7 \u00f7 \u00f7 \u00f7 \u00f7 \u00f7 \u00f7 \u00f7 \u00f7 \u00f7 \u00f7 \u00f7 \u00f7 \u00f7 \u00f7 \u00f7 \u00f7 \u00f7 \u00f7 \u00f7 \u00f7 \u00f7 1) NEWS: Winners at TBFC 2015, a new indie CD charting, and Keeping the Blues Alive on the CBS Evening News 2015 Topanga Banjo-Fiddle Contest & Folk Festival brings nationally prestigious awards from top judges, and contestants from all over the country. It was held Sunday, May 17, at Paramount Ranch, in the Santa Monica Mountains, a site run by the National Park Service, and the weather, the music, and the joyful spirit made it all a perfect day. Congratulations to Larry Wines, the founding editor of the Acoustic Americana Music Guide, who was honored on the main stage as this year's \"Music Legend Award\" honoree. (Details on that at: http:\/\/www.topangabanjofiddle.org\/legend_award.html ) CONTEST WINNERS, by category... 1. The EM Band, Woodland Hills 2. The New Historians, Pasadena 3. New Roads, Santa Monica Traditional Banjo - Advanced 1. Andy Roberts, Mariposa 2. Ken Leiboff, Newbury Park 3. Laura Osborne, Glendale Traditional Banjo - Intermediate 1. Mark Thompson, Buena Park 2. Scott Vilhauer, Torrance Traditional Banjo - Beginning 1. Milena Reed, Culver City 2. Kimberly Brandel, Seal Beach 3. Ashley Atkinson, Los Angeles Bluegrass Banjo - Advanced 1. Dennis Nowack, San Diego 2. Jack O'Shea, Santa Barbara 3. Casey James Holmberg, Culver City Bluegrass Banjo - Intermediate 1. Mason Unthank, Santa Clarita 2. Aaron Wardell, Marlow, NH 3. William Rigert, Lancaster Bluegrass Banjo - Beginning 1. Heidi Lindblom, Huntington Beach 2. Scotty Lomaglio, Castaic 3. Piper Keesee, Toluca Lake Fiddle - Advanced 1. Aarun Carter, Portland, OR 2. Grant Wheeler, Los Angeles 3. Anya Sturm, Santa Monica 4. Honorable Mention: Joyce Pan, Burbank Fiddle - Intermediate 1. Lucas Braun, Los Angeles 2. Shira Ellisman, Encinitas 3. Sofia Miranda, Los Angeles 4. Honorable Mention: Jonathan Shifflett, Los Angeles Fiddle - Beginning 1. Michael Paller, Los Angeles 2. Charlotte Bradley-McKinnon, Pasadena 3. Cassidy Mahoney, Redondo Beach Mandolin - Advanced 1. Roland Sturm, Santa Monica 2. Jonathan Trawick, Portland, OR 3. Calvin Anderson, Huntington Beach Mandolin - Intermediate 1. Bill Birrell, Santa Monica 3. Robert Wheeler IV, Corona Mandolin - Beginning 1. Vincent Green, Los Angeles 2. David Omerod, Bakersfield 3. Claire Masters, Valencia Flat-Picking Guitar - Advanced 1. Nathan La Franchi, San Clemente Flat-Picking Guitar - Intermediate 1. Sean Conlon, San Pedro 2. Fred Miller, Newbury Park 3. John Drake, Fountain Valley Flat-Picking Guitar - Beginning 1. Matthew St. Claire, Bakersfield 2. Michael Koscelnick, Bell Gardens Finger-Style Guitar 1. Craig Lincoln, Woodland Hills 2. Jill Fenimore, Los Angeles 3. Richard Marchetta, Valencia 4. Honorable Mention: Jeff Greenman, La Mirada 1. Ken Leiboff, Newbury Park [Harmonica] 2. Chris Teuber, Venice [Harmonica] 3. Diane Ippel, Ventura [Hammered Dulcimer] 4. Honorable Mention Steve Berman, Agoura Hills [Harmonica] 1. The Emersons, Woodland Hills 2. Harmonistas, Claremont 3. The Three Belles, Harbor City Best Backup Instrument 1. Jonathan Trawick, Portland, OR [Guitar] 2. Aarun Carter, Portland, OR [Guitar] 3. David Aks, Granada Hills [Cello] 4. Honorable Mention Ron Vance, Santa Monica [Bass] Oldest Musician Stan Shapin (b. 1937), Orange, Advanced Traditional Banjo Youngest Musician Rebekah Wilson (b. 2007), Saugus, Beginning Fiddle 2015 Legend Award Winner LAWRENCE (LARRY) WINES Thanks to the entire TBFC organization and all the vital volunteers for making it perfect and building lifetime memories for many who took part. Congratulations to all the winners and all those who competed for honors and awards. The rest of us need to practice-up, get that ol' guit-box or other stranged thang to a luthier, and take a few lessons in time for next year. \u00f7 \u00f7 \u00f7 \u00f7 \u00f7 \u00f7 \u00f7 \u00f7 \u00f7 \u00f7 \u00f7 \u00f7 \u00f7 \u00f7 \u00f7 \u00f7 \u00f7 \u00f7 \u00f7 JOHN MOLLENHAUER, aka JOHN M, is just as inclined to be electric as acoustic. On Friday, March 20th, the official release date for his brand new CD, \"M-VI\" was celebrated with a special full-band CD release concert and John reports \"it was an amazing success. The band ROCKED! We played to a sold-out capacity crowd, got a standing ovation at the end, and some people even bought EXTRA CD's! Everybody who came to the show got one with the price of admission.\" No sooner had he reported that, when it was eclipsed by his next round of news, IN LESS THAN A WEEK. John wrote, \"'M-VI' is number TWO on the Roots Radio Reports pop album chart, and on the 'Singles' chart, I have SEVEN songs in the top 30! SEVEN! Somebody must like me! Smile emoticon!\" John's new CD is now available for purchase on the store page of his website, www.johnm.com where you can purchase the actual CD, or you can choose either hi-res or standard MP-3 quality digital downloads. For a limited time, he's offering a free one-song digital download. He adds, \"Some of the very best musicians I've ever played with anywhere appear on this record, including a drummer who has recorded and toured with Melissa Etheridge and Christopher Cross, a percussionist who has worked with Richard Thompson, and a keyboard player who was one of the very first musicians to walk onstage at Woodstock, as well as another keyboard player who currently tours the world under his own name AND plays keyboards on the road AND in the studio with John Fogarty. I've worked long and hard on this CD and I honestly believe it's my best work to date.\" The Guide sends our congrats to John Mollenhauer for such notable success right out of the gate with his new album. The final segment on Wednesday night's CBS Evening News started and ended at Kingston Mines, the great blues club in Chicago. That would have been enough for the Guide's events editor, who spent a fine evening in that Chicago landmark on his \"Great-30-States-in-30-Days Rail Odyssey Around America\" last September, enjoying the New Orleans cuisine and the traditional deep down blues, with both Chicago Blues and Delta Blues on the menu that night. But there was more. The story was about bluesman BILLY BRANCH taking the traditional blues on the road and into the schools, oftentimes to places where kids have never heard blues music. He teaches them the style and the riffs, and the kids write originals, then they perform for the entire school. It made for a charming and tuneful story, with some impressive newly-minted blues harmonica players at a high school in Wisconsin. And it made for a wonderfully appropriate story on the day of BB King's funeral. Fri-Sat, May 28-30, in OC (Costa Mesa): 7 pm 15th Annual \"AMERICAN COMPOSERS FESTIVAL\" features, in person, ANDRE PREVIN, Friday through Sunday, at Ren\u00e9e and Henry Segerstrom Concert Hall, in the OC Performing Arts Center in Costa Mesa. ANDRE PREVIN, one of America's most versatile and prolific living composers, joins Pacific Symphony as the honored guest and focus of the 15th \"American Composers Festival\" (ACF). Previn, who has been called one of America's least easily categorized musicians, began his remarkable career as a Hollywood \"wunderkind\" and a best-selling jazz pianist. Now 86, Previn has received four Academy Awards for his work in film, 10 Grammy Awards for his recordings (plus one more Grammy for \"Lifetime Achievement\"). He's held a series of major conducting posts, but now exclusively composes. The concert is led by Pacific Symphony's Music Director Carl St. Clair, whose great admiration for the legend shaped this year's ACF to reveal the scope of Previn's prowess as a composer. A special preview takes places at 7 pm, when Alan Chapman interviews Previn on stage prior to the start of the concert. Rarely making public appearances these days, much less engaging in interviews, the very private icon opens up for this unique event. Tickets are $25-$99. More info or purchase tickets at 714-755-5799 or online at www.PacificSymphony.org. Sat, May 30, in Claremont (E of L.A.): 10 am 32nd Annual \"CLAREMONT FOLK FESTIVAL\" brings performances by THE DAVID GRISMAN BLUEGRASS EXPERIENCE, BLIND BOY PAXTON, PERLA BATALLA, ROSS ALTMAN, and many more. Music and workshops begin at 10 am and it goes all day, and it's a wonderful event in a delightful setting, at Rancho Santa Ana Botanic Garden, 1500 N College Av, Claremont 91711. This is a delightful event in a remarkably beautiful location. You can stroll the Botanical Garden's trails and hear the music drifting through, or plant yourself at a stage and see and hear some exemplary acoustic musicians. Schedule Of Events... Main Stage... (Reverse time sequence) 8 pm \u2013 David Grisman Bluegrass Experience 6:30 pm \u2013 Blind Boy Paxton 5 pm \u2013 Tom Freund and Special Guest 3 pm \u2013 Perla Batalla 1:35 pm \u2013 Dustbowl Revival 12:15 pm \u2013 Frank Fairfield 11 am \u2013 Claremont All-Stars Polka Band OakTree Stage... 2:30 pm \u2013 Peter Harper 1:30 pm \u2013 Ross Altman 12:30 pm \u2013 Squeakin' Wheels w\/ Ellen Harper 11:30 am \u2013 Fivacious 10:30 am \u2013 River and Rose Workshops... FOUR options for each time slot... 11:00 am \u2013 1. Protest Songs 2. Fiddle for All Ages 3. African Drumming 4. Israeli Dancing 12:30 pm \u2013 1. Blues & Swing Ukulele 2. Didgeridoo 3. Banjo 4. Polka & Waltz Dancing 2 pm \u2013 1. Harmonica 2. Flat Picking Guitar 3. Beginning Ukulele for the Family 4. Bomba\/Puerto Rican Dancing 3:30 pm \u2013 *Playing in a Bluegrass Band with David Grisman Bluegrass Experience, $20 additional fee* Family Activities... 11 am\u20134 pm: Printmaking, with Uncle Bacon from dA Center for the Arts 11 am\u20134 pm: Tile Mosaic Studio, Leigh Adams 11 am & 2 pm: Storytelling, with Angela Lloyd & Ron Chick 12:30 pm: Kids Rhythm, with Ray McNamera 10 am-4 pm: Passport Activities: face painting, seed planting, community art, butterfly pavilion, Sierra Club, Farm Fresh to You 3:30 pm: Community Drum Circle \u2022 What to bring: water bottle, hat, sunscreen, low\/beach-style chair is optional, but you'll want it. \u2022 What NOT to bring: no coolers, no animals, no tall\/campfire-style chairs, no outside food (food vendors on site). Parking: street parking. Tickets: $35 general admission; age 12 and under, free. Tickets available online (it DOES sell-out!), and complete info at: http:\/\/folkmusiccenter.com\/folk-festival\/ Fri, May 29, PSEUDO-FESTIVAL, in SGV (Monrovia): 6-10 pm Weekly \"MONROVIA FAMILY FESTIVAL\" is a street fair with music on the corners, on a stage, and in several venues (some that serve food, some with full bars). Of note to folkies is the weekly \"KATTYWOMPUS CONCERT \/ JAM,\" at 8 pm, right in the middle of things at Dollmakers Kattywompus, 412 S Myrtle Av, Monrovia 91016; 626-357-1091. Out-of-Town Festival\u2026 Sat & Sun, May 30 & 31, in Northern Cal: Annual \"REDWOOD MOUNTAIN FAIRE\" in Roaring Camp features LAURIE LEWIS & THE RIGHT HANDS, that marvelous band of Tom Rozum, Patrick Sauber, Simon Chrisman, Laurie Lewis, plus guest fiddler Tatiana Hargreaves. WORKSHOPS for ARTISTS & MUSICIANS, in Claremont (E of Los Angeles): Annual \"CLAREMONT FOLK FESTIVAL\" is loaded with workshops. See the complete write-up in the section just above. Sun, May 31, WORKSHOP for ARTISTS, in South Pasadena: 9 am-5 pm \"TODAY'S ARTIST: ART WORLD DO'S AND DON'T'S,\" presented by Los Angeles Art Association at Burke Triolo Studio, 538 Mission St, South Pasadena. Strengthen your professional development and knowledge of today's art world with an immersive one-day artist-centric program focused on the practical needs of artists from LAAA, the organization committed to the needs of artists. The day starts with an expert panel of \"21st Century Art Advisors\" presenting their approaches to working with Artists, Collectors and Clients. Next, \"Do's and Don't's for Achieving Gallery Representation\" will give you valuable information on how best to approach galleries and art dealers. Finally, the \"Collector Roundtable\" will provide insights on the \"how's\" and \"why's\" of collecting from top collectors. This one-day artist-centric program is designed to address the practical needs of artists from LAAA, an organization committed to the needs of artists. Cost: $100 LAAA Members $110 Students & Seniors $180 Non-Members $110 if you are a member of SPARC (South Pasadena Arts Council) that produces the annual folk-friendly \"Eclectic Music Festival;\" SPARC info at www.sopasartscouncil.com Save your spot by registering online (secure form), plus info, schedule, presenters, all at: http:\/\/www.laaa.org\/workshop_todays_artist Or call 310-652-8272 to register by phone. For some, Friday night IS the weekend. But we'll keep it separated AND UPDATED for ya. \u00f7 \u00f7 \u00f7 \u00f7 \u00f7 \u00f7 \u00f7 \u00f7 \u00f7 \u00f7 \u00f7 \u00f7 \u00f7 \u00f7 \u00f7 \u00f7 \u00f7 \u00f7 \u00f7 \u00f7 \u00f7 \u00f7 \u00f7 Friday's CONCERTS & Arts Events Fri-Fri, May 29-Jun 5, FILM PREMIERE, in Bev Hills: 7 pm \"SEEDS OF TIME\" screens at the Laemmle Music Hall, 9036 Wilshire Bl, Beverly Hills 90211; tix at www.laemmle.com This is an L.A. Weekly \"CRITICS PICK,\" and there are multiple special programs. Opening night at Laemmle Music Hall 3, Cary Fowler and Director Sandy McLeod will be on hand for a Q&A after the 7 pm show. On Saturday, Sandy McLeod will return for a Q&A after the 7 pm show. On Sunday, David King of the Seed Library of Los Angeles will do a Q&A after the 7 pm show. Whether or not you attend any of those events, the film will be here for one week only. Critics have called the film \"riveting,\" \"exceptional,\" and a \"commanding call to action.\" Synopsis: A perfect storm is brewing as agricultural pioneer Cary Fowler races against time to protect the future of our food. Gene banks of the world are crumbling, crop failures are producing starvation-inspired rioting and the accelerating effects of climate change are already affecting farmers globally. Fowler's journey, and our own, is just beginning. From Rome to Russia and, finally, a remote island under the Arctic Circle, his passionate and personal journey may hold the key to saving the one resource we cannot live without: our seeds. More at www.laweekly.com\/movies\/seeds-of-time-5448030 Fri, May 29, at UCLA: 7 pm INTERCULTURAL IMPROVISATION ENSEMBLE (aka OMNI-MUSICALITY GROUP), with Steve Loza and Alex Rodriguez, co-directors, and Music of West Africa Ensemble, Omowale Orisayomi and Francis Awe, co-directors, performs in Schoenberg Hall, at the UCLA Herb Alpert School of Music, co-sponsored by the UCLA Department of Ethnomusicology for the \"Spring Festival of World Music and Jazz 2015,\" running May 15-Jun 2. Fri, May 29, in Highland Park (L.A.): 7:30 pm RUN DOWNHILL plays the summer concert series at MorYork Gallery, 4959 York Bl, Los Angeles 90042. Fri, May 29, in Altadena: 8 pm MARK TURNBULL, plus TOM KELL & EMIKO WOODS, play the Coffee Gallery Backstage, 2029 N Lake Av, Altadena 91001. Reservations by phone only, at 626-798-6236. The celebrated performing songwriting team of Tom Kell & Emiko Woods share the night with veteran Grammy nominated and award-winning performer Mark Turnbull. Lainey Ballew says, \"It will be an evening of amazing playing, great songs, delicious harmonies and serious humor. Join us!\" Tix, $15 and reserved by calling 626-798-6236. Fri, May 29, in San Pedro: 8 pm THE SYNCOPATHS play the Grand Annex, 434 W 6th St, San Pedro 90731; 310-833-6362. Fri, May 29, in SaMo: 8 pm CHAD & JEREMY play McCabe's, 3101 Pico Bl, Santa Monica 90405; 310-828-4497. Fri, May 29, in L.A.: 8-10:30 pm \"SONGWRITER'S ROUND\" with performing host ANNIE BOXELL and musical guests, at Muse on 8th, 759 S La Brea Av (just S of Wilshire), Los Angeles 90036; http:\/\/museon8th.com Annie says, \"Joining me will be the amazing and beautiful fellow piano pixie Carolyn Samuelson. Some originals as well as tributes to favorite songwriters, by Annie Boxell & the Vicious Circle of musical guests such as Eric Estes and Jay Pallen. Try to get there early for easy street parking on La Brea, and to order your delicious organic yet indulgent treats before the musical rounds begin!\" 8 pm DON RIGSBY BLUEGRASS plays Alvas Showroom, 1417 W 8th St, San Pedro 90732; 800-403-3447 for reservations. Complimentary coffee, tea, hot cocoa and \"Alvas\" bottled water are provided. Bring your own food & drinks. Fri, May 29, in SGV (Arcadia): 8 pm DAVID LEON BAND, plus BOBBY BLUEHOUSE, at the Arcadia Blues Club, 16 E Huntington Dr (just E of Santa Anita Av), Arcadia; www.arcadiabluesclub.com Doors at 7 pm. Venue has good food (generous portions), full bar, pool tables. Substantial discount for tix bought online. Fun place, but bring earplugs. Seriously. Fri, May 29, in OC (Santa Ana): 8 pm WILLIAM ELLIOTT WHITMORE plays the Constellation Room, 3503 S Harbor Bl, Santa Ana 92704; 714-957-0600. Fri, May 29; Thu-Sun, May 28-31: 8 pm REDCAT PRESENTS: LARS JAN \/ EARLY MORNING OPERA: \"THE INSTITUTE OF MEMORY (TIMe)\" runs four performances at Roy and Edna Disney \/ CalArts Theater, 135 N Grand Av, Los Angeles 90012. Info & tix, www.musiccenter.org. A multi-dimensional visual design sets the stage for award-winning director and media artist Lars Jan's theatrical exploration of the blurring of short and long term memories, and how \"remembering\" is changing now and into the future. Fri-Sun, through Jun 7: 8 pm \"ANDRE & DORINE BY KULUNKA TEATRO\" (Spain) runs May 21-June 7 at LATC. Andre & Dorine tells the story of an elderly couple and how they relive and reinvent their love together as Alzheimer's becomes a permanent part of their relationship. Three actors portray more than 15 characters whose story is told through mask, and movement, with no spoken dialogue. 8 pm CENTER THEATRE GROUP PRESENTS: \"IMMEDIATE FAMILY\" at the Mark Taper Forum at the L.A. Music Center, 135 N Grand Av, Los Angeles 90012. Info & tix, www.musiccenter.org. Race, sexuality and religion are on the menu as Modern Family meets Guess Who's Coming to Dinner in this \"timely and important American play\" (Chicago Tribune), directed by Tony Award \u00ae winner Phylicia Rashad. Fri, May 29-July 12: 8 pm CENTER THEATRE GROUP PRESENTS: \"MATILDA THE MUSICAL\" opening May 29, running through July 12, at the Ahmanson Theatre at the L.A. Music Center, 135 N Grand Av, Los Angeles 90012. Info & tix, www.musiccenter.org. Winner of 50 international awards, including four Tony Awards \u00ae , Matilda The Musical is the story of an extraordinary girl who, armed with a vivid imagination and a sharp mind, dares to take a stand and change her own destiny. Fri, May 29, in Los Feliz (L.A.): 8-11 pm THE PLOUGHBOYS play their weekly residency at the Tam O' Shanter Ale & Sandwich Bar Lounge, 2980 Los Feliz Bl, Los Feliz 90039; 323-664-0228. 8-11 pm PLOUGHBOYS play their weekly residency at the Tam O' Shanter Ale & Sandwich Bar Lounge, 2980 Los Feliz Bl, Los Feliz 90039; 323-664-0228. Fri, May 29, in San Diego Co (Escondido): 9 pm-midnight PAUL & BRIAN of HIGHLAND WAY, that wonderful Celtic band, play A free gig at their favorite pub for an impromptu Friday night at O Sullivan's of Escondido, 118 E Grand Av, Escondido 92025; map\/directions: http:\/\/tinyurl.com\/nqpx363. Web site, http:\/\/www.osullivansescondido.com\/------ Fri, May 29, in Pomona: 9 pm RISING APPALACHIA plays the Glasshouse, 248 W 2nd St, Pomona 91766; 909-865-3802. Fri, May 29, in Murietta: 9 pm LIVE IRISH \/ CELTIC MUSIC or CELTIC ROCK at the Shamrock Irish Pub & Eatery, 39252 Winchester Rd, Ste 145 Murrieta 92592; 951-696-5252; www.getshamrocked.com; www.theshamrockirishpubandeatery.com \u00f7 \u00f7 \u00f7 \u00f7 \u00f7 \u00f7 \u00f7 \u00f7 \u00f7 \u00f7 \u00f7 \u00f7 \u00f7 \u00f7 \u00f7 \u00f7 \u00f7 \u00f7 \u00f7 \u00f7 \u00f7 \u00f7 \u00f7 \u00f7 \u00f7 \u00f7 \u00f7 \u00f7 \u00f7 \u00f7 \u00f7 \u00f7 5) This Weekend's CONCERTS & ARTS EVENTS, Even if you attend the CLAREMONT FOLK FEST \u2013 and you should \u2013 there are some mighty fine concerts this weekend. Saturday's CONCERTS & Arts Events Sat, May 30, in Altadena: 3 pm LOS DOS plays the Coffee Gallery Backstage, 2029 N Lake Av, Altadena 92675. Reservations by phone only, at 626-798-6236. Jordan Sollitto & Jose Prieto combine riveting lyrics, disparate guitar styles and haunting harmonies to create an altogether unique \u2013 and beautiful \u2013 sound. Audiences are as enthralled by Jose's masterful technique \u2013the guy is an astoundingly good nylon guitar player -- as they are by the musical stories told in their stunningly-well-crafted songs. Their set lists combine country, folk, ballads, rock, Spanish rock and instrumentals to take you on an incredibly diverse musical adventure. No less an authority than Herb Pedersen says of Los Dos, \"Skillful songwriting\u2026that somehow blends flamenco, bluegrass and country\u2026Don't ask me how they do it\u2026just go hear them!\" Sat, May 30, in Temecula: 4 pm DAVE STAMEY, the multiple top award-winning cowboy entertainer, plays the Double J Ranch, 38830 Berenda Rd, Temecula 92591. Sat, May 30, in San Pedro: 4:40 pm \"MUSIC UNDER THE GUNS\" concert series brings the PALOS VERDES HIGH SCHOOL BAND to perform on the main deck of the battleship Iowa, docked as a museum on the waterfront at 250 S Harbor Bl, San Pedro 90731; www.pacificbattleship.com. Info, www.labattleship.com Battleship IOWA is proud to host Music Under the Guns. Bands will serenade guests with performances of patriotic selections, show tunes, popular music, swing, movie melodies and many more. Sit \"under the guns\" aboard Battleship Iowa while enjoying the warm weather and stunning views of the LA Waterfront. Tix: Adults $10, Youth\/Student $5 (w\/valid ID), free for age 5 & under. No outside food or beverage. Concessions sold. Sat, May 30, in Lakewood: 6:30 pm Weekly \"BLUEGRASS CONCERT\" brings a different band most every week at Me N Eds Pizza Parlor, 4115 Paramount Bl, Lakewood 90712; 562-421-8908. Sat, May 30; Fri-Fri, May 29-Jun 5, SOLD OUT: 7 pm THE UKULELE ORCHESTRA OF THE WESTERN HEMISPHERE plus RACHEL GARCIA & THU TRAN team up at the Coffee Gallery Backstage, 2029 N Lake Av, Altadena 92675. Reservations by phone only, at 626-798-6236. Sat, May 30, in Pasadena: 7 pm BANSHEE IN THE KITCHEN, that marvelous women's ensemble of Celticana-Americana musicians, plays the Full Moon House Concert series at the home of Garth Garrett and Trisha Jauchler-stonywood in Pasadena. Reservations get directions at fullmoonsaturdays@yahoo.com The band's Brenda Hunter is a National Hammered Dulcimer Champ. Sat, May 30, in San Diego Co (National City): 7:30 pm BARRY McGUIRE & P. F. SLOAN play the AMSD Concerts series in the Laura R. Charles Theater at Sweetwater High School, 2900 Highland Av, National City 91950. 7:30 pm BRYAN BOWERS, multi-instrumentalist, songwriter, and one of the world's best autoharp players, performs for the Pasadena Folk Music Society concert series in \"Little Beckman\" on the Caltech campus in Pasadena. Park in either lot (free for the show) at the S end of Michigan Av, off Del Mar. BRYAN BOWERS, autoharp master, singer-songwriter, storyteller, multi-instrumental performing artist is a real \"wow\" musician. Bower's creativity and talent won him induction into Frets Magazine's First Gallery of the Greats after five years of winning the stringed instrument, open category of the magazine's readers' poll. This distinction put Bowers alongside other luminaries, such as Chet Atkins, David Grisman, Stephan Grappelli, Itzhak Perlman, Tony Rice, Rob Wasserman and Mark O'Connor, recognized for their personal accomplishments. In 1993, Bryan was inducted into the Autoharp Hall of Fame to stand only with Maybelle Carter, Kilby Snow, and Sara Carter. He's a very big fish in the autoharp world and he's in California because of last week's annual California Autoharp Gathering near Fresno. Hear Bryan sing and play his own composition and title tune for one of his early recordings, The View From Home, followed by the traditional tune, \"Flowers of Edinburgh,\" at www.youtube.com\/watch?v=dZ3PMrkVGSQ The Philadelphia Folk Song Society wrote, \"For all the acclaim Bryan Bowers has won as the master of the autoharp, what radiates from the instrument under his touch is not flash but warmth and brilliance.\" \"You get a good feeling being a member of Bryan Bowers' audience, the good feeling that comes from watching someone doing just what he needs to do and doing it well and for all the right reasons.\" Along with creating some fine original songs and adding new sparkle to familiar and obscure traditional songs and tunes, Bryan has introduced many to some fine contemporary songwriters, as he does with Dace Carter's moving \"When I Go,\" at www.youtube.com\/watch?v=jktfwaUIzsI. Tix, $15 for adults, $5 for Caltech students and children. Available at the Caltech Ticket Office, 9 am-4 pm, Monday through Friday at 626-395-4652 or in person (no service charge) at Winnett Student Center on campus. You can buy tickets online for this show at http:\/\/folkmusic.caltech.edu and http:\/\/pasadenafolkmusicsociety.org More at www.bryanbowers.com Sat, May 30, in San Diego Co (Poway): 7:30 pm BILLY LEE & THE SWAMP CRITTERS play the San Diego Folk Heritage concert series in Templars Hall in Old Poway Park, 14134 Midland Rd, Poway 92064; 858-566-4040. Sat, May 30, in Redondo Beach: 7:30-10:30 pm ANDY & RENEE, leaders of the award-winning Americana band HARD RAIN, play the Avenue A Bar & Grill, 800 S Pacific Coast Hwy, Redondo Beach 90277. Sat, May 30, in Newhall (Santa Clarita): 7:30 pm Weekly GRATEFUL DUDES BLUEGRASS residency, sometimes with very interesting guests sitting-in, at Vincenzo's Pizza, 24500 Lyons Av, Newhall 91350. Sat, May 30, in SFV (Studio City): 7:30-11:30 pm SONGMAKERS \"TAKE THE FIFTH HOOT\" happens any month with a fifth Saturday, in Studio City 91604. Location and info at www.songmakers.org Sat, May 30, in SGV (Arcadia): 8 pm \"WEST COAST BLUES NIGHT\" with performances by MIGHTY MOJO PROPHETS, HENRY CARVAJAL, SAN PEDRO SLIM, and BOBBY BLUEHOUSE, at the Arcadia Blues Club, 16 E Huntington Dr (just E of Santa Anita Av), Arcadia; www.arcadiabluesclub.com Sat, May 30, in Culver City: 8 pm SCHTICK SHIFT and JOELLEN LAPIDUS bring Klezmer and Dulcimer to Boulevard Music, 4316 Sepulveda Bl, Culver City 90230; 310-398-2583. Wonderful players JOELLEN LAPIDUS on mountain dulcimer with YVETTE DEVEREAUX on violin. Tix, $15. Sat, May 30, in Oak Park (T.O. area): 8 pm STEVE KATZ plays Russ and Julie's House Concerts series in Oak Park (Agoura Hills\/Westlake Village area). Reservations get directions at 818-707-2179 or rsvp@houseconcerts.us 8 pm ZHENA FOLK CHORUS perform at Alva's Showroom, 1417 W 8th St, San Pedro 90732; 310-519-1314. Sat, May 30, in L.A.: 8 pm \"MARIACHI UNDER THE STARS: AN EVENING WITH GREGORIO LUKE\" at L.A. Plaza de Cultura y Artes. Join L.A. Plaza for an evening exploring mariachi music! Mariachi Under the Stars is a spectacular outdoor event that brings together a large format multimedia presentation by art expert Gregorio Luke and a live mariachi performance. Taking you on a journey through this vibrant music, Luke will showcase the work of mariachi legends, including Jorge Negrete, Javier Solis and Lucha Reyes, among others. Sat, May 30; Thu-Sun, May 28-31: Sat, May 30; Fri-Sun, through Jun 7: Sat, May 30; Fri, May 29-July 12: Sat, May 30, in Malibu: 10 pm GARY ALLEGRETTO & HIS BAND play late at Ollie's Duck & Dive in Malibu; http:\/\/olliesduckanddive.com Gary is a multiple award-winning blues and cowboy harmonica virtuoso. Gary is an endorsed Hoehner artist and his honors include the \"Keeping the Blues Alive\" award. More at: www.garyallegretto.com 10 pm RISING APPALACHIA plus SHEA FREEDOM play a late gig at the Mint, 6010 W Pico Bl, Los Angeles 90035; 323-954-9630. Sunday's CONCERTS & Arts Events Sun, May 31, in Hollywood: 8 am-1 pm Weekly \"HOLLYWOOD FARMERS MARKET\" with live music by the FAIR MARKET BAND, at Ivar & Selma Aves, Hollywood 90028. Sun, May 31, in San Diego: 10 am Monthly \"BLUEGRASS BRUNCH\" at Urban Solace, 3823 30th St, San Diego 92104; 619-295-6464. Sun, May 31, above Arcadia: Noon-5 pm \"MUSIC IN THE MOUNTAINS\" series brings various acoustic players to Adams' Pack Station on Chantry Flat Rd, at the end of the road that begins at Santa Anita Av (go N from the 210 Fwy) above Arcadia 91006; 626-447-7356. Go to the gate near the end of the road and tell them you're there for the music at the Pack Station. Free, but you'll probably pay to park. There's always a bbq for these concert days. Sun, May 31, in Altadena: 2 & 7 pm DAVE STAMEY, the multiple top award-winning cowboy entertainer, plays the Coffee Gallery Backstage, 2029 N Lake Av, Altadena 92675. Reservations an absolute necessity, by phone only, at 626-798-6236. DAVE STAMEY was voted Male Performer of the Year by the Western Music Association, and he is the winner of the Will Rogers Award for Male Vocalist of the Year from the Academy of Western Artists. Plus he's a five-time nominee for Songwriter Of The Year. Dave Stamey is one of the most popular Western Entertainers working today. His vast repertoire of classic and original Western folk music represents a link between today's Americana singer-songwriters and the old-time cowboy balladeers. He has delighted audiences in seven states, and has found that he prefers this type of work to being stomped by angry horses. Two shows, 2 pm & 7 pm. $25, either show. Sun, May 31, in downtown L.A.: 3-5:30 pm Weekly \"WILDE THISTLE IRISH SESSION\" is a structured jam at the Wilde Thistle, 3456 Motor Av, Los Angeles; 310-730-6208; www.thewildethistle.com Sun, May 31, in SaMo: 4 pm STRING MADNESS plays the Santa Monica Conservatory of Music, 1501 Colorado Av, Santa Monica 90404. Sun, May 31, in L.A.: 4 pm \"SPOTLIGHT: COURTNEY BARNETT\" brings the acclaimed Aussie woman guitar player to the Grammy Museum, across from Staples Center in L.A. Rated four-and-a-half stars by Rolling Stone, Courtney Barnett's debut album, \"Sometimes I Sit and Think, and Sometimes I Just Sit,\" released March 24, 2015, mixes witty, often hilarious, and occasionally heartbreaking observations with devastating self-assessment and some incredible guitar play. Barnett first came onto the indie rock scene in 2012 when she self-released the EP, \"I've Got A Friend Called Emily Ferris,\" which garnered praise throughout her native Australia. With one of the most distinctive and compelling voices in indie rock, Pitchfork, in 2013, named her song \"Avant Gardener\" one of its Best New Tracks of the summer. Before launching her solo career, Barnett became a mainstay of the local Melbourne music scene, paying her dues and honing her chops in various garage and psych country outfits. Following the release of 2013's \"The Double EP: A Sea Of Split Peas,\" which combined her first two EPs, Barnett embarked on 18 months of extensive touring that took her all over North America and Europe. The songs on her latest album reveal not only an assured songwriter and guitarist, but also a performer who, in just a few years, has already proven herself an idiosyncratic and boundary-smashing artist, and a passionate advocate for the arts who is changing the face of indie rock in her native Australia and around the world. The GRAMMY Museum welcomes Barnett to the Clive Davis Theater for an intimate performance and discussion surrounding her music and career, moderated by Bob Santelli, Executive Director of the GRAMMY Museum. Doors open at 3:30 pm. Info and tix, 213-765-6803 or www.grammymuseum.org. Sun, May 31, in San Pedro: 4 pm CLAY JENKINS ENSEMBLE plays Alvas Showroom, 1417 W 8th St, San Pedro 90732; 800-403-3447 for reservations. Sun, May 31, in Long Beach: 4-7 pm Weekly \"TRADITIONAL IRISH MUSIC SESSION\" is a structured jam at the Auld Dubliner, 71 S Pine Av, Long Beach 90802; 562-437-8300. Sun, May 31; Thu-Sun, May 28-31: Matinee (time tba) REDCAT PRESENTS: LARS JAN \/ EARLY MORNING OPERA: \"THE INSTITUTE OF MEMORY (TIMe)\" runs four performances at Roy and Edna Disney \/ CalArts Theater, 135 N Grand Av, Los Angeles 90012. Info & tix, www.musiccenter.org. A multi-dimensional visual design sets the stage for award-winning director and media artist Lars Jan's theatrical exploration of the blurring of short and long term memories, and how \"remembering\" is changing now and into the future. Sun, May 31; Fri-Sun, through Jun 7: Matinee (time tba) \"ANDRE & DORINE BY KULUNKA TEATRO\" (Spain) runs May 21-June 7 at LATC. Andre & Dorine tells the story of an elderly couple and how they relive and reinvent their love together as Alzheimer's becomes a permanent part of their relationship. Three actors portray more than 15 characters whose story is told through mask, and movement, with no spoken dialogue. Matinee (time tba) CENTER THEATRE GROUP PRESENTS: \"IMMEDIATE FAMILY\" at the Mark Taper Forum at the L.A. Music Center, 135 N Grand Av, Los Angeles 90012. Info & tix, www.musiccenter.org. Race, sexuality and religion are on the menu as Modern Family meets Guess Who's Coming to Dinner in this \"timely and important American play\" (Chicago Tribune), directed by Tony Award \u00ae winner Phylicia Rashad. Sun, May 31; Fri, May 29-July 12: Matinee (time tba) CENTER THEATRE GROUP PRESENTS: \"MATILDA THE MUSICAL\" opening May 29, running through July 12, at the Ahmanson Theatre at the L.A. Music Center, 135 N Grand Av, Los Angeles 90012. Info & tix, www.musiccenter.org. Winner of 50 international awards, including four Tony Awards \u00ae , Matilda The Musical is the story of an extraordinary girl who, armed with a vivid imagination and a sharp mind, dares to take a stand and change her own destiny. Sun, May 31, in Manhattan Beach: 5-8 pm ANDY & RENEE, leaders of the multiple award-winning Americana band HARD RAIN, play Brooklyn Pizza, 500 S Sepulveda Bl, Manhattan Beach; 310-379-6599. Pizza and salad buffet plus music, all for $20. Sun, May 31, in Echo Park (L.A.): 5:30-9 pm Weekly \"GRAND OLE ECHO\" brings performances by roots-Americana, alt-country, trad-country (NOT Nashville pop country), and \/ or honky-tonk bands, at The Echo, 1822 Sunset Bl, Echo Park 90026; 213-413-8200. This multi-artist FREE weekly series has returned for its spring through fall run. It's always fun. Venue has a full bar and there's usually a rudimentary bbq or food trucks out back. No cover before 6 pm; $5 after. Sun, May 31; Fri-Fri, May 29-Jun 5, 7 pm DAVE STAMEY, the multiple top award-winning cowboy entertainer, plays the Coffee Gallery Backstage, 2029 N Lake Av, Altadena 92675. Reservations an absolute necessity, by phone only, at 626-798-6236. Sun, May 31, at UCLA: 7 pm CHARLES MINGUS ENSEMBLE, with JUSTO ALMARIO, director (spring), plus the IRISH MUSIC ENSEMBLE, TIM TAYLOR, director, Kevin Levine, assistant director, in Schoenberg Hall, at the UCLA Herb Alpert School of Music, co-sponsored by the UCLA Department of Ethnomusicology for the \"Spring Festival of World Music and Jazz 2015,\" running May 15-Jun 2. Sun, May 31, in Claremont: 7 pm Monthly \"OPEN MIC\" at the Folk Music Center & Museum, 220 Yale Av, Claremont 91711; 909-624- 2928. Sun, May 31, in Santa Monica: 7:30-11 pm Weekly \"IRISH MUSIC SESSION\" is a structured jam at O'Brien's Irish Pub & Restaurant, 2226 Wilshire Bl, Santa Monica 90403; 310-829-5303. Note: this is one of TWO O'Brien's locations with music tonight. 8 pm JULIE & AIYANA, plus CHRISTOPHER LOCKETT opening, at Molly Malone's, 575 S Fairfax Av, West Hollywood 90036. $10 cover, venue is 21+. 8 pm JAWG, featuring JOE CABRAL, ALEX McMURRAY, WALLY INGRAM, & GLENN HARTMAN, plays McCabe's, 3101 Pico Bl, Santa Monica 90405; 310-828-4497. Sun, May 31, in San Diego Co (Solana Beach): 8 pm RISING APPALACHIA plus SHEA FREEDOM play the Belly Up Tavern, 143 S Cedros Av, Solana Beach 92075; 858-481-9022. 9 pm KEN O'MALLEY plays his weekly residency of authentic and original Irish music at O'Brien's Irish Pub & Restaurant, 2941 Main St, Santa Monica 90405. Note: this is one of TWO O'Brien's locations and both usually have music Sunday nights. Festivals first, followed by the section for upcoming concerts and arts events\u2026 \u00f7 \u00f7 \u00f7 \u00f7 \u00f7 \u00f7 \u00f7 \u00f7 \u00f7 \u00f7 \u00f7 \u00f7 \u00f7 \u00f7 \u00f7 \u00f7 \u00f7 \u00f7 \u00f7 \u00f7 \u00f7 MORE UPCOMING FESTIVALS Fri-Sun, Jun 12-14, in San Bernardino Co (Ontario): Annual \"HUCK FINN JUBILEE & BLUEGRASS FESTIVAL\" features RALPH STANLEY & THE CLINCH MOUNTAIN BOYS, RICKY SKAGGS & KENTUCKY THUNDER, HOT RIZE, B\u00c9LA FLECK & ABIGAIL WASHBURN, STEVE MARTIN & THE STEEP CANYON RANGERS, and many others. Full info on camping, parking, food, workshops, and more, along with discounted advance tix, at: http:\/\/huckfinn.com +=+=+=+=+=+=+=+=+=+=+=+ Sat, Aug 8, in downtown L.A.: 3-7 pm \"BURGERS & BEER FESTIVAL\" at the Los Angeles Memorial Coliseum. Features Los Angeles' best burger restaurants serving their signature sliders and the state's best craft breweries sampling the brews that have made them famous. Confirmed restaurants include Animal, Bouchon Bistro, Grill 'Em All, Ledlow, Pono Burger and many more to come. Confirmed breweries include Angel City Brewery, Bottle Logic Brewing, Ninkasi Brewing, Strand Brewing Company and many more to come. LA Weekly offers an exclusive presale \/ password opportunity to buy tickets before they go on sale to the general public. Starts May 12, 10 am, ends May 17, 11:59 pm. Promo Code is BURGERMAIL BUY TICKETS (Public on-sale is May 18 at 10 am.) Fri-Sun, Sep 18-21, in Coloma (Northern Cal): 9th annual \"AMERICAN RIVER MUSIC FESTIVAL\" announced its lineup and began offering discounted early bird tickets on May 1. Full info, www.americanrivermusic.org\/festival.php & Arts Events All coming up, some SOON, many with advance discounts, others that'll sell-out quickly. Jun 2, in downtown L.A.: 8:30 pm STEPHEN VANHAUWAERT plays his \"classical piano spheres\" at REDCAT, the Roy & Edna Disney\/CalArts Theater at the L.A. Music Center, 631 W Second St, Los Angeles 90012; 213-237-2800; www.redcat.org Wed, Jun 3, in WeHo: 7:30 pm \"TRIBUTE TO PAUL SIMON,\" with performances by musical host PAUL ZOLLO, VALIDA CARROLL, SEVERIN BROWNE, JILL FREEMAN & JOEL WACHBRIT, JUSTINE BENNETT, PAULA McMATH, SAMANTHA AHDOOT, JEFF GOLD, and others, at the Standard Hotel in West Hollywood. Paul Zollo says, \"I am doing a couple songs, including this one, performed live here on The Smothers Brothers show, it's 'Overs,' which they recorded for 'Bookends.' Been practicing this guitar part, which is so complex and cool.\" Video of \"Overs,\" to get you prepared: https:\/\/www.youtube.com\/watch?v=I78HxruQZ1M June 5, in downtown L.A.: \"DANCE DOWNTOWN: SALSA\" is a participatory event on The Music Center Plaza, 135 N Grand Av, Los Angeles 90012. Info & tix, www.musiccenter.org. Kick off the \"Dance Downtown\" season with salsa! Move and shake the night away under the starry skies with fellow Angelenos. No partners or experience necessary. Beginner lessons throughout the evening. June 5 & 6, in downtown L.A.: NEXT ON GRAND: \"AVAILABLE LIGHT\" is at Walt Disney Concert Hall, 135 N Grand Av, Los Angeles 90012. Info & tix, www.musiccenter.org. Music by John Adams, Dance by Lucinda Childs, Set by Frank Gehry 31 years after the extraordinary event opened the Temporary Contemporary (Geffen\/MOCA), Available Light, in a brand new production, reunites the original creative team. Friday only: post-performance discussion with the creators! Co-presented by the LA Phil and Glorya Kaufman Presents Dance at The Music Center. June 7-27, in Hollywood: \"THE LOAD-IN,\" a world premiere comedy and \"HOLLYWOOD FRINGE FESTIVAL\" selection, starts June 7 at Three Clubs Cocktail Lounge, 1123 N Vine St, Hollywood 90038. World Premiere engagement of a new comedy, written and directed by David Svengalis. Produced by Mahoobla Productions. Original music by Nicole Marcus. 21+ show. Runs Sun, June 7, at 8 pm; Fri, June 12 at 4 pm; Sun, June 14 at 10 pm; Tue, June 16 at 8 pm; Fri, June 19 at 6 pm; & Sat, June 27 at 6 pm. Tix, $13. Reservations, 323- 455-4585. Online tix, www.hollywoodfringe.org\/projects\/2490 June 11-15, in downtown L.A.: L.A. OPERA PRESENTS: \"DOG DAYS\" at Roy and Edna Disney \/ CalArts Theater, 135 N Grand Av, Los Angeles 90012. Info & tix, www.musiccenter.org. A shocking reminder of contemporary opera's raw power, Dog Days blends classical vocalism with dark heavy metal influences to tell the story of a family caught in the aftermath of an unimaginable catastrophe. The work has been hailed by The Wall Street Journal as \"one of the most exciting new operas of recent years.\" EIFMAN BALLET OF ST. PETERSBURG \u2013 \"RODIN\" is at the Dorothy Chandler Pavilion, 135 N Grand Av, Los Angeles 90012. Info & tix, www.musiccenter.org. Boris Eifman's popular St. Petersburg-based company returns to The Music Center for the latest of his signature dance-theatre pieces - Rodin. This full-length work explores the tragic nature of genius the life and creative work of the great sculptor Auguste Rodin and his apprentice, lover and muse, Camille Claudel. June 13, in downtown L.A.: L.A. LAWYERS PHIL(harmonic) & LEGAL VOICES: \"RHAPSODY IN BLUE & BROADWAY MUSICALS\" in Walt Disney Concert Hall, 135 N Grand Av, Los Angeles 90012. Info & tix, www.musiccenter.org. Founder-Conductor Gary S Greene, Esq. leads the LA Lawyers Philharmonic, Legal Voices & Big Band of Barristers' 6th Annual Concert Extraordinaire featuring Rhapsody in Blue, Chichester Psalms and Broadway musicals. Actress June Lockhart; KFI's Bill Handel; Choral Director Jim Raycroft. \"THE LEGEND OF ZELDA: SYMPHONY OF THE GODDESSES-MASTER QUEST\" is in Walt Disney Concert Hall, 135 N Grand Av, Los Angeles 90012. Info & tix, www.musiccenter.org. Journey back to the land of Hyrule with Master Quest, the next chapter in the acclaimed world tour, The Legend of Zelda: Symphony of the Goddesses. Master Quest is a never-before seen or heard multimedia concert experience that celebrates the beloved 29-year-old franchise. 2015 \"LOS ANGELES INTERNATIONAL MUSIC FESTIVAL\" is in Walt Disney Concert Hall, 135 N Grand Av, Los Angeles 90012. Info & tix, www.musiccenter.org. The Los Angeles International Music Festival presented by World Projects Corporation, affords top ensembles from around the world an opportunity to perform at this world class venue. This year's concert Features ensembles from Serbia, Saipan and the United States. June 18, in L.A.: STEVE EARLE & THE DUKES play the El Rey Theatre in L.A.; doors at 7 pm. Tix, $45. \"CLASSICAL SIDE OF CUBAN MUSIC\" happens in the Mark Taper Forum, at the L.A. Music Center, 135 N Grand Av, Los Angeles 90012. Info & tix, www.musiccenter.org. Cuban pianist Daniel Amat, accompanied by some of Los Angeles sought-after studio musicians, pays a tribute to some of Cuba's most prolific composers featuring music from Ignacio Cervantes (1847-1905), Ernesto Lecuona (1895-1963) and Israel Lopez \"Cachao\" (1918-2008). July 15, in Hollywood: JOHN FOGERTY's \"1969\" TOUR plays its only L.A. (and Southern Cal) date at the Hollywood Bowl, with trad-New Orleans keyboard wizard BOB MALONE. Sep 19, in Hollywood: LILA DOWNS plays the Hollywood Pantages. MORE, soon. The Guide's next big MUSIC NEWS EDITION will be along soon. CONTACT US at \/ send Questions \/ Comments to: Tiedtothetracks (at) Hotmail (dot) com Contents copyright \u00a9 2015, Lawrence Wines & Tied to the Tracks. The ACOUSTIC AMERICANA MUSIC GUIDE endeavors to bring you NEWS and views of interest to artists everywhere, more specifically to musicians and the creative community, and music makers and fans of acoustic and Folk-Americana music, both traditional and innovative. We provide a wealth of resources, including a HUGE catalog of acoustic-friendly venues, and schedules of performances in Southern California venues large and small. We cover workshops and other events for artists and folks in the music industry, and all kids o' things in the world of acoustic and Americana and accessible classical music. From washtub bass to musical spoons to oboe to viola to banjo to squeezebox, from Djangostyle to new-fangled-old-time string band music, from sweet Cajun fiddle to pre-bluegrass Appalachian mountain music to proto blues. Posted by - Larry, the editor at Friday, May 29, 2015 Last Week of May: Claremont Folk Fest, American Composers Fest, Workshops, Concerts & plenty more Whoo-eee. The AMERICAN COMPOSERS FESTIVAL features, in person, ANDRE PREVIN, Friday through Sunday. There's a purely delightful folk-Americana FESTIVAL on Saturday, May 30. Whether or not you made it out to any of the SIX festivals on Memorial Day Weekend in Southern Cal, you'll want to get to this one. And maybe even sneak out a bit early for Saturday night's concert action. Of course, there's more, before we get to the weekend. And we've got it for you in this edition. 3) WORKSHOPS for ARTISTS this week & weekend 4) Weeknight MUSIC & ARTS EVENTS, Wednesday to Friday WINNERS at the 56th Annual TOPANGA BANJO FIDDLE CONTEST & FOLK FESTIVAL 3) WORKSHOPS for ARTISTS this week & weekend Wed, May 27, in OC (Laguna Woods): 2-5 pm NATIONAL HAMMERED DULCIMER CHAMPION TED YODER brings his tour to Southern Cal with a WORKSHOP, 2-5 pm, ($25\/hour-cash-check-credit card) open to all level hammered dulcimer players, followed by a 5-6:30 pm Dinner ($11) then an evening CONCERT, 6:30-7:30 pm ($6 cash at door). Info, etc, at www.tedyoder.com All three events at Laguna Woods Clubhouse 6, Gate 10, 24061 Algarrobo, Laguna Woods 92637. 4) Weeknight MUSIC & ARTS EVENTS, Wednesday to Friday Wednesday's CONCERTS & Arts Events 6:30-7:30 pm NATIONAL HAMMERED DULCIMER CHAMPION TED YODER brings his tour to Southern Cal with a WORKSHOP, 2-5 pm, ($25\/hour-cash-check-credit card) open to all level hammered dulcimer players, followed by a 5-6:30 pm Dinner ($11) then an evening CONCERT, 6:30-7:30 pm ($6 cash at door). Info, etc, at www.tedyoder.com Wed, May 27, in Ventura: 6 pm Twice-monthly \"VENTURA BLUEGRASS JAM\" (Second & Fourth Wednesdays) at the Golden China, 760 S Seward Av, Ventura. Wed, May 27, in Altadena: 7-10 pm Monthly \"DAVID HARVEY PRESENTS\" showcase at the Coffee Gallery Backstage, 2029 N Lake Av, Altadena 91001. No reservations are taken for this show; just get there on time to get in. There's a fine lineup for this month's show. THE LICATA BROTHERS are the youthful duo of Jimmy and Tony with their soulful harmonies and acoustic guitars. They sing their way through a wide variety of 20th Century popular music, and were invited off the street in New Orleans, where they were busking, to play the stage at prestigious Preservation Hall. You can find them on Facebook and see recent videos of them at the Coffee Gallery Backstage at www.TheLicataBrothers.com. WILD MOUNTAIN MYSTICS is a duo who play music ranging from tender-hearted love songs to foot-stompin' folk blues, mainly on acoustic guitar and mandolin. Their harmonies join gritty and smooth and blend in a way that reminds you of traditional mountain music. Some of their influences include The Carter Family, Hank Williams, The Beatles, Johnny Cash, the Mamas and the Papas, Carole King, Emmylou Harris, Maria Callas, and Linda Ronstadt. Their music has many traditional elements, but the message of love and hope is timeless. More at www.reverbnation.com\/wildmountainmystics DONNA LYNN CASKEY is a banjo maven who takes the pure, timeless sound of traditional mountain music to new places. Her gorgeous and lush debut album, Nameless Heart, received a great review in American Songwriter by the legendary music journalist Paul Zollo, who said: \"...In the midst of so many musicians and songwriters playing their songs, and I never could forget her music. Simple and stark against beautiful driving rhythms and delicate passages of her fine 5-string banjo, her songs resound like modern"} +{"id":"RedPajamaCommonCrawl.0009","text":"Focus Collections Upcoming Focus Issues Plant Cell Teaching Tools Follow plantphysiol on Twitter Visit plantphysiol on Facebook Research ArticleCELL BIOLOGY AND SIGNAL TRANSDUCTION Molecular Characterization of Two Arabidopsis Ire1 Homologs, Endoplasmic Reticulum-Located Transmembrane Protein Kinases Nozomu Koizumi, Immaculada M. Martinez, Yukio Kimata, Kenji Kohno, Hiroshi Sano, Maarten J. Chrispeels Nozomu Koizumi Immaculada M. Martinez Yukio Kimata Kenji Kohno Hiroshi Sano Maarten J. Chrispeels Published November 2001. DOI: https:\/\/doi.org\/10.1104\/pp.010636 Copyright \u00a9 2001 American Society of Plant Physiologists A major response of eukaryotic cells to the presence of unfolded proteins in the lumen of the endoplasmic reticulum (ER) is to activate genes that encode ER-located molecular chaperones, such as the binding protein. This response, called the unfolded protein response, requires the transduction of a signal from the ER to the nucleus. In yeast (Saccharomyces cerevisiae) and mammalian cells, an ER-located transmembrane receptor protein kinase\/ribonuclease called Ire1, with a sensor domain in the lumen of the ER, is the first component of this pathway. Here, we report the cloning and derived amino acid sequences of AtIre1-1 and AtIre1-2, two Arabidopsis homologs of Ire1. The two proteins are located in the perinuclear ER (based on heterologous expression of fusions with green fluorescent protein). The expression patterns of the two genes (using \u03b2-glucuronidase fusions) are nearly nonoverlapping. We also demonstrate functional complementation of the sensor domains of the two proteins in yeast and show that the Ire1-2 protein is capable of autotransphosphorylation. These and other findings are discussed in relation to the involvement of these genes in unfolded protein response signaling in plants. The endoplasmic reticulum (ER), which in plant cells is composed of numerous distinct morphological domains with specific functions (Staehelin, 1997; Zheng and Staehelin, 2001), is a three-dimensional network of membranous tubules and sheets that extends throughout the cytoplasm. At the periphery of the cell, it underlies the plasma membrane, and around the nucleus it links up with the nuclear envelope. The role of the rough ER in the biosynthesis, modification, folding, and export of secreted, vacuolar, and membrane proteins of plant cells has been the subject of numerous studies (for review, see Vitale and Denecke, 1999; Vitale and Gallili, 2001). About one-third of all cellular proteins are thought to be synthesized on the rough ER. Correct folding of newly synthesized proteins in the lumen of the ER is a prerequisite for their transport to other cellular destinations. To promote polypeptide folding and subunit assembly, the ER lumen contains molecular chaperones, disulfide exchange proteins, and a system to synthesize and attach Asn-linked glycans to nascent polypeptides. Malfolded and unassembled proteins are subject to a quality control process that retains them in the ER to restore them to normal conformation or that eliminates them via a degradation after transport to the vacuole, or in the cytosol, after retrotranslocation across the ER membrane (for review, see Bonifacino and Weissman, 1998;Mori, 2000). When stress causes protein folding to be slowed, the presence of unfolded proteins in the ER triggers several cellular responses. One such response, called the unfolded protein response (UPR), results in the enhanced expression of a large number of genes. As part of the UPR, the expression of genes encoding ER chaperones such as the binding protein (BiP) and protein disulfide isomerase (PDI) is enhanced. Genome-wide expression studies show that the UPR affects not only ER chaperone genes, but multiple functions of the ER and the rest of the secretory pathway as well (Travers et al., 2000). The second cellular response to unfolded proteins, so far only described in mammalian cells, consists of a transient attenuation in the rate of protein synthesis so that less protein enters the ER (see Brostrom and Brostrom, 1998; Harding et al., 2000). Together, these two responses minimize the presence of unfolded proteins in the ER. In yeast (Saccharomyces cerevisiae) and mammalian cells where the UPR has been studied in some detail, signaling from the ER to the nucleus is mediated by the transmembrane protein kinase\/ribonuclease Ire1. This protein has a sensor domain in the lumen of the ER that is thought to sense the presence of unfolded proteins. BiP itself has been shown to be the ligand for this sensor domain (Bertolotti et al., 2000; Okamura et al., 2000). In yeast, the nuclease domain initiates the splicing of the mRNA that encodes a transcription factor (Hac1p) that is ultimately responsible for the transcriptional activation of the UPR target genes. Yeast has only one Ire1gene, but humans and mice have at least two genes for this protein (for review, see Kaufman, 1999; Silverman and Williams, 1999). Given the complex nature of the UPR, the two mammalian IRE1 proteins may affect different downstream processes. Both proteins appear to signal the induction of chaperones as shown by their expression in cultured cells (Tirasophon et al., 1998; Wang et al., 1998). Iwawaki et al. (2001)recently reported that human IRE1\u03b2 induces translational repression through 28S rRNA cleavage in response to ER stress. The attenuation of protein synthesis is also signaled via the protein kinase dsRNA-dependent (PKR)-like ER kinase (PERK) in mammalian cells. This kinase has a related lumenal sensor domain (Harding et al., 1999), but lacks a ribonuclease domain. In mammals, under unstressed condition, BiP represses UPR signaling through the association with the lumenal regions of PERK and IRE1, but the accumulation of mis-folded proteins in the ER relieves this repression by bringing about the release of BiP from the lumenal domains of PERK and IRE1 (Harding et al., 2000). Similar regulation is also observed in yeast (Okamura et al., 2000). A variety of stress conditions, including treatment with tunicamycin, inhibit the proper folding and oligomerization of proteins in the lumen of the ER (Pelham, 1989) and tunicamycin is routinely used as a way to induce the UPR. Treatment of plant cells or tissues with tunicamycin induces BiP and other ER chaperones (Fontes et al., 1991; Shorrosh and Dixon, 1992). D'Amico et al. (1992) showed that treatment of bean (Phaesoleus vulgaris) cotyledons with tunicamycin not only induces BiP, but that BiP can be co-immunoprecipitated with the newly synthesized (unglycosylated and presumably malfolded) polypeptides present in the ER. More recent evidence suggests that BiP and calreticulin form an abundant complex in the ER (Crofts et al., 1998). In tobacco (Nicotiana tabacum) and soybean (Glycine max), BiP is encoded by a small gene family (Denecke et al., 1991; Kalinski et al., 1995), whereas in Arabidopsis there are only two BiP genes (Koizumi, 1996). These early investigations set the stage for all later work on the role of chaperones in protein folding, protein assembly, and quality control in the ER of plant cells (for review, see Vitale and Denecke, 1999). With respect to the UPR itself, there is almost no information regarding plant cells. The floury-2 endosperm mutant of maize (Zea mays) presents an interesting case of ER stress in plants. This mutant produces an aberrant zein storage protein with a defective signal peptide-processing site (Coleman et al., 1995) and the seeds have dramatically increased levels of BiP and other chaperones (Boston et al., 1991; Li and Larkins, 1996; Coleman et al., 1997;Gillikin et al., 1997). This system was recently used to show that the enzymes of lipid metabolism associated with the ER are up-regulated (Shank et al., 2001). Tunicamycin, which inhibits the synthesis of dolichol-linked glycans (Takatsuki et al., 1975), has been most widely used to induce the UPR in plant cells. Overexpression of the gene encoding the enzyme that is inhibited by tunicamycin makes plants less sensitive to this antibiotic and obviates the UPR (Koizumi et al., 1999). The role of BiP in ER stress was explored by Leborgne-Castel et al. (1999) who created lines of tobacco that overexpress BiP. They found that overexpression from a transgene caused down-regulation of the endogenous BiP genes and greatly reduced the UPR. They also observed that tunicamycin down regulated the level of \u03b1-amylase, a secreted protein, compared with a cytosolic protein. Co-expression of BiP restored amylase synthesis, suggesting that there was insufficient BiP to take care of the large increase in the demand for folding required by the overexpressed \u03b1-amylase. Because this particular amylase is not a glycosylated protein, the ER stress resulting from tunicamycin treatment could be signaling through the PERK pathway. However, an exhaustive search of the Arabidopsis database did not reveal any PERK homologs. Here, we report the presence of two Ire1 homologs in the ER of Arabidopsis cells. The derived amino acid sequences have the three domains characteristic of Ire1 proteins found in other organisms: a lumenal sensing domain, a protein kinase domain, and a ribonuclease domain. The two proteins share 41% amino acid identity. Introduction into \u0394ire1 yeast cells of chimeric genes encoding the lumenal domains of either of the Arabidopsis Ire1 proteins and the other two domains of yeast Ire1 results in yeast strains that respond to tunicamycin by enhancing the expression of an introduced UPR element (UPRE)-lacZ reporter construct. Analysis of plants transformed with AtIre1 promoter-\u03b2-glucuronidase (GUS) fusions shows that the two genes have nearly non-overlapping patterns of expression. Accumulation of Chaperone mRNAs Is Induced by Tunicamycin Tunicamycin (5 \u03bcg mL\u22121) treatment of immersed leaf segments causes rapid changes in ER chaperone mRNAs (Fig.1). mRNAs of five chaperones (BiP, PDI, calnexin, calreticulin-1, and calreticulin-2) increased rapidly upon tunicamycin treatment. BiP mRNA was also induced by two chemical stresses: azetidine-2-carboxylate and dithiothreitol (results not shown). These results confirm and extend earlier work with plant tissues, demonstrating the existence of the UPR in plants. Cooperative induction of mRNA of the ER chaperones in Arabidopsis by tunicamycin. Total RNA was extracted from Arabidopsis seedlings after addition of tunicamycin (5 \u03bcg mL\u22121) to the culture medium. Incubation periods after treatment were 0 h (Control), 1 h (Tm 1 h), and 2.5 h (Tm 2.5 h). The RNA blot was probed with the cDNAs of BiP, PDI, calnexin, calreticulin-1, and calreticulin-2. Cloning of the Arabidopsis Ire1 Homologs Ire1p of yeast is a large transmembrane protein (1,115 amino acids) with a three-domain structure: A large sensor domain is followed by a protein kinase domain and a nuclease domain. The sensor domain and the kinase domain are separated by a transmembrane helix. Using the amino acid sequence of yeast Ire1p, we conducted a search for homologs of this protein in the Arabidopsis database. We found two genomic sequences that, when translated, showed considerable sequence identity with Ire1 proteins of other organisms. We designated these genes AtIre1-1 and AtIre1-2. AtIre1-1 appeared to be a complete coding frame in a long genomic sequence (accession no.AB016884), but AtIre1-2 was only a partial sequence, at the end of a BAC clone (accession no. B28768) when we found it. We amplified a full-length cDNA of AtIre1-1 by reverse transcriptase (RT)-PCR. For AtIre1-2, we first amplified a portion of the cDNA according to the known sequence and then this fragment was used as a probe to screen a cDNA library of Arabidopsis. The cDNA we obtained was almost full length and in the meantime a complete genomic sequence for AtIre1-2 was released (accession no. AC007584). This allowed us to isolate a full-length cDNA for AtIre1-2 by RT-PCR using primers derived from the genomic sequence. The sequences of the AtIre1-1 and AtIre1-2 cDNAs that we obtained did not match the predicted coding sequences found in the database because the predictions of some of the intron splicing sites were incorrect. In the case of AtIre1-1, the first intron was not detected by computer analysis. For AtIre1-2, the C-terminal portion of the protein, encoding the kinase and RNase domains, was predicted as a protein. The correct nucleotide sequences of AtIre1-1 and AtIre1-2 have been deposited in the database (accession nos. AB049936 and AB049937, respectively). The derived amino acid sequences of the two proteins are shown in Figure 2. Alignment of Ire1 homologs from various organisms. Two Arabidopsis homologs (AtIre1-1 and AtIre1-2; this study), yeast Ire1p (Ire1p, accession no. Z11701), human Ire1\u03b1 (hIre1\u03b1, accession no. AF059198), and mouse Ire1\u03b2 (mIre1\u03b2, accession no. AF071777) were aligned using ClustalW software. Amino acid residues conserved in three out of five sequences are boxed. The ATP binding motif (VAVKR) and the Ser\/Thr protein kinase motif (DLKPQN) are underlined. A comparison of the cDNA and genomic nucleotide sequences showed that AtIre1-1 and AtIre1-2 have five and six introns, respectively. The splice sites are conserved between the two genes except that the last intron of AtIre1-2 is missing from AtIre1-1. A genomic Southern analysis was carried out using gene-specific probes for each gene (Fig.3A). A single band in each restriction digest indicated that AtIre1-1 and AtIre1-2 exist as a single copy in the genome of Arabidopsis. A, Genomic Southern analysis of AtIre1-1 and AtIre1-2. Genomic DNA of Arabidopsis digested with two restriction enzymes was fractionated by agarose gel, blotted, and probed with a fragment of either AtIre1-1 or AtIre1-2 cDNA. B, mRNA abundance analysis of AtIre1-1, AtIre1-2, and BiP. Poly(A+) RNA was isolated from Arabidopsis seedlings with no treatment or treated with tunicamycin (5 \u03bcg mL\u22121 for 4 h). Two micrograms of RNA sample from each treatment was used for northern blotting. Probes used were same as in A for AtIre1-1 and AtIre1-2. BiP probe was the same as in Figure 1. Characteristics of the Amino Acid Sequences AtIre1-1 and AtIre1-2 encode open reading frames of 881 and 841 amino acids, respectively. Although the polypeptides are smaller than those of human (977 amino acids) and yeast (1,115 amino acids), the derived Arabidopsis amino acid sequences revealed the structural features of yeast and mammalian Ire1 proteins. Namely, they have short hydrophobic regions at the N-terminal end and near the middle of the proteins, representing the likely signal peptides and transmembrane domains. Following the putative transmembrane domain, they contain kinase and RNase domains. These two C-terminal domains have significant sequence identity with the homologous domains of other Ire1 proteins (30%\u201340%). The kinase domain has a critical Lys residue in the conserved VAVKR domain and the signature sequence of Ser\/Thr kinases (DLKPEN) is represented as DLKPQN (underlined in Fig. 2). The N-terminal regions representing the likely sensor domains are much less conserved among the different homologs (<10%). Comparing AtIre1-1 with AtIre1-2, the C-terminal domains also have a higher sequence identity (65%) than the N-terminal regions (28%). Expression of the AtIre Genes To detect transcripts of AtIre1-1 and AtIre1-2, a northern-blot analysis was done. Using total RNA, we were never able to detect any signals. Therefore, we isolated poly(A+) RNA for a northern blot, and in this way we detected weak signals for AtIre1-1 and AtIre1-2 (Fig. 3B). A search in the Arabidopsis expressed sequence tag (EST) database did not produce any ESTs for AtIre1-1 or AtIre1-2, but in August 2000, a single EST of AtIre1-2 was reported in developing seeds and added to the database with our annotation. Together, these results indicate that expression levels of the AtIre1 genes are very low in Arabidopsis. Unlike BiP, which is highly induced by tunicamycin, the levels of the AtIre transcripts were not changed by tunicamycin treatment. AtIre1-2 Has Protein Kinase Activity Ire1p of yeast and its mammalian homologs have autophosphorylation activity in vitro. To determine if AtIre1 has protein kinase activity, we expressed in Escherichia coli a fusion polypeptide consisting of glutathione S-transferase (GST) and the C-terminal half of AtIre1-2 containing the protein kinase and ribonuclease domains. A second construct carried a K442A mutation in which Lys-442 was mutated to Ala (see Fig.4). This mutation inactivates the enzymatic activity of other protein kinases. We purified the recombinant protein on a glutathione affinity column and obtained a single band of 73 to 75 kD on a Coomassie Brilliant Blue-stained gel. This band reacted with an anti-GST serum and its molecular size was consistent with that of the fusion protein. Incubation with32P-labeled ATP resulted in the labeling of the same polypeptide as was identified by the GST antiserum. The GST fusion polypeptide was not labeled with 32P in the K442A mutant. We suggest on the basis of this experiment that AtIre1-2 is a trans-phosphorylating protein kinase similar to other receptor kinases. A and B, Autophosphorylation activity of the C-terminal domain of AtIre1-2. A, Domain structure of Ire1 (top) and of the GST fusions showing the location of the K to A mutation. B, The fusion protein of GST with the C-terminal domain of AtIre1-2 was expressed in E. coli and affinity purified on glutathione-Sepharose. Purified protein incubated with \u03b3-32P ATP was subjected to SDS-PAGE. The gel was Coomassie stained (CBB) and exposed to x-ray film (autoradiogram). The same fraction was used for an immunoblot analysis with anti-GST antibody (anti-GST). In A and B, lane 1 has the wild-type GST-AtIre1-2 fusion and lane 2 has the mutant GST-AtIre1-2 fusion. There is no32P labeling of the fusion polypeptide of the mutant (lane 2 in the autoradiogram). Subcellular Localization of AtIre1-Green Fluorescent Protein (GFP) Fusions To determine the subcellular location of AtIre1, we made translational fusions with the GFP and expressed these constructs in cultured tobacco cells (BY-2 cells). As controls, we used GFP by itself and a construct in which GFP has a signal peptide and a carboxyterminal ER retention motif (Lys-Asp-Glu-Leu or KDEL). The expression of all constructs was driven by the cauliflower mosaic virus (CaMV) 35S promoter. The cells were examined by fluorescence microscopy. In cells expressing GFP alone (Fig. 5, A and B), the entire cytoplasm but not the vacuoles is diffusely labeled and the nucleus appears bright green, indicating that GFP enters the nucleus readily. Figure 5, C and D, show the results with the GFP-KDEL construct. Fluorescence is seen in the perinuclear zone, in cytoplasmic strands, and in the newly formed cross walls (possibly associated with plasmodesmata), but not in the nucleoplasm. In cells transformed with the AtIre1-1-GFP construct (Fig. 5, E and F) the fluorescence is confined to the perinuclear area. Figure 5G shows that the location of AtIre1-2-GFP is similar to that of AtIre1-1-GFP. Figure 5H is an image of a cell transformed with the mutant K442A AtIre1-2-GFP construct. The parallel construct of AtIre1-1-GFP (K487A) showed the same localization (data not shown). This mutation produces a nonfunctional protein, and the transformed cells invariably show brighter fluorescence. Treatment of cells with brefeldin A (10 \u03bcg mL\u22121 for 90 min), which causes redistribution of Golgi proteins (Staehelin and Driouich, 1997), did not change the distribution of the AtIre1 proteins (data not shown). A similar treatment with brefeldin A caused the redistribution of a GFP fusion with the Golgi marker enzyme \u03b1-mannosidase I (data not shown). These results rule out the Golgi as the location of the AtIre1 proteins. Localization of AtIre1-1-GFP and AtIre1-2-GFP fusion proteins by fluorescence microscopy. Epifluorescence images of tobacco BY-2 cells (A\u2013H), and purified nuclei from tobacco BY-2 cells (i\u2013l). A, B, and i, BY-2 cells express normal GFP. Note green fluorescence in the nucleoplasm. C, D, and j, BY-2 cells expressing GFP-KDEL. Note absence of fluorescence in the nucleoplasm. E, F, and k, BY-2 cells expressing AtIre1-1-GFP. G and l, Cells expressing AtIre1-2-GFP. H, BY-2 cell expressing the AtIre1-2(K442A)-GFP. Bars = 0.01 mm. Figure 5, i through l, are of isolated nuclei from cells expressing GFP alone (Fig. 5i), GFP-KDEL (Fig. 5j), the AtIre1-1-GFP construct (Fig.5k), and the AtIre1-2-GFP construct (Fig. 5l). The nucleoplasm is labeled in Figure 5i, indicating that GFP itself stays in the nucleus during nuclear isolation (NI). Together, these data support the interpretation that AtIre1-1 and AtIre1-2 are located in the nuclear envelope and\/or the ER that is in close proximity to the nucleus. The N-Terminal Regions of AtIre1-1 and AtIre1-2 Function as Sensors Although the amino acid sequences of the N-terminal region of AtIre1-1 and AtIre1-2 are very dissimilar from that of yeast Ire1p, we investigated whether these regions can function as sensors of stress in yeast cells. To test this possibility, we made chimeric genes of the N-terminal domains of AtIre1-1 and AtIre1-2, and the C-terminal domains of yeast Ire1p. The N-terminal domain of yeast Ire1p, except the signal peptide, was replaced with the N-terminal domain of either AtIre1-1 or AtIre1-2 (see Fig. 6A). These constructs were introduced into a yeast \u0394ire1 mutant, using a single-copy (ARS and CEN) plasmid vector pRS313 (Sikorski et al., 1989). As a positive control, pRS313-carrying yeast IRE1 was used. The various yeast transformants were grown on synthetic dextrose plates without or with tunicamycin (0.2 \u03bcg mL\u22121). Growth of the yeast \u0394ire1 mutant containing the empty vector was severely inhibited by tunicamycin. This inhibition of growth was rescued by transformation with yeast IRE1. Growth inhibition was also rescued with the two chimeric constructs Atire1-ch and Atire2-ch (Fig. 6B). To confirm that the UPR was induced when the yeast cells were subjected to ER stress, we measured the expression of \u03b2-galactosidase driven by a 22-bp UPRE of the yeast BiP gene (KAR2) promoter. In the yeast \u0394ire1 mutant transformed with empty vector only, the induction of \u03b2-galactosidase was not observed upon treatment with either tunicamycin or dithiothreitol. Yeast \u0394ire1 cells complemented with yeastIRE1 showed the expected response to these stresses. In yeast \u0394ire1 cells transformed with the chimeric constructs, the chemical stresses also induced the accumulation of the enzyme (Fig. 5C). These results indicate that the N-terminal domains of the Arabidopsis Ire1-1 and Ire1-2 proteins can act as ER stress sensors in yeast. A through C, Complementation of yeastire1 deletion mutant with chimeric constructs of yeast Ire1p and Arabidopsis Ire1 homologs. A, Schematic view of the chimeric constructs used for yeast complementation. Chimeric constructs consisted of the sensor domains of AtIre1-1 or AtIre1-2, and other parts (signal peptide and C-terminal half) of yeast Ire1p. B, Growth of\u0394ire1 strains of yeast complemented with chimeric constructs in the absence or presence of tunicamycin.\u0394ire1 containing vector only (vector), chimeric constructs for AtIre1-1 (Atire1-ch) and AtIre1-2 (Atire2-ch), and yeastIRE1 were grown on synthetic dextrose plates without tunicamycin (\u2212Tunicamycin) and with tunicamycin (+Tunicamycin, final concentration at 0.2 \u03bcg mL\u22121). Approximately 1 \u00d7 105 cells were spotted on the left column of each plate. Series of one-tenth dilution of cells were spotted on the right side. Yeast cells were grown for 3 d at 30\u00b0C. C, Activity of \u03b2-galactosidase of yeast cells containing each construct. Cells were incubated at 30\u00b0C with 2 \u03bcg mL\u22121 tunicamycin for 4 h, or 1 mm dithiothreitol for 2 h, and their \u03b2-galactosidase activity was measured. AtIre1-1 and AtIre1-2 Have Nonoverlapping Expression Patterns We made AtIre1 promoter::GUS fusions for both genes and examined their expression in Arabidopsis. GUS activity was found to be very low, in agreement with the finding that there were very few accessions of Ire-1 genes in the EST databases. The 1,996-bp promoter of AtIre1-1 drives GUS expression in the apical meristem (Fig.7, A and B), at leaf margins where vascular bundles end (Fig. 7C) in the anthers before pollen is formed (Fig. 7D), and in the ovules at a very early stage of development (Fig.7, E and F). There is no expression in more mature embryos. AtIre1-1 is also strongly expressed in the cotyledons immediately after germination (inset in the upper right hand corner of Fig. 7A) but not later on (Fig. 7A). Thus, the expression of AtIre1-1 in the plant is extremely restricted to certain tissues at specific developmental times. The 1,994-bp promoter of AtIre1-2 drives expression of GUS in the vascular bundles of young plants (Fig. 7G), leaves (Fig. 7, G and H), in roots (inset in Fig. 7G), seedlings (Fig. 7J), and in the receptacles of flowers and vascular bundles of the petals (Fig. 7K). This gene appears to be more widely expressed than AtIre1-1, but it is clearly not generally expressed throughout the plant. A through K, Histochemical staining of GUS of Arabidopsis plants transformed with AtIre1-promoter::GUS fusions. A through F, AtIre1-1 and G-K: AtIre1-2. A and B, Seedlings with fully expanded cotyledons (note staining of the meristems); A inset, 48-h-old seedling with stained cotyledons; C, leaf margin; D, flower with immature anthers; E, flower after pollination, only the gynecium is stained and anthers are not longer stained; F. ovules; G, seedling; G inset, root tip; H and I, rosette leaf; J, seedling; K, flowers. In this report, we show that the genes of five different ER chaperones are induced during the UPR in Arabidopsis and we present the molecular characteristics of two ER-located transmembrane protein kinases, AtIre1-1 and AtIre1-2, whose homologs are involved in UPR signaling in other organisms; the two AtIre1 homologs have nearly nonoverlapping expression patterns. One of the two proteins is shown to function as a protein kinase (the other one was not tested) and the sensor domains of the proteins function in sensing unfolded proteins in yeast. It remains to be demonstrated that the two proteins are involved in the UPR of plant cells. The UPR in Plant Cells In the most recent major review on the functions of the ER in plant cells (Vitale and Denecke, 1999), no mention is made of the UPR, although ER quality control is discussed in detail. This omission is simply a reflection of the fact that there have been no systematic studies of the UPR in plants, although it was shown some years ago that tunicamycin increases the level of BiP mRNA and protein. In Figure 1, we show that 5 different ER-located chaperones are induced by tunicamycin. Plants, we conclude, behave similarly to other eukaryotes with respect to this important cellular process (Kaufman, 1999; Mori, 2000). This is not surprising, because the UPR is thought to control many essential aspects of ER function, not only those that relate to protein import, processing, and export (Travers et al., 2000). Furthermore, unfolded proteins are constantly being delivered to the ER of all cells, and these proteins must be either folded and assembled, or exported for degradation. Tunicamycin prevents protein folding by inhibiting the synthesis of high-Man glycans in the ER. In a similar manner, dithiothreitol can prevent protein folding by inhibiting disulfide bond formation, and this chemical has been shown to increase the levels of mRNA for two chaperones, BiP and PDI (Denecke et al., 1995). Nelson et al. (1997) did not find up-regulation of calreticulin mRNA after heat shock, but it is not clear to what extent the treatment interfered with protein folding. A related type of ER stress in maize endosperm, caused by the presence of an excessive amount of zein polypeptides with uncleaved signal peptides, has been shown to be accompanied by the up-regulation of calnexin, BiP, and PDI (Fontes et al., 1991; Li and Larkins, 1996; Wrobel, 1996). It is more than likely that the zein polypeptides are in an unfolded state in the ER of these cells. The Arabidopsis Ire1 Proteins Homologs of yeast IRE1 have been identified in several other eukaryotic species including Drosophila melanogaster, Cenorhabditis elegans, human, and mouse. Alignment of the derived amino acid sequences shows that the most conserved features of the proteins are the kinase and ribonuclease domains. The two Arabidopsis Ire1 proteins are somewhat smaller than the yeast protein but contain the same three domains, with greater sequence identity in the two enzymatic domains compared with the putative sensor domain. Each protein species is encoded by a unique gene. In mice and humans, two IRE-1 proteins, each encoded by a different gene, have so far been identified. The gene encoding AtIre1-1 is located on chromosome 5 (Bac K16H17), whereas the gene encoding AtIre1-2 is on chromosome 2 (Bac mjb20). The translation product from this gene is incorrectly annotated in the database as the putative protein comprises only the carboxyterminal half of AtIre1-2 and does not include the transmembrane and sensor domains. AtIre1-GFP Fusion Proteins Are Located in the Perinuclear ER The results presented in Figure 5 are consistent with a localization of the AtIre1-GFP fusion proteins in the perinuclear ER. The fluorescence obtained with the AtIre1-GFP constructs was much less than that obtained with GFP alone or GFP-KDEL. This lower fluorescence may be the result of the property of the Ire1 to regulate its own expression at the level of mRNA (Tirasophon et al., 1998). Localization of Ire1 in the ER of yeast cells was first postulated by Cox et al. (1993) and by Mori et al. (1993) on the basis of the molecular properties of the Ire1 proteins: a signal peptide, a transmembrane domain, and high-Man glycans. Light microscopy analysis of COS1 cells transfected with epitope-tagged mouse Ire1 shows colocalization with the ER marker ribophorin 2 (Wang et al., 1998). The clearer confocal images in the study of Tirasophon et al. (1998) show a perinuclear localization for human Ire1 transfected into COS1 cells, very much like the images shown in Figure 5. Brefeldin A at 5 mg mL\u22121 did not alter the distribution of fusion proteins in the cells, although it caused, as expected, a redistribution of the soybean Golgi marker \u03b1-mannosidase I (data not shown). We conclude that AtIre1 is present in the nuclear envelope and in the ER immediately adjacent to the nucleus. Deletion of the ribonuclease domains (data not shown) and a single amino acid mutation in the kinase domain that prevented kinase activity did not alter the observed subcellular distribution of the fusion protein. So far, all studies have been done with overexpressed Ire1 proteins and we cannot rule out the possibility that endogenous Ire1 is confined to the nuclear envelope itself. Upon induction of the UPR in mammalian cells, human Ire1 is proteolytically cleaved, and fragments containing the kinase and nuclease domains accumulate in the nucleus (Niwa et al., 1999). It may be relevant in this respect that both AtIre1 proteins have putative nuclear localization signals at the N-terminal end of this combined enzymatic domain (KKKKSKK in AtIre1-1 and KKKKNRK in AtIre1-2). AtIre1-2 Is an Autophosphorylating Protein Kinase Ire1 proteins are transmembrane receptor protein kinases that oligomerize when BiP is detached from the receptor domain (Bertolotti et al., 2000; Okamura et al., 2000). Oligomerization then leads to trans-autophosphorylation of the cytoplasmic effector domains (Shamu and Walter, 1996; Bertolotti et al., 2000). BiP thus serves as an inhibitory ligand for these receptor kinases, which mechanistically are similar to other transmembrane protein kinase receptors. AtIre1-1 and ArIre1-2 have a DLKPQN motif that closely resembles the consensus motif for Ser\/Thr kinases (DLKPEN; Lindberg et al., 1992). Incubation of the purified GST fusion protein with 32P-ATP resulted in the phosphorylation of the fusion protein. Lys-442 is contained in a motif (VAVKR) conserved in all protein kinases that contacts the \u03b1- and \u03b2-phosphates of ATP and is essential for catalysis. Mutation of this Lys residue (K442A) resulted in the inactivation of the protein kinase. This result confirms that the phosphorylation of the AtIre1-2-GST fusion protein was caused by the intrinsic kinase activity of the protein and not due to a contaminating kinase. Using a yeast two-hybrid system, Welihinda and Kaufman (1996) demonstrated that yeast Ire1p forms oligomers and that oligomer formation is a prerequisite for activation of the kinase. Whereas we do not show that oligomer formation is required for kinase activity, GST is known to form dimers in nature, and the phosphorylation results described here with the chimeric protein parallel those observed with yeast Ire1p. It is therefore likely that AtIre1 proteins also form dimers in vivo. Sensing Unfolded Proteins The AtIre1 amino acid sequences we describe here have the typical tripartite structure of other eukaryotic Ire1 proteins. The N-terminal lumenal domain is thought to be the sensor domain of the protein. To demonstrate this function, several studies have relied on the expression of a chimeric gene in an \u0394ire1 strain of yeast that harbors a single copy of the lacZ gene under the control of the UPR element of the yeast BiP gene (KAR2). Accumulation of \u03b2-galactosidase after treatment with tunicamycin is then a convenient way to measure the UPR. Liu et al. (2000) showed that the N-terminal domains of human, mouse, and C. elegans Ire1 linked to the transmembrane and C-terminal portions of yeast IRE1 could drive \u03b2-galactosidase expression in a \u0394ire1 yeast strain treated with tunicamycin. Our results (Fig. 5) similarly show that the sensor domains of AtIre1-1 and AtIre1-2 in chimeric constructs with the C-terminal portion of yeast IRE1, induce \u03b2-galactosidase when the complemented \u0394ire1 strain is treated with tunicamycin. A similar approach was used by Bertolotti et al. (2000) to show the functional equivalence of the lumenal domains of the mammalian Ire1p and PERK transmembrane protein kinases. But how does Ire1 sense the presence of unfolded proteins in the ER? Indirect observations suggest that unfolded proteins are not sensed directly, but indirectly through the level of free BiP. For example, cells that overexpress Kar2p\/BiP respond less well to ER stress (Dorner et al., 1992; Kohno et al., 1993). In mammalian cells, BiP was found to be associated with both IRE1 and PERK (Bertolotti et al., 2000), the two proteins involved in sensing ER stress. Recent experiments show that in yeast, in the absence of stress, BiP\/Kar2p binds to the lumenal domain of Ire1p and keeps this protein in an inactive unphosphorylated state. Stress results in the release of BiP\/Kar2p from Ire1p and activation of Ire1p and the UPR pathway (Okamura et al., 2000). In tobacco, overexpression of BiP also alleviates ER stress (Leborgne-Castel et al., 1999); therefore, a similar regulation mechanism might be conserved in plants. What Is the Function of the Two AtIre1 Genes? Like humans, Arabidopsis has two putative AtIre1 genes, although yeast has only one. The yeast UPR is a linear pathway, but the mammalian UPR is more complex with diversity of downstream signals (Urano et al., 2000a). When overexpressed, either mammalian gene (human Ire1\u03b1 or mouse Ire1\u03b2) can activate the BiP promoter, as does overexpression of the yeast gene in yeast, suggesting that this portion of the role of Ire1 is conserved between yeast and mammals (Tirasophon et al., 1998; Wang et al., 1998). We were unable to overexpress the AtIre1 genes in Arabidopsis. That is, when plants transformed with a CaMV35S::AtIre1-1 or AtIre1-2 were tested they were found to have normal levels of AtIre1 transcripts. BiP genes were not overexpressed in those plants. We postulate that the gene product down-regulates the expression of the introduced genes. The two genes are differentially expressed in Arabidopsis. In mammals also, Ire1\u03b1 (Tirasophon et al., 1998) is ubiquitously expressed, whereas Ire1\u03b2 is expressed only in gastrointestinal epithelial cells (Urano et al., 2000b). In this study, we dealt primarily with that aspect of the UPR that concerns the induction of chaperones. However, the UPR has two components: up-regulation of chaperone genes and attenuation of translation. In mammalian cells, the attenuation of protein synthesis in response to ER stress in mediated by the protein PERK, another ER stress sensor protein (Harding et al., 2000). An exhaustive search of the Arabidopsis database did not reveal any PERK homologs. Iwawaki et al. (2001) recently found that in human cells IRE1\u03b2 signals the attenuation of protein synthesis during ER stress. Whether in plants the Ire1 proteins signal an attenuation of protein synthesis remains to be examined. It is also possible that in the course of evolution these ER-located protein kinases assumed an entirely different function, unrelated to the UPR. Sterile seeds of Arabidopsis (ecotype Columbia) were germinated in one-half-strength Murashige and Skoog medium containing 1% (w\/v) Suc and further cultured in the light\/dark cycle of 16 h of light and 8 h of darkness with gentle shaking. Two-week-old plantlets were treated with tunicamycin, which was added to the culture medium at final concentration of 5 \u03bcg mL\u22121. Non-sterile seeds growing in soil for 4 weeks were used for stable transformations. The tobacco (Nicotiana tabacum) cell line BY-2 was used in stable transformation assays for heterologous expression of chimeric AtIre1-GFP fusion proteins. The BY-2 cells were maintained and subcultured by 1:30 dilution in growth medium (Murashige and Skoog salts medium at pH 5.7 supplemented with 3% [w\/v] Suc, 0.1 g L\u22121 myoinositol, 1 mg L\u22121thiamine, 0.18 g L\u22121 KH2PO4, 2 \u03bcm 2,4-dichlorophenoxyacetic acid, and suitable antibiotic) at 24\u00b0C in darkness and shaken at 113 rpm. RNA Preparation and Northern Analysis For northern analysis, total RNA was isolated (Koizumi et al., 1999), fractionated by agarose gel electrophoresis, and transferred to a nylon membrane. The membrane was probed with32P-labeled cDNAs of BiP (Koizumi, 1996), PDI, calnexin (Huang et al., 1993), and calreticulin-1 and -2 (Nelson et al., 1997). cDNAs of calnexin and PDI were amplified by RT-PCR with primers CN-1 (ATGAGACAACGGCAACTATTTTCC) and CN-2 (AAGACAAAAATTTCTCAAACTTGG), and primer PDI-1 (CTCGTGAAGCTGAGGGTATTG) and PDI-2 (AAGATTGGAGCAAGCTTTGG), respectively. Calreticulin cDNAs was a generous gift of Dr. Donald E. Nelson (University of Arizona, Tucson). Hybridization was carried out as described previously (Koizumi et al., 1999). For detection of Ire1 homologs, poly(A+) RNA was prepared using PolyATtract mRNA isolation system (Promega Corporation, Madison, WI) according to the manufacturer's instructions, and subjected to northern analysis. Isolation of Promoters and cDNAs Encoding Ire1 Homologs To isolate the full coding region of AtIre1-1 cDNA, RT-PCR was carried out with primer 1-a (AAAGCGATGAGAGGATCTGC) and primer 1-b (GAAGAAAAGAATCCTAGAATACAGTGG). A specific PCR product, approximately 3 kb in length, was cloned into the plasmid vector pCR 2.1-TOPO (Invitrogen, Carlsbad, CA). For AtIre1-2, RT-PCR was carried out using primer 2-a (CGTTTGTTAAACCCACACCC) and 2-b (TGAACTTGAATTTCCGGAGG) to amplify an approximately 0.4-kb fragment. This fragment was used as a probe to screen a cDNA library constructed in HybirZAP-2.1 (Stratagene, La Jolla, CA), and nearly full-length cDNA was isolated. Finally, primer 2-c (ATGCCGCCGAGATGTCCTTTCC) and 2-b were used to amplify a full-length cDNA encoding AtIre1-2. This PCR product was also cloned into pCR 2.1-TOPO vector. Nucleotide sequences of both cDNAs were determined by DNA sequencing using synthetic primers. AtIre1 promoters were amplified by PCR using forward primers at positions \u22121,996 bp for AtIre1-1 and \u22121,994 bp for AtIre1-2 and reverse primers at the initiation codon of both genes. PCR products were cloned into the plasmid pCR2.1-TOPO (Invitrogen). DNA sequences were confirmed. To make transcriptional fusions with GUS gene, the 35S promoter of pBl121 was substituted by either AtiIre1-1 promoter (vector called pbinAtIre1-1p::GUS) or AtIre1-2 promoter (vector called pbinAtIre1-2p::GUS). To make the fusions with GFP, AtIre1-1, AtIre1-1(K487A), AtIre1-2, and AtIre1-2(K442A) cDNAs were translationally fused to the 5\u2032 end of GFP by recombinant PCR. The GFP gene was a gift of Dr. Yasuo Niwa (University of Shizuoka, Japan; Chiu et al., 1996). Amplified transgenes and control of the GFP gene alone were introduced into the pCR2.1-TOPO. All constructs were confirmed by DNA sequencing. For stable expression in BY2 cells, theSpeI\/XhoI restriction fragment from the pCR2.1 constructs carrying the GFP gene by itself, the AtIre1-1::GFP and the AtIre1-1(K487A)::GFP transgenes, and the AvrII\/XhoI restriction fragments from the AtIre1-2::GFP and the AtIre1-2(K442A)::GFP transgenes were inserted in the plant expression vector pIG121-Hm (a gift from Kenzo Nakamura, Nagoya University, Japan) by substitution of theXbaI\/XhoI fragment. This expression vector contains the CaMV 35S promoter and the nos3\u2032-polyadenylation tail in an expression cassette that permits two selection options: hygromycin and kanamycin. The GFP-KDEL gene containing plasmid, pER-GFP, was provided by Dr. Dolors Ludevid (Consejo Superior de Investigaciones Cientificas, Barcelona), and the BY-2 cells expressing the soybean (Glycine max) \u03b1-1-2 mannosidase I-GFP Golgi marker was provided by Dr. Andrew Staehelin (University of Colorado, Boulder). Genomic Southern Analysis A part of AtIre1-1 encoding C-terminal portion amplified with primer 1-c (CGAGAGCACAAGATGTTATGC) and primer 1-b was used as a probe to detect AtIre1-1. For AtIre1-2, the PCR fragment obtained with primer 2-a and 2-b was used as well. Genomic DNA of Arabidopsis was prepared as described previously (Koizumi et al., 1999), digested with appropriate restriction enzymes, and subjected to Southern hybridization using the probes mentioned above. Transformation Procedures To generate transgenic BY-2 cells expressing the GFP fusions, all the GFP constructs were transferred toAgrobacterium tumefaciens AGL-O following the method described by Lazo et al. (1991). Absorbance (0.9) of an overnightA. tumefaciens culture was used to transform 5 mL of a 4-d-old BY-2 cell culture previously diluted once in fresh growth medium. After 2 d of incubation at 26\u00b0C in darkness, BY-2 cells were washed five times with growth medium containing 100 mg L\u22121 kanamycin and 500 mg L\u22121 carbenicillin. Cells were plated in presence of kanamycin and carbenicillin at the same concentrations and incubated in darkness at 26\u00b0C. Calli resistant to kanamycin formed after 3 weeks of selection and were then moved to fresh plates monthly. Callus cells were resuspended in fresh growth medium before examination with an epifluorescence microscope. Transgenic Arabidopsis plants expressing GUS protein under the regulation of either of the AtIre1 promoters were produced by infiltration (Clough and Bent, 1998) in 200 mL of A. tumefaciens AGL-O containing the binary vector pbinAtIre1-1p::GUS or pbinAtIre1-2p::GUS. Seeds from infiltrated plants were collected and the seedlings selected on kanamycin. Isolation of Nuclei BY-2 protoplasts were prepared from 2-week-old calli. BY-2 cells were incubated with growth medium plus 5.41% (w\/v) betaine, 1% (w\/v) cellulase, 0.5% (w\/v) macerozyme, and 0.1% (w\/v) bovine serum albumin Fraction V for 5 h at 26\u00b0C in darkness. Protoplasts were sedimented at 50 g during 4 min and washed twice with growth medium with betaine. The pellet was resuspended in NI buffer supplemented with the following protease inhibitors: 0.4 mmphenylmethylsulfonyl fluoride, 5 \u03bcg mL\u22121 aprotinin, 5 \u03bcg mL\u22121 pepstatin A, and 5 \u03bcg mL\u22121leupeptin. The NI buffer contains 10 mm MES [2-(N-morpholino)-ethanesulfonic acid], 0.2m Suc, 10 mm NaCl, 10 mm KCl, 2.5 mm EDTA, 2.5 mm dithiothreitol, 0.1 mm Spermine, and 0.5 mm Spermidine. Protoplasts were disrupted by six passages through a 21-gauge needle on ice. The released nuclei were concentrated on a Percoll step gradient prepared in NI buffer and containing layers of 50% (w\/v) Percoll, 7% (v\/v) Percoll, and sample. The gradient was centrifuged for 10 min at 100g at 4\u00b0C. Purified nuclei at the 50% to 7% (v\/v) Percoll interface were washed three times by a one-tenth dilution with NI buffer plus 20% (v\/v) glycerol. Nuclei were resuspended in fresh NI buffer\/glycerol before examination in the epifluorescence microscope. In Vitro Kinase Assay A part of AtIre1-2, amplified with primer 2-d (GAATTCAAAAAGTTTTCGTCGAGGGG) and primer 2-e (CTCGAGTTAGATGATGTCCCATTTGAAG), was subcloned in pGEX-2T (Amersham-Pharmacia Biotech, Uppsala) with EcoRI andXhoI, yielding a plasmid harboring a fusion protein of GST and the C terminal portion of AtIre1-2 (GST-AtIre2). At the same time, a mutant construct in which Lys-442 was converted to Ala (GST-AtIre2-M) was also made. These plasmids were introduced inEscherichia coli (BL21) and the fusion proteins were induced by addition of IPTG. The fusion proteins were purified with glutathione-Sepharose beads as described previously (Ikeda et al., 1999). Approximately 50 ng of purified proteins were incubated with 0.1 \u03bcCi of [32P]ATP in kinase buffer containing 20 mm sodium phosphate (pH 8.0) and 10 mmMgCl2 in a final volume of 20 \u03bcL at 37\u00b0C for 10 min. The reaction product was fractionated by SDS-PAGE and subjected to autoradiography. Complementation of Yeast (Saccharomyces cerevisiae) ire1 Mutants The \u0394ire1 yeast strain KMY1515 (MAT\u03b1 ura3-52 leu2-3, 112 his3-\u0394200 trp1-\u0394901 \u0394ire1::TRP1 lys2-801::LYS2-UPRE- CYC1-lacZ;Okamura et al., 2000) was transformed with the following plasmids. pRS313, a yeast centromeric plasmid vector (Sikorski and Hieter, 1989), and pR313-IRE1 (Okamura et al., 2000), which contains the yeastIRE1 gene, were used as a negative and a positive control, respectively. To make chimeric constructs, anEcoRI site was introduced after the nucleotide sequence encoding the signal peptide (after Arg-31) and a BamHI site was introduced before the sequence for the transmembrane domain (before Glu-521) of pR313-IRE1. The nucleotide sequences encoding the sensor domain of AtIre1-1 or AtIre1-2 were amplified with primer 1-d (GAATTCGGATCTGAAATCTCCAAGTCC) and 1-e (GGATCCGCTAGCAAAGCCTGCCTGTTTCG) or primer 2-f (GAATTCGGCGGCGCTGCCGACGTAG) and 2-g (GGATCCTCCAAACAAATATGTATATTTCTGC) and replaced with that of yeast Ire1 using EcoRI and BamHI sites obtaining Atire1-ch or Atire2-ch. KMY1515 cells transformed with either of these plasmids were incubated in synthetic dextrose medium (Kaiser et al., 1994) supplemented with uracil (100 mg L\u22121) and His (50 mg L\u22121) at 30\u00b0C with or without tunicamycin. Cells were also used for \u03b2-galactosidase activity assays according to Kaiser et al. (1994). Histochemical Staining Whole transgenic seedlings or organs were treated for 20 min in cold 90% (v\/v) acetone, then washed once with GUS buffer (25 mm sodium phosphate buffer, pH 7, 0.5 mmKFe(CN)2, 0.5 mm KFe(CN)3, and 10 mm EDTA), and incubated overnight with 2 mm5-bromo-4-chloro-3-indolyl \u03b2-d-glucuronide in GUS buffer at 37\u00b0C in the dark. The GUS staining solution was removed, and the tissues were dehydrated by increasing the ethanol concentrations gradually from 70% (v\/v) to absolute ethanol. Samples where visualized in the light microscope. \u21b51 This work has been supported by a grant from the Department of Energy (Office of Energy Biosciences, grant no. DE\u2013FG03\u201386ER13497) to M.J.C., a fellowship from the Ministry of Science and Technology of Spain to I.M.M., and grants from the Research for the Future Program (JSPS\u2013RFTF00L01604) of the Japan Society for the Promotion of Science. \u21b5* Corresponding author; e-mail mchrispeels{at}ucsd.edu; fax 858\u2013534\u20134052. Article, publication date, and citation information can be found atwww.plantphysiol.org\/cgi\/doi\/10.1104\/pp.010636. Received July 18, 2001. Revision received July 27, 2001. Accepted August 16, 2001. Bertolotti A, Zhang YH, Hendershot LM, Harding HP, Ron D (2000) Dynamic interaction of BiP and ER stress transducers in the unfolded-protein response. Nat Cell Biol 2:326\u2013332. Bonifacino JS, Weissman AM (1998) Ubiquitin and the control of protein fate in the secretory and endocytic pathways. Annu Rev Cell Dev Biol 14:19\u201357. Boston RS, Fontes EBP, Shank BB, Wrobel RL (1991) Increased expression of the maize immunoglobulin binding protein homolog B-70 in 3 zein regulatory mutants. Plant Cell 3:497\u2013505. Brostrom CO, Brostrom MA (1998) Regulation of translational initiation during cellular responses to stress. Prog Nucleic Acids Res Mol Biol 58:79\u2013125. Chiu W, Niwa Y, Zeng W, Hirano T, Kobayashi H, Sheen J (1996) Engineered GFP as a vital reporter in plants. Curr Biol 6:325\u2013330. Clough SJ, Bent AF (1998) Floral dip: a simplified method for Agrobacterium-mediated transformation of Arabidopsis thaliana. Plant J 16:735\u2013743. Coleman CE, Clore AM, Ranch JP, Higgins R, Lopes MA, Larkins BA (1997) Expression of a mutant alpha-zein creates the floury2 phenotype in transgenic maize. Proc Natl Acad Sci USA 94:7094\u20137097. Gillikin JW, (1995) A defective signal peptide in the maize high-lysine mutant floury-2. Proc Natl Acad Sci USA 92:6828\u20136831. Cox JS, Shamu CE, Walter P (1993) Transcriptional induction of genes encoding ER resident proteins requires a transmembrane protein kinase. Cell 73:1197\u20131206. Crofts AJ, Leborgne-Castel N, Pesca M, Vitale A, Denecke J (1998) BiP and calreticulin form an abundant complex that is independent of endoplasmic reticulum stress. Plant Cell 10:813\u2013823. D'Amico L, Valsasina B, Daminati MG, Fabbrini MS, Nitti G, Bollini R, Ceriotti A, Vitale A (1992) Bean homologs of the mammalian glucose-related proteins: induction by tunicamycin and interaction with newly synthesized seed storage proteins in the endoplasmic reticulum. Plant J 2:443\u2013455. Denecke J, Carlsson LE, Vidal S, H\u00f6glund AS, Ek B, van Zeijl MJ, Sinjorgo KM, Palva ET (1995) The tobacco homolog of mammalian calreticulin is present in protein complexes in vivo. Plant Cell 3:391\u2013406. Goldman MHS, Demolder J, Seurinck J, Botterman J (1991) The tobacco luminal binding protein is encoded by a multigene family. Plant Cell 3:1025\u20131035. Dorner AJ, Wasley LC, Kaufman RJ (1992) Overexpression of GRP78 mitigates stress induction of glucose regulated proteins and blocks secretion of selective proteins in Chinese hamster ovary cells. EMBO J 11:2583\u20132593. Wrobel RL, Moose SP, O'Brian GR, Wurtzel ET, Boston RS (1991) Characterization of an immunoglobulin binding protein homolog in maize floury-2 endosperm mutant. Plant Cell 3:483\u2013496. Zhang F, Bass HW, Larkins BA, (1997) A defective signal peptide tethers the floury-2 zein to the endoplasmic reticulum membrane. Plant Physiol 114:345\u2013352. Zeng H, (2000) Perk is essential for translational regulation and cell survival during the unfolded protein response. Mol Cell 5:897\u2013904. (1999) Protein translation and folding are coupled by an endoplasmic-reticulum-resident kinase. Nature 397:271\u2013274. Huang L, Franklin AE, Hoffman NE (1993) Primary structure and characterization of an Arabidopsis thaliana calnexin-like protein. J Biol Chem 268:6560\u20136566. Ikeda Y, Koizumi N, Kusano T, Sano H (1999) Sucrose and cytokinin modulation of WPK4, a gene encoding a SNF1-related protein kinase from wheat. Plant Physiol 121:813\u2013820. Iwawaki T, Hosoda A, Okuda T, Kamigori Y, Nomura-Furuwatari C, Kimata Y, Tsuru A, Kohno K (2001) A novel translational control by the ER transmembrane kinase\/ribonuclease IRE1 under ER stress. Nature Cell Biol 3:158\u2013164. Kaiser C, Michaelis S, Mitchell A (1994) Methods in Yeast Genetics: A Cold Spring Harbor Laboratory Course Manual. (Cold Spring Harbor Laboratory Press, Cold Spring Harbor, NY). Kalinski A, Rowley DL, Loer DS, Foley C, Buta G, Herman EM (1995) Binding-protein expression is subjected to temporal, developmental and stress-induced regulation in terminally differentiated soybean organs. Planta 195:611\u2013621. Kaufman R (1999) Stress signaling from the lumen of the endoplasmic reticulum: coordination of gene transcriptional and translational controls. Genes Develop 13:1211\u20131233. Kohno K, Normington K, Sambrook J, Gething MJ, Mori K (1993) The promoter region of the yeast KAR2 (BiP) gene contains a regulatory domain that responds to the presence of unfolded proteins in the endoplasmic reticulum. Mol Cell Biol 13:877\u2013890. Koizumi N (1996) Isolation and responses to stress of a gene that encodes a luminal binding protein in Arabidopsis thaliana. Plant Cell Physiol 37:862\u2013865. Ujino T, Sano H, Chrispeels MJ (1999) Overexpression of a gene that encodes the first enzyme in the biosynthesis of asparagine-linked glycans makes plants resistant to tunicamycin and obviates the tunicamycin-induced unfolded protein response. Plant Physiol 121:353\u2013362. Lazo GR, Stein PA, Ludwig RA (1991) A DNA transformation-competent Arabidopsis genomic library in Agrobacterium. Biotechnology 9:963\u2013967. Jelitto-Van Dooren EPWM, (1999) Overexpression of BiP in tobacco alleviates endoplasmic reticulum"} +{"id":"RedPajamaCommonCrawl.0010","text":"\u4e0a\u6d77419\u8bba\u575b,\u7231\u4e0a\u6d77,\u4e0a\u6d77\u9f99\u51e4419 \u2013 Powered by Anouk Declan! Leave a Comment on Turkey removes central bank governor appoints deputy Official gazette Turkey removes central bank governor appoints deputy Official gazette Top News Turkey central bank governor Murat Cetinkaya. (Reuters)Turkey removed its central bank governor early on Saturday and replaced him with the bank's deputy governor, a presidential decree published on the official gazette showed.Murat Cetinkaya was removed from the governor role and was replaced by Murat Uysal, who was serving as his deputy, the order showed. Karnataka trust vote today: Speaker's call on resignations, says SC, but gives rebel MLAs a shield After Masood Azhar blacklisting, more isolation for Pakistan By Reuters |Ankara | Published: July 6, 2019 9:36:05 am Cabinet asks finance panel to consider securing funds for defence Post Comment(s) read more Leave a Comment on EU slaps sanctions on Turkey over gas drilling off Cyprus EU slaps sanctions on Turkey over gas drilling off Cyprus NRC deadline approaching, families stranded in Assam floods stay home More Explained Best Of Express Post Comment(s) Related News The EU ministers repeated the \"serious immediate negative impact\" that Turkey's illegal actions are having on EU-Turkey relations and called on Ankara to respect Cyprus' sovereign rights in line with international law. (REUTERS)European Union foreign ministers on Monday turned up the pressure on Turkey after approving an initial batch of sanctions against the country over its drilling for gas in waters where EU member Cyprus has exclusive economic rights. Meanwhile, Cyprus' Greek Cypriot President Nicos Anastasiades will chair a meeting of political leaders Tuesday to discuss a renewed proposal by Turkish Cypriot leader Mustafa AKinci to establish a joint committee with Greek Cypriots on managing offshore gas drilling activities.Akinci has repeatedly called for the creation of such a committee that he says would give his community a say in how newly found gas deposits off Cyprus' southern coast are managed and future proceeds are divvied up. A similar proposal was made by Akinci's predecessor Dervis Eroglu in 2011. The ministers said in a statement that in light of Turkey's \"continued and new illegal drilling activities,\" they were suspending talks on an air transport agreement and would call on the European Investment Bank to \"review\" it's lending to the country.They also backed a proposal by the EU's executive branch to reduce financial assistance to Turkey for next year. The ministers warned that additional \"targeted measures\" were being worked on to penalize Turkey, which started negotiations to join the EU in 2005.Turkey's Foreign Minister Mevlut Cavusoglu issued his own warning last week that his country would step up drilling activities off Cyprus if the EU moved ahead with sanctions. Advertising Europe should brace for US tariffs on several fronts, says German official The Cypriot government says energy discussions with Turkish Cypriots should be part of overarching reunification talks, adding that Turkish Cypriot rights to the island's energy reserves are assured. The government says future gas proceeds that will flow into an established hydrocarbons fund will be shared equitably after a peace deal is signed. Explained: The Hague rules on Kulbhushan Jadhav today EU Parliament to elect its president on July 3 in any case: Spokesman Two Turkish vessels escorted by warships are drilling for gas on either end of ethnically divided Cyprus.The EU ministers repeated the \"serious immediate negative impact\" that Turkey's illegal actions are having on EU-Turkey relations and called on Ankara to respect Cyprus' sovereign rights in line with international law.They also welcomed the Cypriot government's invitation to Turkey to negotiate the borders of their respective exclusive economic zones and continental shelf.Turkey doesn't recognize Cyprus as a state and claims 44% of Cyprus' exclusive economic zone as its own, according to Cyprus government officials. Turkish Cypriots in the east Mediterranean island nation's breakaway north claim another 25%. Cyprus was split along ethnic lines in 1974 when Turkey invaded in the wake of a coup by supporters of union with Greece. A Turkish Cypriot declaration of independence is recognized only by Turkey, which keeps more than 35,000 troops in the breakaway north. Cyprus joined the EU in 2004, but only the internationally recognized south enjoys full membership benefits.Turkey contends that it's protecting its rights and those of Turkish Cypriots to the area's hydrocarbon deposits. Cypriot officials, however, accuse Turkey of using the minority Turkish Cypriots in order to pursue its goal of exerting control over the eastern Mediterranean region.The Cypriot government says it will take legal action against any oil and gas companies supporting Turkish vessels in any repeat attempt to drill for gas. Cyprus has already issued around 20 international arrest warrants against three international companies assisting one of the two Turkish vessels now drilling 42 miles (68 kilometers) off the island's west coast.The Cyprus government has licensed energy companies including ExxonMobil, France's Total and Italy's Eni to carry out gas drilling in blocks, or areas, off the island's southern coastline. At least three significant gas deposits have so far been discovered there. By AP |Brussels | Published: July 16, 2019 7:31:13 am Explained: Kulbhushan Jadhav case file Advertising Advertising Former UK PM Major vows legal action to block suspension of parliament Karnataka: Supreme Court to rule today, says Speaker's powers need relook read more Leave a Comment on More people show interest in getting their DNA tested finds new poll More people show interest in getting their DNA tested finds new poll Reviewed by Alina Shrourou, B.Sc. (Editor)Oct 1 2018Only a small percentage of people in their 50s and early 60s have had their DNA tested \u2013 either for medical reasons, to learn their ancestry or out of curiosity \u2013 but far more have an interest in getting such tests done, according to a new poll.One in 10 have taken genetic tests offered directly to consumers, and one in 20 have taken genetic tests ordered by a doctor, according to new findings from the National Poll on Healthy Aging. More than half expressed interest in getting DNA tests to guide medical care, understand health risks or know their ancestry.Still, the poll finds, that desire to know more about their risk of disease or heritage comes with a grain of salt. Two thirds of those polled said they thought genetic testing could lead them to worry too much about their future health.The poll of 993 adults between the ages of 50 and 64 was conducted by the University of Michigan Institute for Healthcare Policy and Innovation, and sponsored by AARP and Michigan Medicine, U-M's academic medical center.It comes at a time when the U.S. Food and Drug Administration has approved several disease-specific tests to be marketed directly to the public, instead of requiring a physician to order them.The poll also asked respondents their interest in testing to learn their genetic risk for three later-life disorders: Alzheimer's disease, Parkinson's disease or macular degeneration. Around two-thirds had at least some interest in each test.Scott Roberts, Ph.D., a professor from the U-M School of Public Health who has studied use of genetic testing, including direct-to-consumer testing, worked on the poll's design and analysis. He notes that even those who get direct-to-consumer genetic tests mainly to learn about their ancestral heritage could end up being \"blindsided\" by findings showing that they have a high risk of diseases such as Alzheimer's.\"Compared to previous findings in the general adult population, this age group appears to be a little more lukewarm about their views of the benefits versus the risks of genetic testing overall,\" he says. \"The majority said they might be interested in knowing their risk for specific conditions, but on other hand they were worried about potential psychological distress from the results.\"Roberts points out that the accuracy of any genetic test is not 100 percent. He also notes that testing ordered by physicians often comes with a chance to meet with a genetic counselor \u2013 a specially trained clinician who can help patients decide whether to get tested, prepare them for handling the results, and help them understand what the results do and don't mean.By contrast, direct-to-consumer testing often comes with none of these services, and individuals who buy DNA tests directly may encounter difficulty in interpreting them, or getting access to a genetic counselor after they receive their results. Genetic counselors are already in high demand for clinical cases, and their appointment times are prioritized for those who have a clinical reason for DNA testing, including family history of a serious genetic illness.Related StoriesPopulation-scale DNA test could make personalized medicine effective and affordable for allResearchers develop DNA nanorobots that target breast cancer cellsArtificial DNA can help release active ingredients from drugs in sequence\"Patients may not think about the downstream effects of direct-to-consumer genetic testing. An unexpected positive result may lead to several additional tests that may or may not be covered by insurance,\" says Preeti Malani, M.D., director of the poll and a professor of internal medicine at the U-M Medical School who has special training in geriatric medicine.Experience with testingThe five percent of the poll respondents who had already had a genetic test ordered by their physician said it was done either because the physician suggested it or because they had wanted to find out more about their risk of disease or how best to manage a current condition.Ten percent had had a direct-to-consumer test. More than 70 percent of them said they were interested in learning more about their ancestry, and just under half said they were just curious about their genetic make-up. Just over one in 10 said they got tested to find out more about their health in general, or their risk of a particular disease.Combining the two types of genetic testing, 14 percent had had either kind.\"We're living in an era when advances like DNA testing are providing an amazing amount of useful health information,\" says Alison Bryant, Ph.D., senior vice president of research for AARP. \"As genetic testing becomes even more sophisticated and common among older adults, the challenge will be to ensure that people understand the benefits and limitations of these tests.\"Future of genetic testing Roberts, who specializes in genetic testing for Alzheimer's disease, notes that 70 percent of poll respondents had an interest in learning their Alzheimer's risk.Newer clinical trials of drugs that aim to prevent, delay or slow progression of memory loss and other cognitive problems are actually looking to enroll people who have a higher-than-usual genetic risk of Alzheimer's. So those who elect to buy such a test, or whose doctors order one for them because of family history, may now have an action they can take based on their results.\"Before, there wasn't much we could recommend, but now there are more research opportunities to take part in, and we know more about health behaviors earlier in life that can affect the risk of Alzheimer's and other forms of dementia later in life,\" he says.Poll respondents seemed to understand how genetic testing provides a potential window into the future, both for their own health risks (90 percent agreed with this idea) or for those of their children and grandchildren (86 percent). But 41 percent said that a genetic test wasn't necessary if they already know what disease risks run in their family.The poll results are based on answers from a nationally representative sample of 993 people ages 50 to 64. The poll respondents answered a wide range of questions online. Questions were written, and data interpreted and compiled, by the IHPI team. Laptops and Internet access were provided to poll respondents who did not already have it.\u200b Source:http:\/\/www.med.umich.edu\/ read more Leave a Comment on Star Explorer Mae Jemison The Sky Connects Us Star Explorer Mae Jemison The Sky Connects Us Dr. Mae Jemison and I have a few things in common. We both grew up in houses that had scary basements with cobwebs, coal bins and wringer washing machines. We both wore out our Chicago Public Library cards. We both were tormented by siblings but taught by our parents to stick up for each other, which we did. I memorized the soundtrack of West Side Story word-for-word; Jemison danced in a production of the show.The list of similarities doesn't stretch too long, however. She was a skinny black girl who lived on the South side, and I was a chubby white girl who lived on the North side. Not to knock my own accomplishments, but I didn't graduate from high school at 15, as Jemison did, or go on to earn an engineering degree from Stanford, or a medical degree from Cornell.I didn't serve in the Peace Corps in Sierra Leone and Liberia, or work as a doctor in a Cambodian refugee camp.You won't find my likeness on a LEGO figurine meant to inspire children because I didn't become an astronaut. I liked thinking about space, but Jemison went there \u2014 and she was the first woman of color who did. To say that there just isn't another Earthling like Mae Jemison is not an overstatement.Jemison has served on numerous boards and task forces. She founded a consulting company and a science camp. She's been named to the National Women's Hall of Fame, the National Medical Association Hall of Fame, the Texas Science Hall of Fame, and the International Space Hall of Fame. She has received the National Organization for Women's Intrepid Award, and many other awards and honors.I recently had the opportunity to speak with her, and although she shared some illuminating recollections of her mission on the Space Shuttle Endeavour in 1992, her experiences as an astronaut were neither the starting point nor the ending point of our conversation. This extraordinary woman's career is too packed with present and future endeavors to dwell very long on her stellar past.She currently leads 100 Year Starship, a nonprofit initiative to build a foundation for interstellar travel within the next hundred years.Jemison also leads Look Up, a movement that encourages people to connect with the sky above us on one day each year. Participants collaborate on weaving a global tapestry of Skyfies \u2014 sky selfies \u2014 accompanied by reflections on their feelings, thoughts, hopes and needs as they look up. This year's Look Up day was Oct. 18. Alternative Adventures Space Settlements One of Jemison's current passions, Look Up, began with a conversation she had with LeVar Burton and Jill Tarter following a South by Southwest panel discussion a few years back. Burton and Tarter are both on the 100 Year Starship advisory board.Burton is famous for his portrayals of Geordi La Forge in Star Trek and Kunta Kinte in Roots, among many other acting credits. He's also well known as the host of the long-running educational program, Reading Rainbow.Astronomer Jill Tarter, cofounder of the SETI Institute, is a pioneer in the search for extraterrestrial intelligence. Carl Sagan's novel Contact and the film based on it feature a protagonist whose character is informed by Tarter's work.That pivotal conversation involving Jemison, Burton and Tarter centered on how to connect people to space.\"We were really working very hard on that,\" Jemison recalled, \"so we actually thought that in some kind of way we have to get back to folks thinking about the world as connected. And in fact, Jill talked about the fact that if we don't consider ourselves as 'Earthlings' \u2026 that's a major concern. All the work that I've ever done, since I've come out of NASA, is really about 'how do we connect with each other on this planet?'\"That conversation led to Look Up.\"One of the things we have to do is understand that we're inextricably connected to this planet,\" said Jemison. \"Our biology, our rhythms, our cycles, our knowledge is connected to this planet. Yet at the same time we're connected to each other across this planet and the greater universe. So it was really, how do we get this sense of being? The sky is one of those things that's a transition point. You know, it connects us. What if one day we just stopped looking down, and we looked up?\" In the Library Look Up Not Lost in Space Though Jemison's path has been far different from mine, our conversation started with an important influence in both of our young lives: many hours spent in libraries, making discoveries and imagining possibilities. Jemison shared her concern that the search engines we now rely on eliminate a crucial part of learning that can take place only in the presence of physical books on shelves.\"I remember as a little kid \u2014 six years old, seven years old \u2014 going with my brother and sister and mother to the library, and there's something that's very special about being there with other people,\" she recalled. \"You really get to search through books and things that are adjacent on this side or on that side, and get to walk through rows and see all of these ideas. And it's a little bit different \u2014 in fact, I think it's quite different \u2014 than where the search engines are taking us these days, where search engines take you to places that they want you to see, based on their algorithms, based on their idea of 'Did I make a profit off of this or not? Did I get paid for it?'\"That's a very, very different experience, and it's a very truncated experience,\" Jemison said.Even now, when she's engaged in research, some of the most fundamental things happen when she starts looking for material and finds books or research articles adjacent to the volume she was looking for, she pointed out. It's a fundamentally different process from being directed by a search engine to see what it wants you to see.Jemison is an advocate of reading as a way to explore with your mind and \"create the footpath\" toward achieving goals. Allowing scope for the imagination is critical to children's learning, she said.\"People always say, 'well the kid plays with the box instead of the toy,' right? It's because sometimes the [toy] is too concrete,\" Jemison explained. \"And these days we have these experiences that are so concrete that it doesn't challenge the individual to think about the world and to explore possibilities. I mean, I'm not saying it's not important to have concrete ideas, and be very disciplined and know there's factual things and all of that \u2014 but there's also a different part of play, which allows you to expand and try new avenues.\" We all can heed Jemison's call to look up, but very few of us can travel to where she's been. I asked her how actually being in space changed her thinking.\"I'm going to get rid of the overview effect real quick,\" she said. \"The overview effect where people say, you know, astronauts look down and 'everything important to me in the entire universe is on this planet.' And that I realized that there were no borders \u2014 there's this whole mantra about that.\"That didn't happen to me. I never thought that,\" Jemison continued. \"I never just thought that the Earth was the center of the universe \u2014 I don't think it now. I never thought that those borders that people draw on maps actually existed. I knew that those are constructs they had in their mind. I never believed that people were that fundamentally different from one to the other.\"What being in space did do for her, she said, \"was it confirmed something that I've always believed \u2014 that the Earth will be here. We may not. You know, when you see this thin shimmering layer of blue light that's our atmosphere, you recognize that we don't have to be here. This planet that offers us so much \u2014 it will be here, but humans don't have to be here. We just have way too much hubris in thinking that we can exist without the Earth. We can not.\"Now, the other thing I felt is that I felt very connected with the rest of the universe,\" Jemison said. \"That was maybe the pivotal moment for me. I was thinking, would I feel lost? But I could imagine myself in a star system 10,000 light years away, and I felt connected. And that was like fundamental \u2014 that connection.\"Was there ever a moment in her life as an astronaut, I wondered, when she was out there in space, when she felt fear?\"I actually tried to make myself afraid while I was up,\" Jemison said. \"I did\u2026 because I was feeling way too jazzy. Way too mellow, right? And I couldn't, because I really felt that connection. It was as though everything was OK. I was connected.\"It was calm, and it was very centered, and you could deal with lots of things,\" she recalled. One of those things was that \"the world lives on, but I should always be prepared to die. Not to be here. And what would I want to be like at that time?\"Jemison was in the first class of astronauts after the Challenger accident, and she noted in what I viewed as a considerable understatement, that she had done things that were not risk-free prior to ever joining the astronauts. She worked as a doctor in a Cambodian refugee camp while in the Peace Corps, to cite just one example.\"You know, it was a matter of steadying yourself and feeling very comfortable about things,\" she said. I asked Jemison about the future of human space exploration, and though she firmly rejected the use of the word \"colony\" to describe any settlements that might result, she did say she knew that we could do it, depending on our commitment.\"What it would be like depends very much on who's involved,\" she said. \"So my big task with space exploration has been to get more people involved. And my big task in science has been 'how do we get more people involved?' In fact, the proposal for 100 Year Starship was 'An Inclusive Audacious Journey Transforms Life Here on Earth & Beyond.' The first word is 'inclusive' because I think we come up with the best solutions and the best possibilities when we have more perspectives on board.\"I wondered whether a continuing commitment to work on 100 Year Starship and other paths to advance space exploration might help solve some of planet Earth's most pressing problems.\"For 100 Year Starship \u2026 the way we look at it is that most of the major problems we have to solve very much mirror the challenges that we face on this starship \u2014 that we face on Earth today,\" Jemison said. It's crucial to bring in a variety of people, she pointed out \u2014 social scientists, physicists, material scientists, artists, storytellers.\"Pursuing the extraordinary gives us something that we can build on today,\" she continued, \"and the other part of this is that people need an adrenaline rush. We need adrenaline as humans. And right now, all of our adrenaline \u2014 so much of our adrenaline \u2014 is being generated by fear and war. Those things are not really going to hold you in good stead in the long run, but they're an easy way to generate adrenaline.\"Because in addition to all of her other many roles, Jemison has been a dancer and an actor and a writer, I asked what she thought about the importance of melding the arts and humanities with science.\"They're all part of being human,\" she said. \"We see colors, we feel, we think. Anyone who tells you that science isn't emotional is a liar. Science is creative. There's some objectivity to it. I mean, we can look at the social sciences with some objectivity as well, right? But the reality is that what we choose to research and study is very emotionally connected. You know, the solutions that we look at many times are generated from our cultural background \u2014 generated from our experiences, which is part of our culture, right? And so\u2026 all of it\u2026 if we don't recognize that, then we fail to come up with the kinds of solutions that make a difference.\"The perception that scientists are neither creative nor intuitive is a fallacy, Jemison said.\"They certainly are as well, and they use that to a large extent. And that's the same thing with art and, I always remind people, with social sciences, which are really hard. Because if we think of the sciences as only the best and the purest are things that we can quantify easily\u2026 eh\u2026 it's hard to do social sciences,\" she pointed out.\"Clearly, to be human, to be part of this universe, there's this wealth and this range of ways we interact and ways we think we know things,\" Jemison said, \"and to ignore any of those is to ignore a major part of the universe and our capacity to interact with it.\" Although most of us won't get to venture where Jemison has gone, we can get a taste of experiences that otherwise would be inaccessible to us through technology \u2014 virtual and augmented reality, for example.Jemison recently took part in Defying Gravity: Women in Space, a mixed-reality experience brought to life through Microsoft's HoloLens. I asked her about the usefulness of virtual and augmented reality.One thing she worries about, she said, is \"people not being freed up to use their imagination enough. So that they exercise their brain cells, right? To come up with new things \u2014 or to come up with other perceptions. So I think virtual reality and augmented reality allow you to maybe explore and walk around something that you wouldn't be able to. And if you feel like you're physically there, what does that capture for you? That could be really exciting.\"She recalled visiting the Museum of Science and Industry in Chicago, when she was a young girl.\"There was this exhibit \u2026 I think it was the street of yesteryear or something. It was like a turn-of-the-century street with cobblestones and silent movies and all of that. I was just absolutely fascinated by it, because it was sort of like, now I have to stop and think, what might life have been like then? What could you do? So augmented reality could bring us that as well \u2014 as long as we encourage folks to think beyond that, not just to walk through it. So I think there's some really powerful pieces to it.\" Although it's still a nascent movement, Look Up picked up some steam this year. For the first time, participants could contribute their own sky images and messages using the new mobile Skyfie app. They were able to upload them to a global tapestry and then \"spin the globe\" to see what others were seeing and thinking.People stayed on the app, which was introduced just in time for Look Up's designated 24-hour period, for 10-15 minutes, Jemison noted. There were contributions from every continent.Pondering the theme of connections that Jemison emphasized so strongly, I wondered about her use of the word \"Earthlings\" rather than, say, \"humans.\"\"Well, you know Jill came up with it\" as a way to counter the human tendency to separate, she said. \"So the plants are Earthlings, the microbes are Earthlings, my cat is an Earthling. We're all tied together.\"Jemison recalled a conversation she had with a group of students on Oct. 18 \u2014 Look Up day.\"We were talking about Earthlings, and if you went to Mars, would you be a Martian? And they said, 'No, you're still sort of an Earthling, but you're a human-ling.' You know, you don't change \u2014 you're still connected.\"Those connections that can be felt so strongly when we look up at the sky can have a powerful influence on the world beneath our feet. With all of the knowledge and the capabilities we have, how does an organization like the United Nations, for example, push for sustainability goals?\"How do we get clean water to everyone, and those kinds of things? We already know how to do this,\" Jemison said.\"We have the capacity to feed everyone on this planet, right? \u2026 We have the capacity to educate all children. All of those things are possible. That doesn't mean we can't go to space. We can do all of this without sacrificing quality of life from one society to another. \"But part of the issue is really we don't \u2014 we don't care about other folks.\"I suggested that we don't think of ourselves as planetary citizens. We think about little divisions and disagreements, instead of thinking in terms of how we can solve problems as a unified people.\"Nature connects us,\" Jemison laughed. \"It really doesn't give a damn about those ideas that we come up with \u2014 those divisions and things. It really doesn't care. \u2026 When the distractions that separate us\u2026 the noise is louder than ever\u2026 look up at what's common to all of us: the sky, weather, what passes through.\"What's above us unites us,\" she continued. \"That's the sky, if we can just start to think that every group of people have looked up at the sky. The African proverb says, 'No one shows a child the sky.' It's something that we do. It's common. The mystery about the stars. What is the sun? \u2026 That people look up with hope. You know, it's almost universal.\" Mick Brady is managing editor of ECT News Network. read more Leave a Comment on Vertex gets European CHMP positive opinion for KALYDECO to treat patients with Vertex gets European CHMP positive opinion for KALYDECO to treat patients with Oct 22 2018Vertex Pharmaceuticals (Europe) Limited today announces that the European Medicines Agency's (EMA) Committee for Medicinal Products for Human Use (CHMP) adopted a positive opinion for KALYDECO\u00ae (ivacaftor) to include the treatment of people with cystic fibrosis (CF) aged 12 to <24 months who have at least one of the following nine mutations in their cystic fibrosis transmembrane conductance regulator (CFTR) gene: G551D, G1244E, G1349D, G178R, G551S, S1251N, S1255P, S549N or S549R.Related StoriesRevolutionary gene replacement surgery restores vision in patients with retinal degenerationEMBL study reveals uncoupling between chromatin topology and gene expressionNew gene-editing protocol allows perfect mutation-effect matchingIf the European Commission issues a favorable adoption of the EMA CHMP opinion for the extension of indication, ivacaftor will be the first and only medicine approved in Europe to treat the underlying cause of CF in patients aged 12 to <24 months, who have specific mutations in the CFTR gene.\"Cystic fibrosis is a chronic, progressive disease that is present at birth, with symptoms often occurring in infancy, so early treatment is crucial to deliver the best possible outcomes for patients,\" said Reshma Kewalramani, MD, Executive Vice President, Global Medicines Development and Medical Affairs and Chief Medical Officer at Vertex. \"Today's announcement marks an important step towards allowing young CF patients to benefit from treatment at an early stage of their disease, and brings us one step closer to our goal of treating all people living with CF.\"The submission was supported by data from the ongoing Phase 3 open-label safety study (ARRIVAL) of children with CF aged 12 to <24 months who have one of 10 mutations in the CFTR gene that demonstrated a safety profile consistent with that observed in previous Phase 3 studies of older children and adults, and improvements in sweat chloride, a key secondary efficacy endpoint.Ivacaftor is already approved in Europe for the treatment of CF in patients aged two years and older who have one of the nine following mutations in the CFTR gene: G551D, G1244E, G1349D, G178R, G551S, S1251N, S1255P, S549N or S549R. It is also approved for the treatment of CF in patients aged 18 years and older who have an R117H mutation in the CFTR gene. Source:https:\/\/www.vrtx.com\/ read more Leave a Comment on Fundamental technology to support early differential diagnosis of concurrent ASD in patients Fundamental technology to support early differential diagnosis of concurrent ASD in patients Source:http:\/\/www.hitachi.com\/ Since analyzing complex signals of optical topography requires expert knowledge and experience, automatic analysis technology that supports general physicians is important for clinical application. Development of the technology using the brain's response to medicine for diagnostic support can also be expected for other diseases and psychotropic drugs. As research progresses, there is a possibility that it will become a mean for selecting the optimal therapeutic agent and behavioral therapy for each individual patient. In the era of our super-aging society, brain and mental diseases, from neurodevelopmental disorders to depression and dementia, are extremely significant social issues. Since the burden of such technology on patients is minimal, social implementation should be accelerated through the promotion of large-scale research.\"Dr. Shigeto Yamawaki, Specially-Appointed Professor of the Center of Brain, Mind and Kansei Sciences Research Center, Hiroshima University, and the former President of the International College of Neuropsychopharmacology. Long term ADHD and ASD in children are thought to lead to refusal to attend school, hikikomori (reclusion from society), depression and other conditions. Differential diagnosis to reveal the presence or absence of symptoms for both illnesses is necessary, as it has been reported that the numbers of patients displaying characteristics of both ADHD and ASD are not small. Further, as determining treatment methods and therapy is a time-consuming process that increases the burden on patients and their families, reducing the time to accurate diagnosis was desired. In March 2018, research led by JMU discovered that it was possible to visualize the presence or not of concurrent ASD by measuring the brain activity patterns of ADHD patients who have no prior history of taking related medication, before and after taking the medication. Based on this finding, an algorithm was developed to automatically analyze whether or not the ADHD patient is concurrently afflicted with ASD.The development process and features of the technology are as follows:Step 1. Measuring brain response after medication1.5 hours after the administration of the sustained release agent methylphenidate hydrochloride, optical topography signals of brain response from 32 ADHD patients with no prior history of taking related medication (11 with concurrent ASD and 21 without concurrent ASD), were measured for 10 minutes while the patients performed a simple cognitive task that involved pressing a button only when specific pictures were displayed on a PC monitor.Step 2. Determining the optimal region for measuring the brain for diagnosisMachine learning was applied to the signals measured in Step 1 and the diagnostic results obtained after several months. The results indicated that using the activation signals from the attention-function-related region (middle frontal gyrus-angular gyrus) and the motor-function-related region (precentral gyrus) were optimal for correctly distinguishing the presence or absence of concurrent ASD. Further, the most accurate classification was obtained by two-dimensionally plotting the quantities of activity signals in the above two related regions and setting appropriate thresholds with ROC curve, respectively.Step 3. Implementing an automatic analysis algorithmThe automatic analysis algorithm was developed by integrating the algorithm for signals from the optimal brain measurement regions found in this development, and the noise reduction algorithm previously published.To evaluate the effectiveness of this technology, cross validation method was used to verify the accuracy in predicting the actual diagnostic result obtained several months later. The evaluation yielded an accuracy of about 82%, indicating that the technology may be a practical candidate as a differential diagnostic support tool for early diagnosis. It is expected that by adding these objective biomarkers, the diagnosis period that begins with doctors issuing questionnaires to families and lasts several months will be dramatically shortened, and consequently, doctors will be able to decide on treatment\/therapy at an early stage and provide families with advice on how to care for the patients.Hitachi, JMU, IUHW and Chuo-U will continue to develop this technology through clinical research, with the aim of realizing a society that supports the healthy development of patients with neurodevelopmental disorders. A part of these results will be published on the Frontier in Human Neuroscience(12) on 8 February 2019. Hitachi is cooperating with the Japan Science and Technology Agency (JST) Research Institute of Science and Technology for Society (RISTEX) Research Program for \"Implementation of Support System for Children with Attention-Deficit Hyperactivity Disorder by Functional Near-Infrared Spectroscopy Diagnostic Method,\" using the automation technology developed to support diagnosis using brain reaction. Process in developing the automatic analysis algorithm Recently, it has been found that the number of children with characteristics of both ADHD and ASD is not few. In other words, it has become necessary to not only distinguish ADHD and ASD from one another, but also determine whether patients are afflicted by both diseases. Determining such has been difficult for doctors who are not well-versed in the clinical practice of neurodevelopmental disorders. This technology is a breakthrough from the viewpoints of assistance in diagnosis through the objective displaying of data that serves as a reference for this difficult judgment, as well as its contribution to helping patients receive appropriate treatment. The significance of the development of technologies for the diagnosis of neurodevelopmental disorder is significant because the diagnosis is largely dependent on the experience of the doctor and the basic idea of this technology that examines differences in brain responses on medications is ingenious. I think that its application to other psychiatric disorders can also be expected in the future. I hope that the research will progress further and become available in the clinical setting.\"Dr. Shinya Miyamoto, Professor at Shirayuri University and Chairman of Japanese Society of Pediatric Psychiatry and Neurology. Feb 13 2019Hitachi, Ltd., Jichi Medical University (JMU), International University of Health and Welfare (IUHW) and Chuo University (Chuo-U) have developed fundamental technology to support the early differential diagnosis of concurrent autism spectrum disorder (ASD) in patients with attention-deficit hyperactivity disorder (ADHD). The technology automatically analyzes the presence or absence of concurrent ASD when an ADHD patient takes their medication for the first time, by using optical topography to measure brain response. The condition can be predicted with a confirmed accuracy of about 82%. Conventionally, differential diagnosis requires follow-up observations spanning several months. This technique demonstrates the possibility of achieving a diagnosis in about 2 hours. Hitachi, JMU, IUHW and Chuo-U will continue to develop this technology through clinical research, with the aim of realizing a society that supports the healthy development of patients with neurodevelopmental disorders. read more Leave a Comment on RCEM issues position statement on metrics to supplement fourhour standard target RCEM issues position statement on metrics to supplement fourhour standard target Source:https:\/\/www.rcem.ac.uk\/RCEM\/News\/News_2019\/_RCEM_release_position_statement_on_metrics_to_supplement_four-hour_target.aspx While we are dismayed by many of the myths being pedaled around the four-hour standard, we are keen to ensure that any changes are not imposed due to political will but are developed responsibly, collaboratively and are based upon clinical expert consensus in the best interests of patients.The measures set out in this document are what we believe are in the best interests of patients and will enhance and refine the four-hour standard as a powerful system measure of flow. These have been developed based on the expert opinion of clinicians working in emergency medicine and are supported by a range of colleagues from other specialties. We also note that the last multidisciplinary evidence-based review in Scotland by Sir Harry Burns in November 2017 clearly stated that the four-hour standard should be retained.We note the Prime Minster made a commitment to involve clinicians in the development of new standards. While we have been disappointed to not have been involved from the outset of this process, and that there has been little clarity around who has been involved, we now look forward to providing our clinical expert advice to NHS England and NHS Improvement to assist them in their review.Only by collaborating and sharing expertise will we be able to develop a suite of additional standards that enhance clinical care and maintain a focus on safety.Robust joint evaluation of any new measures will need to be developed to ensure that any potential change can prove more effective and safer than the existing arrangements before they are adopted.This will allow us then to better understand and find shared solutions to meet the needs of our patients and the staff who have to care for them in an intense healthcare environment. We are pleased to have agreed with NHS England that if we cannot find a better flow metric than the four-hour standard at the end of the evaluation then it should be retained.\" Mar 12 2019The Royal College of Emergency Medicine (RCEM) supports the continued use of the four-hour access standard as a high-level metric to monitor emergency care system performance. However, the problems and care models in Emergency Departments have changed considerably over the last 10 years and it is the College's role to responsibly decide what standards we think usefully inform assurance, improvement efforts and patient safety.As such the Royal College of Emergency Medicine today issues the position statement 'Improving Quality Indicators and System Metrics for Emergency Departments in England'.We have reviewed and discussed a variety of time-based metrics. These should be seen as supporting and refocusing the efforts to monitor system flow which we know is 'mission critical' to safety in Emergency Departments.The College is still very clear that rather than scrapping the four-hour access standard, it should be supported by a series of complementary metrics that help understanding of the causes of long waits and crowding in Emergency Departments.The position statement sets out what the College believes are the best supplementary measures to the four-hour standard that will ensure safety and facilitate the best care possible for patients.President of the Royal College of Emergency Medicine, Dr Taj Hassan said: read more Leave a Comment on New survey indicates need of attention to neglected tropical diseases New survey indicates need of attention to neglected tropical diseases Reviewed by James Ives, M.Psych. (Editor)Mar 22 2019Although neglected diseases account for 11% of the global disease burden, they are targeted by only a small proportion of the new drugs developed every year.Between January 2012 and September 2018, a total of 256 new drugs entered the market, but only eight (3.1%) were designed to treat neglected diseases. This value exceeds the proportion for 1975-99, which was 1.1%, but falls short of the 4.3% mark recorded for 2000-11.The term \"neglected diseases\" refers to malaria, diarrheic diseases, tuberculosis, and 20 neglected tropical diseases recognized by the World Health Organization (WHO), such as dengue, chikungunya, Chagas and leishmaniasis, among others.An up-to-date survey of drugs and vaccines for neglected diseases has been published in The Lancet Infectious Diseases. Signed by two researchers affiliated with the University of S\u00e3o Paulo (USP) in Brazil, it shows that much remains to be done, especially with regard to neglected tropical diseases (NTDs).NTDs were targeted by none of the new chemical entities approved between 2012 and 2018, although two targeted malaria and tuberculosis. The new drugs for tuberculosis (bedaquiline), with a novel action mechanism, and for Plasmodium vivax malaria (tafenoquine) are the first innovations in treatment for their respective targets in the last 40 and 60 years, respectively.\"The other six products registered between 2012 and 2018 for this group of diseases are repurposed drugs, biologicals or new formulations. The repurposed drugs, for example, were used to treat other diseases and have been approved for new clinical uses. None is what we call a new chemical entity, meaning the result of innovation and hence not containing any active molecule previously approved for clinical use,\" said Adriano Andricopulo, a professor at the University of S\u00e3o Paulo's S\u00e3o Carlos Physics Institute (IFSC-USP) and one of the authors of the article.Related StoriesArtificial DNA can help release active ingredients from drugs in sequenceMosquito surveillance in Madagascar reveals new insight into malaria transmissionAMSBIO offers new, best-in-class CAR-T cell range for research and immunotherapyThe other author is Leonardo L. G. Ferreira, who has received a doctoral scholarship and a postdoctoral scholarship from FAPESP.Both scientists are also affiliated with the Center for Research and Innovation in Biodiversity and Drug Discovery (CIBFar), one of the Research, Innovation and Dissemination Centers (RIDCs) funded by FAPESP.The WHO is committed to eliminating epidemics of NTDs by 2030. In addition, the 2012 London Declaration on NTDs established action plans to control, eliminate or eradicate ten NTDs by 2020.\"By incorporating cutting-edge science and technology, drug research and development for neglected diseases have progressed considerably. Nonetheless, a profound gap persists between disease burden and the development of therapeutic assets for such diseases,\" the authors write.However, they note that the list of approved new chemical entities will expand in 2019 with the development of fexinidazole, the most advanced oral drug for human African trypanosomiasis. \"The drug is now being tested for Chagas disease,\" Andricopulo said.Andricopulo is the principal investigator for one of five proposals approved in a call issued by FAPESP with the UK Medical Research Council (MRC) and the Newton Fund for NTD Joint Center Partnerships. Over the next three years, groups led by Andricopulo and Kevin David Read of the University of Dundee's Drug Discovery Unit (DDU) in Scotland will investigate the use of bioactive natural products in the discovery of new drugs to treat leishmaniasis and Chagas. Source:http:\/\/agencia.fapesp.br\/neglected-diseases-continue-to-require-attention-despite-progress\/30049\/ read more Leave a Comment on Baby socks contain traces of bisphenol A and parabens study finds Baby socks contain traces of bisphenol A and parabens study finds Reviewed by James Ives, M.Psych. (Editor)Jun 16 2019A team of scientists from the University of Granada (UGR), the Biohealth Research Institute in Granada (ibs.GRANADA), the city's San Cecilio Clinical Hospital, and the Centre for Biomedical Research in Epidemiology and Public Health (CIBERESP) has found that 9 out of 10 pairs of socks for babies and children from 0-4 years old contain traces of bisphenol A and parabens. The hormonal activities of these two endocrine disruptors have been linked to dysfunctions that can trigger illnesses in both children and adults.This scientific study\u2013the first of its kind to be conducted in Europe\u2013reveals that fabrics can be a source of exposure to endocrine-disrupting chemical pollutants. This is of particular concern in the case of exposure among very young children.The researchers also discovered major differences in the amount of the toxic product detected, depending on the type of outlet selling the socks. Samples of 32 pairs of children's socks (from new-borns to aged 48 months) were analyzed, having been purchased in three different types of retail outlet, classified according to the price range of their products. The three types were: local bargain retailer (three pairs for \u20ac1.50-\u20ac1.80); low-cost, fast-fashion international retailer (three pairs for \u20ac3.00-\u20ac4.50); and a higher-quality international retail clothing brand (three pairs for \u20ac6.95-\u20ac7.95).By using sophisticated analytical chemistry techniques and performing complex biological tests to quantify hormonal activity, the Granada-based researchers studied the presence of the plastic component bisphenol A, the preservatives known as parabens, and the hormonal activity (estrogenicity and androgenicity) of the sock extracts.Local bargain retailer The concentrations of the two chemicals found in the socks sold at the local bargain store in the sample reached a maximum of 3,736 ng of bisphenol A per gram of fabric. This average amount of bisphenol A was more than 25 times higher than that found in the socks sold by the low-cost international retailer and the higher-quality international brand. Parabens were found in all the products studied\u2013in particular ethylparaben, followed by methylparaben\u2013but in average concentrations lower than those of bisphenol A and with less pronounced differences between store type.As was to be expected, given their high bisphenol A content and the presence of parabens, two out of every ten pairs of socks bought at the bargain retailer presented oestrogenic hormonal activity; and one out of every three pairs bought at the same outlet presented anti-androgenic activity in the biological tests conducted. That is to say, the extracts taken from these items of clothing behaved like the female hormone and they antagonised male hormones. Due to this hormonal activity, bisphenols and parabens are endocrine disruptors associated with certain dysfunctions that can lead to illnesses in both children and adults. The spectrum of illnesses associated with exposure to endocrine disruptors is far-reaching, ranging from attention deficits and hyperactivity, to genitourinary disorders, premature secondary sexual development, and obesity in children. Among adults, they are linked to hypothyroidism, infertility, diabetes, and hormone-dependent cancers, such as breast cancer.Related StoriesTen-fold rise in tongue-tie surgery for newborns 'without any real strong data'In secret, seniors discuss 'rational suicide'Opioids are major cause of pregnancy-related deaths in UtahUsing complex algorithms, the researchers also estimated the risk to babies and children of exposure, via the skin, to each of the chemical compounds. The interpretation is not straightforward, as little is known about how, and to what extent, they can be absorbed by the skin, or how much may be released during washing (and, in turn, the possible contamination of the water and thus the other baby items being washed). However, the researchers' main issue of concern is the possible exposure to these chemical compounds contained in clothing via the digestive tract, given how common it is for babies suck their own feet and socks. To address this, the research group has added a further slogan to its public awareness-raising campaign against exposure to endocrine disrupters, in particular alerting parents of small children: \"Socks suck!\"Information campaignThe UGR research group is aiming to inform parents, train physicians and health workers to give timely recommendations, warn manufacturers and importers about the quality of their products, and make national and European governments aware of the"} +{"id":"RedPajamaCommonCrawl.0011","text":"Unconventional protein post-translational modifications: the helmsmen in breast cancer Jiena Liu1 na1, Qin Wang1,2 na1, Yujuan Kang1, Shouping Xu1 & Da Pang ORCID: orcid.org\/0000-0003-2853-41701,3 Breast cancer is the most prevalent malignant tumor and a leading cause of mortality among females worldwide. The tumorigenesis and progression of breast cancer involve complex pathophysiological processes, which may be mediated by post-translational modifications (PTMs) of proteins, stimulated by various genes and signaling pathways. Studies into PTMs have long been dominated by the investigation of protein phosphorylation and histone epigenetic modifications. However, with great advances in proteomic techniques, several other PTMs, such as acetylation, glycosylation, sumoylation, methylation, ubiquitination, citrullination, and palmitoylation have been confirmed in breast cancer. Nevertheless, the mechanisms, effects, and inhibitors of these unconventional PTMs (particularly, the non-histone modifications other than phosphorylation) received comparatively little attention. Therefore, in this review, we illustrate the functions of these PTMs and highlight their impact on the oncogenesis and progression of breast cancer. Identification of novel potential therapeutic drugs targeting PTMs and development of biological markers for the detection of breast cancer would be significantly valuable for the efficient selection of therapeutic regimens and prediction of disease prognosis in patients with breast cancer. Breast cancer is a heterogeneous disease with a high incidence and mortality rate among females worldwide [1, 2]. Although there have been significant advances in the conventional breast cancer treatment involving surgery, radiation, and chemotherapy, many patients develop resistance to these therapies during the course of disease progression, eventually resulting in cancer recurrence and metastasis [3]. Therefore, it is crucial to develop novel therapies for the treatment of breast cancer. Genetic code determines the specific sequence of a protein and whose function can be regulated by different modifications after translation. PTMs are defined as the chemical modifications of a protein that take place after its translation [4]. Protein PTMs increase the diversity of protein by altering their physical and chemical properties, conformation, and binding capacity. It is estimated that 50%-90% of proteins in human body undergo PTMs [5]. Each type of PTMs mainly consists of three components, writers, which add the modifications to the substrates; erasers, which wipe off the modification from the substrates; and readers, which recognize and bind the modified substrates to perform the corresponding biological functions. The writers, readers, and erasers are consisting of various enzymes [6,7,8,9,10]. The processes of PTMs are fine-tuned by thousands of enzymes and whose dysregulation contributes to a variety of pathologies that can be the primary driver of cancer [11,12,13]. Therefore, the study of PTMs is particularly valuable in cases where cancer cells do not differ in the expression or mutational status of a protein in the pathological process. Over the past few decades, due to significant advances in genomic, proteomic, bioinformatics, and mass spectrometric technologies, several enzymes (Additional file 1: Table S1) such as lysine acetyltransferases (KATs), deacetylases (KDACs), protein lysine methyltransferases (PKMTs), protein arginine methyltransferases (PRMTs) and so on that involved in the regulation of PTMs have been discovered in breast cancer [14,15,16,17,18,19,20,21,22]. Furthermore, several proteins (Additional file 1: Table S1) that undergone a series of PTMs, playing significant roles in the etiology of breast cancer, have been identified [14,15,16, 23]. These PTMs, including phosphorylation, ubiquitination, sumoylation, citrullination, acetylation, methylation, glycosylation, and palmitoylation (Fig. 1), take place in numerous proteins to regulate their stability, activity, cellular localization, interaction with other macromolecules, and the cellular response to different stimuli [9, 15, 24, 25]. PTMs have been shown to mediate several cellular pathophysiological processes related to breast cancer [24], such as immune response (Fig. 1A), signal transduction (Fig. 1B), cell proliferation, malignant transformation (Fig. 1C), angiogenesis (Fig. 1D), cell cycle regulation (Fig. 1E), metabolic reprogramming (Fig. 1F), autophagy (Fig. 1G), cell epithelial-mesenchymal transition (EMT) and invasion (Fig. 1H), as well as DNA damage repair (Fig. 1I) and apoptosis (Fig. 1J). Furthermore, several studies have reported that the dysregulation of PTMs plays a crucial role in the onset and progression of breast cancer [14, 19, 23, 26,27,28,29]. However, the exact molecular mechanisms underlying the effects of these abnormal PTMs on the various pathophysiological processes in breast cancer have not yet been extensively studied. Overview of post-translational modifications in breast cancer. LY: Lymphocyte; M: macrophage; DC: dendritic cells; GLUTs: Glucose Transporters; OP: oxidative phosphorylation; TCA: tricarboxylic acid cycle; Ser: serine; Thr: threonine; Asn: asparagine; Lys: lysine; Arg: arginine; Tyr: tyrosine; Cys: cysteine; Cit: citrulline The target protein of PTMs can be classified into two categories, histones and non-histones. Histone modifications, especially the modifications that take place in H3 and H4, regulate the structure of chromatin to promote transcriptional activation by relaxing chromatin and induce transcriptional repression through condensing chromatin [30, 31]. Therefore, the modifications that occur on histones are also known as epigenetic modifications [30,31,32]. Protein phosphorylation is a sophisticated network consists of protein kinases, substrates, phospho-binding proteins and phosphatases [33,34,35,36,37]. During evolution, protein phosphorylation emerged as an essential and the most prevalent post-translational modification due to its variability and reversibility [33, 35, 38]. A breakthrough in the treatment of human epidermal growth factor receptor 2 (HER2) positive breast cancer patients was achieved by the discovery of tyrosine kinases (RTKs) inhibitors targeting protein phosphorylation, namely, trastuzumab and gefitinib [39,40,41]. Therefore, we wonder whether PTMs, other than protein phosphorylation, could also be potential therapeutic targets in breast cancer. In the context that histone epigenetic modifications and phosphorylation have been studied intensively in breast cancer [42,43,44,45]. However, it has become increasingly clear that other unconventional PTMs, such as acetylation, glycosylation, sumoylation, methylation, ubiquitination, citrullination, and palmitoylation, play equally important effects on the occurrence and progression of breast cancer [17, 18, 46,47,48,49,50]. So in this review, we introduce the relationship between these unconventional PTMs and breast cancer from the point of view of their underlying mechanisms in the oncogenesis and cancer progression. Moreover, we summarize the inhibitors targeting unconventional PTMs and the various PTM-associated clinical trials and thus, present the therapeutic potential of PTMs in breast cancer. Protein acetylation Potential mechanisms of protein acetylation involved in breast cancer Protein acetylation is a reversible and evolutionarily conserved PTM regulated by the opposing actions of KATs and KDACs that, respectively, add and remove the acetyl group from the \u03b5-amino side chain of lysine (K) [10, 51, 52]. Acetylation can influence protein functions by neutralizing the positive charge of lysine [10, 51,52,53]. Intriguingly, several studies have reported that lysine acetylation can also take place in a non-enzymatic manner in the mitochondria where has a high concentration of acetyl-CoA and an elevated pH that leads to the deprotonation of lysine [54,55,56]. Hundreds of acetylation sites have been identified in human breast cancer MDA-MB-231 cells by using proteomic techniques [57]. The effects of protein acetylation in promoting or inhibiting breast cancer may be substrate- and modification site-specific [58,59,60]. Protein acetylation plays an oncogenic role in breast cancer Several acetylated proteins lead to poor prognosis by promoting the progression of breast cancer (Additional file 1: Table S1). KATs and KDACs regulate various pathophysiological processes and play oncogenic roles via different functional mechanisms in breast cancer. The potential molecular mechanisms of the aberrant acetylated proteins that promote the oncogenesis and progression of breast cancer can be divided into three parts. Firstly, acetylation promotes breast cancer metastasis. For instance, Twist, a well-known transcription factor involved in EMT, can be aberrantly activated through acetylation at K73 and K76 by 60 kDa Tat-interactive protein (TIP60) to induce its interaction with the second bromodomain (BD2) of bromodomain-containing protein 4 (BRD4) [28]. The interaction of Twist and BRD4 at the enhancer and promoter of WNT5A promote the expression of WNT5A, which leads to the activation of WNT signal pathway to accelerate EMT and tumorsphere formation in basal-like breast cancer cells (Fig. 2A) [28]. Acetylation of RelA\/p65, a subunit of nuclear factor-kappa B (NF-\u03baB), by p300 at K218, K221, and K310 activates NF-\u03baB signal pathway and promotes the transcription of interleukin-8 (IL-8) to facilitate angiogenesis and tumor metastasis [61]. Heat-shock protein 5 (HSPA5) is regarded as a marker of poor prognosis in breast cancer due to its role in promoting drug resistance and metastasis [62]. P300 also catalyzes the acetylation of HSPA5 at K353 to inhibit its degradation mediated by E3 ubiquitin-protein ligase GP78 and promotes breast cancer metastasis (Fig. 2B) [62]. Histone deacetylase 6 (HDAC6) is reported to deacetylase cell microtubule structures, such as \u03b1-Tubulin and cortactin, and increase the formation of invadopodia that promotes breast cancer cell migration and invasion (Fig. 2C) [58]. Pathophysiological processes regulated by protein acetylation in breast cancer Secondly, acetylation promotes the proliferation of breast cancer cells. For example, the acetylation of the oncogene nuclear receptor coactivator amplified in breast cancer 1 (AIB1) at K276 by the males absent on the first (MOF) protein can activate the transcription factor E2F1 to promote breast cancer cell proliferation [63]. Moreover, histone deacetylase 1 (HDAC1) can interact with the DNA binding domain (DBD) and transcription activation function domain 2 (AF-2) domains of estrogen receptor \u03b1 (ER\u03b1) to inhibit its transcriptional activity and increase cell proliferation and colony formation in ER positive breast cancer cells [64]. HDAC6 deacetylases survivin to promote its cytoplasmic localization and enhance tumor cell growth and survival by inactivating caspase protein-induced programmed cell death in the cytoplasm (Fig. 2D) [59]. Thirdly, acetylation inhibits the sensitivity of tumor cells to anti-tumor therapy. Oncoprotein mammalian hepatitis B X-interacting protein (HBXIP) inhibits chaperone-mediated autophagy (CMA)-dependent degradation of homeobox B13 (HOXB13) via enhancing acetylation of HOXB13 at K277 by p300, and thus induces tamoxifen (TAM)- resistance via downregulating ER\u03b1 and upregulating interleukin-6 (IL-6) expressions (Fig. 2E) [65]. Sirtuin 2 (SIRT2) is induced via the NOTCH signaling pathway to deacetylate aldehyde dehydrogenase A1 (ALDH1A1) at K353 leading to the increase of its enzyme activity and the promotion of breast cancer stem cells (CSCs) properties (Fig. 2F) [66]. Microrchidia family CW-type zinc finger 2 (MORC2) is an oncogenic chromatin-remodeling enzyme that participate in DNA repair. N-acetyltransferase 10 (NAT10) catalyzes the acetylation of MORC2 at K767 and thus promotes DNA damage-induced G2 checkpoint arrest and decreases the sensitivity of cancer cell to DNA-damaging chemotherapy and radiotherapy [50]. Protein acetylation plays a role in tumor suppression in breast cancer Several proteins regulated by acetylation show tumor-suppressing effects in breast cancer. For any particular protein, KATs and KDACs act as Yin and Yang by exerting opposing reversible actions on the regulation of acetylation (Fig. 2). For example, as mentioned previously, the subcellular localization of survivin is crucial for its function, and HDAC6 exerts oncogenic effects by deacetylating survivin to promote its cytoplasmic localization [59]. On the contrary, survivin can be acetylated by CREB binding protein (CBP) at K129 to promote its nuclear localization and act as a tumor suppressor by inhibiting the transactivation of signal transducer and activator of transcription 3 (STAT3) (Fig. 2D) [67]. Oncoprotein HSPA5 acetylated at K353 by p300 is abrogated by HDAC6, which catalyzes the deacetylation of HSPA5 to accelerate its polyubiquitination at K447 by E3 ubiquitin ligase GP78, and induce ubiquitination-mediated protein degradation (Fig. 2B) [60]. Acetylation of ALDH1A1 at K353 by p300\/CBP-associated factor (PCAF) inhibits the CSCs population as well as self-renewal property of breast cancer (Fig. 2F) [66]. The acetylation of microtubule structures, such as \u03b1-Tubulin and cortactin, by \u03b1-Tubulin N-acetyltransferase 1 (ATAT1) and TIP60 decreases the formation of invadopodia and inhibits breast cancer cell migration and invasion (Fig. 2C) [68]. In addition, SIRT3 inhibits CSCs reprogramming by deacetylating superoxide dismutase 2 (SOD2) at K68 [69]. P300 catalyzes the acetylation of Forkhead Box O3 (FOXO3) to promote its nuclear translocation and activation, thus increasing the cytotoxicity of Lapatinib in HER2 positive breast cancer cells [70]. Targeting protein acetylation for breast cancer treatment The inhibitors targeting protein acetylation can be classified into three categories, namely, KAT, KDAC, and bromodomain protein (acetyl-lysine readers) inhibitors (Additional file 1: Table S2). KAT inhibitors suppress the activity of acetyltransferases and the acetylation level of proteins. However, there has been limited research on the effects of these inhibitors in breast cancer. For example, the NAT10 inhibitor, remodelin, represses the acetylation of MORC2 and increases the sensitivity of breast cancer cells to DNA-damaging chemotherapy and radiotherapy [50]. Moreover, TH1834, a selective TIP60 inhibitor, induces apoptosis and increases unrepaired DNA damage after DNA-damaging therapy in breast cancer [22, 71]. ICG-001 specifically binds to CREB and blocks the \u03b2-catenin\/CBP interaction, thereby inhibiting the EMT and invasion of MCF-7 cells [72]. The second category of inhibitors, namely, KDAC inhibitors, inhibits the activity of deacetylases and increases the acetylation level of proteins. For instance, treatment with pan-HDAC inhibitor, vorinostat, may induce cell cycle arrest and cell apoptosis in breast cancer cells [73]. Tubacin is a selective HDAC6 inhibitor that prevents estradiol-stimulated cell migration in MCF-7 cells [74]. Ricolinostat is also a selective HDAC6 inhibitor that inhibits breast cancer migration and invasion [68]. However, there has been limited research on the effects of the bromodomain protein inhibitors in breast cancer. For instance, JQ1, a bromodomain and extra terminal domain (BET) inhibitor, can suppress tumorigenesis in basal-like breast cancer via inhibiting the interaction between acetylated twist and BRD4 [28]. It has been demonstrated that NOTCH, WNT, and NF-\u03baB signaling pathways, which are widely involved in cancer cell proliferation, metastasis, stemness and anti-tumor responses, are involved in the regulation of protein acetylation on the progression of breast cancer [13, 61, 66]. In addition, acetylation can regulate ER\u03b1 expression and downstream target gene transcription, thus playing a vital role in ER positive breast cancer [64, 65]. Therefore, given the crucial role of protein acetylation in the tumorigenesis and progression of breast cancer, inhibitors that target acetylation may have potential therapeutic applications. Although the study of KDAC, KAT and bromodomain inhibitors often focus on histone acetylation, recent studies [10, 75,76,77,78] also suggest that these drugs may regulate non-histone protein acetylation in breast cancer. However, further studies are required to understand the effects of these drugs. Protein glycosylation Potential mechanisms of protein glycosylation involved in promoting breast cancer progression Glycosylation is defined as the enzymatic process that modifies proteins or lipids by sequential addition or removal of carbohydrates [49]. Different kinds of protein glycosylation, using nucleotide sugars such as uridine diphosphate N-acetylglucosamine (UDP-GlcNAc) and uridine diphosphate N-acetylgalactosamine (UDP-GalNAc) as the sugar donor have been reported in breast cancer [49, 79,80,81,82,83,84,85]. Among them, O-GlcNAcylation, mucin type O-glycosylation, and N-linked glycosylation are the most widely studied protein glycosylation, the cell organelles where these modifications occur and the enzymes that regulate them are detailed in Additional file 1: Fig. S1 [49, 79, 82, 83, 85]. Recent studies have shown that the upregulation of glycosylation plays an oncogenic role in breast cancer [49, 86, 87]. Thus, here, we illustrate the causes of aberrant glycosylation and the potential mechanisms underlying protein glycosylation in breast cancer (Additional file 1: Table S1) in this section. The increase in glycosylation in breast cancer is primarily caused by three reasons. While on the one hand, high levels of protein glycosylation may be caused in tumor cells due to the high rate of glucose uptake with activated glycolysis resulting in high levels of lactic acid produced under the conditions of sufficient oxygen supply (Warburg effect) [88, 89]. On the other hand, some glycosyltransferases, such as N-acetylgalactosaminyltransferase 4 (GalNAc-T4), GalNAc-T14, GalNAc-T6, fucosyltransferases 4 (FUT4), FUT8, and O-GlcNAc transferase (OGT) [29, 90,91,92], which are overexpressed in breast cancer and correlated with its prognosis, may be used as novel biomarkers or combined with traditional biomarkers to improve the sensitivity and specificity for the diagnosis of breast cancer [83, 93, 94]. However, the applications as biomarkers need to be further evaluated. Moreover, the glycosylation of glycolytic enzymes plays a crucial role in promoting the metabolic remodeling and the production of nucleotide sugars. For example, the activity of phosphofructokinase 1 (PFK1), a key enzyme in the glycolysis pathway, is suppressed by O-GlcNAcylated at serine (Ser)529, resulting in the redirection of glucose metabolism through pentose phosphate pathway (PPP), thus increasing nucleotide metabolism [95]. Here, we discuss the potential mechanisms of protein glycosylation that promote the oncogenesis and progression of breast cancer in the following three parts. First, glycosylation promotes the proliferation and metastasis of breast cancer cells. Glycosylation can promote cancer cell mobility and invasion by regulating the actin cytoskeleton. Cofilin, an actin-binding protein, responsible for modulating the actin dynamics to promote cell motility, is O-GlcNAcylated at Ser 108, the O-GlcNAcylation is crucial for the proper localization of cofilin in invadopodia to promote breast cancer cells mobility and invasion [96]. Furthermore, glycosylation can promote cancer cell metastasis via regulating EMT and cell adhesion. O-GlcNAcylation of snail1 at Ser112 inhibits its phosphorylation by glycogen synthase kinase-3\u03b2 (GSK3\u03b2) and ubiquitin-dependent degradation, and the O-GlcNAcylated snail1 suppresses the transcription of E-cadherin [97]. The binding of p120 and \u03b2-catenin to E-cadherin is crucial for the membrane translocation and stability of E-cadherin, hyper-GlcNAcylation of p120 and \u03b2-catenin result in decreased membrane translocation of E-cadherin, thus inducing cancer cell metastasis (Fig. 3A) [82]. FUT8 plays a role in the fucosylation of transforming growth factor-\u03b2 (TGF-\u03b2) serine\/threonine kinase receptor I (T\u03b2RI) and II (T\u03b2RII) on the cell surface and activates the TGF-\u03b2 signaling pathway to promote EMT and breast cancer cell invasion [98]. FUT8, whose expression level is positively related to a higher tumor stage and lymph node metastasis, is overexpressed in breast cancer [94]. Golgi mannosidase \u03b1-class 1A member 1 (MAN1A1) catalyzes the removal of mannose from high-mannose glycans (Additional file 1: Fig.S1). This process is crucial for the structure transformation of N-glycans from high-mannose structure to complex oligosaccharide chain. MAN1A1 silencing or use of the mannosidase inhibitor kifunensine [99] to reduce MAN1A1 expression significantly increases the adhesion of breast cancer cells to endothelial cells. A previous study on the clinical samples of breast cancer patients showed that the patients who had low levels of MAN1A1 were more likely to have higher tumor metastasis and shorter disease-free survival [100]. Forkhead box protein A1 (FOXA1), a transcription cofactor of ER\u03b1 that promotes ER\u03b1 recruitment, may be glycosylated by GalNAc-T4 to enhance protein stability and regulate the estrogen network. Knockdown of GalNAc-T4 decreases the expression of cyclin D1 and induces cell cycle arrest [101]. Furthermore, the O-glycosylation of ER\u03b1 at Ser573 by GalNAc-T6 is crucial for the nuclear localization and downstream target transcription of ER\u03b1 to promote cell proliferation [102]. Mucin 1 (MUC1) promotes EMT by regulating various EMT-related signaling pathways, such as the NF-\u03baB, TGF-\u03b2, and STAT3 pathways [103]. Moreover, the overexpression of GalNAc-T6 can glycosylate and sustain the stability of MUC1, leading to proliferation and cell adhesion reduction of cancer cells [104]. Protein glycosylation promotes the progression of breast cancer Next, glycosylation inhibits the sensitivity of tumor cells to anti-tumor therapy. Treatment with PUGNAc (OGA inhibitors) and glucosamine to increase the level of O-GlcNAcylation can significantly reduce the expression of ER\u03b1 in ER positive breast cancer cells and protect the cells from tamoxifen-induced death [105]. On the contrary, the inhibition of OGT by siRNA potentiates the expression of p21 and early growth response gene 1 (Egr1) induced by tamoxifen to promote cell cycle arrest and cell death [105]. These data suggest that the inhibition of O-GlcNAcylation might help to improve the efficacy of anti-estrogen therapy in breast cancer. However, the underlying mechanisms are not yet clearly understood [105]. N-linked glycosylation regulates the responsiveness of breast cancer cells to chemotherapy. The N-glycosylation of HER2 protein at asparagine (Asn) 68\/124\/187\/259\/530\/571\/549 can inhibit its binding with Herceptin and activate mitogen-activated protein kinase (MAPK) and PI3K-Akt signaling pathways to promote breast cancer progression (Fig. 3B). A reduction in cell surface glycosylation along with increased sensitivity to Herceptin and doxorubicin has been reported following tunicamycin treatment [106]. Ribophorin II (RPN2), a part of the N-oligosaccharyltransferase complex, promotes breast cancer malignancy by regulating the glycosylation of tetraspanin protein CD63 and multidrug resistance protein 1 (MDR1). The glycosylated CD63 and MDR1 can interact with each other and co-localized in the cell membrane and play an essential role in reducing the concentration of anticancer drugs in cancer cells by facilitating the efflux of the anticancer drug out of cells, thus leading to drug resistance and cancer invasiveness (Fig. 3B) [107]. Collectively, these studies highlight the potential of glycosylation inhibitors in combination with other anticancer therapies in the treatment of breast cancer. Lastly, glycosylation promotes tumor growth by regulating the immune microenvironment and antitumor immune response. Abnormal glycosylation of tumor-related epitopes (such as hypersialylation in breast cancer) result in the altered interaction with lectins expressed in immune cells, which activate the inhibitory signals in the immune cells and lead to tumor immune suppression [85, 108, 109]. In breast cancer, the upregulation of Tn and sialylated Tn (STn) glycans can be recognized and bound by macrophage galactose-specific lectin (MGL) expressed in the macrophages and dendritic cells [110]. This glycosylation-dependent interaction drives an immune inhibitory program that decreases the production of IFN-\u03b3 and increases the expression of IL-10 and TNF, thus decreasing the effector T cell proliferation and increasing effector T cell apoptosis (Fig. 4A, I) [110]. The presence of cell surface sialic acids have been referred to as 'self-associated molecular patterns (SAMPs)' that are recognized by sialic acid-binding immunoglobulin-like lectins (siglecs) expressed by immune cells to produce signals that negatively regulate the immune system [111]. Similar to the immune checkpoint receptor programmed cell death 1 (PD-1), most siglecs contain a cytosolic immunoreceptor tyrosine-based inhibitory motif (ITIM) that can recruits SH2-containing inositol phosphatase (SHP) to halt the kinase phosphorylation cascade in immune cell, and thus inhibit the activity of immune cell [112, 113]. For example, the binding of sialylated N-acetyl-d-lactosamine (LacNAc) to siglec-7 on the NK cells can protect the cancer cells from NK cell cytotoxicity by decreasing the production of IFN-\u03b3 and other cytotoxic molecules (Fig. 4A, II) [114]. The binding of mucin 1-sialylated core 1 (MUC1-ST) to siglec-9 on monocytes and macrophages can induce the release of factors such as IL-8, IL-6, macrophage colony-stimulating factor (M-CSF), and plasminogen activator inhibitor-1 (PAI-1), that promote tumor growth and induce macrophages to develop a tumor-associated macrophages (TAM) phenotype (Fig. 4A, III) [115, 116]. In addition, the interactions between sialyl-Lewis X glycans on the leukocytes and selectins on the endothelial cells are crucial for immune cell trafficking [117]. Similarly, the cancer cells that overexpress sialyl-Lewis X glycans can bind to the endothelial cells and promote tumor metastasis by this mechanism (Fig. 4A, IV) [117]. Thus, targeting this aberrant glycosylation may be a potential novel therapy for breast cancer treatment [118,119,120]. For example, the sialidase conjugate trastuzumab can desialylate tumor cells and inhibit the interaction between the sialylated glycans and inhibitory siglec receptor on the NK cell to enhance NK cell cytotoxicity [119, 120]. Tumor microenvironment induces programmed cell death-ligand 1 (PD-L1) expressed in tumor cells. The binding of PD-L1 to PD-1 expressed in the immune cell can protect the tumor cells from the immune cell attack [121]. N-glycosylation of PD-L1 helps maintain its protein stability by antagonizing the binding of GSK3\u03b2 and phosphorylation-induced proteasome degradation [122]. Previous studies have reported that \u03b2-1,3-N-acetylglucosaminyltransferase (B3GNT3), an enzyme which is transcriptionally activated by EGF, catalyzes the N-glycosylation of PD-L1 at Asn192 and Asn200 in TNBC, thus promoting its interaction with PD-1 and inducing immune suppression and T cell exhaustion [49, 123]. The STM108 antibody can specifically recognize the Asn192 and Asn200 glycosylation sites of PD-L1 and induce PD-L1 internalization and degradation to reactivate T cells. Moreover, the antibody\u2013drug conjugate, STM108-ADC, induces potent drug-induced cytotoxic activities and bystander effects to kill TNBC cells both in vivo and in vitro (Fig. 4B) [123]. This implies that targeting protein glycosylation might be a potential way to enhancing the effects of immune checkpoint therapy in TNBC and need further verification in clinical trials. Protein glycosylation regulates the immune microenvironment and anti-tumor immune response Targeting protein glycosylation for breast cancer treatment Currently, these drugs and inhibitors target at protein glycosylation (Additional file 1: Table S2) for breast cancer treatment can be divided into the following two categories. The first category is monosaccharide analogs. As several cell membrane and secretory proteins are glycoproteins, the monosaccharide analogs may participate in the glycosylation pathway to alter the glycan structure and disrupt the elongation of the oligosaccharide chains [86, 124]. Consequently, they may affect the oncogenic functions of the corresponding glycoproteins. The monosaccharide analogs include the glucose analog 2-Deoxy-D-glucose (2-DG) [86], GalNAc analog 2-KetoGal [124], and fucose analog 6-Azidofucose [125]. The second category involves glycosyltransferase and glycoprotein inhibitors that targets at high levels of glycosylation in breast cancer. For example, the reduction in cell surface glycosylation together with the increased sensitivity to Herceptin and doxorubicin has been found following tunicamycin treatment [106]. Ginsenoside Rg3 inhibits the expression of FUT4 and inhibits fucosylation modification [126]. Epigallocatechin gallate (EGCG) can inhibit the production of MUC1 and thereby suppress breast cancer metastasis [80, 127]. In consideration that dysregulation of diverse glycosyltransferase results in upregulation of glycoprotein during breast cancer oncogenesis and progression, many glycoproteins may be viewed as biomarkers for breast cancer diagnosis. To date three serum glycoproteins including cancer antigen (CA 15\u20133) and CA 27\u201329 that encoded by MUC1 gene, and carcinoembryonic antigen (CEA) are regarded as traditional biomarkers used for clinically detection and monitor breast cancer occurrence and recurrence through serum glycoprotein immunoassays [49, 81, 128]. However, it is significant to find new markers that specific for breast cancer due to the lake of sensitivity and specificity of traditional glycoprotein biomarkers. Recently, many researchers are increasingly interest to glycosylated biomarkers within exosomes or extracellular vesicles that derived from cells and biofluids. This novel field termed liquid biopsies [129, 130]. Liquid biopsies may have the potential to be used in breast cancer as these vesicles also contain aberrant glycoproteins. Potential mechanisms of protein sumoylation involved in breast cancer Sumoylation is a three-step enzymatic cascade reaction analogous to ubiquitination catalyzed by SUMO-E1 activating enzyme, SUMO-E2 conjugating enzyme, and SUMO-E3 protein ligases to covalently attach the small ubiquitin-related modifier (SUMO) proteins to the lysine residues of the target proteins [9, 131]. Sumoylation is a reversible modification that can be deSUMOylated by SUMO-specific proteases (SENPs) [9, 17, 25]. The dysregulation of protein sumoylation may either promote or suppress the progression of breast cancer [17, 23, 132,133,134,135]. Hence, here, we discuss the molecular mechanisms underlying sumoylation in breast cancer. Protein sumoylation plays an oncogenic role in breast cancer In general, protein sumoylation may promote breast cancer tumorigenesis and progression by accelerating cell cycle transition and proliferation, facilitating tumor cell EMT and migration. These mechanisms are described in detail in this section. Firstly, protein sumoylation accelerates cell cycle transition and proliferation of breast cancer cells. For example, BRCA1, a well-known breast cancer susceptibility gene associated with DNA damage repair, cell cycle regulation, and sustained chromosomal genomic stability, may be sumoylated at K32 and K1690 in the ER positive breast cancer cells to induce G0\/G1 phase transition and oxidative stress response [136]. Further, The sumoylation of the transcriptional co-repressor KRAB domain-associated protein 1 (KAP1) at K554, K779, and K804 attenuates the acetylation and augments the methylation of H3K9 at the p21 promoter, thus repressing the expression of p21 and promoting MCF-7 cell proliferation [137]. The upregulation of sumoylation-related enzymes, such as UBC9 and PIAS1, has been shown in several breast cancer tissue arrays [138,139,140,141]. UBC9, the sole SUMO E2 conjugating enzyme, may induce tumor cell resistance to chemotherapy via upregulating expression of anti-apoptotic protein Bcl-2 and is correlated with poor clinical prognosis in breast cancer [139, 140, 142]. DeSUMOylation of protein interacting with never in mitosis A (NIMA)-1 (Pin1) at K6 and K63 by SENP1 promotes its protein activity and interaction with the substrate, thereby inducing malignant cell transformation (Fig. 5A) [143]. MiR200 b\/c acts as a tumor suppressor by upregulating the expression of E-cadherin [144, 145]. Sumoylation of the transcription factor Forkhead Box Protein M1 (FOXM1B) at K463 inhibits the expression of miR200 b\/c and p21, thus activating the expression of JNK1 and promoting the proliferation of MCF-7 cells (Fig. 5B) [146]. The potential mechanisms of sumoylation and methylation regulating breast cancer Moreover, protein sumoylation facilitates breast cancer cell EMT and migration. The sumoylation of talin, a key component of focal adhesions (FAs) that accelerating cancer cell migration by linking the cytoskeleton to the extracellular matrix, at K2445 and K841 positively regulates FAs disassembly and promotes MDA-MB-231 cell migration [147]. The sumoylation of T\u03b2RI at K389 in response to TGF-\u03b2 depends on its kinase activity and phosphorylation modification. Further, the sumoylation of T\u03b2RI enhances its interaction with Smad2\/3 and promotes the phosphorylation of Smad3, consequently activating TGF-\u03b2-Smad signaling pathway to promote cancer cell metastasis (Fig. 5C I) [148]. Interestingly, a previous study also demonstrated that SENP5 promotes breast cancer invasion by sustaining the sumoylation of T\u03b2RI (Fig. 5C II), whose expression is negatively correlated with the prognosis of breast cancer patients [134]. However, whether this contradiction is attributed to the interaction between phosphorylation and sumoylation or to the difference in the modified site is unclear and needs to be further investigated [134]. SENP2 facilitates TGF-\u03b2-Smad4 signaling pathway by desumoylating Smad4 at lys159 to promote EMT and cell migration in TNBC cells and sustain cancer stem cell properties (Fig. 5C III) [149]. The high expression of SENP2 consequently leads to poor prognosis in TNBC patients [149]. Protein sumoylation plays a role in tumor suppression in breast cancer For any specific protein, similar to acetylation, reversible protein sumoylation can play opposing roles as an oncogene and a tumor suppressor. For example, the sumoylation of Pin1 at lys6 and lys63 suppressed its ability and oncogenic function (Fig. 5A) [143]. Sumoylation of Smad4 at K159 promotes its interaction with the transcriptional corepressor Daxx to repress the transcriptional activity of Smad4, thereby inhibiting the TGF-\u03b2-Smad4 signaling pathway and playing the role of a tumor suppressor in breast cancer (Fig. 5C III) [150]. SENP2 deSUMOylates FOXM1B at K463 and thus upregulates the expression of miR200 b\/c and p21 to reduce the proliferation and migration of MCF-7 breast cancer cells (Fig. 5B) [146]. In addition, SENP2 acts as an ER\u03b1 transcriptional corepressor by recruiting HDAC3 to the promoter of ER\u03b1, it also influences the cell cycle G1\/S transition and inhibits the proliferation of ER-positive breast cancer MCF-7 cells [151]. Targeting protein sumoylation for breast cancer treatment However, since this modification has been identified only recently, the inhibitors targeting sumoylation in breast cancer are somewhat limited (Additional file 1: Table S2). Recent studies have identified two pharmacological inhibitors of the SUMO pathway, namely, ginkgolic acids C15:1 (GA C15:1) that interact with SUMO E1 activating enzymes to abrogate the formation of the E1-SUMO1 complex [152], and 2-D08, which suppresses sumoylation by inhibiting the transfer of SUMO from SUMO E2 conjugating enzyme to target substrate [153]. These two inhibitors play a pivotal anti-cancer role in breast cancer cell lines, such as MDA-MB-231, MCF-7, and BT474, not only by inducing the expression of autophagy modulator Tribbles pseudokinase 3 (TRIB3) and the transcription of various autophagy-related genes, such as ATG1, ATG7, and BECN1 to accelerate autophagy-dependent cancer cell death, but also by inhibiting the sumoylation of RAC1 (a member of Rho GTPase family), and thus suppress the activation RAC1 and repress the RAC1-mediated cell migration and invasion [154, 155]. Moreover, Triptolide, a component extracted from the Chinese herb, Tripterygium wilfordii Hook F, acts as a natural SENP1 inhibitor that downregulates the expression of the androgen receptor (AR) and c-Jun to restore the balance between sumoylation and deSUMOylation and consequently inhibits prostate cancer [156]. Considering that SENP1 also overexpressed in breast cancer [143], Triptolide may potentially be used for the treatment of breast cancer. However, its specific anti-cancer function has yet not been verified in breast cancer. The SUMO gene was first discovered in 1995 [157], and a recent proteomics study indicated that at least 1000 human proteins were modified by SUMO proteins [16]. Considering that this modification is somewhat newly discovered, our understanding of protein sumoylation is somewhat limited. The mechanism by which sumoylation is involved in the progression of breast cancer remains to be further studied, for example, whether sumoylation is participated in the anti-tumor immune response of breast cancer is still unknown. In addition, inhibitors targeting sumoylation remains to be explored. Protein methylation Potential mechanisms of protein methylation involved in breast cancer The process in which protein methyltransferases transfer the methyl group from s-adenosyl methionine (SAM) to the side chains of amino acid residues, such as arginine, lysine, glutamate, and cysteine, consequently producing a methylated residue and s-adenosyl homocysteine (SAH), is called as protein methylation [8, 15, 158,159,160,161,162,163,164]. The methylation of lysine and arginine residues on proteins, catalyzed by PKMT and PRMT, respectively, is the prominent and universal types of methylation modification occurring in breast cancer [8, 15]. Lysine methylation is a reversible modification, and several protein lysine demethylases (PKDMs), as their name suggests, possess the lysine demethylase activity [15, 165, 166]. In the case of arginine demethylation, the data on the sole putative arginine demethylase JMJD6 is controversial [167, 168]. Therefore, a bona fide arginine demethylase is yet to be identified. In this section, we present the underlying mechanisms of protein methylation in breast cancer carcinogenesis and metastasis [19, 48, 165, 166, 169]. Protein methylation plays an oncogenic role in breast cancer Several studies have confirmed that PRMT1, PRMT2, PRMT3, and PRMT7 are overexpressed in breast cancer [159, 170,171,172,173,174]. Moreover, co-activator associated arginine methyltransferase 1 (CARM1, also known as PRMT4) is overexpressed in metastatic breast cancer as opposed to normal breast tissues [173, 175]. Among the numerous PKMT and PKDM that have been identified so far, SET6, SMYD2, SMYD3, LSD1, and KDM2A have been shown to regulate breast cancer [48, 163, 165, 166]. The mechanisms protein methylation participates in breast cancer tumorigenesis and progression are described in further detail in this section. Methylation activates oncogenic signaling pathways to accelerate breast cancer progression. For example, the methylation of BRG1-associated factor 155 (BAF155), a core subunit of chromatin remodeling complex SWI\/SNF, at R1064 by CARM1 regulates the expression of target genes in the c-MYC pathway, and thus accelerates the progression of breast cancer, as previously shown in both, in vivo and in vitro assays [173]. PRMT1 catalyzes ER\u03b1 methylation at R260 within the DNA binding domain during rapid estrogen signaling, leading to the activation of the downstream PI3K-Src-Akt signaling pathway, thus promoting the phosphorylation of Akt at Ser473 and resulting in cancer cell proliferation and antiapoptotic effects (Fig. 5D) [171]. The dimethylation of Akt at R391 by PRMT5 is essential for its kinase activity and breast cancer tumorigenesis [176]. Moreover, LSD1 catalyzes the demethylation of ER\u03b1 at K266 to promote ER\u03b1 signaling and cell proliferation [177]. KDM2A activates the Notch signaling pathway to enhance the stemness of breast cancer cells [165]. Furthermore, protein methylation regulates the anti-tumor effects of tumor suppressor proteins. For instance, programmed cell death protein 4 (PDCD4) is methylated at R110 by PRMT5 to inhibit its anti-tumor properties, and the co-expression of PDCD4 and PRMT5 generates a tumor-promoting phenotype in an orthotopic breast cancer model [172]. Several previous studies have demonstrated that the activity of p53, a well-known tumor suppressor protein, is regulated by protein methylation [170, 178,179,180]. P53 monomethylated at K370 by SMYD2 represses its antitumor ability, thus inhibiting p53-mediated apoptosis [179]. However, K372 monomethylated by SET9 inhibits the interaction between SMYD2 and p53 and thus increases p53 stability and its target gene transcription [8, 163]. In addition, the p53 monomethylated at K382 by SET8 represses its acetylation and transcriptional activity [180]. However, future research is required to analyze whether the methylation of p53 plays a role in breast cancer (Fig. 5E). Finally, protein methylation facilitates breast cancer cells EMT and migration. WD repeat domain 5 (WDR5), a core subunit of the histone methyltransferase (HMT) complex positively correlated with a higher clinical stage and histological grade of tumor [181, 182], is methylated by SET6 at K207 and K325 in breast cancer cells to promote cell proliferation and migration [48]. KDM2A interacts with RelA to co-occupy at the promoter region of tet-eleven translocation 2 (TET2) and repress the expression of its target genes including epithelial cell adhesion molecule (EpCAM) and E-cadherin, thus accelerating EMT and angiogenesis, TNBC patients with overexpressed KDM2A often related to worse survival [166]. Intriguingly, some PRMTs undergo automethylation spontaneously, the automethylation of PRMT7 at R531 in the C-terminal of the protein accelerates the interaction with the transcription factor Yin-Yang 1 (YY1) and is vital for its recruitment to the promoter region of E-cadherin to inhibit transcription, thus promoting EMT and breast cancer cell migration and invasion (Fig. 5F) [19]. Protein methylation plays a role in tumor suppression in breast cancer The reversible modifications of protein methylation, i.e. methylation and demethylation, of the specific protein at the same site may have contrary effects. For example, the demethylation of ER\u03b1 at R260 by JMJD6 inhibits the activation of the PI3K-Src-Akt signaling pathway, thus inhibiting breast cancer cell proliferation (Fig. 5D) [171]. On the other hand, the methylation of ER\u03b1 at K266 attenuates the chromatin recruitment of ER\u03b1 and its target gene expression [177]. Targeting protein methylation for breast cancer treatment Pharmacological inhibitors targeting the protein methylation have a crucial role in cancer treatment (Additional file 1: Table S2). For example, GSK591 is a selective PRMT5 inhibitor that suppresses breast CSCs proliferation and self-renewal [183]. GSK3326595 is also a selective PRMT5 inhibitor that inhibits the activation of Akt to sensitive breast cancer cells to etoposide and cisplatin [176]. DC_C66 and DC_C11 are cell membrane permeable CARM1 inhibitors that effectively suppress the proliferation of MCF-7 cells by competitively occupying the binding site of the substrate [184]. PKMT inhibitor MS1943 inhibits the proliferation of multiple TNBC cells [185]. Daminozide is a KDM2A inhibitor that can inhibit cancer cell stemness and enhance the sensitivity and cytotoxicity of cisplatin in MDA-MB-231 cells [165]. A majority of the previous studies on methylation mainly focus on DNA and histone methylation [30, 32, 42, 44], non-histone methylation, as a burgeoning field, the studies and literatures are somewhat limited in breast cancer. Thus, considering several methylases and demethylases discovered so far, it may be worthwhile to focus further studies in this field to discover potential breast cancer therapies. For instance, methylation of ER\u03b1 at R260 by PRMT1 promoting the phosphorylation of Akt at Ser473 and the activation of PI3K-Src-Akt signaling pathway [171]. Moreover, the dimethylation of Akt at R391 by PRMT5 is essential for its kinase activity [176]. Therefore, whether there is a synergistic regulatory relationship between PRMT1 and PRMT5, or whether there exists a positive feedback between the phosphorylation and methylation of Akt, deserves further study. Protein ubiquitination Potential mechanisms of protein ubiquitination involved in breast cancer Protein ubiquitination is a multi-step process sequentially catalyzed by enzyme complexes consisting ubiquitin-activating enzymes (E1), ubiquitin-conjugating enzymes (E2), and ubiquitin ligases (E3) (Additional file 1: Fig. S2) [24]. Among these enzymes, the E3 ubiquitin ligases selectively interact with specific target proteins and play a corresponding role in cellular physiology [24, 186, 187]. E3 ubiquitin ligases can be divided into three categories, including RING E3s, homologous to the E6AP carboxyl terminus (HECT) E3s, and RING-in-between-RING (RBR) E3s (Additional file 1: Fig. S2) [187]. Different from classic E3s, including HECT and RING E3 ligases, which been regarded as destructive ubiquitin ligases and well-studied in breast cancer [27, 46, 188,189,190,191,192,193,194,195], atypical ubiquitin ligase of the RBR E3 ligases is prone to catalyze mono-ubiquitination or linear poly-ubiquitination of the substrates. However, it does not lead to the degradation of the substrate but plays a vital role in signal transduction and regulation of gene transcription [7, 187]. In addition, over 600 E3 ligases have been identified in humans so far, whereas only about 12 RBR E3 ligases have been reported [187]. Due to the special functions and the limited number of RBR E3 ligases, the pathways and regulatory mechanisms underlying the role of RBR E3 ligases in breast cancer carcinogenesis and evolution are illustrated in detail in this section. RBR E3 ligases play an oncogenic role in breast cancer Ring finger protein 31 (RNF31, also named HOIP), Ran Bp-type and C3HC4-type zinc finger-containing protein 1 (RBCK1), and Ariadne homolog 1 (ARIH1) are members of RBR E3 ligases that are up-regulated in breast cancer [18, 196, 197]. RNF31 was originally cloned from breast cancer cells and was identified to be highly expressed in breast cancer tissues compared to the adjacent normal tissues [196]. Recent studies have shown that RNF31 may function as a breast cancer oncogene by any of the following mechanisms. RNF31 acts as an oncogene by catalyzing the monoubiquitination of ER\u03b1 to increase its stability and promotes the transcription of the ER\u03b1 signal downstream oncogenic proteins (cyclin D1 and c-myc) to accelerate cell cycle transition and cancer cell proliferation (Fig. 6A) [196]. Moreover, RNF31 inhibits the ubiquitination of MDM2 through an unknown mechanism to accelerate p53 degradation, which resulting in chemotherapy resistance by inhibiting p53 induced cell apoptosis (Fig. 6B) [196, 198]. In addition, RNF31 and RBCK1 are the vital components of linear ubiquitin assembly complex (LUBAC), that mediate the linear polyubiquitination of the inhibitor of \u03baB Kinase (IKK) \u03b3 (NEMO), thereby activating the IKK complex and facilitating NF-\u03baB signaling (Fig. 6C) [196]. RBCK1 also increases the transcription of ER\u03b1 and cyclin B1 by recruitment to the ER\u03b1 promoter to enhance cancer cell proliferation (Fig. 6D) [199]. ARIH1 may facilitate the removal of damaged mitochondria to protect breast cancer cells from chemotherapy-induced death [197]. The proposed model for the effects of RNF31 and RBCK1 in breast cancer RBR E3 ligases play a role in tumor suppression in breast cancer RNF144A and Parkinson protein 2 (PARK2, also known as Parkin) are members of the RBR E3 ligase family that have been identified as tumor suppressor genes in breast cancer, their low expression levels in breast cancer may be attributed to hypermethylation in their promoter [200, 201]. RNF144A ubiquitinates and degrades the DNA-dependent protein kinase catalytic subunit (DNA-PKcs) and poly (ADP-ribose) polymerase 1 (PARP1) to inhibit the repair of DNA damage via non-homologous end joining (NHEJ) and base excision repair (BER) pathways, respectively [202, 203]. Thus, it promotes cell death and acts as a tumor suppressor. PARK2-mediated HIF-1\u03b1 ubiquitination at K477 and degradation inhibits breast cancer metastasis [204]. PARK2 also decreases the expression of Cyclin-dependent kinase 6 (CDK6) and negatively regulates the proliferation of breast cancer cells [205]. In addition, Parkin binds to microtubules and increases the interaction between paclitaxel and the microtubule, thus enhancing paclitaxel sensitivity in breast cancer [197, 206]. Targeting protein ubiquitination for breast cancer treatment Some small molecule inhibitors targeting ubiquitination may be potential novel therapies for breast cancer (Additional file 1: Table S2). For example, WP1130 has been shown to effectively promote chemotherapy-induced tumor cell death by inhibiting USP9X [46]. ML364, a USP2 inhibitor, induces cyclin D1 degradation and causes cell cycle arrest in MCF-7 cells [207]. Nutlin-3 inhibits MDM2-dependent P53 ubiquitin degradation and causes cell cycle G1 arrest [208]. Similarly, SP-141 promotes MDM2 auto-ubiquitination and degradation to suppress breast cancer [209]. Furthermore, traditional Chinese medicines have attracted increasing attention in recent years. Celastrol, a component extracted from the Chinese herb Tripterygium wilfordii Hook F, is a proteasome inhibitor that represses the degradation of tumor suppressor proteins to promote cancer cell apoptosis [210]. This anti-cancer activity has been demonstrated in prostate cancer and may also have an influence on breast cancer oncogenesis, however, further studies are required to confirm its effects in breast cancer. In general, several substrate ubiquitination sites still remain unidentified, and the function of RBR E3 ligases has been studied mainly through gene silencing [196, 198, 211]. Considering the vital role of RBR E3 ligases in the regulation of breast cancer, small-molecule inhibitors that target these enzymes may have a therapeutic potential in the treatment of breast cancer. Other PTMs involved in breast cancer In addition to the PTMs mentioned above, some other rare PTMs, such as citrullination and palmitoylation, have also been reported in breast cancer [26, 212, 213]. Citrullination is defined as a process of deimination of arginine and conversion to citrulline (Cit), thus replacing the positively charged arginine by uncharged citrulline catalyzed by peptidyl arginine deiminases (PADs) [214, 215]. Peptidyl arginine deiminase 2 (PADI2) is overexpressed in breast cancer and is associated with tumorigenesis and progression [213]. PADI2 regulates RNA polymerase II (RNAP2) transcriptional activity by catalyzing the deamination of R1810 to Cit1810, thus promoting gene transcription and cell proliferation in breast cancer [215, 216]. PADI2 serves as a mediator of the EGF-PI3K signaling pathway to accelerate tumor cell invasion and migration by activating the components of the Rho family, including Rho, Rac, and Cdc42 [26]. The citrullination of GSK3\u03b2 at R3 is important for its nuclear localization and the inhibition of the TGF-\u03b2 signaling pathway, thus inhibiting the EMT of breast cancer cells [47]. Protein palmitoylation (also known as protein S-acylation) is a reversible PTM that is catalyzed by protein acyltransferases (PATs) and acylprotein thioesterases (APTs) to either link or remove a palmitate group to cysteine (Cys) residues [217,218,219]. Palmitoylation of the adhesion protein CD44 at cysteine (Cys) 286 and Cys295 increases its raft affiliation but decreases its interaction with the migratory binding partner ezrin, thus inhibiting breast cancer cell migration [220]. Targeting protein citrullination and palmitoylation for breast cancer treatment Both, the first-generation pan-PADs inhibitor, Cl-Amidine [214] and the more potent second-generation inhibitor, BB-Cl-Amidine [221] can maintain the integrity of the basement membrane and suppress the proliferation and migration of breast cancer cells in vivo as well as in vitro assays [26]. D-Cl-amidine, a selective PAD1 inhibitor, decreases cell viability in MDA-MB-231 cells [185]. Moreover, curcumin inhibits the migration of breast cancer cells by repressing the palmitoylation of integrin \u03b24 (ITG \u03b24) and ITG \u03b24-dependent cell migration [222]. The crosstalk between PTMs Most proteins are modified by multiple PTMs, and the different kinds of protein PTMs can interact with each other. Such crosstalk between the PTMs can integrate diverse signals and vastly increase their regulatory potential. Firstly, different kinds of PTMs may take place at different amino acid such as lysine, arginine, threonine (T), serine, asparagine, tyrosine, and cysteine [7, 9, 10, 15, 38, 223]. However, lysine serves as the most universal target protein amino acid residue that can be regulated by several PTMs, such as ubiquitination [24], sumoylation [9, 131], methylation [15, 163], and acetylation [10, 224]; these modifications may influence each other and compete for the same lysine site. For example, SUMO covalently attached to the lysine site is generally used to inhibit the conjugation of ubiquitin to protect the target proteins from ubiquitin-mediated degradation [9, 131, 225]. Methylation of ER\u03b1 at K266 by SMYD2 inhibits its acetylation at K266\/268 catalyzed by p300, which can be reversed by demethylase LSD1 and promotes the expression of ER\u03b1 target genes (Fig. 7A) [177]. HDAC6 catalyzes the deacetylation of HSPA5 at K353 and accelerates its polyubiquitination at K447, thus inducing ubiquitination-mediated protein degradation (Fig. 2B) [60]. Moreover, many protein post-translational modifications are involved in the progression of breast cancer by regulating the activity of signaling pathways [61, 66, 67, 98, 106, 149, 171], the activation of most signaling pathways such as NF-\u03baB, TGF-\u03b2-Smad4 and PI3K-Akt is a cascade of phosphorylation modification [61, 98, 106, 149]. Therefore, there are many crosstalk between phosphorylation and other PTMs in breast cancer, for example, the crosstalk between methylation and phosphorylation; methylated ER\u03b1 at R260 by PRMT1 triggers the PI3K-Akt signaling pathway to stimulate the downstream target proteins to undergo phosphorylation modification and resulting in breast cancer cell proliferation and antiapoptotic effects (Fig. 5D) [171]. Dimethylation of Akt at R391 promotes its phosphorylation at T308 and thereby promoting PI3K-Akt activation to promote breast cancer progression [176]. The crosstalk between sumoylation and phosphorylation; The Ras-ERK2 signaling pathway mediates the phosphorylation of CCAAT\/enhancer binding protein beta1 (C\/EBPbeta1) at Thr235 that accelerates the sumoylation of C\/EBPbeta1 to facilitate breast cancer cell escape from oncogene-induced senescence [132]. Forkhead Box Protein P3 (FOXP3) is recruited in the promoter region of UBC9 to promote its transcription and translation, however, the loss of phosphorylation on tyrosine 342 or the loss of acetylation and\/or ubiquitination on K263 in FOXP3 suppress its role in promoting UBC9 expression and sumoylation [135]. In addition, there is much crosstalk between O-GlcNAcylation and phosphorylation; for example, T58 of the transcription factor c-Myc can be both a target for phosphorylation and O-GlcNAcylation, while serum starvation promotes O-GlcNAcylation of c-Myc, serum stimulation shows the opposite effects (Fig. 7B) [226]. The O-GlcNAcylation of p53 at Ser149 inhibits its phosphorylation at Thr155, resulting in a reduced interaction between MDM2 and p53, and consequently inhibits the ubiquitin-dependent degradation of p53 (Fig. 7C) [227]. Similarly, the O-GlcNAcylation of snail1 inhibits its phosphorylation-mediated proteasome degradation (Fig. 3A) [228]. Except for O-GlcNAcylation, the N-glycosylation of PD-L1 can maintain its protein stability by antagonizing the binding of GSK3\u03b2 and phosphorylation-induced proteasome degradation (Fig. 4B) [122, 123]. However, the crosstalk between phosphorylation and O-GlcNAcylation is not always mutually exclusive. For instance, the O-GlcNAcylation of TGF-\u03b2 activated kinase 1 binding proteins (TABs) at Ser408 is accelerated by its phosphorylation at Thr404, and the O-GlcNAcylated TABs, in turn, activate TGF-\u03b2 activated kinase 1 (TAK1) and its downstream NF-\u03baB signaling pathway; this positive feedback facilitates the migration and invasion of TNBC (Fig. 7D) [229]. Furthermore, in addition to the crosstalk between non-histone PTMs, the crosstalk also exists between histones and non-histone PTMs [50, 137]. For example, the acetylation of MORC2 at K67 by NAT10 inhibit"} +{"id":"RedPajamaCommonCrawl.0012","text":"HB2 (2017-18) ALUMNAE The 77 women who completed the second Homeward Bound program all had a background (degree qualification, or equivalent) in a field of science. They represented a broad range of professions, occupations and career levels, and were selected based on their potential to have an impact on decision making as it relates to the state of the planet. Pathways and mechanisms for having impact formed a core part of program curriculum and discussions. This second cohort of women began their learning journey in April 2017, culminating in their voyage to Antarctica from 18 February to 17 March 2018, and extending with debriefings, collaborations and follow-up sessions for several months post-voyage. Now as alumnae, joining the 76 who went before them, they are helping fullfill Homeward Bound's ambition to develop a 1000-strong network of women with backgrounds in science who can support each other in changing the face of leadership and better managing our 'planet as home'. (Note: the following profiles may no longer be current; they are as provided during program participation.) Adriana Humanes Adriana has a PhD in Marine Ecology focussed on the effects of human activities and climate change on coral reefs. Her previous experience includes environmental education programs in Venezuela, monitoring coral bleaching in the Caribbean and assessing the effects of suspended sediments, nutrients and temperature on coral reproduction. She is excited about the opportunity to participate in Homeward Bound and is looking forward to discussing with other participants the strategies needed in underdeveloped countries to make people aware of the need of mitigating the impact of human activities on climate change. W: adrianahumanes.com (Adriana was chosen to be the first recipient of the Homeward Bound Founders (partial) scholarship, funded by crowdfunding donations) Alicia Perez-Porro Research associate, Smithsonian Institution New York, United States, originally from Spain Alicia's passions span science as much as the experience of scientists and science in society. With more than one decade in research, she also works to make science more inclusive, understood, and creative. Originally from Barcelona, Spain, she holds a MSc in Biodiversity, a PhD in Biology on ecology and genomics of marine sponges, conducted at Harvard University, and is currently a Smithsonian National Museum of Natural History Research Associate. Recognising the unique barriers women face in science, she created and chairs the Women in Science Commission (MECUSA) of the Association of Spanish Scientist in the USA (www.ecusa.es). W: aliciaperezporro.com Ana Chang Founder\/Principal, Concept Hatchery Ana is curious about why people do the things they do. She uses ethnographic methodologies to uncover the social, cultural, and psychological drivers of behavior. Ana is the founder of Concept Hatchery, an insight and strategy consultancy. She helped found Seafood Legacy, a Japanese sustainable seafood advocacy, where she serves as international advisor. She is passionate about cultural fluency in the global sustainable seafood community. Ana is a world traveler, avid Disney fan, and loves running for charity in the Hogwarts Running Club. She is blogging about her Homeward Bound journey at Queendom of Ice on Facebook. Beth Christie Lecturer in Education (Learning for Sustainability), University of Edinburgh Dr Beth Christie is a Lecturer at the University of Edinburgh. She leads the MSc Learning for Sustainability and is Associate Editor of the Journal of Adventure Education and Outdoor Learning. Being passionate about re-visioning education for a sustainable future, she has worked closely with academics, teachers and leaders across Scotland to consider how this future may develop in theory, practice and policy. At a global level she has developed and led a MOOC (Massive Open Online Course) in Learning for Sustainability: Developing a Personal Ethic. She is married with two children and loves to run, snowboard and be outdoors. C\u00e9cile Godde PhD student, CSIRO-Food Systems and Global Change & The University of Queensland-QAAFI Queensland, Australia, originally from France C\u00e9cile is an environmental and agricultural scientist currently undertaking her PhD in sustainable grazing systems intensification. She is passionate about the challenges in relation to sustainable food systems at the farm level as well as in a national and global context. She wishes to better inform decisions to feed the world more sustainably and equitably now and in the future. She loves sharing her research with others, travelling, discovering new cultures, outdoor activities, painting and playing music. W: cecilegodde.wordpress.com\/ T: twitter.com\/Cecile_Godde Elisa Harvey Veterinarian and Biotech Consultant (CardioMed Device Consultants LLC) Maryland, United States Elisa is a practicing veterinarian and biotech consultant from Maryland, USA. She also holds a PhD in physiology and Master's in ecology and evolutionary biology from the University of Connecticut. She has had a varied career in veterinary practice, spent a decade reviewing medical technologies and leading other scientists at the US Food and Drug Administration, and another decade consulting for the global biotech industry. Her passions include international veterinary volunteer work, travel and equestrian pursuits. She avidly believes in the One Health concept to improve human, animal and environmental health, and is a proud mother of two scientist sons and a menagerie including five horses, two dogs, a cat and chickens. \u00c9milie Lefol Phd Student at the University of Sherbrooke Qu\u00e9bec, Canada, originally from Normandy in France \u00c9milie's passion for studying birds and mammals grew throughout her studies. Then also she became passionate about travelling. After obtaining a Master's degree in Biology, she spent 5 years working for different research organisations. Her various missions led her to travel the globe and follow many species. Accustomed to extreme and isolated environments, \u00c9milie recently spent 15 months on an island in the French Southern and Antarctic Territories studying the Royal Penguin. Curious and enthusiastic, this young woman has it in her to transmit her passions and knowledge to the greatest number. Hannah Laeverenz Schlogelhofer PhD student, University of Cambridge Hannah loves the outdoors and enjoys trekking, ski-mountaineering, yoga and contemporary dance. She studied Natural Sciences at Cambridge, specialising in Chemistry. She then continued at Cambridge joining the Nanoscience and Nanotechnology Doctoral Training Programme. Hannah is now a PhD student working in the Physics and Plant Sciences Departments at Cambridge and is a Scholar of the Winton Programme for the Physics of Sustainability. Her research is in the field of microbial ecology and focuses on the mutualistic nutrient exchange between algae and bacteria. lsabel Zhang Zhang Investment Analyst, International Finance Corporation (World Bank Group) DC, United States Isabel is an investment analyst for climate-related projects at the International Finance Corporation, a member of the World Bank Group focussed on private sector development in emerging markets. Her areas of responsibility include the global renewable energy supply chain, energy efficiency and climate smart agriculture. Prior to joining the World Bank, Isabel worked at Goldman Sachs as an equity research analyst, advising institutional investors on long-term investment opportunities. Isabel is passionate about solving global environmental challenges and believes that the path toward a more sustainable future requires the collaboration between key decision-makers \u2013 scientists, entrepreneurs, investors, policy-makers, and crucially, requires educating and persuading the public on the shared vision. She is honoured and excited by the opportunity to be part of the Homeward Bound community of female role models. Born in Spain, Isabel is fluent in Spanish, Mandarin and English, and was selected as a member of the UK Parliament's Diaspora Emerging Leadership Programme. For fun, Isabel loves travelling, scuba diving and yoga. Jessica Kretzmann PhD Candidate, The University of Western Australia Jessica is a PhD student in chemistry and nanotechnology at the University of Western Australia. Growing up in rural Western Australia, Jessica learnt first-hand how outreach programs for science education are crucial for building a culture of science, and has passionately pursued her PhD and outreach programs to share her enthusiasm and knowledge of science. Jessica is researching the design and evaluation of new materials for delivery of gene therapies, for treatment of diseases such as cancer. Jessica is committed to a range of voluntary science engagement activities, promoting science to local and rural school students through SciTech, Education Lab and Ignite Mentoring, and as an Australian Nanotechnology Network Young Nanotechnology Ambassador. Karen Alexander Research Fellow, University of Tasmania Tasmania, Australia Karen is a research fellow in ecosystem-based management at the University of Tasmania. Her research focusses on 'blue growth' and she is particularly interested in understanding why conflict occurs around coastal and marine natural resource use. Originally from Scotland, Karen did her PhD at the Scottish Association for Marine Science. Karen feels quite at home in Tasmania \u2013 she loves the mountains and the sea. Outside of work she enjoys mediation, bushwalking, kayaking, general adventure and is currently learning to help crew a 40-foot Dubois racing yacht called 'Ultimate Challenge'. Kathryn Scott Senior Project Officer with the Department of Agriculture and Fisheries in Brisbane Kathryn has a Master of Environment (Economics and Policy major), and a Bachelor of Learning Management (Primary major). After several years working in education, Kathryn made a career shift in following her heart to study and work in the environment and natural resource management field. She is passionate about sustainability and is thrilled to be part of Homeward Bound, eager to collaborate in leading the way to elevate climate change action towards a sustainable future. Laura Wells Environmentalist, model, science communicator Laura is an environmentalist, presenter and one of Australia's top plus-size models. Holding degrees in Biology and Law, qualifications in Environmental management systems and currently studying a Diploma of Paramedical Science, Laura's passion for the environment, love for the ocean and interest in climate change has lead her to become a positive role model, advocate and ambassador for change. Working on environmental campaigns with The Boomerang Alliance, Greenpeace, 1 Million Women, WWF, Marine Stewardship Council, Corona x Parley and within the sustainable fashion realm has allowed Laura to extend the voice of environmental awareness and help to educate those people not normally influenced by such a sphere. Maddie Brasier PhD Student, University of Liverpool and Natural History Museum, London Maddie Brasier is a PhD student at the University of Liverpool and Natural History Museum, London. Her PhD research combines DNA barcoding, modelling and stable isotope analysis to further our understanding of the diversity, biogeography and trophic traits of Antarctic Polychaetes. She has collaborated with British Antarctic Survey and the US Antarctic Program on expeditions and research projects. She is passionate about science communication; regularly organising and delivering outreach events as a STEM Ambassador and with the UK Polar Network. After her PhD Maddie wishes to remain in polar science and is really excited to go south with Homeward Bound! Megan Oaten Senior Lecturer, Menzies Health Institute, Griffith University Dr Megan Oaten is a Senior Lecturer with the Menzies Health Institute, Griffith University, Gold Coast, Australia. Her research focusses on stigmatisation and disease-avoidant behaviour in humans. Megan has been the recipient of the prestigious Australian Postdoctoral Fellowship (2010-2012), funded by the Australian Research Council, and is currently the lead CI on an Australian Research Council Discovery Project Grant \"Determining the role of disease avoidance in stigmatisation\" (2015-2018). She has worked as an editor on the Royal Society's Special Issue in Philosophical Transactions B on Behavioural disease avoidance: From animals to culture. Graduate Director, ARC Centre of Excellence for Climate System Science, UNSW Melissa Hart is a climate scientist whose research focusses on the impact of cities on climate and climate on cities. Melissa has developed and leads a national cross-institutional graduate program in climate science, which has trained 120 PhD students. She is passionate about gender equity in science and is the chair of the Equity and Diversity committee in the Australian Meteorological and Oceanographic Society. Melissa has lived and worked on four continents and has dreamt of travelling to Antarctica since year 11 geography. Nicole Fetchet Outreach Science Communicator, Questacon Nicole grew up on the coast, spent her holidays exploring the outdoors and constantly asked questions about the world around her. With a keen interest in the everyday applications of science, she pursued an International Bachelor of Science degree in Chemistry. As a female industrial chemist working, studying and collaborating with industry, Nicole realised she needed to do more for women in this sector, so she ran away to join the Science Circus! Now, as a science communicator, Nicole facilitates workshops, encourages exploration of the sciences and shares her enthusiasm with students at Questacon, the National Science and Technology Centre. Paola Tello Guerrero Physicist, ALS Petrophysics UK, originally from Colombia Paola was born and raised in Colombia (Latin America) and started working on energy industry-related projects, social responsibility, and leadership programs since 2008 in both Colombia and United Kingdom. She founded the Colombian Women Geo-Networking, an initiative to motivate women participation and promote the exchange of geoscientific information. Paola holds a Bachelor\u00b4s degree in Physics from the Industrial University of Santander and is a specialist in rock's physical properties. Paola is curious about how things (and humans!) work and commit with the responsibility of leaving our planet in better conditions that she found it. She is honoured to be the first Colombian in Homeward Bound. Rachel Zombor Director & Consultant Clinical Neuropsychologist (Acting), Department of Health Rachel has worked as a neuropsychologist for over a decade and has qualifications in science, neuropsychology, counselling and management. She currently directs and operates the clinical, training and research programs of a statewide mental health unit. Rachel is passionate about improving health services and loves teaching, supervising and mentoring. She has an interest in concise and simple communication and aspires to combat the rise of anti-science sentiment, \"alternative facts\" and climate change denialism. Homeward bound embodies many of her passions \u2013 gender equality, science, leadership, personal development and travel (Antarctica!!). Rebecca Doyle Senior Lecturer, The University of Melbourne Dr Rebecca Doyle is a senior lecturer with the Faculty of Veterinary and Agricultural Sciences, and researcher at the Animal Welfare Science Centre, the University of Melbourne. After studying animal science at Sydney University, Rebecca completed a PhD with the CSIRO where she studied cognitive measures of animal welfare. Rebecca still studies fundamental measures of welfare, but now also conducts applied research, including improving animal welfare and production in developing countries. Rebecca loves working in the area of sheep cognition, but has a soft spot for Galapagos tortoises, sloths and other slow-moving creatures that occupy slightly obscure ecological niches. Samantha Nixon PhD student, University of Queensland Samantha began research during her Biomedical Science degree in wildlife conservation, using 3D modelling and printing to understand the skeletal anatomy of bilbies and wombats to understand key arthritic and dental diseases which hamper captive breeding efforts and to design more effective breeding programs. Despite her arachnophobia, she began studying spider venoms against major sheep parasites, the Sheep Blowfly and blood-feeding Barber's Pole Worm. She has continued this work in her PhD, overcoming her phobia as she uses spider venoms to create next-generation drugs against neglected tropical diseases and livestock parasites. Samantha is passionate about using leadership to improve access to medicine and education globally. Sandra Guzm\u00e1n Founder and General Coordinator, GFLAC and PhD student, University of York Sandra Guzman is a Mexican social scientist and climate activist with interest in climate finance and energy transition. Sandra is a PhD student in Politics in the University of York, and is the founder and the General Coordinator of the Climate Finance Group for Latin America and the Caribbean (GFLAC). She has been a climate activist since 2005 working in organisations such as WWF and CEMDA in Mexico. She holds a Master Degree on Environmental Policy and Regulation by LSE, and a Degree on International Relations by the UNAM. She is a happy mother of a 20-month-old baby. Dr Sarah Hanieh Early Career Research Fellow, Peter Doherty Institute for Immunity and Infection, University of Melbourne Sarah is a paediatrician and Early Career Research Fellow working in the area of global health with a strong interest in nutritional and infectious causes of impaired child growth and development. She has previously spent time working in a variety of settings in a clinical, research and policy capacity including Nepal, Papua New Guinea, Liberia, South America, Ethiopia and Vietnam, as well as with Indigenous communities in the Northern Territory. Her current research focusses on preventing chronic undernutrition in children in resource poor settings. Stacey Noel Director of Stockholm Environment Institute's Africa Centre Stacey is a social economist with a research focus on the interaction between natural capital and rural livelihoods in developing countries. Prior to joining SEI, she worked for the Toledo Institute for Development and Environment in Belize and as a Foreign Service Officer for the US Department of State in Washington, DC and Hong Kong. She has an MSc with Merit in Development Management from the London School of Economics. Stacey, an American, is the mother of three children raised in six countries across four continents. Susan Scott Professor of Theoretical Physics, Research School of Physics and Engineering, Australian National University, ACT, Australia Professor Susan Scott is Professor of Theoretical Physics in the Research School of Physics and Engineering at the Australian National University. She became the first female Professor of Physics (with one other woman) at the Australian National University in 2009. Her research expertise is in gravitational physics, general relativity theory, cosmology and gravitational waves. Professor Scott is a member of the international team which announced the first direct detection of gravitational waves on Earth in 2016. She is a Fellow of the Australian Academy of Science and of the European Academy of Sciences. She is a Program Leader in the new Australian Research Council Centre of Excellence for Gravitational Wave Discovery and an enthusiastic Ambassador for Business Events Sydney. Professor Scott is passionate about science, and as a woman and the proud mum of two daughters, cares deeply about the participation of women in science and policy making which will determine the future health of our planet. Val\u00e9rie Sage Senior Research Scientist, CSIRO Energy WA, Australia, originally from France Valerie is a Senior Research Scientist, with extensive experience and expertise in Energy and Natural Gas Processing and Conversion. Although working in the area of fossil fuels, her research has a strong focus on emissions reduction, greenhouse gases transformation, and process optimisation and intensification to reduce waste, footprint and cost. Through her career, she has developed a strong background in Chemistry (PhD from the University Of York, UK) and Chemical Engineering, with expertise in energy generation, gas processing and heterogeneous catalysis. Outside of work, she enjoys the great outdoors (cycling, diving, Dragon Boat Paddling), making the most of the amazing WA weather and environment, especially with water close by. Alexandra Dubini Research fellow, University of Cordoba Spain, originally from France Dr Alexandra Dubini studied and obtained her PhD in Molecular Biology from the University of East Anglia, UK (2005). She worked 10 years (2005-2015) at the National Renewable Energy Laboratory (NREL, USA) as a research scientist where she focussed on understanding the metabolic pathways involved in biofuel production, from green algae, and more specifically hydrogen production. She is a well-known expert in this field and authored many scientific publications. She recently expended her work to waste water bioremediation using algae bacteria consortia. She is working in collaboration with many laboratories around the world and is eager to promote algae as the next source of energy and valuable products for more sustainable solutions. She often commits in outreach activities and coaching of students, including collaboration with the NASA. Moreover, she is entitled as a yoga teacher and massage therapist. In her free time Alexandra loves dancing, skiing and traveling. Amal-Lee Amin Division Chief of Climate Change, Inter-American Development Bank Amal-Lee's lead responsibilities include implementing the Paris Agreement. From 2001-11 she had several roles leading strategy and policy on climate change, including designing a new Green Investment Bank and the Climate Investment Funds. From 2011-15 Amal-Lee was Associate Director at E3G where she established a high-level dialogue on China's Green Finance Pathway and was a member of the Green Climate Fund's Private Sector Advisor Group. Her PhD on policies for renewable energy investments in India and South Africa has been central to her career. Ana Payo Payo PhD Candidate Biodiversity, IMEDEA-CSIC-UIB\/ Barcelona University Ana is a passionate scientist with a particular interest in population ecology. She is about to defend her PhD on the effects of environmental variability and perturbations on seabirds population dynamics. She believes that addressing the challenge of empowering women and engaging people in science has never been more urgent in order to avoid loss of scientific talent and to ensure future innovation capability, excellence and competitiveness. That's why she invests most of her free time doing scientific outreach (scientific stand-up comedy shows) with Big Van. Brenda Lin Research Scientist, CSIRO Brenda Lin is a senior research scientist with CSIRO working in the Land & Water Division on climate change impacts on biodiversity and ecosystem services. Prior to CSIRO, Brenda was based at the US Environmental Protect ion Agency in Washington DC with the Global Change Research Program researching question of resilience to climate change in socio-ecological systems at multiple scales. Prior to her work at the EPA, Brenda was at The Earth Institute at Columbia University working on agricultural development and climate change adaptation for small-holder farmers in Brazil and India. Brenda has also worked in coffee agroforestry systems in Southern Mexico researching the ability of diversified shade coffee systems to protect coffee farmers from the effects of increasing temperature and precipitation variation. Daniela Lainez del Pozo PhD candidate, University College London Daniela is PhD candidate in Geography at University College London, a biologist and photographer from Peru. Her interest is in interdisciplinary approaches to conservation. Since 2015 she has done ethnographical research in northern Peru, an area highly vulnerable to El Ni\u00f1o and climate change, where she is exploring stakeholder perspectives on the challenges to achieve effective MPA management. Before this, she led technically demanding conservation projects like the biological baseline study of the Manu-Tambopata Conservation Corridor, and has also lectured at university. Her photography has been awarded recognition twice at UCL Research Images as Art competition and her research is supported by INNOVATE-Peru, EFN-WWF, UCL, RGS-IBG, and the Scott Neotropical Fund. W: www.geog.ucl.ac.uk\/people\/research-students\/daniela-lainez-del-pozo (Daniela was selected as the recipient of a full scholarship position on Homeward Bound, provided by major sponsor Kathmandu) Fern Wickson Senior Scientist and Leader of the Society, Ecology and Ethics Department, Gen\u00d8k \u2013 Centre for Biosafety Dr Fern Wickson is an Australian citizen currently working as Senior Scientist and Leader of the Society, Ecology and Ethics Department (SEED) at Gen\u00d8k Centre for Biosafety in Troms\u00f8, Norway. Trained in biology and political science, with an interdisciplinary PhD across the natural and social sciences, she is committed to advancing sustainable agriculture, responsible innovation and resilient socio-ecological futures. Her research explores the interface between environmental science, philosophy and politics, with a particular specialisation in the governance of new and emerging technologies. Fern is also a yoga teacher who enjoys hiking, kayaking, snowboarding and trying to grow her own food. Helen Corney PhD Candidate \u2013 Global, Urban and Social Studies, RMIT Helen has worked in the environment sector for over two decades with numerous roles including Park Ranger, River Health Officer, and teaching Conservation and Land Management. She has a passion for working with members of the community to enhance their understanding and enjoyment of the environment whilst undertaking conservation work. After working on river health issues, Helen was inspired to research the relationship between the human well-being benefits of urban waterway corridors and biodiversity and the implications this has for environmental management. She is currently completing a PhD with the Interdisciplinary Conservation Science Research Group at RMIT University, Melbourne, Australia. Jamie Womble Marine Ecologist, National Park Service, Glacier Bay Field Station Juneau, Alaska Dr Jamie Womble is a marine ecologist based in Juneau, Alaska. Her research interests are focussed on using innovative tools to assess the influence of prey availability and changes in ice habitat on the foraging ecology, diving behaviour, distribution, and migrations of top marine predators in temperate and subpolar regions. Jamie currently leads research projects on harbour seals and sea otters for the National Park Service in tidewater glacier fjords in Alaska. Jamie holds a PhD in Wildlife Science from Oregon State University, an MS from the University of Alaska Fairbanks, and was an Endeavour Post-Doctoral Research Fellow at the Institute for Marine & Antarctic Studies at the University of Tasmania. Jamie has led and participated in research projects throughout coastal Alaska, Argentina, Chile, and Tasmania on fish, songbirds, penguins, seals, sea lions, sea otters and whales. Jill M Lynn Veterinarian\/Owner of Harmony Mobile Veterinary Clinic, US Army Reserve Veterinary Corps Officer Dr Jill Lynn owns and operates a mobile veterinary clinic in Sault Sainte Marie, Michigan USA. She also serves as a Captain in the United States Army Reserve Veterinary Corps. Her two most exciting army missions included a six-month deployment in East Africa, where she partnered with local animal health workers in remote areas, and a three-week mission in the Darien province of Panama. Jill earned a Doctor of Veterinary Medicine degree from Michigan State University in 2008, an AS from North Central Michigan College and a BA in History from the University of Michigan. Kate Clarke Senior Veterinarian with Eureka Veterinary Hospital, Ballarat Kate has worked in private veterinary practice in rural Victoria and England, before returning in 2001 to the Ballarat region where she grew up. She's committed to providing quality care to companion animals and their owners, gaining her Membership of the Australian and New Zealand College of Veterinary Scientists in Small Animal Medicine in 2003. Kate's also a mother of two, qualified Interior Designer, amateur Landscape gardener, enjoys Latin dancing, loves her cattle and being outdoors (especially at sunset), is active on her kids' school council and in local sporting communities, and lives to travel. She's excited to represent rural Australian women and learn how to positively influence our natural world on a larger scale. Kimberly Vinette Herrin Veterinarian, Taronga Conservation Society Australia Sydney, Australia, dual citizenship with USA and Australia Kimberly is an adventurous and caring zoo and wildlife veterinarian, working for nearly 20 years in both a clinical and conservation capacity. During 10 years at Taronga Zoo, she participated in conservation medicine programs for chimpanzees in the Republic of Congo, orang-utans in Indonesia and marine turtles worldwide. With a MS in Oceanography, her marine research passion led to working in the Arctic with Bowhead whales and sub-Antarctic pinnipeds. She also has interest in teaching veterinarians from developing countries, diving, flying, sailing and photography. Lee Constable Host of Scope, Australian kids' science TV show, produced by Network Ten with CSIRO With a double degree in Science\/Arts and Honours in Biology, Lee has a diverse background in environmental science, plant science, sociology and drama. Lee loves combining science with media and the arts. She was a presenter in the Questacon Science Circus while gaining a Master of Science Communication Outreach, and started a youth-run radio show called SoapBox focussed on social justice and sustainability. Lee now spends her days on camera and her nights planning her passion project, Co-Lab: Science Meets Street Art. Madeline Mitchell Postdoctoral fellow. CSIRO Agriculture and Food, Canberra ACT, Australia Madeline is plant molecular physiologist interested in understanding the way plants respond to their environment to optimise growth and how we can best use science for a more sustainable, food-secure world. During her PhD at the University of Cambridge, she investigated the way algae photosynthesis more efficiently, contributing to an international collaboration to re-engineer crop photosynthesis to improve yields. Currently a postdoctoral fellow at CSIRO, she is working on turning starch crops into oil crops to meet the growing demand for plant oil. She is also passionate about gender equity and diversity in STEM. Freshwater ecologist, water allocation planning officer, Department of Environment, Water and Natural Resources Growing up in the outdoors on a small cattle farm and spending weekends camping and bush-walking, Melissa dreamt of having a job working out-bush in nature. After studying Environmental Science, she was drawn to the remoteness of the arid zone, and the camaraderie of the community and people researching Australian desert rivers. This is where she undertook further study and researched freshwater turtles. Her passion was enhanced when she met and worked with Aboriginal people, first in the Northern Territory and then in South Australia where she learnt about science from a cultural perspective. Having loved working in natural resource management with pastoralists and Aboriginal people across the arid-zone rangelands, she is now embarking on a new journey on Aboriginal water planning and policy for the South Australian River Murray. T: twitter.com\/Mel_EcoCulture Natalia Melcer Chemist, US Department of Energy Maryland, United States, originally from Canada Natalia Melcer works at the intersection of science and policy in Washington, DC. Since 2005, she has worked in a spectrum of science policy positions relating to chemistry, physics and energy. She currently works in the Office of Basic Energy Sciences at the US Department of Energy (DOE) on budget formulation, strategic planning and communications. In previous positions, Natalia focussed on policy through budget formulation and execution activities at DOE, and on science as a senior program officer with the Board on Physics and Astronomy at the US National Academies. She is a dual citizen of Canada and the US and enjoys yoga, photography and travel. Nina Earl Assistant Curator, Museum of Applied Arts and Sciences As a creative science enthusiast, Nina works as a curator at the Museum of Applied Arts and Sciences (a dream job). She develops exhibitions, manage the museum's collection and engage with visitors at public events. She has a strong background in science education and outreach, having worked for Fizzics Education and ACTEW Water. Nina holds a Masters of Science Communication from ANU and a Bachelor of Science from UNSW. She is passionate about motivating young women to pursue careers in science, technology, engineering and mathematics and believes it is important that there are strong female role models for them. Priscilla Wehi T\u0113n\u0101 koutou e te wh\u0101nau. Government scientist and Rutherford Discovery Fellow at Landcare Research Manaaki Whenua Cilla graduated with a PhD in Ecology and M\u0101ori from the University of Waikato, and her current research focusses on connections between culture and biodiversity, and ecological restoration. She also studies terrestrial alpine crickets. She is passionate about inclusivity and diversity in science, and is a mother of three amazing young adults. W: heherengakorero.co.nz\/about\/priscilla.html Rachelle Balez PhD candidate, University of Wollongong Rachelle Balez is a 3rd year PhD student at the Illawarra Health and Medical Research Institute, whose work focusses on understanding the molecular mechanisms underlying Alzheimer's disease by generating neurons from patient derived induced pluripotent stem cells. Rachelle is passionate about STEM education and has travelled to rural and regional high schools across NSW, Australia, as part of the UOW STEM Road Show. Rachelle is also secretary for the Australasian Neuroscience Society Student Body Committee, where she is working to help support the needs of neuroscience students across Australia. As well as her love for science, Rachelle is a practicing artist with a Bachelors degree in Creative Arts, is an avid traveller and really enjoys eating. Rebecca Waddington LCDR Rebecca Waddington is a Commissioned Officer, National Oceanic and Atmospheric Administration (NOAA) Missouri, United States Rebecca grew up in California and developed a passion for weather. She graduated with a Bachelor of Science in Meteorology and immediately joined the NOAA Corps. Her first assignment was as navigation officer aboard NOAA's oceanographic research vessel, the KA'IMIMOANA. Following her sea time, she transitioned to working in the storm surge unit at the National Hurricane Center. In 2009, she traded her sea legs for wings and became a pilot. She now combines her love of weather and flying by working at the Aviation Weather Center and serving as aircraft commander on NOAA's premiere remote sensing platform. Sandra Velarde Economist, Scion (New Zealand Forest Research Institute Ltd) Bay of Plenty, New Zealand, originally from Peru Born and raised in Peru, Sandra's curious mind and thirst for knowledge, has taken her to work in Italy, Kenya, Brazil, Peru, Australia and New Zealand. Her research interests are understanding innovation processes and scenario planning. At Scion (New Zealand Forest Research Institute) she focusses on developing adaptive governance approaches to decision-making. Sandra is completing a PhD at the Australian National University. She holds a MSc in Ecological Economics (University of Edinburgh) and BSc in Forest Sciences (Universidad Nacional Agraria La Molina). Sandra enjoys travelling, meeting new people, water colours, marketing her family's dog business, growing her own food, scuba-diving and advocating for women in leadership. Paediatric Registrar, Sydney Children's Hospital New South Wales, Australia, originally from New Zealand Sarah is a medical doctor originally from New Zealand who is currently undertaking specialist training in Paediatrics and Child Health in Sydney, Australia. She has career interests in general paediatrics and preventative medicine as well as medical education and leadership. Sarah loves spending time in the outdoors and enjoys hiking, running and completing endurance events (slowly!). She has always been fascinated with Antarctica and is absolutely thrilled to see it for herself, along with the opportunity to acquire valuable leadership knowledge and skills in a collaborative environment with this group of incredible women. Sue Mauger Science Director, Cook Inletkeeper Alaska, United States Sue has been studying impacts of climate and land-use change in Alaska's wild salmon streams for 17 years. She coordinates regional water temperature data collecting networks with diverse partners and uses thermal infrared imagery to map cold water habitat, which is critical for the persistence of salmon during this time of rapid change. Sue is interested in research that can be applied to decision making and public policy, and strives to connect people through stories informed by science to reach common goals. Sylvia Struck Manager, Drinking Water Safety Program, First Nations Health Authority Vancouver, BC Canada, originally from United States Dr Sylvia Struck's energy and enthusiasm for the environment and her philosophy that health is a basic human right permeate her work. She started her career as an environmental engineer, but her interest in human health impacts inspired her to complete a PhD in Public Health. Her research focussed on how livelihood, poverty and policy influence water access in rural Uganda. She currently works with First Nations communities to support sustainable access to safe, reliable water supplies. Sylvia also lectures at the University of British Columbia on global environmental health and the impacts of climate change on human health. Veronique Florec Post-doctoral researcher in environmental and resource economics, Veronique's research focusses on improving the management of our natural environment through multidisciplinary projects that combine social, environmental and economic information. She uses integrated bio-economic modelling to evaluate the impact of different land management strategies on people and the environment. Veronique is currently leading a project that focusses on applying economic analysis to the management of natural hazards to help decision makers get better value for money from public investments in hazard mitigation. She is both Colombian and French, and loves living in Australia. Xuehua Zhang Professor of Environmental and Climate Policy, Institute of New Energy and Low Carbon Technology of Sichuan University Sichuan, China Xuehua's area of research interests is environmental policy-making, environmental governance, agricultural pollution control, ecological farming, urban waste management, and environmental legal institutions. She has contributed to the international policy community and its understanding of the actual functions and operations of China's environmental governance system, mostly through providing consulting services to governments and international organisations. She just recently completed a study on the community-based waste segregation and composting at source in Bengaluru, India, and is conducting similar experiments in Chengdu, China. Xuehua received her PhD from Stanford University, USA. Alice Ruhweza Executive Director, Vital Signs at Conservation International Kenya, originally from Uganda Alice is the Executive Director of Vital Signs, an integrated monitoring system that generates data on agriculture, ecosystems and human wellbeing and transforms them into decision support tools for managers and planners to enable better decision-making in support of sustainable development. Before Vital Signs, Alice worked for the United Nations Development Programme (UNDP) team leading the Environmental Finance Unit in Africa. Alice's more recent work has focussed on systems thinking and identifying decisions points or processes across sectors where data can be influential in policy and planning. This is what attracted her to Vital Signs where she will continue to promote multi-scale and multi-sectoral use of Vital Signs' data. Alice holds a Bachelor's Degree in Social Sciences from Makerere University (Uganda), and a Master's Degree in Agricultural and Applied Economics from the University of Wisconsin (USA). W: vitalsigns.org Amanda Kirk Environmental and humanitarian engineer, Opus International Consultants Ltd Bay of Plenty, New Zealand Amanda has a Bachelor of Engineering (Honours) majoring in Natural Resources and currently works for Opus International Consultants as an Environmental Engineer. She is involved in a wide range of environmental projects including stormwater design, hydrology and geospatial analysis. Amanda is passionate about humanitarian development and volunteers with Engineers Without Borders New Zealand (EWBNZ) where she is currently managing the National Research Program. EWBNZ is a not-for-profit organisation which aims to confront the global challenges of poverty, sustainable development and social inequity through humanitarian engineering. Anais Pages Western Australia, Australia, originally from France Anais was born and raised in France, lived in the Caribbean Islands and the UK and is now living in Perth, Australia. After undertaking a BSc and MSc in Environmental Sciences and a PhD in Applied Chemistry, she currently works as a research scientist in CSIRO, Perth. Her research is at the boundaries between organic chemistry, geology and evolutionary biology and promotes a better understanding of the origins of life on Earth and its evolution through time. She loves sharing her love of science and is strongly involved in science outreach programs in Western Australia. Catherine Sorbara Chief Operations Officer of the Cheeky Scientist Association and Chair of Cambridge AWiSE United Kingdom, originally from Canada Cathy completed her PhD in 2014 at the Technical University of Munich, Germany. Her dissertation focussed on the molecular mechanisms which lead to axon degeneration in Multiple Sclerosis. She has since shifted gears to help academics find their own passion. She currently resides in Cambridge UK where she is the Chief Operations Officer of Cheeky Scientist, a training platform for academics who want to transition into industry. She also cares about strengthening the voice of women in science and is Chair of Cambridge AWiSE, a regional network for women in science, engineering and technology in both industry and academia. Elena Joli Physics Teacher and Science Editor Elena is an Italian theoretical physicist, teacher of physics at upper school. Elena studied black holes at the University of Bologna and at \u00c9cole Normale Sup\u00e9rieure in Paris. She holds a Master in Science communication from SISSA-International School for Advanced Studies in Italy, and for almost 10 years she has been writing physics textbooks, translating and editing into Italian scientific books from English and French and working as science editor for an Italian publishing company and a science magazine. She is author of a scientific essay about the role of metaphors in science communication and of a science book for kids about black holes. Ellen Moon Research Associate, Southern Cross GeoScience, Southern Cross University New South Wales, Australia, originally from the United Kingdom Dr Ellen Moon is a geochemist at Southern Cross University. She grew up on the island of Jersey, and received her PhD in Ocean and Earth Science from the University of Southampton in 2012. She moved to Australia in 2011 and since then has worked in both industry and academia, on projects related to environmental sustainability of industrial processes and resilience of remediated landscapes to climate change. Recently, she has been involved in national scientific policy design. Ellen is passionate about making STEM careers more attractive and accessible to young women, and is looking forward to learning new skills to facilitate this through the Homeward Bound global leadership initiative. Gaia Dell'Ariccia Postdoctoral Researcher, collaborating with the Centre for Evolutionary and Functional Ecology, Montpellier France, originally from Italy Dr Gaia Dell'Ariccia is a behavioural ecologist working on petrel seabirds' migration, navigation and homing, and on their sensory ecology. After completing her master studies at the University of Rome (Italy), she carried out her PhD at the University of Zurich (Switzerland) investigating homing pigeons navigation abilities. She worked for 4 years postdoc at the Center of Evolutionary and Functional Ecology of Montpellier (France) studying the olfactory ecology of petrels. She spent the last two years at the University of Barcelona (Spain) studying the trans-equatorial migrations of shearwaters. She is currently based in France working on seabirds' movement ecology. Hilary McManus Associate Professor of Biology at Le Moyne College in Syracuse Hilary holds a PhD in Botany from the University of Connecticut and studies species diversity and organellar genome evolution of freshwater green algae. She mentors students in projects characterising the algae of Central New York State, in house rain-gutters of North Carolina, and in freshwater habitats of Iceland. She teaches courses in botany, evolution and environmental issues, and encourages students to seek active roles in addressing climate and environmental issues on campus and at home. Her free time is spent with her family enjoying the outdoors hiking, camping and canoeing. Jessica Brainard Curator, New Museum Project, Western Australian Museum Western Australia, Australia, originally from the United States With a background in environmental science communication, Jessica has a knack for distilling complex information and making science come to life for diverse audiences. In her current role, Jessica develops museum exhibitions that celebrate and inspire people to conserve the amazing biodiversity of Western Australia. She serves as a bridge between scientists and the lay public \u2014 effectively interpreting environmental messages to move both hearts and minds. Jessica is passionate about sharing stories that showcase the voices of women in science. An ocean lover, she views Homeward Bound as an opportunity to shine a light on the effects of climate change on marine ecosystems and their most vulnerable inhabitants. Justine Barrett Post-graduate student, University of Tasmania Justine is a post-graduate student at the University of Tasmania studying a Master of Antarctic and Marine Science \u2013 and absolutely loves it! She also runs a very small business wowing four-year old preschool children with the wonders of science and assists their teachers to include more science into their program. Justine is passionate about science communication and has developed activities to engage secondary students in current science issues. She would love to see Antarctic science being taught in all secondary schools in Australia and is working towards this goal. Justine has three young daughters whom she expects will take over the world one day \ud83d\ude09 Dr Katherine R Duncan Chancellor's Research Fellow and Lecturer Marine Natural Products Drug Discovery, University of Strathclyde, Strathclyde Institute of Pharmacy and Biomedical Science, Glasgow Kate discovers novel antibiotics and anticancer compounds from the oceans using a multidisciplinary approach encompassing microbiology, comparative metabolomics, chemistry, ecology and molecular biology. She has over 12 years' research experience, including a RSC MChem (Scotland), an international Masters placement in Chemistry (Florida), a PhD in Biomedical Sciences (Canada), two postdoctoral fellowships in Marine Biomedicine (University of California) and Marine Biotechnology (Scottish Marine Institute). She started her own research group in 2016. W: http:\/\/katherinerduncan.weebly.com. Laura Trotta Founder and Director, Laura Trotta Enterprises Laura Trotta has a Bachelor of Environmental Engineering and a Masters Science in Environmental Geochemistry. Following a lengthy career in the Minerals Industry, Laura took her voice online (lauratrotta.com) and created a number of online sustainability programs which inspire and guide parents to make sustainable lifestyle choices. Marie Clarke Science domain leader and classroom teacher, Maffra Secondary College Marie completed a Bachelor of Arts and Bachelor of Science before her PhD in Immunology at the University of Melbourne. After a post-doc studying the effects of gut microbiota on immune responses, she completed a Dip.Ed and is currently leading the Science team at Maffra Secondary College while taking intermission from a medical degree at Monash University. Marie is passionate about increasing STEM engagement and opportunities among rural students, particularly females, and is working to increase community-owned renewable energy sources with the Wellington Renewable Energy Network. She has two young children and writes fiction in her spare time. Melissa Cano Postdoctoral researcher, National Renewable Energy Laboratory Colorado, United States, originally from Marseille, France Melissa has a passion for science, yoga, nature and the night sky. Currently she works as a microbiologist at the National Renewable Energy Laboratory (NREL) in Colorado, USA. Her research focusses on developing future biofuels and biotechnologies. She obtained her PhD in 2013 at the Alternative Energies and Atomic Energy Commission (CEA) in Cadarache, France, where she studied the bioproduction of hydrogen by cyanobacteria: fascinating bacteria that can do photosynthesis (and are partly responsible for the dioxygen we all breathe!). She believes education and communication are necessary elements of change. Natasha Wright Group Leader \u2013 Biophysics, CSIRO Manufacturing Natasha leads CSIRO Manufacturing's diverse Characterisation capability. She has been working in the field of Materials Characterisation since 1992 and has had many roles at CSIRO during this time, utilizing both her Materials Science and Crystallography expertise. Notably, Natasha has had vast experience in a wide range of Materials Characterisation techniques and acts as a trusted advisor for CSIRO and industry determining the most appropriate and holistic determination of materials properties depending on client need. She is married with 3 children and loves the great outdoors. Paloma Corvalan Paloma desperately wants the world to change for the better, but does not know how we can realistically create that transformation. She is certain a team of 1000 women in STEMM will be stronger together in helping solve our world's problems, and she is proud to be a part of the Homeward Bound squad. Paloma is a Swiss and Australian biologist with a BSc in Ecology and Environmental Science from the University of British Columbia, and is currently working on a PhD in animal behaviour at the University of Queensland. Consultant, McKinsey & Co Indian, working in London, UK Purvi grew up in India with an interest in science and engineering, and graduated from IIT Madras with a degree in Biotechnology Engineering. During her years working for GlaxoSmithKline, she built a passion in healthcare and emerging economics \u2013 working across Thailand, Vietnam, Philippines, Singapore and India. Thereafter, she completed her MBA from INSEAD, graduating with classmates from 90 countries. She believes in diversity, global collaboration and is keen on creating opportunities for young girls and women. She is energised about participating in Homeward Bound and looks forward to collaborations across science, engineering and business for the future of our planet! W: purviguptahb2018.wixsite.com\/home Rashmi Venkatraman Public Health Professional Rashmi is from Melbourne, Australia and has a background in international public health, infectious diseases, primary health care and women's sexual and reproductive health. After completing her education, she has continued to work in the health and not-for-profit sectors with a focus on international efforts as well as domestic. Rashmi has an invested interest in how public health, and more specifically women's health and wellbeing will be affected by climate change. She's an avid traveler, will always have a pair of headphones on and a book nearby and is constantly on the lookout for yummy food. Rashmi has a Bachelor's in Bio-Medical Sciences and a Master's in International Public Health. Romy Zyngier A\/Program Manager Bushfire Monitoring, Evaluation and Research, Department of Environment, Land, Water and Planning, Victoria Australia Dr Romy Zyngier has a research background in soil and carbon sequestration and is passionate about issues of food security and climate change. Romy manages the Victorian Bushfire Monitoring Program and is the policy lead on understanding carbon assets in the landscape and potential management frameworks. She has research experience in Thailand, China, USA, Israel and Australia in both forest and agricultural ecosystems. Romy is a creative communicator and facilitator, bringing her interests in the arts together with her passion for science! Research Scientist, ECOCEAN Inc. Samantha graduated with First Class Honours in Marine Biology from the University of Queensland in December 2016, at the age of 44. She is now with ECOCEAN, a not-for-profit organisation that works for the protection and conservation of whale sharks and the marine environment through research, education and public outreach. Samantha is passionate about the importance of STEM education and believes going back to university was the best thing she ever did. Through her Homeward Bound journey, Samantha wants to show that anyone can make a difference and it's never too late to start! Sarah Hamylton Senior Lecturer in GIS, University of Wollongong Dr Sarah Hamylton, a geographer, is a Senior Lecturer at the University of Wollongong. She is Co-Director of the GeoQuest Research Centre and Academic Director of the Spatial Analysis Laboratory. Her BSc was in Environmental Sciences (Southampton, UK), she has two Masters degrees (Marine Environmental Science, Southampton; GIS and Remote Sensing, Cambridge) and a PhD on Red Sea and Seychelles coral reefs (Darwin College, Cambridge, 2010). Sarah sits on the Council of the Australian Coral Reef Society and co-founded the Women in Coastal Geoscience and Engineering Network. Recently nominated as 'Woman"} +{"id":"RedPajamaCommonCrawl.0013","text":"Hycofenix Generic Name: hydrocodone bitartrate, pseudoephedrine hydrochloride, and guaifenesin oral solution Brand Name: Hycofenix Last reviewed on RxList: 7\/13\/2018 home drugs a-z list side effects drug center hycofenix (hydrocodone bitartrate, pseudoephedrine hydrochloride, and guaifenesin oral solution) drug PROFESSIONAL SIDE EFFECTS (hydrocodone bitartrate, pseudoephedrine hydrochloride, and guaifenesin) Oral Solution ADDICTION, ABUSE, AND MISUSE; LIFE-THREATENING RESPIRATORY DEPRESSION; ACCIDENTAL INGESTION; MEDICATION ERRORS; CYTOCHROME P450 3A4 INTERACTION; CONCOMITANT USE WITH BENZODIAZEPINES OR OTHER CNS DEPRESSANTS; INTERACTION WITH ALCOHOL; NEONATAL OPIOID WITHDRAWAL SYNDROME Addiction, Abuse, and Misuse HYCOFENIX exposes patients and other users to the risks of opioid addiction, abuse, and misuse, which can lead to overdose and death. Reserve HYCOFENIX for use in adult patients for whom the benefits of cough suppression are expected to outweigh the risks, and in whom an adequate assessment of the etiology of the cough has been made. Assess each patient's risk prior to prescribing HYCOFENIX, prescribe HYCOFENIX for the shortest duration that is consistent with individual patient treatment goals, monitor all patients regularly for the development of addition or abuse, and refill only after reevaluation of the need for continued treatment. [see WARNINGS AND PRECAUTIONS] Life-Threatening Respiratory Depression Serious, life-threatening, or fatal respiratory depression may occur with use of HYCOFENIX. Monitor for respiratory depression, especially during initiation of HYCOFENIX therapy or when used in patients at higher risk [see WARNINGS AND PRECAUTIONS]. Accidental Ingestion Accidental ingestion of even one dose of HYCOFENIX, especially by children, can result in a fatal overdose of hydrocodone [see WARNINGS AND PRECAUTIONS]. Risk of Medication Errors Ensure accuracy when prescribing, dispensing, and administering HYCOFENIX. Dosing errors can result in accidental overdose and death. Always use an accurate milliliter measuring device when measuring and administering HYCOFENIX [see DOSAGE AND ADMINISTRATION, WARNINGS AND PRECAUTIONS]. Cytochrome P450 3A4 Interaction The concomitant use of HYCOFENIX with all cytochrome P450 3A4 inhibitors may result in an increase in hydrocodone plasma concentrations, which could increase or prolong adverse drug effects and may cause potentially fatal respiratory depression. In addition, discontinuation of a concomitantly used cytochrome P450 3A4 inducer may result in an increase in hydrocodone plasma concentration. Avoid the use of HYCOFENIX in patients taking a CYP3A4 inhibitor or inducer [see WARNINGS AND PRECAUTIONS, DRUG INTERACTIONS]. Risks from Concomitant Use with Benzodiazepines or Other CNS Depressants Concomitant use of opioids with benzodiazepines or other central nervous system (CNS) depressants, including alcohol, may result in profound sedation, respiratory depression, coma, and death. Avoid the use of HYCOFENIX in patients taking benzodiazepines, other CNS depressants, or alcohol. [see WARNING AND PRECAUTIONS, DRUG INTERACTIONS] Interaction with Alcohol Instruct patients not to consume alcoholic beverages or use prescription or non-prescription products that contain alcohol while taking HYCOFENIX. The co-ingestion of alcohol with HYCOFENIX may result in increased plasma levels and a potentially fatal overdose of hydrocodone [see WARNINGS AND PRECAUTIONS and DRUG INTERACTIONS]. Neonatal Opioid Withdrawal Syndrome HYCOFENIX is not recommended for use in pregnant women [see Use In Specific Populations]. Prolonged use of HYCOFENIX during pregnancy can result in neonatal opioid withdrawal syndrome, which may be life-threatening if not recognized and treated, and requires management according to protocols developed by neonatology experts. If HYCOFENIX is used for a prolonged period in a pregnant woman, advise the patient of the risk of neonatal opioid withdrawal syndrome and ensure that appropriate treatment will be available [see WARNINGS AND PRECAUTIONS] HYCOFENIX (hydrocodone bitartrate, pseudoephedrine hydrochloride, and guaifenesin) oral solution contains hydrocodone, an opioid agonist; pseudoephedrine, an alpha-adrenergic agonist; and guaifenesin, an expectorant. Each 5 mL of HYCOFENIX contains 2.5 mg of hydrocodone bitartrate, 30 mg of pseudoephedrine hydrochloride, and 200 mg of guaifenesin for oral administration. HYCOFENIX also contains the following inactive ingredients: black raspberry flavor, citric acid, D&C Red #33, FD&C Blue #1, glycerin, methylparaben, polyethylene glycol propylparaben, purified water, saccharin sodium, sodium citrate, and sorbitol. Hydrocodone Bitartrate The chemical name for hydrocodone bitartrate is morphinan-6-one, 4,5-epoxy-3-methoxy-17-methyl-, (5\u03b1)-, [R-(R*,R*)]-2,3-dihydroxybutanedioate (1:1), hydrate (2:5). It is also known as 4,5\u03b1-Epoxy-3-methoxy-17-methylmorphinan-6-one tartrate (1:1) hydrate (2:5). It occurs as a fine white crystal or crystalline powder, which is derived from the opium alkaloid, thebaine, and it has the following chemical structure: Pseudoephedrine Hydrochloride The chemical name for pseudoephedrine hydrochloride is benzenemethanol, \u03b1-[1-(methylamino)ethyl]-, [S- (R*,R*)] hydrochloride and has the following chemical structure: The chemical name for guaifenesin is 3-(2-methoxyphenoxy)-1,2-propanediol. It occurs as a white powder, and it has the following chemical structure: HYCOFENIX is indicated for the symptomatic relief of cough, nasal congestion, and to loosen mucus associated with the common cold in patients 18 years of age and older. Important Limitations Of Use Not indicated for pediatric patients under 18 years of age [see Use In Specific Populations]. Contraindicated in pediatric patients less than 6 years of age [see CONTRAINDICATIONS]. Because of the risks of addiction, abuse, and misuse with opioids, even at recommended doses [see WARNINGS AND PRECAUTIONS], reserve HYCOFENIX for use in adult patients for whom the benefits of cough suppression are expected to outweigh the risks, and in whom an adequate assessment of the etiology of the cough has been made. Which illness is known as a viral upper respiratory tract infection? See Answer Important Dosage And Administration Instructions Administer HYCOFENIX by the oral route only. Always use an accurate milliliter measuring device when administering HYCOFENIX to ensure that the dose is measured and administered accurately. A household teaspoon is not an accurate measuring device and could lead to overdosage [see WARNINGS AND PRECAUTIONS]. For prescriptions where a measuring device is not provided, a pharmacist can provide an appropriate measuring device and can provide instructions for measuring the correct dose. Do not overfill. Rinse the measuring device with water after each use. Advise patients not to increase the dose or dosing frequency of HYCOFENIX because serious adverse events such as respiratory depression may occur with overdosage [see WARNINGS AND PRECAUTIONS, OVERDOSAGE]. The dosage of HYCOFENIX should not be increased if cough fails to respond; an unresponsive cough should be reevaluated for possible underlying pathology [see Monitoring, Maintenance, and Discontinuation of Therapy, WARNINGS AND PRECAUTIONS]. Adults 18 Years Of Age And Older 10 mL every 4 to 6 hours as needed, not to exceed 4 doses (40 mL) in 24 hours. Monitoring, Maintenance, And Discontinuation Of Therapy Prescribe HYCOFENIX for the shortest duration that is consistent with individual patient treatment goals [see WARNINGS AND PRECAUTIONS]. Monitor patients closely for respiratory depression, especially within the first 24-72 hours of initiating therapy [see WARNINGS AND PRECAUTIONS]. Reevaluate patients with unresponsive cough in 5 days or sooner for possible underlying pathology, such as foreign body or lower respiratory tract disease [see WARNINGS AND PRECAUTIONS]. If a patient requires a refill, reevaluate the cause of the cough and assess the need for continued treatment with HYCOFENIX, the relative incidence of adverse reactions, and the development of addiction, abuse, or misuse [see WARNINGS AND PRECAUTIONS]. Do not abruptly discontinue HYCOFENIX in a physically-dependent patient [see Drug Abuse And Dependence]. When a patient who has been taking HYCOFENIX regularly and may be physically dependent no longer requires therapy with HYCOFENIX, taper the dose gradually, by 25% to 50% every 2 to 4 days, while monitoring carefully for signs and symptoms of withdrawal. If the patient develops these signs or symptoms, raise the dose to the previous level and taper more slowly, either by increasing the interval between decreases, decreasing the amount of change in dose, or both. Oral solution: Each 5 mL contains hydrocodone bitartrate, USP, 2.5 mg; pseudoephedrine hydrochloride, USP, 30 mg; and guaifenesin, USP, 200 mg [see DESCRIPTION]. HYCOFENIX (hydrocodone bitartrate, pseudoephedrine hydrochloride, and guaifenesin) oral solution is supplied as a violet-colored, black raspberry flavored liquid containing 2.5 mg hydrocodone bitartrate, 30 mg pseudoephedrine hydrochloride, and 200 mg guaifenesin in each 5 mL. It is available in: White HDPE bottles of 16 fl. oz. (473 mL): NDC 24470-915-16 White HDPE bottles of 4 fl. oz. (118 mL): NDC 24470-915-04 Store solution at 20\u00b0 to 25\u00b0C (68\u00b0 to 77\u00b0F). [See USP Controlled Room Temperature.] Dispense in a tight, light-resistant container, as defined in the USP, with a child-resistant closure. Ensure that patients have an oral dosing dispenser that measures the appropriate volume in milliliters. Counsel patients on how to utilize an oral dosing dispenser and correctly measure the oral suspension as prescribed. Manufactured for: BKK Pharmaceuticals, LLC, Wilmington, DE 19801. Revised: Jun 2018 The following serious adverse reactions are described, or described in greater detail, in other sections: Addiction, abuse, and misuse [see WARNINGS AND PRECAUTIONS, Drug Abuse And Dependence] Life-threatening respiratory depression [see WARNINGS AND PRECAUTIONS, OVERDOSAGE] Accidental overdose and death due to medication errors [see WARNINGS AND PRECAUTIONS] Decreased mental alertness with impaired mental and\/or physical abilities [see WARNINGS AND PRECAUTIONS] Interactions with benzodiazepines and other CNS depressants [see WARNINGS AND PRECAUTIONS, DRUG INTERACTIONS] Paralytic ileus, gastrointestinal adverse reactions [see WARNINGS AND PRECAUTIONS] Increased intracranial pressure [see WARNINGS AND PRECAUTIONS] Obscured clinical course in patients with head injuries [see WARNINGS AND PRECAUTIONS] Cardiovascular and central nervous system effects [see WARNINGS AND PRECAUTIONS] Seizures [see WARNINGS AND PRECAUTIONS] Severe hypotension [see WARNINGS AND PRECAUTIONS] Neonatal Opioid Withdrawal Syndrome [see WARNINGS AND PRECAUTIONS] Adrenal insufficiency [see WARNINGS AND PRECAUTIONS] The following adverse reactions have been identified during clinical studies, in the literature, or during postapproval use of hydrocodone, pseudoephedrine, and\/or guaifenesin. Because these reactions may be reported voluntarily from a population of uncertain size, it is not always possible to reliably estimate their frequency or establish a causal relationship to drug exposure. The most common adverse reactions to HYCOFENIX include: Sedation (somnolence, mental clouding, lethargy), impaired mental and physical performance, lightheadedness, dizziness, headache, dry mouth, nausea, vomiting, constipation, tachycardia, arrhythmias including premature ventricular contractions, CNS stimulation including anxiety, restlessness, nervousness, tremor, and irritability. Other Reactions Include Anaphylaxis: Anaphylaxis has been reported with hydrocodone, one of the ingredients in HYCOFENIX. Body as a whole: Coma, death, fatigue, falling injuries, lethargy, weakness, hyperthermia. Cardiovascular: Peripheral edema, increased blood pressure, decreased blood pressure, tachycardia, chest pain, palpitation, syncope, orthostatic hypotension, prolonged QT interval, hot flush, atrial fibrillation, myocardial infarction. Central Nervous System: Ataxia, facial dyskinesia, insomnia, increased intracranial pressure, migraine, seizure, tremor. Dermatologic: Flushing, hyperhidrosis, pruritus, rash. Cases of severe skin reactions such as acute generalized exanthematous pustulosis (AGEP) have been reported with pseudoephedrine-containing products. Endocrine\/Metabolic: Cases of serotonin syndrome, a potentially life-threatening condition, have been reported during concomitant use of opioids with serotonergic drugs. Cases of adrenal insufficiency have been reported with opioid use, more often following greater than one month of use. Cases of androgen deficiency have occurred with chronic use of opioids [see CLINICAL PHARMACOLOGY]. Gastrointestinal: Abdominal pain, bowel obstruction, decreased appetite, diarrhea, difficulty swallowing, GERD, indigestion, pancreatitis, paralytic ileus, biliary tract spasm (spasm of the sphincter of Oddi), dysgeusia, ischemic colitis. Genitourinary: Urinary tract infection, ureteral spasm, spasm of vesicle sphincters, urinary retention. Laboratory: Increases in serum amylase. Musculoskeletal: Arthralgia, backache, muscle spasm, weakness. Ophthalmic: Miosis (constricted pupils), visual disturbances, mydriasis (dilated pupils). Psychiatric: Agitation, anxiety, confusion, fear, dysphoria, depression, hyperactivity, confusion, hallucinations, hyperexcitability. Reproductive: Hypogonadism, infertility. Respiratory: Bronchitis, cough, dyspnea, nasal congestion, nasopharyngitis, respiratory depression, sinusitis, upper respiratory tract infection. Other: Drug abuse, drug dependence, opioid withdrawal syndrome. Cold and Flu: Finding Relief for Your Cough See Slideshow No specific drug interaction studies have been conducted with HYCOFENIX. Concomitant use of alcohol with HYCOFENIX can result in an increase of hydrocodone plasma levels and potentially fatal overdose of hydrocodone. Instruct patients not to consume alcoholic beverages or use prescription or nonprescription products containing alcohol while on HYCOFENIX therapy [see WARNINGS AND PRECAUTIONS, CLINICAL PHARMACOLOGY]. Inhibitors Of CYP3A4 And CYP2D6 The concomitant use of HYCOFENIX and CYP3A4 inhibitors, such as macrolide antibiotics (e.g., erythromycin), azole-antifungal agents (e.g. ketoconazole), or protease inhibitors (e.g., ritonavir), can increase the plasma concentration of hydrocodone, resulting in increased or prolonged opioid effects. These effects could be more pronounced with concomitant use of HYCOFENIX and CYP2D6 and CYP3A4 inhibitors, particularly when an inhibitor is added after a stable dose of HYCOFENIX is achieved [see WARNINGS AND PRECAUTIONS]. After stopping a CYP3A4 inhibitor, as the effects of the inhibitor decline, the hydrocodone plasma concentration will decrease [see CLINICAL PHARMACOLOGY], resulting in decreased opioid efficacy or a withdrawal syndrome in patients who had developed physical dependence to hydrocodone. Avoid the use of HYCOFENIX while taking a CYP3A4 or CYP2D6 inhibitor. If concomitant use is necessary, monitor patients for respiratory depression and sedation at frequent intervals. CYP3A4 Inducers The concomitant use of HYCOFENIX and CYP3A4 inducers such as rifampin, carbamazepine, or phenytoin, can decrease the plasma concentration of hydrocodone [see CLINICAL PHARMACOLOGY], resulting in decreased efficacy or onset of a withdrawal syndrome in patients who have developed physical dependence to hydrocodone [see WARNINGS AND PRECAUTIONS]. After stopping a CYP3A4 inducer, as the effects of the inducer decline, the hydrocodone plasma concentration will increase [see CLINICAL PHARMACOLOGY], which could increase or prolong both the therapeutic effects and adverse reactions, and may cause serious respiratory depression. Avoid the use of HYCOFENIX in patients who are taking CYP3A4 inducers. If concomitant use of a CYP3A4 inducer is necessary, follow the patient for reduced efficacy. Benzodiazepines, And Other CNS Depressants Due to additive pharmacologic effect, the concomitant use of benzodiazepines or other CNS depressants, including alcohol, other sedatives\/hypnotics, anxiolytics, tranquilizers, muscle relaxants, general anesthetics, antipsychotics, and other opioids, can increase the risk of hypotension, respiratory depression, profound sedation, coma, and death. Avoid the use of HYCOFENIX in patients who are taking benzodiazepines or other CNS depressants [see WARNINGS AND PRECAUTIONS], and instruct patients to avoid consumption of alcohol while on HYCOFENIX [see DRUG INTERACTIONS, PATIENT INFORMATION]. Serotonergic Drugs The concomitant use of opioids with other drugs that affect the serotonergic neurotransmitter system has resulted in serotonin syndrome. If concomitant use is warranted, carefully observe the patient, particularly during treatment initiation. Discontinue HYCOFENIX if serotonin syndrome is suspected. Monoamine Oxidase Inhibitors (MAOIs) Avoid the use of HYCOFENIX in patients who are taking monoamine oxidase inhibitors (MAOIs) or have taken MAOIs within 14 days. The use of MAOIs or tricyclic antidepressants with hydrocodone, one of the active ingredients in HYCOFENIX, may increase the effect of either the antidepressant or hydrocodone. MAOI interactions with opioids may manifest as serotonin syndrome or opioid toxicity (e.g., respiratory depression, coma). An increase in blood pressure or hypertensive crisis may also occur when pseudoephedrine containing preparations are used with MAOIs. Hydrocodone may enhance the neuromuscular blocking action of skeletal muscle relaxants and produce an increased degree of respiratory depression. Avoid the use of HYCOFENIX in patients taking muscle relaxants. If concomitant use is necessary, monitor patients for signs of respiratory depression that may be greater than otherwise expected. Opioids can reduce the efficacy of diuretics by inducing the release of antidiuretic hormone. Monitor patients for signs of diminished diuresis and\/or effects on blood pressure and increase the dosage of the diuretic as needed. Anticholinergic Drugs The concomitant use of anticholinergic drugs with HYCOFENIX may increase risk of urinary retention and\/or severe constipation, which may lead to paralytic ileus [see WARNINGS AND PRECAUTIONS]. Monitor patients for signs of urinary retention or reduced gastric motility when HYCOFENIX is used concomitantly with anticholinergic drugs. Due to the antagonistic pharmacologic effects of pseudoephedrine, one of the active ingredients in HYCOFENIX, the concomitant use of HYCOFENIX with antihypertensive drugs which interfere with sympathetic activity (e.g., methyldopa, mecamylamine, and reserpine) may reduce their antihypertensive effects. Use HYCOFENIX with caution in patients who are taking antihypertensive drugs. Increased ectopic pacemaker activity can occur when pseudoephedrine is used concomitantly with digitalis. Use HYCOFENIX with caution in patients who are taking digitalis. Drug Abuse And Dependence HYCOFENIX contains hydrocodone, a Schedule II controlled substance. HYCOFENIX contains hydrocodone, a substance with a high potential for abuse similar to other opioids including morphine and codeine. HYCOFENIX can be abused and is subject to misuse, addiction, and criminal diversion [see WARNINGS AND PRECAUTIONS]. All patients treated with opioids require careful monitoring for signs of abuse and addiction, since use of opioid analgesic and antitussive products carries the risk of addiction even under appropriate medical use. Prescription drug abuse is the intentional non-therapeutic use of a prescription drug, even once, for its rewarding psychological or physiological effects. Drug addiction is a cluster of behavioral, cognitive, and physiological phenomena that develop after repeated substance use and includes: a strong desire to take the drug, difficulties in controlling its use, persisting in its use despite harmful consequences, a higher priority given to drug use than to other activities and obligations, increased tolerance, and sometimes a physical withdrawal. \"Drug-seeking\" behavior is very common in persons with substance use disorders. Drug-seeking tactics include emergency calls or visits near the end of office hours, refusal to undergo appropriate examination, testing, or referral, repeated \"loss\" of prescriptions, tampering with prescriptions, and reluctance to provide prior medical records or contact information for other treating health care provider(s). \"Doctor shopping\" (visiting multiple prescribers to obtain additional prescriptions) is common among drug abusers and people suffering from untreated addiction. Preoccupation with achieving adequate pain relief can be appropriate behavior in a patient with poor pain control. Abuse and addiction are separate and distinct from physical dependence and tolerance. Health care providers should be aware that addiction may not be accompanied by concurrent tolerance and symptoms of physical dependence in all addicts. In addition, abuse of opioids can occur in the absence of true addiction. HYCOFENIX, like other opioids, can be diverted for non-medical use into illicit channels of distribution. Careful record-keeping of prescribing information, including quantity, frequency, and renewal requests, as required by state and federal law, is strongly advised. Proper assessment of the patient, proper prescribing practices, periodic re-evaluation of therapy, and proper dispensing and storage are appropriate measures that help to limit abuse of opioid drugs. Abuse of guaifenesin has been linked to the formation of kidney stones composed of the major metabolite \u03b2-(2- methoxyphenoxy) lactic acid. Risks Specific To Abuse Of HYCOFENIX HYCOFENIX is for oral use only. Abuse of HYCOFENIX poses a risk of overdose and death. The risk is increased with concurrent use of HYCOFENIX with alcohol and other central nervous system depressants [see WARNINGS AND PRECAUTIONS, DRUG INTERACTIONS]. Parenteral drug abuse is commonly associated with transmission of infectious diseases such as hepatitis and HIV. Psychological dependence, physical dependence, and tolerance may develop upon repeated administration of opioids; therefore, HYCOFENIX should be prescribed and administered for the shortest duration that is consistent with individual patient treatment goals and patients should be reevaluated prior to refills [see DOSAGE AND ADMINISTRATION, WARNINGS AND PRECAUTIONS]. Physical dependence, the condition in which continued administration of the drug is required to prevent the appearance of a withdrawal syndrome, assumes clinically significant proportions only after several weeks of continued oral opioid use, although some mild degree of physical dependence may develop after a few days of opioid therapy. If HYCOFENIX is abruptly discontinued in a physically-dependent patient, a withdrawal syndrome may occur. Withdrawal also may be precipitated through the administration of drugs with opioid antagonist activity (e.g., naloxone, nalmefene), mixed agonist\/antagonist analgesics (e.g., pentazocine, butorphanol, nalbuphine), or partial agonists (e.g., buprenorphine). Some or all of the following can characterize this syndrome: restlessness, lacrimation, rhinorrhea, yawning, perspiration, chills, myalgia, and mydriasis. Other signs and symptoms also may develop, including irritability, anxiety, backache, joint pain, weakness, abdominal cramps, insomnia, nausea, anorexia, vomiting, diarrhea, or increased blood pressure, respiratory rate, or heart rate. Infants born to mothers physically dependent on opioids will also be physically dependent and may exhibit respiratory difficulties and withdrawal signs [see Use In Specific Populations]. HYCOFENIX contains hydrocodone, a Schedule II controlled substance. As an opioid, HYCOFENIX exposes users to the risks of addiction, abuse, and misuse [see Drug Abuse And Dependence], which can lead to overdose and death [see OVERDOSAGE]. Reserve HYCOFENIX for use in adult patients for whom the benefits of cough suppression are expected to outweigh the risks, and in whom an adequate assessment of the etiology of the cough has been made. Assess each patient's risk prior to prescribing HYCOFENIX, prescribe HYCOFENIX for the shortest duration that is consistent with individual patient treatment goals, monitor all patients regularly for the development of addiction or abuse, and refill only after reevaluation of the need for continued treatment. Although the risk of addiction in any individual is unknown, it can occur in patients appropriately prescribed HYCOFENIX. Addiction can occur at recommended dosages and if the drug is misused or abused. Risks are increased in patients with a personal or family history of substance abuse (including drug or alcohol abuse or addiction) or mental illness (e.g., major depression). Opioids are sought by drug abusers and people with addiction disorders and are subject to criminal diversion. Consider these risks when prescribing or dispensing HYCOFENIX. Strategies to reduce these risks include prescribing the drug in the smallest appropriate quantity and advising the patient on the proper disposal of unused drug [see PATIENT INFORMATION]. Contact local state professional licensing board or state controlled substances authority for information on how to prevent and detect abuse or diversion of this product. Serious, life-threatening, or fatal respiratory depression has been reported with the use of opioids, including hydrocodone, one of the active ingredients in HYCOFENIX. Hydrocodone produces dose-related respiratory depression by directly acting on the brain stem respiratory center that controls respiratory rhythm and may produce irregular and periodic breathing. Respiratory depression, if not immediately recognized and treated, may lead to respiratory arrest and death. Management of respiratory depression includes discontinuation of HYCOFENIX, close observation, supportive measures, and use of opioid antagonists (e.g. naloxone), depending on the patient's clinical status [see OVERDOSAGE]. Carbon dioxide (CO2) retention from opioidinduced respiratory depression can exacerbate the sedating effects of opioids. While serious, life-threatening, or fatal respiratory depression can occur at any time during the use of HYCOFENIX, the risk is greatest during the initiation of therapy, when HYCOFENIX is used concomitantly with other drugs that may cause respiratory depression [see Risks from Concomitant Use with Benzodiazepines or other CNS Depressants], in patients with chronic pulmonary disease or decreased respiratory reserve, and in patients with altered pharmacokinetics or altered clearance (e.g. elderly, cachectic, or debilitated patients) [see Risks with Use in Other At-Risk Populations]. To reduce the risk of respiratory depression, proper dosing of HYCOFENIX is essential [see DOSAGE AND ADMINISTRATION, Risk of Accidental Overdose and Death due to Medication Errors]. Monitor patients closely, especially within the first 24- 72 hours of initiating therapy or when used in patients at higher risk. Overdose of hydrocodone in adults has been associated with fatal respiratory depression, and the use of hydrocodone in children younger than 6 years of age has been associated with fatal respiratory depression when used as recommended. Accidental ingestion of even one dose of HYCOFENIX, especially by children, can result in respiratory depression and death. Risks With Use In Pediatric Populations Children are particularly sensitive to the respiratory depressant effects of hydrocodone [see Life-Threatening Respiratory Depression]. Because of the risk of life-threatening respiratory depression and death, HYCOFENIX is contraindicated in children less than 6 years of age [see CONTRAINDICATIONS]. Use of HYCOFENIX in children also exposes them to the risks of addiction, abuse, and misuse [see Drug Abuse And Dependence], which can lead to overdose and death [see Addiction, Abuse, and Misuse, OVERDOSAGE]. Because the benefits of symptomatic treatment of cough associated with allergies or the common cold do not outweigh the risks of use of hydrocodone in pediatric patients, HYCOFENIX is not indicated for use in patients younger than 18 years of age [see INDICATIONS, Use In Specific Populations]. Risks With Use In Other At-Risk Populations Unresponsive Cough The dosage of HYCOFENIX should not be increased if cough fails to respond; an unresponsive cough should be reevaluated in 5 days or sooner for possible underlying pathology, such as foreign body or lower respiratory tract disease [see DOSAGE AND ADMINISTRATION]. Asthma And Other Pulmonary Disease The use of HYCOFENIX in patients with acute or severe bronchial asthma in an unmonitored setting or in the absence of resuscitative equipment is contraindicated [see CONTRAINDICATIONS]. Opioid analgesics and antitussives, including hydrocodone, one of the active ingredients in HYCOFENIX, should not be used in patients with acute febrile illness associated with productive cough or in patients with chronic respiratory disease where interference with ability to clear the tracheobronchial tree of secretions would have a deleterious effect on the patient's respiratory function. HYCOFENIX-treated patients with significant chronic obstructive pulmonary disease or cor pulmonale, and those with a substantially decreased respiratory reserve, hypoxia, hypercapnia, or pre-existing respiratory depression are at increased risk of decreased respiratory drive including apnea, even at recommended dosages of HYCOFENIX [see Life-Threatening Respiratory Depression]. Elderly, Cachectic, Or Debilitated Patients Life-threatening respiratory depression is more likely to occur in elderly, cachectic, or debilitated patients because they may have altered pharmacokinetics or altered clearance compared to younger, healthier patients [see Life-Threatening Respiratory Depression]. Because of the risk of respiratory depression, avoid the use of opioid antitussives, including HYCOFENIX in patients with compromised respiratory function, patients at risk of respiratory failure, and in elderly, cachectic, or debilitated patients. If HYCOFENIX is prescribed, monitor such patients closely, particularly when initiating HYCOFENIX and when HYCOFENIX is given concomitantly with other drugs that depress respiration [see Risks from Concomitant Use with Benzodiazepines or other CNS Depressants]. Risk Of Accidental Overdose And Death Due To Medication Errors Dosing errors can result in accidental overdose and death. To reduce the risk of overdose and respiratory depression, ensure that the dose of HYCOFENIX is communicated clearly and dispensed accurately [see DOSAGE AND ADMINISTRATION]. Advise patients to always use an accurate milliliter measuring device when measuring and administering HYCOFENIX. Inform patients that household teaspoon is not an accurate measuring device and such use could lead to overdosage and serious adverse reactions [see OVERDOSAGE]. For prescriptions where a measuring device is not provided, a pharmacist can provide an appropriate calibrated measuring device and can provide instructions for measuring the correct dose. Activities Requiring Mental Alertness: Risks Of Driving And Operating Machinery Hydrocodone, one of the active ingredients in HYCOFENIX, may produce marked drowsiness and impair the mental and\/or physical abilities required for the performance of potentially hazardous tasks such as driving a car or operating machinery. Advise patients to avoid engaging in hazardous tasks requiring mental alertness and motor coordination after ingestion of HYCOFENIX. Avoid concurrent use of HYCOFENIX with alcohol or other central nervous system depressants because additional impairment of central nervous system performance may occur [see Risks from Concomitant Use with Benzodiazepines or other CNS Depressants]. Risks From Concomitant Use Or Discontinuation Of Cytochrome P450 3A4 Inhibitors And Inducers Concomitant use of HYCOFENIX with a CYP3A4 inhibitor, such as macrolide antibiotics (e.g., erythromycin), azole-antifungal agents (e.g., ketoconazole), and protease inhibitors (e.g., ritonavir), may increase plasma concentrations of hydrocodone and prolong opioid adverse reactions, which may cause potentially fatal respiratory depression [see Risks from Concomitant Use with Benzodiazepines or other CNS Depressants], particularly when an inhibitor is added after a stable dose of HYCOFENIX is achieved. Similarly, discontinuation of a CYP3A4 inducer, such as rifampin, carbamazepine, and phenytoin, in HYCOFENIX-treated patients may increase hydrocodone plasma concentrations and prolong opioid adverse reactions. Concomitant use of HYCOFENIX with CYP3A4 inducers or discontinuation of an CYP3A4 inhibitor could decrease hydrocodone plasma concentrations, decrease opioid efficacy or, possibly, lead to a withdrawal syndrome in a patient who had developed physical dependence to hydrocodone. Avoid the use of HYCOFENIX in patients who are taking a CYP3A4 inhibitor or inducer. If concomitant use of HYCOFENIX with a CYP3A4 inhibitor or inducer is necessary, monitor patients for signs and symptoms that may reflect opioid toxicity and opioid withdrawal [see DRUG INTERACTIONS]. Concomitant use of opioids, including HYCOFENIX, with benzodiazepines, or other CNS depressants, including alcohol, may result in profound sedation, respiratory depression, coma, and death. Because of these risks, avoid use of opioid cough medications in patients taking benzodiazepines, other CNS depressants, or alcohol [see DRUG INTERACTIONS]. Observational studies have demonstrated that concomitant use of opioid analgesics and benzodiazepines increases the risk of drug-related mortality compared to use of opioids alone. Because of similar pharmacologic properties, it is reasonable to expect similar risk with concomitant use of opioid cough medications and benzodiazepines, other CNS depressants, or alcohol. Advise both patients and caregivers about the risks of respiratory depression and sedation if HYCOFENIX is used with benzodiazepines, alcohol, or other CNS depressants [see PATIENT INFORMATION]. Patients must not consume alcoholic beverages, or prescription or non-prescription products containing alcohol, while on HYCOFENIX therapy. The co-ingestion of alcohol with HYCOFENIX may result in increased plasma levels and a potentially fatal overdose of hydrocodone [see DRUG INTERACTIONS]. Risks Of Use In Patients With Gastrointestinal Conditions HYCOFENIX is contraindicated in patients with known or suspected gastrointestinal obstruction, including paralytic ileus [see CONTRAINDICATIONS]. The use of hydrocodone in HYCOFENIX may obscure the diagnosis or clinical course of patients with acute abdominal conditions. The concurrent use of anticholinergics with HYCOFENIX may produce paralytic ileus [see DRUG INTERACTIONS]. The hydrocodone in HYCOFENIX may result in constipation or obstructive bowel disease, especially in patients with underlying intestinal motility disorders. Use with caution in patients with underlying intestinal motility disorders. The hydrocodone in HYCOFENIX may cause spasm of the sphincter of Oddi, resulting in an increase in biliary tract pressure. Opioids may cause increases in serum amylase [see Drug\/Laboratory Test Interactions]. Monitor patients with biliary tract disease, including acute pancreatitis for worsening symptoms. Risks Of Use In Patients With Head Injury, Impaired Consciousness, Increased Intracranial Pressure, Or Brain Tumors Avoid the use of HYCOFENIX in patients with head injury, intracranial lesions, or a pre-existing increase in intracranial pressure. In patients who may be susceptible to the intracranial effects of CO2 retention (e.g., those with evidence of increased intracranial pressure or brain tumors), HYCOFENIX may reduce respiratory drive, and the resultant CO2 retention can further increase intracranial pressure. Furthermore, opioids produce adverse reactions that may obscure the clinical course of patients with head injuries. Cardiovascular And Central Nervous System Effects The pseudoephedrine contained in HYCOFENIX can produce cardiovascular and central nervous system effects in some patients such as, insomnia, dizziness, weakness, tremor, transient elevations in blood pressure, or arrhythmias. In addition, central nervous system stimulation with convulsions or cardiovascular collapse with accompanying hypotension has been reported. Therefore, HYCOFENIX is contraindicated in patients with severe hypertension or coronary artery disease [see CONTRAINDICATIONS], and should, be used with caution in patients with other cardiovascular disorders. Increased Risk Of Seizures In Patients With Seizure Disorders The hydrocodone in HYCOFENIX may increase the frequency of seizures in patients with seizure disorders, and may increase the risk of seizures occurring in other clinical settings associated with seizures. Monitor patients with a history of seizure disorders for worsened seizure control during HYCOFENIX therapy. Severe Hypotension HYCOFENIX may cause severe hypotension including orthostatic hypotension and syncope in ambulatory patients. There is increased risk in patients whose ability to maintain blood pressure has already been compromised by a reduced blood volume or concurrent administration of certain CNS depressant drugs (e.g., phenothiazines or general anesthetics) [see DRUG INTERACTIONS]. Monitor these patients for signs of hypotension after initiating HYCOFENIX. In patients with circulatory shock, HYCOFENIX may cause vasodilation that can further reduce cardiac output and blood pressure. Avoid the use of HYCOFENIX in patients with circulatory shock. HYCOFENIX is not recommended for use in pregnant women. Prolonged use of HYCOFENIX during pregnancy can result in withdrawal in the neonate. Neonatal opioid withdrawal syndrome, unlike opioid withdrawal syndrome in adults, may be life-threatening if not recognized and treated, and requires management according to protocols developed by neonatology experts. Observe newborns for signs of neonatal opioid withdrawal syndrome and manage accordingly. Advise pregnant women using opioids for a prolonged period of the risk of neonatal opioid withdrawal syndrome and ensure that appropriate treatment will be available. [see Use In Specific Populations, PATIENT INFORMATION] Cases of adrenal insufficiency have been reported with opioid use, more often following greater than one month of use. Presentation of adrenal insufficiency may include non-specific symptoms and signs including nausea, vomiting, anorexia, fatigue, weakness, dizziness, and low blood pressure. If adrenal insufficiency is suspected, confirm the diagnosis with diagnostic testing as soon as possible. If adrenal insufficiency is diagnosed, treat with physiologic replacement doses of corticosteroids. Wean the patient off of the opioid to allow adrenal function to recover and continue corticosteroid treatment until adrenal function recovers. Other opioids may be tried as some cases reported use of a different opioid without recurrence of adrenal insufficiency. The information available does not identify any particular opioids as being more likely to be associated with adrenal insufficiency. Drug\/Laboratory Test Interactions Because opioid agonists may increase biliary tract pressure, with resultant increase in plasma amylase or lipase levels, determination of these enzyme levels may be unreliable for 24 hours after administration of a dose of HYCOFENIX. Patient Counseling Information Advise the patient to read the FDA-approved patient labeling (Medication Guide). Inform patients that the use of HYCOFENIX, even when taken as recommended, can result in addiction, abuse, and misuse, which can lead to overdose and death [see WARNINGS AND PRECAUTIONS]. Instruct patients not to share HYCOFENIX with others and to take steps to protect HYCOFENIX from theft or misuse. Important Dosing And Administration Instructions Instruct patients how to measure and take the correct dose of HYCOFENIX. Advise patients to measure HYCOFENIX with an accurate milliliter measuring device. Patients should be informed that a household teaspoon is not an accurate measuring device and could lead to overdosage. Advise patients to ask their pharmacist to recommend an appropriate measuring device and for instructions for measuring the correct dose [see DOSAGE AND ADMINISTRATION, WARNINGS AND PRECAUTIONS]. Advise patients not to increase the dose or dosing frequency of HYCOFENIX because serious adverse events such as respiratory depression may occur with overdosage [see WARNINGS AND PRECAUTIONS, OVERDOSAGE]. Inform patients of the risk of life-threatening respiratory depression, including information that the risk is greatest when starting HYCOFENIX and that it can occur even at recommended dosages [see WARNINGS AND PRECAUTIONS]. Advise patients how to recognize respiratory depression and to seek medical attention if breathing difficulties develop. Inform patients that accidental ingestion, especially by children, may result in respiratory depression or death [see WARNINGS AND PRECAUTIONS]. Instruct patients to take steps to store HYCOFENIX securely and to properly dispose of unused HYCOFENIX in accordance with the local state guidelines and\/or regulations. Activities Requiring Mental Alertness Advise patients to avoid engaging in hazardous tasks that require mental alertness and motor coordination such as operating machinery or driving a motor vehicle as HYCOFENIX may produce marked drowsiness [see WARNINGS AND PRECAUTIONS]. Interactions With Benzodiazepines And Other Central Nervous System Depressants, Including Alcohol Inform patients and caregivers that potentially fatal additive effects may occur if HYCOFENIX is used with benzodiazepines or other CNS depressants, including alcohol. Advise patients to avoid concomitant use of HYCOFENIX with benzodiazepines or other CNS depressants and instruct patients not to consume alcoholic beverages, as well as prescription and over-the-counter products that contain alcohol, during treatment with HYCOFENIX [see WARNINGS AND PRECAUTIONS, DRUG INTERACTIONS]. Advise patients of the potential for severe constipation [see WARNINGS AND PRECAUTIONS, ADVERSE REACTIONS]. Cardiovascular And CNS Effects Inform patients that the pseudoephedrine contained in HYCOFENIX can produce cardiovascular and central nervous system effects in some patients such as, insomnia, dizziness, weakness, tremor, transient elevations in blood pressure, or arrhythmias. Inform patients that anaphylaxis has been reported with ingredients contained in HYCOFENIX. Advise patients how to recognize such a reaction and when to seek medical attention [see CONTRAINDICATIONS, ADVERSE REACTIONS]. MAOI Interaction Inform patients not to take HYCOFENIX while using or within 14 days of stopping any drugs that inhibit monoamine oxidase. Patients should not start MAOIs while taking HYCOFENIX [see DRUG INTERACTIONS]. Inform patients that HYCOFENIX may cause orthostatic hypotension and syncope. Instruct patients how to recognize symptoms of low blood pressure and how to reduce the risk of serious consequences should hypotension occur (e.g., sit or lie down, carefully rise from a sitting or lying position) [see WARNINGS AND PRECAUTIONS]. Advise patients that use of HYCOFENIX is not recommended during pregnancy [see Use In Specific Populations]. Inform female patients of reproductive potential that use of HYCOFENIX during pregnancy can result in neonatal opioid withdrawal syndrome, which may be life-threatening if not recognized and treated [see WARNINGS AND PRECAUTIONS, Use In Specific Populations]. Embryo-Fetal Toxicity Inform female patients of reproductive potential that HYCOFENIX can cause fetal harm and to inform their healthcare provider of a known or suspected pregnancy [see Use In Specific Populations]. Advise women that breastfeeding is not recommended during treatment with HYCOFENIX [see Use In Specific Populations]. Inform patients that chronic use of opioids, such as hydrocodone, a component of HYCOFENIX, may cause reduced fertility. It is not known whether these effects on fertility are reversible [see Use In Specific Populations]. Inform patients that HYCOFENIX could cause adrenal insufficiency, a potentially life-threatening condition. Adrenal insufficiency may present with non-specific symptoms and signs such as nausea, vomiting, anorexia, fatigue, weakness, dizziness, and low blood pressure. Advise patients to seek medical attention if they experience a constellation of these symptoms [see WARNINGS AND PRECAUTIONS]. Inform patients that HYCOFENIX could cause a rare but potentially life-threatening condition resulting from concomitant administration of serotonergic drugs. Warn patients of the symptoms of serotonin syndrome and to seek medical attention right away if symptoms develop. Instruct patients to inform their physicians if they are taking, or plan to take serotonergic medications. [see ADVERSE REACTIONS, DRUG INTERACTIONS]. Disposal Of Unused HYCOFENIX Advise patients to properly dispose of unused HYCOFENIX. Advise patients to throw the drug in the household trash following these steps. 1) Remove them from their original containers and mix them with an undesirable substance, such as used coffee grounds or kitty litter (this makes the drug less appealing to children and pets, and unrecognizable to people who may intentionally go through the trash seeking drugs). 2) Place the mixture in a sealable bag, empty can, or other container to prevent the drug from leaking or breaking out of a garbage bag, or to dispose of in accordance with local state guidelines and\/or regulations. Carcinogenicity, mutagenicity, and fertility studies have not been conducted with HYCOFENIX; however, published information is available for the individual active ingredients or related active ingredients. Carcinogenicity studies were conducted with codeine, an opiate related to hydrocodone. Two-year studies in F344\/N rats and B6C3F1 mice were conducted to assess the carcinogenic potential of codeine. No evidence of tumorigenicity was observed in male and female rats at codeine dietary doses up to 70 and 80 mg\/kg\/day (approximately equivalent to 55 and 65 times the MRHD of hydrocodone on a mg\/m\u00b2 basis, respectively). No evidence of tumorigenicity was observed in male and female mice at codeine dietary doses up to 400 mg\/kg\/day (approximately equivalent to 160 times the MRHD of hydrocodone on a mg\/m\u00b2 basis). Mutagenicity studies with hydrocodone have not been conducted. Fertility studies with hydrocodone have not been conducted. Carcinogenicity studies were conducted with ephedrine sulfate, a structurally related drug. Two-year studies in F344\/N rats and B6C3F1 mice were conducted to assess the carcinogenic potential of ephedrine sulfate. No evidence of tumorigenicity was observed in male and female rats at ephedrine sulfate dietary doses up to 9 and 11 mg\/kg\/day (approximately equivalent to 0.4 and 0.5 times the MRHD of pseudoephedrine on a mg\/m\u00b2 basis, respectively). No evidence of tumorigenicity was observed in male and female mice at ephedrine sulfate dietary doses up to 29 and 25 mg\/kg\/day (approximately equivalent to 0.7 and 0.6 times the MRHD of pseudoephedrine on a mg\/m\u00b2 basis, respectively). Mutagenicity studies with pseudoephedrine have not been conducted. Fertility studies with pseudoephedrine have not been conducted. Carcinogenicity, mutagenicity, and fertility studies with guaifenesin have not been conducted. HYCOFENIX is not recommended for use in pregnant women, including during or immediately prior to labor. Prolonged use of opioids during pregnancy may cause neonatal opioid withdrawal syndrome [see WARNINGS AND PRECAUTIONS, Clinical Considerations]. There are no available data with HYCOFENIX use in pregnant women to inform a drug-associated risk for adverse developmental outcomes. Published studies with hydrocodone have reported inconsistent findings and have important methodological limitations (see Data). Reproductive toxicity studies have not been conducted with HYCOFENIX; however, studies are available with individual active ingredients or related active ingredients (see Data). In animal reproduction studies, hydrocodone administered by the subcutaneous route to pregnant hamsters during the period of organogenesis produced a teratogenic effect at a dose approximately 70 times the maximum recommended human dose (MRHD) (see Data). Guaifenesin administered by the oral route to pregnant rats during the period of organogenesis was embryolethal at a dose approximately 2 times the MRHD and produced teratogenic effects at a dose approximately 3 times the MRHD (see Data). Based on the animal data, advise pregnant women of the potential risk to a fetus. Clinical Considerations Fetal\/Neonatal Adverse Reactions Prolonged use of opioid analgesics during pregnancy for medical or nonmedical purposes can result in physical dependence in the neonate and neonatal opioid withdrawal syndrome shortly after birth. Neonatal opioid withdrawal syndrome presents as irritability, hyperactivity and abnormal sleep pattern, high pitched cry, tremor, vomiting, diarrhea and failure to gain weight. The onset, duration, and severity of neonatal opioid withdrawal syndrome vary based on the specific opioid used, duration of use, timing and amount of last maternal use, and rate of elimination of the drug by the newborn. Observe newborns for symptoms of neonatal opioid withdrawal syndrome and manage accordingly [see WARNINGS AND PRECAUTIONS]. Maternal use of pseudoephedrine can cause fetal tachycardia. Labor Or Delivery Opioids cross the placenta and may produce respiratory depression and psycho-physiologic effects in neonates. An opioid antagonist, such as naloxone, must be available for reversal of opioid-induced respiratory depression in the neonate. Opioids, including HYCOFENIX, can prolong labor through actions which temporarily reduce the strength, duration, and frequency of uterine contractions. However, this effect is not consistent and may be offset by an increased rate of cervical dilation, which tends to shorten labor. Monitor neonates exposed to opioids during labor for signs of excess sedation and respiratory depression. A limited number of pregnancies have been reported in published observational studies and postmarketing reports describing hydrocodone use during pregnancy. However, these data cannot definitely establish or exclude any drug-associated risk during pregnancy. Methodological limitations of these observational studies include small sample size and lack of details regarding dose, duration and timing of exposure. The majority of studies examining the use of pseudoephedrine in pregnancy did not find an association with an increased risk of congenital anomalies. Some studies reported an association with an increased risk of gastroschisis. However, several similar studies did not find a statistically significant association. Methodological limitations of these studies included small sample size, recall bias and lack of information regarding dose and timing of exposure. Reproductive toxicity studies have not been conducted with HYCOFENIX; however, studies are available with individual active ingredients or related active ingredients. In an embryofetal development study in pregnant hamsters dosed on gestation day 8 during the period of organogenesis, hydrocodone induced cranioschisis, a malformation, at approximately 70 times the MRHD (on a mg\/m\u00b2 basis with a maternal subcutaneous dose of 102 mg\/kg). Reproductive toxicology studies were also conducted with codeine, an opiate related to hydrocodone. In an embryofetal development study in pregnant rats dosed throughout the period of organogenesis, codeine increased resorptions and decreased fetal weights at a dose approximately 95 times the MRHD of hydrocodone (on a mg\/m\u00b2 basis with a maternal oral dose of codeine at 120 mg\/kg\/day); however, these effects occurred in the presence of maternal toxicity. In embryofetal development studies with pregnant rabbits and mice dosed throughout the period of organogenesis, codeine produced no adverse developmental effects at doses approximately 50 and 240 times, respectively, the MRHD of hydrocodone (on a mg\/m\u00b2 basis with maternal oral doses of codeine at 30 mg\/kg\/day in rabbits and 600 mg\/kg\/day in mice). Animal studies with pseudoephedrine are not available. In an embryofetal development study in pregnant rats dosed throughout the period of organogenesis, guaifenesin resulted in fetal death at doses approximately 2 times the MRHD (on a mg\/m\u00b2 basis with maternal oral doses of 350 mg\/kg\/day and higher). Guaifenesin also induced hemorrhagic spots and decreases in fetal weight and lengths of full body, skull, fore- and hind-limbs, and tail at doses 2 times the MRHD (on a mg\/m\u00b2 basis with maternal oral doses of 250 mg\/kg\/day and higher). Limb and tail defects, increased intercostal space, and improper development of limbs were observed at doses 3 times the MRHD (on a mg\/m\u00b2 basis with maternal oral doses of 500 mg\/kg\/day and higher). Because of the potential for serious adverse reactions, including excess sedation, respiratory depression, and death in a breastfed infant, advise patients that breastfeeding is not recommended during treatment with HYCOFENIX. There are no data on the presence of HYCOFENIX in human milk, the effects of HYCOFENIX on the breastfed infant, or the effects of HYCOFENIX on milk production; however, data are available with hydrocodone, pseudoephedrine, and guaifenesin. Hydrocodone is present in breast milk. Published cases report variable concentrations of hydrocodone and hydromorphone (an active metabolite) in breast milk with administration of immediate-release hydrocodone to nursing mothers in the early post-partum period with relative infant doses of hydrocodone ranging between 1.4 and 3.7%. There are case reports of excessive sedation and respiratory depression in breastfed infants exposed to hydrocodone. No information is available on the effects of hydrocodone on milk production. Pseudoephedrine is present in human milk. Pseudoephedrine has been reported to decrease milk production (see Data). Pseudoephedrine has been reported to cause \"irritability\" in a breastfed infant (see Clinical Considerations and Data). No information is available on the levels of guaifenesin in breast milk or on milk production. Infants exposed to HYCOFENIX through breast milk should be monitored for excess sedation, respiratory depression, and irritability. Withdrawal symptoms can occur in breastfed infants when maternal administration of an opioid is stopped, or when breastfeeding is stopped. In a study of eight lactating women, who were 8 to 76 weeks postpartum and received a single dose of 60 mg of pseudoephedrine, the mean 24-hour milk production was reduced by 24%. In the same study, the estimated mean relative infant dose from breast milk (assuming mean milk consumption of 150 ml\/kg\/day and a maternal dosing regimen of 60 mg pseudoephedrine four times per day) was calculated to be 4.3% of the weight-adjusted maternal dose. Females And Males Of Reproductive Potential Chronic use of opioids, such as hydrocodone, a component of HYCOFENIX, may cause reduced fertility in females and males of reproductive potential. It is not known whether these effects on fertility are reversible [see ADVERSE REACTIONS, CLINICAL PHARMACOLOGY]. HYCOFENIX is not indicated for use in patients younger than 18 years of age because the benefits of symptomatic treatment of cough associated with allergies or the common cold do not outweigh the risks for use of hydrocodone in these patients [see INDICATIONS, WARNINGS AND PRECAUTIONS]. Life-threatening respiratory depression and death have occurred in children who received hydrocodone [see WARNINGS AND PRECAUTIONS]. Because of the risk of life-threatening respiratory depression and death, HYCOFENIX is contraindicated in children less than 6 years of age [see CONTRAINDICATIONS]. Clinical studies have not been conducted with HYCOFENIX in geriatric populations. Use caution when considering the use of HYCOFENIX in patients 65 years of age or older. Elderly patients may have increased sensitivity to hydrocodone; greater frequency of decreased hepatic, renal, or cardiac function; or concomitant disease or other drug therapy [see WARNINGS AND PRECAUTIONS]. Respiratory depression is the chief risk for elderly patients treated with opioids, including HYCOFENIX. Respiratory depression has occurred after large initial doses of opioids were administered to patients who were not opioid-tolerant or when opioids were co-administered with other agents that depress respiration [see WARNINGS AND PRECAUTIONS]. Hydrocodone is known to be substantially excreted by the kidney, and the risk of adverse reactions to this drug may be greater in patients with impaired renal function. Because elderly patients are more likely to have decreased renal function, monitor these patients closely for respiratory depression, sedation, and hypotension. The pharmacokinetics of HYCOFENIX has not been characterized in patients with renal impairment. Patients with renal impairment may have higher plasma concentrations than those with normal function [see CLINICAL PHARMACOLOGY]. Pseudoephedrine is primarily excreted unchanged in the urine. Therefore, pseudoephedrine may accumulate in patients with renal impairment. HYCOFENIX should be used with caution in patients with severe impairment of renal function, and patients should be monitored closely for signs of hydrocodone toxicity (respiratory depression, sedation, and hypotension) and pseudoephedrine toxicity. The pharmacokinetics of HYCOFENIX has not been characterized in patients with hepatic impairment. Patients with severe hepatic impairment may have higher plasma concentrations than those with normal hepatic function [see CLINICAL PHARMACOLOGY]. Therefore, HYCOFENIX should be used with caution in patients with severe impairment of hepatic function, and patients should be monitored closely for respiratory depression, sedation, and hypotension. No human overdosage data are available for HYCOFENIX. Overdosage with hydrocodone is characterized by respiratory depression (a decrease in respiratory rate and\/or tidal volume, Cheyne-Stokes respiration, cyanosis), extreme somnolence progressing to stupor or coma, skeletal muscle flaccidity, dizziness, ringing in the ears, confusion, blurred vision, eye problems, cold and clammy skin, and"} +{"id":"RedPajamaCommonCrawl.0014","text":"ACA \u2013 TITLE V TITLE V\u2014HEALTH CARE WORKFORCE Subtitle A\u2013Purpose and Definitions SEC. 5001. PURPOSE. The purpose of this title is to improve access to and the delivery of health care services for all individuals, particularly low income, underserved, uninsured, minority, health disparity, and rural populations by\u2013 (1) gathering and assessing comprehensive data in order for the health care workforce to meet the health care needs of individuals, including research on the supply, demand, distribution, diversity, and skills needs of the health care workforce; (2) increasing the supply of a qualified health care workforce to improve access to and the delivery of health care services for all individuals; (3) enhancing health care workforce education and training to improve access to and the delivery of health care services for all individuals; and (4) providing support to the existing health care workforce to improve access to and the delivery of health care services for all individuals. (a) This Title- In this title: (1) ALLIED HEALTH PROFESSIONAL- The term allied health professional means an allied health professional as defined in section 799B(5) of the Public Heath Service Act (42 U.S.C. 295p(5)) who\u2013 (A) has graduated and received an allied health professions degree or certificate from an institution of higher education; and (B) is employed with a Federal, State, local or tribal public health agency, or in a setting where patients might require health care services, including acute care facilities, ambulatory care facilities, personal residences, and other settings located in health professional shortage areas, medically underserved areas, or medically underserved populations, as recognized by the Secretary of Health and Human Services. (2) HEALTH CARE CAREER PATHWAY- The term healthcare career pathway means a rigorous, engaging, and high quality set of courses and services that\u2013 (A) includes an articulated sequence of academic and career courses, including 21st century skills; (B) is aligned with the needs of healthcare industries in a region or State; (C) prepares students for entry into the full range of postsecondary education options, including registered apprenticeships, and careers; (D) provides academic and career counseling in student-to-counselor ratios that allow students to make informed decisions about academic and career options; (E) meets State academic standards, State requirements for secondary school graduation and is aligned with requirements for entry into postsecondary education, and applicable industry standards; and (F) leads to 2 or more credentials, including\u2013 (i) a secondary school diploma; and (ii) a postsecondary degree, an apprenticeship or other occupational certification, a certificate, or a license. (3) INSTITUTION OF HIGHER EDUCATION- The term institution of higher education has the meaning given the term in sections 101 and 102 of the Higher Education Act of 1965 (20 U.S.C. 1001 and 1002). (4) LOW INCOME INDIVIDUAL, STATE WORKFORCE INVESTMENT BOARD, AND LOCAL WORKFORCE INVESTMENT BOARD- (A) LOW-INCOME INDIVIDUAL- The term low-income individual has the meaning given that term in section 101 of the Workforce investment Act of 1998 (29 U.S.C. 2801). (B) STATE WORKFORCE INVESTMENT BOARD; LOCAL WORKFORCE INVESTMENT BOARD- The terms State workforce investment board and local workforce investment board, refer to a State workforce investment board established under section 111 of the Workforce Investment Act of 1998 (29 U.S.C. 2821) and a local workforce investment board established under section 117 of such Act (29 U.S.C. 2832), respectively. (5) POSTSECONDARY EDUCATION- The term postsecondary education means\u2013 (A) a 4-year program of instruction, or not less than a 1-year program of instruction that is acceptable for credit toward an associate or a baccalaureate degree, offered by an institution of higher education; or (B) a certificate or registered apprenticeship program at the postsecondary level offered by an institution of higher education or a non-profit educational institution. (6) REGISTERED APPRENTICESHIP PROGRAM- The term registered apprenticeship program means an industry skills training program at the postsecondary level that combines technical and theoretical training through structure on the job learning with related instruction (in a classroom or through distance learning) while an individual is employed, working under the direction of qualified personnel or a mentor, and earning incremental wage increases aligned to enhance job proficiency, resulting in the acquisition of a nationally recognized and portable certificate, under a plan approved by the Office of Apprenticeship or a State agency recognized by the Department of Labor. (b) Title VII of the Public Health Service Act- Section 799B of the Public Health Service Act (42 U.S.C. 295p) is amended\u2013 (1) by striking paragraph (3) and inserting the following: (3) PHYSICIAN ASSISTANT EDUCATION PROGRAM- The term physician assistant education program means an educational program in a public or private institution in a State that\u2013 (A) has as its objective the education of individuals who, upon completion of their studies in the program, be qualified to provide primary care medical services with the supervision of a physician; and (B) is accredited by the Accreditation Review Commission on Education for the Physician Assistant.; and (12) AREA HEALTH EDUCATION CENTER- The term area health education center means a public or nonprofit private organization that has a cooperative agreement or contract in effect with an entity that has received an award under subsection (a)(1) or (a)(2) of section 751, satisfies the requirements in section 751(d)(1), and has as one of its principal functions the operation of an area health education center. Appropriate organizations may include hospitals, health organizations with accredited primary care training programs, accredited physician assistant educational programs associated with a college or university, and universities or colleges not operating a school of medicine or osteopathic medicine. (13) AREA HEALTH EDUCATION CENTER PROGRAM- The term area health education center program means cooperative program consisting of an entity that has received an award under subsection (a)(1) or (a)(2) of section 751 for the purpose of planning, developing, operating, and evaluating an area health education center program and one or more area health education centers, which carries out the required activities described in section 751(c), satisfies the program requirements in such section, has as one of its principal functions identifying and implementing strategies and activities that address health care workforce needs in its service area, in coordination with the local workforce investment boards. (14) CLINICAL SOCIAL WORKER- The term clinical social worker has the meaning given the term in section 1861(hh)(1) of the Social Security Act (42 U.S.C. 1395x(hh)(1)). (15) CULTURAL COMPETENCY- The term cultural competency shall be defined by the Secretary in a manner consistent with section 1707(d)(3). (16) DIRECT CARE WORKER- The term direct care worker has the meaning given that term in the 2010 Standard Occupational Classifications of the Department of Labor for Home Health Aides [31-1011], Psychiatric Aides [31-1013], Nursing Assistants [31-1014], and Personal Care Aides [39-9021]. (17) FEDERALLY QUALIFIED HEALTH CENTER- The term Federally qualified health center has the meaning given that term in section 1861(aa) of the Social Security Act (42 U.S.C. 1395x(aa)). (18) FRONTIER HEALTH PROFESSIONAL SHORTAGE AREA- The term frontier health professional shortage area means an area\u2013 (A) with a population density less than 6 persons per square mile within the service area; and (B) with respect to which the distance or time for the population to access care is excessive. (19) GRADUATE PSYCHOLOGY- The term graduate psychology means an accredited program in professional psychology. (20) HEALTH DISPARITY POPULATION- The term health disparity population has the meaning given such term in section 903(d)(1). (21) HEALTH LITERACY- The term health literacy means the degree to which an individual has the capacity to obtain, communicate, process, and understand health information and services in order to make appropriate health decisions. (22) MENTAL HEALTH SERVICE PROFESSIONAL- The term mental health service professional means an individual with a graduate or postgraduate degree from an accredited institution of higher education in psychiatry, psychology, school psychology, behavioral pediatrics, psychiatric nursing, social work, school social work, substance abuse disorder prevention and treatment, marriage and family counseling, school counseling, or professional counseling. (23) ONE-STOP DELIVERY SYSTEM CENTER- The term one-stop delivery system means a one-stop delivery system described in section 134(c) of the Workforce Investment Act of 1998 (29 U.S.C. 2864(c)). (24) PARAPROFESSIONAL CHILD AND ADOLESCENT MENTAL HEALTH WORKER- The term paraprofessional child and adolescent mental health worker means an individual who is not a mental or behavioral health service professional, but who works at the first stage of contact with children and families who are seeking mental or behavioral health services, including substance abuse prevention and treatment services. (25) RACIAL AND ETHNIC MINORITY GROUP; RACIAL AND ETHNIC MINORITY POPULATION- The terms racial and ethnic minority group and racial and ethnic minority population have the meaning given the term racial and ethnic minority group in section 1707. (26) RURAL HEALTH CLINIC- The term rural health clinic has the meaning given that term in section 1861(aa) of the Social Security Act (42 U.S.C. 1395x(aa)).. (c) Title VIII of the Public Health Service Act- Section 801 of the Public Health Service Act (42 U.S.C. 296) is amended\u2013 (1) in paragraph (2)\u2013 (A) by striking means a and inserting means an accredited (as defined in paragraph 6); and (B) by striking the period as inserting the following: where graduates are\u2013 (A) authorized to sit for the National Council Licensure EXamination-Registered Nurse (NCLEX-RN); or (B) licensed registered nurses who will receive a graduate or equivalent degree or training to become an advanced education nurse as defined by section 811(b).; and (16) ACCELERATED NURSING DEGREE PROGRAM- The term accelerated nursing degree program means a program of education in professional nursing offered by an accredited school of nursing in which an individual holding a bachelors degree in another discipline receives a BSN or MSN degree in an accelerated time frame as determined by the accredited school of nursing. (17) BRIDGE OR DEGREE COMPLETION PROGRAM- The term bridge or degree completion program means a program of education in professional nursing offered by an accredited school of nursing, as defined in paragraph (2), that leads to a baccalaureate degree in nursing. Such programs may include, Registered Nurse (RN) to Bachelors of Science of Nursing (BSN) programs, RN to MSN (Master of Science of Nursing) programs, or BSN to Doctoral programs.. Subtitle B\u2013Innovations in the Health Care Workforce SEC. 5101. NATIONAL HEALTH CARE WORKFORCE COMMISSION. (a) Purpose- It is the purpose of this section to establish a National Health Care Workforce Commission that\u2013 (1) serves as a national resource for Congress, the President, States, and localities; (2) communicates and coordinates with the Departments of Health and Human Services, Labor, Veterans Affairs, Homeland Security, and Education on related activities administered by one or more of such Departments; (3) develops and commissions evaluations of education and training activities to determine whether the demand for health care workers is being met; (4) identifies barriers to improved coordination at the Federal, State, and local levels and recommend ways to address such barriers; and (5) encourages innovations to address population needs, constant changes in technology, and other environmental factors. (b) Establishment- There is hereby established the National Health Care Workforce Commission (in this section referred to as the Commission). (c) Membership- (1) NUMBER AND APPOINTMENT- The Commission shall be composed of 15 members to be appointed by the Comptroller General, without regard to section 5 of the Federal Advisory Committee Act (5 U.S.C. App.). (2) QUALIFICATIONS- (A) IN GENERAL- The membership of the Commission shall include individuals\u2013 (i) with national recognition for their expertise in health care labor market analysis, including health care workforce analysis; health care finance and economics; health care facility management; health care plans and integrated delivery systems; health care workforce education and training; health care philanthropy; providers of health care services; and other related fields; and (ii) who will provide a combination of professional perspectives, broad geographic representation, and a balance between urban, suburban, rural, and frontier representatives. (B) INCLUSION- (i) IN GENERAL- The membership of the Commission shall include no less than one representative of\u2013 (I) the health care workforce and health professionals; (II) employers; (III) third-party payers; (IV) individuals skilled in the conduct and interpretation of health care services and health economics research; (V) representatives of consumers; (VI) labor unions; (VII) State or local workforce investment boards; and (VIII) educational institutions (which may include elementary and secondary institutions, institutions of higher education, including 2 and 4 year institutions, or registered apprenticeship programs). (ii) ADDITIONAL MEMBERS- The remaining membership may include additional representatives from clause (i) and other individuals as determined appropriate by the Comptroller General of the United States. (C) MAJORITY NON-PROVIDERS- Individuals who are directly involved in health professions education or practice shall not constitute a majority of the membership of the Commission. (D) ETHICAL DISCLOSURE- The Comptroller General shall establish a system for public disclosure by members of the Commission of financial and other potential conflicts of interest relating to such members. Members of the Commission shall be treated as employees of Congress for purposes of applying title I of the Ethics in Government Act of 1978. Members of the Commission shall not be treated as special government employees under title 18, United States Code. (3) TERMS- (A) IN GENERAL- The terms of members of the Commission shall be for 3 years except that the Comptroller General shall designate staggered terms for the members first appointed. (B) VACANCIES- Any member appointed to fill a vacancy occurring before the expiration of the term for which the members predecessor was appointed shall be appointed only for the remainder of that term. A member may serve after the expiration of that members term until a successor has taken office. A vacancy in the Commission shall be filled in the manner in which the original appointment was made. (C) INITIAL APPOINTMENTS- The Comptroller General shall make initial appointments of members to the Commission not later than September 30, 2010. (4) COMPENSATION- While serving on the business of the Commission (including travel time), a member of the Commission shall be entitled to compensation at the per diem equivalent of the rate provided for level IV of the Executive Schedule under section 5315 of tile 5, United States Code, and while so serving away from home and the members regular place of business, a member may be allowed travel expenses, as authorized by the Chairman of the Commission. Physicians serving as personnel of the Commission may be provided a physician comparability allowance by the Commission in the same manner as Government physicians may be provided such an allowance by an agency under section 5948 of title 5, United States Code, and for such purpose subsection (i) of such section shall apply to the Commission in the same manner as it applies to the Tennessee Valley Authority. For purposes of pay (other than pay of members of the Commission) and employment benefits, rights, and privileges, all personnel of the Commission shall be treated as if they were employees of the United States Senate. Personnel of the Commission shall not be treated as employees of the Government Accountability Office for any purpose. (5) CHAIRMAN, VICE CHAIRMAN- The Comptroller General shall designate a member of the Commission, at the time of appointment of the member, as Chairman and a member as Vice Chairman for that term of appointment, except that in the case of vacancy of the chairmanship or vice chairmanship, the Comptroller General may designate another member for the remainder of that members term. (6) MEETINGS- The Commission shall meet at the call of the chairman, but no less frequently than on a quarterly basis. (1) RECOGNITION, DISSEMINATION, AND COMMUNICATION- The Commission shall\u2013 (A) recognize efforts of Federal, State, and local partnerships to develop and offer health care career pathways of proven effectiveness; (B) disseminate information on promising retention practices for health care professionals; and (C) communicate information on important policies and practices that affect the recruitment, education and training, and retention of the health care workforce. (2) REVIEW OF HEALTH CARE WORKFORCE AND ANNUAL REPORTS- In order to develop a fiscally sustainable integrated workforce that supports a high-quality, readily accessible health care delivery system that meets the needs of patients and populations, the Commission, in consultation with relevant Federal, State, and local agencies, shall\u2013 (A) review current and projected health care workforce supply and demand, including the topics described in paragraph (3); (B) make recommendations to Congress and the Administration concerning national health care workforce priorities, goals, and policies; (C) by not later than October 1 of each year (beginning with 2011), submit a report to Congress and the Administration containing the results of such reviews and recommendations concerning related policies; and (D) by not later than April 1 of each year (beginning with 2011), submit a report to Congress and the Administration containing a review of, and recommendations on, at a minimum one high priority area as described in paragraph (4). (3) SPECIFIC TOPICS TO BE REVIEWED- The topics described in this paragraph include\u2013 (A) current health care workforce supply and distribution, including demographics, skill sets, and demands, with projected demands during the subsequent 10 and 25 year periods; (B) health care workforce education and training capacity, including the number of students who have completed education and training, including registered apprenticeships; the number of qualified faculty; the education and training infrastructure; and the education and training demands, with projected demands during the subsequent 10 and 25 year periods; (C) the education loan and grant programs in titles VII and VIII of the Public Health Service Act (42 U.S.C. 292 et seq. and 296 et seq.), with recommendations on whether such programs should become part of the Higher Education Act of 1965 (20 U.S.C. 1001 et seq); (D) the implications of new and existing Federal policies which affect the health care workforce, including Medicare and Medicaid graduate medical education policies, titles VII and VIII of the Public Health Service Act (42 U.S.C. 292 et seq. and 296 et seq.), the National Health Service Corps (with recommendations for aligning such programs with national health workforce priorities and goals), and other health care workforce programs, including those supported through the Workforce Investment Act of 1998 (29 U.S.C. 2801 et seq.), the Carl D. Perkins Career and Technical Education Act of 2006 (20 U.S.C. 2301 et seq.), the Higher Education Act of 1965 (20 U.S.C. 1001 et seq.), and any other Federal health care workforce programs; (E) the health care workforce needs of special populations, such as minorities, rural populations, medically underserved populations, gender specific needs, individuals with disabilities, and geriatric and pediatric populations with recommendations for new and existing Federal policies to meet the needs of these special populations; and (F) recommendations creating or revising national loan repayment programs and scholarship programs to require low-income, minority medical students to serve in their home communities, if designated as medical underserved community. (4) HIGH PRIORITY AREAS- (A) IN GENERAL- The initial high priority topics described in this paragraph include each of the following: (i) Integrated health care workforce planning that identifies health care professional skills needed and maximizes the skill sets of health care professionals across disciplines. (ii) An analysis of the nature, scopes of practice, and demands for health care workers in the enhanced information technology and management workplace. (iii) An analysis of how to align Medicare and Medicaid graduate medical education policies with national workforce goals. (iv) The education and training capacity, projected demands, and integration with the health care delivery system of each of the following: (I) Nursing workforce capacity at all levels. (II) Oral health care workforce capacity at all levels. (III) Mental and behavioral health care workforce capacity at all levels. (IV) Allied health and public health care workforce capacity at all levels. (V) Emergency medical service workforce capacity, including the retention and recruitment of the volunteer workforce, at all levels. (VI) The geographic distribution of health care providers as compared to the identified health care workforce needs of States and regions. (B) FUTURE DETERMINATIONS- The Commission may require that additional topics be included under subparagraph (A). The appropriate committees of Congress may recommend to the Commission the inclusion of other topics for health care workforce development areas that require special attention. (5) GRANT PROGRAM- The Commission shall\u2013 (A) review implementation progress reports on, and report to Congress about, the State Health Care Workforce Development Grant program established in section 5102; (B) in collaboration with the Department of Labor and in coordination with the Department of Education and other relevant Federal agencies, make recommendations to the fiscal and administrative agent under section 5102(b) for grant recipients under section 5102; (C) assess the implementation of the grants under such section; and (D) collect performance and report information, including identified models and best practices, on grants from the fiscal and administrative agent under such section and distribute this information to Congress, relevant Federal agencies, and to the public. (6) STUDY- The Commission shall study effective mechanisms for financing education and training for careers in health care, including public health and allied health. (7) RECOMMENDATIONS- The Commission shall submit recommendations to Congress, the Department of Labor, and the Department of Health and Human Services about improving safety, health, and worker protections in the workplace for the health care workforce. (8) ASSESSMENT- The Commission shall assess and receive reports from the National Center for Health Care Workforce Analysis established under section 761(b) of the Public Service Health Act (as amended by section 5103). (e) Consultation With Federal, State, and Local Agencies, Congress, and Other Organizations- (1) IN GENERAL- The Commission shall consult with Federal agencies (including the Departments of Health and Human Services, Labor, Education, Commerce, Agriculture, Defense, and Veterans Affairs and the Environmental Protection Agency), Congress, the Medicare Payment Advisory Commission, the Medicaid and CHIP Payment and Access Commission, and, to the extent practicable, with State and local agencies, Indian tribes, voluntary health care organizations, professional societies, and other relevant public-private health care partnerships. (2) OBTAINING OFFICIAL DATA- The Commission, consistent with established privacy rules, may secure directly from any department or agency of the Executive Branch information necessary to enable the Commission to carry out this section. (3) DETAIL OF FEDERAL GOVERNMENT EMPLOYEES- An employee of the Federal Government may be detailed to the Commission without reimbursement. The detail of such an employee shall be without interruption or loss of civil service status. (f) Director and Staff; Experts and Consultants- Subject to such review as the Comptroller General of the United States determines to be necessary to ensure the efficient administration of the Commission, the Commission may\u2013 (1) employ and fix the compensation of an executive director that shall not exceed the rate of basic pay payable for level V of the Executive Schedule and such other personnel as may be necessary to carry out its duties (without regard to the provisions of title 5, United States Code, governing appointments in the competitive service); (2) seek such assistance and support as may be required in the performance of its duties from appropriate Federal departments and agencies; (3) enter into contracts or make other arrangements, as may be necessary for the conduct of the work of the Commission (without regard to section 3709 of the Revised Statutes (41 U.S.C. 5)); (4) make advance, progress, and other payments which relate to the work of the Commission; (5) provide transportation and subsistence for persons serving without compensation; and (6) prescribe such rules and regulations as the Commission determines to be necessary with respect to the internal organization and operation of the Commission. (g) Powers- (1) DATA COLLECTION- In order to carry out its functions under this section, the Commission shall\u2013 (A) utilize existing information, both published and unpublished, where possible, collected and assessed either by its own staff or under other arrangements made in accordance with this section, including coordination with the Bureau of Labor Statistics; (B) carry out, or award grants or contracts for the carrying out of, original research and development, where existing information is inadequate, and (C) adopt procedures allowing interested parties to submit information for the Commissions use in making reports and recommendations. (2) ACCESS OF THE GOVERNMENT ACCOUNTABILITY OFFICE TO INFORMATION- The Comptroller General of the United States shall have unrestricted access to all deliberations, records, and data of the Commission, immediately upon request. (3) PERIODIC AUDIT- The Commission shall be subject to periodic audit by an independent public accountant under contract to the Commission. (h) Authorization of Appropriations- (1) REQUEST FOR APPROPRIATIONS- The Commission shall submit requests for appropriations in the same manner as the Comptroller General of the United States submits requests for appropriations. Amounts so appropriated for the Commission shall be separate from amounts appropriated for the Comptroller General. (2) AUTHORIZATION- There are authorized to be appropriated such sums as may be necessary to carry out this section. (3) GIFTS AND SERVICES- The Commission may not accept gifts, bequeaths, or donations of property, but may accept and use donations of services for purposes of carrying out this section. (i) Definitions- In this section: (1) HEALTH CARE WORKFORCE- The term health care workforce includes all health care providers with direct patient care and support responsibilities, such as physicians, nurses, nurse practitioners, primary care providers, preventive medicine physicians, optometrists, ophthalmologists, physician assistants, pharmacists, dentists, dental hygienists, and other oral healthcare professionals, allied health professionals, doctors of chiropractic, community health workers, health care paraprofessionals, direct care workers, psychologists and other behavioral and mental health professionals (including substance abuse prevention and treatment providers), social workers, physical and occupational therapists, certified nurse midwives, podiatrists, the EMS workforce (including professional and volunteer ambulance personnel and firefighters who perform emergency medical services), licensed complementary and alternative medicine providers, integrative health practitioners, public health professionals, and any other health professional that the Comptroller General of the United States determines appropriate. (2) HEALTH PROFESSIONALS- The term health professionals includes\u2013 (A) dentists, dental hygienists, primary care providers, specialty physicians, nurses, nurse practitioners, physician assistants, psychologists and other behavioral and mental health professionals (including substance abuse prevention and treatment providers), social workers, physical and occupational therapists, public health professionals, clinical pharmacists, allied health professionals, doctors of chiropractic, community health workers, school nurses, certified nurse midwives, podiatrists, licensed complementary and alternative medicine providers, the EMS workforce (including professional and volunteer ambulance personnel and firefighters who perform emergency medical services), and integrative health practitioners; (B) national representatives of health professionals; (C) representatives of schools of medicine, osteopathy, nursing, dentistry, optometry, pharmacy, chiropractic, allied health, educational programs for public health professionals, behavioral and mental health professionals (as so defined), social workers, pharmacists, physical and occupational therapists, oral health care industry dentistry and dental hygiene, and physician assistants; (D) representatives of public and private teaching hospitals, and ambulatory health facilities, including Federal medical facilities; and (E) any other health professional the Comptroller General of the United States determines appropriate. SEC. 5102. STATE HEALTH CARE WORKFORCE DEVELOPMENT GRANTS. (a) Establishment- There is established a competitive health care workforce development grant program (referred to in this section as the program) for the purpose of enabling State partnerships to complete comprehensive planning and to carry out activities leading to coherent and comprehensive health care workforce development strategies at the State and local levels. (b) Fiscal and Administrative Agent- The Health Resources and Services Administration of the Department of Health and Human Services (referred to in this section as the Administration) shall be the fiscal and administrative agent for the grants awarded under this section. The Administration is authorized to carry out the program, in consultation with the National Health Care Workforce Commission (referred to in this section as the Commission), which shall review reports on the development, implementation, and evaluation activities of the grant program, including\u2013 (1) administering the grants; (2) providing technical assistance to grantees; and (3) reporting performance information to the Commission. (c) Planning Grants- (1) AMOUNT AND DURATION- A planning grant shall be awarded under this subsection for a period of not more than one year and the maximum award may not be more than $150,000. (2) ELIGIBILITY- To be eligible to receive a planning grant, an entity shall be an eligible partnership. An eligible partnership shall be a State workforce investment board, if it includes or modifies the members to include at least one representative from each of the following: health care employer, labor organization, a public 2-year institution of higher education, a public 4-year institution of higher education, the recognized State federation of labor, the State public secondary education agency, the State P-16 or P-20 Council if such a council exists, and a philanthropic organization that is actively engaged in providing learning, mentoring, and work opportunities to recruit, educate, and train individuals for, and retain individuals in, careers in health care and related industries. (3) FISCAL AND ADMINISTRATIVE AGENT- The Governor of the State receiving a planning grant has the authority to appoint a fiscal and an administrative agency for the partnership. (4) APPLICATION- Each State partnership desiring a planning grant shall submit an application to the Administrator of the Administration at such time and in such manner, and accompanied by such information as the Administrator may reasonable require. Each application submitted for a planning grant shall describe the members of the State partnership, the activities for which assistance is sought, the proposed performance benchmarks to be used to measure progress under the planning grant, a budget for use of the funds to complete the required activities described in paragraph (5), and such additional assurance and information as the Administrator determines to be essential to ensure compliance with the grant program requirements. (5) REQUIRED ACTIVITIES- A State partnership receiving a planning grant shall carry out the following: (A) Analyze State labor market information in order to create health care career pathways for students and adults, including dislocated workers. (B) Identify current and projected high demand State or regional health care sectors for purposes of planning career pathways. (C) Identify existing Federal, State, and private resources to recruit, educate or train, and retain a skilled health care workforce and strengthen partnerships. (D) Describe the academic and health care industry skill standards for high school graduation, for entry into postsecondary education, and for various credentials and licensure. (E) Describe State secondary and postsecondary education and training policies, models, or practices for the health care sector, including career information and guidance counseling. (F) Identify Federal or State policies or rules to developing a coherent and comprehensive health care workforce development strategy and barriers and a plan to resolve these barriers. (G) Participate in the Administrations evaluation and reporting activities. (6) PERFORMANCE AND EVALUATION- Before the State partnership receives a planning grant, such partnership and the Administrator of the Administration shall jointly determine the performance benchmarks that will be established for the purposes of the planning grant. (7) MATCH- Each State partnership receiving a planning grant shall provide an amount, in cash or in kind, that is not less that 15 percent of the amount of the grant, to carry out the activities supported by the grant. The matching requirement may be provided from funds available under other Federal, State, local or private sources to carry out the activities. (8) REPORT- (A) REPORT TO ADMINISTRATION- Not later than 1 year after a State partnership receives a planning grant, the partnership shall submit a report to the Administration on the States performance of the activities under the grant, including the use of funds, including matching funds, to carry out required activities, and a description of the progress of the State workforce investment board in meeting the performance benchmarks. (B) REPORT TO CONGRESS- The Administration shall submit a report to Congress analyzing the planning activities, performance, and fund utilization of each State grant recipient, including an identification of promising practices and a profile of the activities of each State grant recipient. (d) Implementation Grants- (1) IN GENERAL- The Administration shall\u2013 (A) competitively award implementation grants to State partnerships to enable such partnerships to implement activities that will result in a coherent and comprehensive plan for health workforce development that will address current and projected workforce demands within the State; and (B) inform the Commission and Congress about the awards made. (2) DURATION- An implementation grant shall be awarded for a period of no more than 2 years, except in those cases where the Administration determines that the grantee is high performing and the activities supported by the grant warrant up to 1 additional year of funding. (3) ELIGIBILITY- To be eligible for an implementation grant, a State partnership shall have\u2013 (A) received a planning grant under subsection (c) and completed all requirements of such grant; or (B) completed a satisfactory application, including a plan to coordinate with required partners and complete the required activities during the 2 year period of the implementation grant. (4) FISCAL AND ADMINISTRATIVE AGENT- A State partnership receiving an implementation grant shall appoint a fiscal and an administration agent for the implementation of such grant. (5) APPLICATION- Each eligible State partnership desiring an implementation grant shall submit an application to the Administration at such time, in such manner, and accompanied by such information as the Administration may reasonably require. Each application submitted shall include\u2013 (A) a description of the members of the State partnership; (B) a description of how the State partnership completed the required activities under the planning grant, if applicable; (C) a description of the activities for which implementation grant funds are sought, including grants to regions by the State partnership to advance coherent and comprehensive regional health care workforce planning activities; (D) a description of how the State partnership will coordinate with required partners and complete the required partnership activities during the duration of an implementation grant; (E) a budget proposal of the cost of the activities supported by the implementation grant and a timeline for the provision of matching funds required; (F) proposed performance benchmarks to be used to assess and evaluate the progress of the partnership activities; (G) a description of how the State partnership will collect data to report progress in grant activities; and (H) such additional assurances as the Administration determines to be essential to ensure compliance with grant requirements. (6) REQUIRED ACTIVITIES- (A) IN GENERAL- A State partnership that receives an implementation grant may reserve not less than 60 percent of the grant funds to make grants to be competitively awarded by the State partnership, consistent with State procurement rules, to encourage regional partnerships to address health care workforce development needs and to promote innovative health care workforce career pathway activities, including career counseling, learning, and employment. (B) ELIGIBLE PARTNERSHIP DUTIES- An eligible State partnership receiving an implementation grant shall\u2013 (i) identify and convene regional leadership to discuss opportunities to engage in statewide health care workforce development planning, including the potential use of competitive grants to improve the development, distribution, and diversity of the regional health care workforce; the alignment of curricula for health care careers; and the access to quality career information and guidance and education and training opportunities; (ii) in consultation with key stakeholders and regional leaders, take appropriate steps to reduce Federal, State, or local barriers to a comprehensive and coherent strategy, including changes in State or local policies to foster coherent and comprehensive health care workforce development activities, including health care career pathways at the regional and State levels, career planning information, retraining for dislocated workers, and as appropriate, requests for Federal program or administrative waivers; (iii) develop, disseminate, and review with key stakeholders a preliminary statewide strategy that addresses short- and long-term health care workforce development supply versus demand; (iv) convene State partnership members on a regular basis, and at least on a semiannual basis; (v) assist leaders at the regional level to form partnerships, including technical assistance and capacity building activities; (vi) collect and assess data on and report on the performance benchmarks selected by the State partnership and the Administration for implementation activities carried out by regional and State partnerships; and (vii) participate in the Administrations evaluation and reporting activities. (7) PERFORMANCE AND EVALUATION- Before the State partnership receives an implementation grant, it and the Administrator shall jointly determine the performance benchmarks that shall be established for the purposes of the implementation grant. (8) MATCH- Each State partnership receiving an implementation grant shall provide an amount, in cash or in kind that is not less than 25 percent of the amount of the grant, to carry out the activities supported by the grant. The matching funds may be provided from funds available from other Federal, State, local, or private sources to carry out such activities. (9) REPORTS- (A) REPORT TO ADMINISTRATION- For each year of the implementation grant, the State partnership receiving the implementation grant shall submit a report to the Administration on the performance of the State of the grant activities, including a description of the use of the funds, including matched funds, to complete activities, and a description of the performance of the State partnership in meeting the performance benchmarks. (B) REPORT TO CONGRESS- The Administration shall submit a report to Congress analyzing implementation activities, performance, and fund utilization of the State grantees, including an identification of promising practices and a profile of the activities of each State grantee. (e) Authorization for Appropriations- (1) PLANNING GRANTS- There are authorized to be appropriated to award planning grants under subsection (c) $8,000,000 for fiscal year 2010, and such sums as may be necessary for each subsequent fiscal year. (2) IMPLEMENTATION GRANTS- There are authorized to be appropriated to award implementation grants under subsection (d), $150,000,000 for fiscal year 2010, and such sums as may be necessary for each subsequent fiscal year. SEC. 5103. HEALTH CARE WORKFORCE ASSESSMENT. (a) In General- Section 761 of the Public Health Service Act (42 U.S.C. 294m) is amended\u2013 (1) by redesignating subsection (c) as subsection (e); (2) by striking subsection (b) and inserting the following: (b) National Center for Health Care Workforce Analysis- (1) ESTABLISHMENT- The Secretary shall establish the National Center for Health Workforce Analysis (referred to in this section as the National Center). (2) PURPOSES- The National Center, in coordination to the extent practicable with the National Health Care Workforce Commission (established in section 5101 of the Patient Protection and Affordable Care Act), and relevant regional and State centers and agencies, shall\u2013 (A) provide for the development of information describing and analyzing the health care workforce and workforce related issues; (B) carry out the activities under section 792(a); (C) annually evaluate programs under this title; (D) develop and publish performance measures and benchmarks for programs under this title; and (E) establish, maintain, and publicize a national Internet registry of each grant awarded under this title and a database to collect data from longitudinal evaluations (as described in subsection (d)(2)) on performance measures (as developed under sections 749(d)(3), 757(d)(3), and 762(a)(3)). (3) COLLABORATION AND DATA SHARING- (A) IN GENERAL- The National Center shall collaborate with Federal agencies and relevant professional and educational organizations or societies for the purpose of linking data regarding grants awarded under this title. (B) CONTRACTS FOR HEALTH WORKFORCE ANALYSIS- For the purpose of carrying out the activities described in subparagraph (A), the National Center may enter into contracts with relevant professional and educational organizations or societies. (c) State and Regional Centers for Health Workforce Analysis- (1) IN GENERAL- The Secretary shall award grants to, or enter into contracts with, eligible entities for purposes of\u2013 (A) collecting, analyzing, and reporting data regarding programs under this title to the National Center and to the public; and (B) providing technical assistance to local and regional entities on the collection, analysis, and reporting of data. (2) ELIGIBLE ENTITIES- To be eligible for a grant or contract under this subsection, an entity shall\u2013 (A) be a State, a State workforce investment board, a public health or health professions school, an academic health center, or an appropriate public or private nonprofit entity; and (B) submit to the Secretary an application at such time, in such manner, and containing such information as the Secretary may require. (d) Increase in Grants for Longitudinal Evaluations- (1) IN GENERAL- The Secretary shall increase the amount awarded to an eligible entity under this title for a longitudinal evaluation of individuals who have received education, training, or financial assistance from programs under this title. (2) CAPABILITY- A longitudinal evaluation shall be capable of\u2013 (A) studying practice patterns; and (B) collecting and reporting data on performance measures developed under sections 749(d)(3), 757(d)(3), and 762(a)(3). (3) GUIDELINES- A longitudinal evaluation shall comply with guidelines issued under sections 749(d)(4), 757(d)(4), and 762(a)(4). (4) ELIGIBLE ENTITIES- To be eligible to obtain an increase under this section, an entity shall be a recipient of a grant or contract under this title.; and (3) in subsection (e), as so redesignated\u2013 (A) NATIONAL CENTER- To carry out subsection (b), there are authorized to be appropriated $7,500,000 for each of fiscal years 2010 through 2014. (B) STATE AND REGIONAL CENTERS- To carry out subsection (c), there are authorized to be appropriated $4,500,000 for each of fiscal years 2010 through 2014. (C) GRANTS FOR LONGITUDINAL EVALUATIONS- To carry out subsection (d), there are authorized to be appropriated such sums as may be necessary for fiscal years 2010 through 2014.; and (4) in paragraph (2), by striking subsection (a) and inserting paragraph (1). (b) Transfers- Not later than 180 days after the date of enactment of this Act, the responsibilities and resources of the National Center for Health Workforce Analysis, as in effect on the date before the date of enactment of this Act, shall be transferred to the National Center for Health Care Workforce Analysis established under section 761 of the Public Health Service Act, as amended by subsection (a). (c) Use of Longitudinal Evaluations- Section 791(a)(1) of the Public Health Service Act (42 U.S.C. 295j(a)(1)) is amended\u2013 (1) in subparagraph (A), by striking or at the end; (2) in subparagraph (B), by striking the period and inserting ; or; and (C) utilizes a longitudinal evaluation (as described in section 761(d)(2)) and reports data from such system to the national workforce database (as established under section 761(b)(2)(E)).. (d) Performance Measures; Guidelines for Longitudinal Evaluations- (1) ADVISORY COMMITTEE ON TRAINING IN PRIMARY CARE MEDICINE AND DENTISTRY- Section 748(d) of the Public Health Service Act is amended\u2013 (A) in paragraph (1), by striking and at the end; (B) in paragraph (2), by striking the period and inserting a semicolon; and (3) develop, publish, and implement performance measures for programs under this part; (4) develop and publish guidelines for longitudinal evaluations (as described in section 761(d)(2)) for programs under this part; and (5) recommend appropriation levels for programs under this part.. (2) ADVISORY COMMITTEE ON INTERDISCIPLINARY, COMMUNITY-BASED LINKAGES- Section 756(d) of the Public Health Service Act is amended\u2013 (3) ADVISORY COUNCIL ON GRADUATE MEDICAL EDUCATION- Section 762(a) of the Public Health Service Act (42 U.S.C. 294o(a)) is amended\u2013 (3) develop, publish, and implement performance measures for programs under this title, except for programs under part C or D; (4) develop and publish guidelines for longitudinal evaluations (as described in section 761(d)(2)) for programs under this title, except for programs under part C or D; and (5) recommend appropriation levels for programs under this title, except for programs under part C or D.. Subtitle C\u2013Increasing the Supply of the Health Care Workforce SEC. 5201. FEDERALLY SUPPORTED STUDENT LOAN FUNDS. (a) Medical Schools and Primary Health Care- Section 723 of the Public Health Service Act (42 U.S.C. 292s) is amended\u2013 (A) in paragraph (1), by striking subparagraph (B) and inserting the following: (B) to practice in such care for 10 years (including residency training in primary health care) or through the date on which the loan is repaid in full, whichever occurs first.; and (B) by striking paragraph (3) and inserting the following: (3) NONCOMPLIANCE BY STUDENT- Each agreement entered into with a student pursuant to paragraph (1) shall provide that, if the student fails to comply with such agreement, the loan involved will begin to accrue interest at a rate of 2 percent per year greater than the rate at which the student would pay if compliant in such year.; and (d) Sense of Congress- It is the sense of Congress that funds repaid under the loan program under this section should not be transferred to the Treasury of the United States or otherwise used for any other purpose other than to carry out this section.. (b) Student Loan Guidelines- The Secretary of Health and Human Services shall not require parental financial information for an independent student to determine financial need under section 723 of the Public Health Service Act (42 U.S.C. 292s) and the determination of need for such information shall be at the discretion of applicable school loan officer. The Secretary shall amend guidelines issued by the Health Resources and Services Administration in accordance with the preceding sentence. SEC. 5202. NURSING STUDENT LOAN PROGRAM. (a) Loan Agreements- Section 836(a) of the Public Health Service Act (42 U.S.C. 297b(a)) is amended\u2013 (1) by striking $2,500 and inserting $3,300; (2) by striking $4,000 and inserting $5,200; and (3) by striking $13,000 and all that follows through the period and inserting $17,000 in the case of any student during fiscal years 2010 and 2011. After fiscal year 2011, such amounts shall be adjusted to provide for a cost-of-attendance increase for the yearly loan rate and the aggregate of the loans.. (b) Loan Provisions- Section 836(b) of the Public Health Service Act (42 U.S.C. 297b(b)) is amended\u2013 (1) in paragraph (1)(C), by striking 1986 and inserting 2000; and (2) in paragraph (3), by striking the date of enactment of the Nurse Training Amendments of 1979 and inserting September 29, 1995. SEC. 5203. HEALTH CARE WORKFORCE LOAN REPAYMENT PROGRAMS. Part E of title VII of the Public Health Service Act (42 U.S.C. 294n et seq.) is amended by adding at the end the following: Subpart 3\u2013Recruitment and Retention Programs SEC. 775. INVESTMENT IN TOMORROWS PEDIATRIC HEALTH CARE WORKFORCE. (a) Establishment- The Secretary shall establish and carry out a pediatric specialty loan repayment program under which the eligible individual agrees to be employed full-time for a specified period (which shall not be less than 2 years) in providing pediatric medical subspecialty, pediatric surgical specialty, or child and adolescent mental and behavioral health care, including substance abuse prevention and treatment services. (b) Program Administration- Through the program established under this section, the Secretary shall enter into contracts with qualified health professionals under which\u2013 (1) such qualified health professionals will agree to provide pediatric medical subspecialty, pediatric surgical specialty, or child and adolescent mental and behavioral health care in an area with a shortage of the specified pediatric subspecialty that has a sufficient pediatric population to support such pediatric subspecialty, as determined by the Secretary; and (2) the Secretary agrees to make payments on the principal and interest of undergraduate, graduate, or graduate medical education loans of professionals described in paragraph (1) of not more than $35,000 a year for each year of agreed upon service under such paragraph for a period of not more than 3 years during the qualified health professionals\u2013 (A) participation in an accredited pediatric medical subspecialty, pediatric surgical specialty, or child and adolescent mental health subspecialty residency or fellowship; or (B) employment as a pediatric medical subspecialist, pediatric surgical specialist, or child and adolescent mental health professional serving an area or population described in such paragraph. (c) In General- (1) ELIGIBLE INDIVIDUALS- (A) PEDIATRIC MEDICAL SPECIALISTS AND PEDIATRIC SURGICAL SPECIALISTS- For purposes of contracts with respect to pediatric medical specialists and pediatric surgical specialists, the term qualified health professional means a licensed physician who\u2013 (i) is entering or receiving training in an accredited pediatric medical subspecialty or pediatric surgical specialty residency or fellowship; or (ii) has completed (but not prior to the end of the calendar year in which this section is enacted) the training described in subparagraph (B). (B) CHILD AND ADOLESCENT MENTAL AND BEHAVIORAL HEALTH- For purposes of contracts with respect to child and adolescent mental and behavioral health care, the term qualified health professional means a health care professional who\u2013 (i) has received specialized training or clinical experience in child and adolescent mental health in psychiatry, psychology, school psychology, behavioral pediatrics, psychiatric nursing, social work, school social work, substance abuse disorder prevention and treatment, marriage and family therapy, school counseling, or professional counseling; (ii) has a license or certification in a State to practice allopathic medicine, osteopathic medicine, psychology, school psychology, psychiatric nursing, social work, school social work, marriage and family therapy, school counseling, or professional counseling; or (iii) is a mental health service professional who completed (but not before the end of the calendar year in which this section is enacted) specialized training or clinical experience in child and adolescent mental health described in clause (i). (2) ADDITIONAL ELIGIBILITY REQUIREMENTS- The Secretary may not enter into a contract under this subsection with an eligible individual unless\u2013 (A) the individual agrees to work in, or for a provider serving, a health professional shortage area or medically underserved area, or to serve a medically underserved population; (B) the individual is a United States citizen or a permanent legal United States resident; and (C) if the individual is enrolled in a graduate program, the program is accredited, and the individual has an acceptable level of academic standing (as determined by the Secretary). (d) Priority- In"} +{"id":"RedPajamaCommonCrawl.0015","text":"Category Archives: Stat of the Week My Good Faith Critique Of DRA By Neil Weinberg on May 22, 2017 | 2 Comments Note: This isn't a Tigers post. If you're here for the Tigers, feel free to ignore. Also, I'm publishing this here rather than at FanGraphs because 1) I don't want the general public to get the idea that FanGraphs as an institution is throwing shade at DRA and 2) I don't want the perception that anything I'm saying is done in the service of driving traffic or subscriptions to or from either site. Evaluating pitchers is very hard, but that hasn't stopped people from trying. Wins and losses. ERA. WHIP. FIP. These are all statistics that at one point or another had been at the forefront of the quest for The Best Single Metric. A wise person might suggest that searching for one metric to rule them all might be a silly quest, but even if we all decided to properly use every tool in the toolbox, there would still have to be a best metric among the useful ones. Two years ago, the Baseball Prospectus stats team took a swing at building the next generation of pitching metrics, led by their top-line creation, Deserved Run Average (DRA). Many in our little corner of the world treated this as near second coming because it was first high-level attempt to get beyond the FIP-generation of metrics and some of the smartest people in the public analysis sphere had thrown their intellectual heft behind the effort. DRA promised to incorporate a lot of information that hadn't found its way into FIP while also taking a more complex approach to modeling the pitcher-value process. I agree that those are worthwhile goals. I think FIP is a very useful metric, not just because it does a pretty good job of representing pitcher value but because it is extremely straightforward. I am not saying that simplicity makes FIP a good metric, but rather that its clarity does. FIP has flaws, but its flaws are in perfect view. I know exactly what FIP is doing and exactly what FIP is not doing. And this is precisely where DRA has so far failed to win me as a full convert so far. I want to be clear that I am not saying DRA is less rigorous than FIP or that it has been designed poorly or in bad faith. My issue with DRA is not that I think there is something wrong with it, it's that I don't really know what to make of it. My argument is not that FIP is a better representation of pitcher value than DRA, it's that I am less certain about the quality of DRA than I am the quality of FIP. Imagine FIP and DRA are diamonds. I can hold FIP in my hand and examine it under a magnifying glass. DRA is on a table twenty feet away. I can see the exact quality of the FIP diamond, but I can only tell that DRA is a diamond. Smart people who cut the DRA diamond are telling me they think the DRA diamond is better, but I have not been able to see them side by side. In my own analysis and in my own writing, I have utilized DRA but I still lean heavily on the FIP-family of metrics for this reason. If I'm writing about a player and want to communicate something, I prefer FIP to DRA because I can talk clearly about what FIP says. If I want to use DRA I can only say that based on the complex method it deploys, the pitcher is this good\/bad\/other. Now many strong advocates of DRA will tell you that its complexity is good. Pitching, after all, is very complicated so it follows that any statistic that measures pitching holistically should also be complicated. That's a very convincing point, but as I noted earlier my problem is not complexity, it's clarity. I love complicated things. I've taken graduate-level courses in statistics and modeling. I am in no way turned off by DRA in concept. At no point in this piece am I saying DRA should be less complex. However, there are two clear issues with DRA that prevent me from using it as my primary point of reference. The first is that the BP team has not outlined a justification for its modeling strategy. If you read through their explanations (see here, here, here, and here) what you find is a list of flaws that exist with other pitching metrics. \"FIP doesn't have X, X matters, so we put X in our model. We know pitchers control their BABIP to some degree, so we put that in the model.\" This creates a couple of issues. The first issue is that I can't see what components are doing the lifting (for example, this page needs to be way more granular). Does a player have a good DRA because their opponents are very tough or because their defense is terrible? DRA jams a lot of information into a single output and that makes it quite difficult to use in any sort of interesting way. FIP only has five inputs (strikeouts, walks, hit batters, home runs, and balls-in-play) and even that can feel overly aggregated. DRA has even more inputs that have run through even more aggregation. That might provide DRA with a more accurate output but it blurs a lot of lines. This pitcher might be good, but I have no idea why he's good. More importantly, however, is the fact that the BP team has not thoroughly explained why their modeling choices (structure, not inputs) are the proper modeling choices. DRA is a complex model, and while complexity is good, complexity also means that there were hundreds of choices made along the way that could have made differently and produced differently outcomes. In other words, DRA is built on a lot of choices made by people about how to incorporate something and those choices have not been explained and defended. As I noted earlier, the choices may be correct, but I have no way of evaluating them if they do not explain how they came to them. Here's an excerpt from the Gory Math DRA post: What is the best way to model this relationship? That required a lot of testing. A LOT of testing. We tried linear models. We tried local regression. We tried tree-based methods. We bagged the trees. We tried gradient boosting. We tried support vector machines. We even tried neural networks. None of them were providing better results than existing estimators. And then we tried the one method that turned out to be perfect: MARS. MARS stands for Multivariate Adaptive Regression Splines, and was introduced by Dr. Jerome Friedman of Stanford in 1991. You don't hear much about MARS anymore: it has been supplanted in the everyday modeling lexicon by trendier machine-learning methods, including many of those we mentioned above. But MARS, in addition to being useful for data dumpster-diving, also has another big advantage: interactions. MARS uses what are known as regression splines to better fit data. Instead of drawing a straight line between two points, MARS creates hinges that allow the line to bend, resulting in \"knots\" that accommodate different trends. The power of these knots is enhanced when MARS looks at how variables interact with each other. These interactions are, in our opinion, one of the under-appreciated facts in baseball statistics. As discussed above, pitchers who are pitching particularly well or poorly have a cascading effect on other aspects of the game, including base-stealing. Moreover, there is a survival bias in baseball, as with most sports: pitchers who pitch more innings tend to be more talented, which means they end up being starters instead of relievers or spot fill-ins. The power of MARS is it not only allows us to connect data with hinged lines rather than straight ones, but that it allows those hinges to be built around the most significant interactions between the variables being considered, and only at the levels those interactions have value. MARS also uses a stepwise variable selection process to choose only the number of terms sufficient to account for the most variance. Most people won't be able to make heads or tails of this section and it's incumbent upon BP to make it more accessible, for one. But even granting a pardon for that, as someone knowledgeable in these issues, I don't know if this strategy is a good one or a bad one. They made all sorts of choices based on various tests and I am simply asked to accept they chose the right one and that there isn't a better option out there. Now you might say that it isn't their job to teach me how to literally write R code and test my own model so that I can probe the ether for things I think might be imperfect within DRA. Of course they shouldn't be asked to test literally every possible model specification when building DRA, but you have to give me more information about why you chose to build it like this as opposed to some of the other approaches you tried or could have tried. On the other hand, with something like FIP, all of the decisions are on display. You might think the decisions are wrong, but you can see the decisions and make that judgement. There are five inputs with a set of clear weights. That's all FIP is, and while that limits FIP in terms of accuracy, FIP is extremely clear. I can't make that judgement with DRA. A stronger and clearer defense of the specifications needs to be made. And this leads me to my second key issue with DRA that prevents me from using it in a more serious way. DRA is two years old and has already had three major iterations that worked differently in meaningful ways. I have no problem with updating your metrics based on new data or new research, and I don't think there is an inherent problem any of the specific changes they have announced. The problem is that DRA-2015, DRA-2016, and DRA-2017 have different views of the same seasons and I have a strong suspicion that DRA-2018 will lead to more of these cases. The rapidity with which DRA has been revised indicates the BP team's willingness to explore improvements (which is great!) but it also suggests to me that they haven't figured out the right way to model the underlying data generating process. When they announce a revision, they are stating that the previous version failed to capture something they found essential. It's one thing if these changes were exclusively based on new data, but they are also based on changes to the modeling. And if the results are that sensitive to tweaks in method, I am suspect about the entire system. That doesn't mean that FIP is necessarily better than any particular version of DRA, simply that I know that in a few months DRA is going to change and a pitcher I thought way decent might actually be kind of bad even though we didn't learn anything new about the pitcher himself. Put another way, are the things BP learned about DRA between 2015 and 2017 things they couldn't have learned by exploring more specifications before the initial rollout? I am not saying they should hold the release back until it's perfected because public input makes things better, but simply that the first few years are more akin to a beta test. I'm not ready to fully adopt the metric until it settles in a little more. That's not me dismissing DRA or its potential value to the world of baseball analytics. I really like DRA from a conceptual perspective, but my perception is that the nuts and bolts are subject to change quite frequently, so I have yet to dive in without a life preserver. I want to reiterate that none of this is a critique of any individual decision and it is decidedly not an argument that FIP is a better representation of pitching value than DRA. That is a separate argument that can be had on separate terms. But I do think that DRA is not as useful as FIP at this point in time. I am hesitant to use a metric whose workings I can't see. I don't know if the modeling strategy is correct and I am pretty sure that in a few months a chunk of pitchers will have totally different DRAs. I also want to be clear that none of this is intended as shade or inter-nerd sniping. I have great respect for the BP stats team and have shared these critiques with them. This is not a take down, it's a list of demands. I think DRA is aiming in the right direction, I just haven't been given enough information to figure out if it's really an improvement over its predecessors. Building a metric like DRA makes all the sense in the world and some great people are in command, but it will remain a complementary metric for me until it is unpacked in a way that allows me to trace its design. So here is what I would propose: Create an expanded version of the DRA run value page that includes every individual component so that people can see how the different factors are operating. It takes two seconds to figure out why FIP likes someone or doesn't. Doing so with DRA is next to impossible. Go back to the drawing board on the public facing explanation and give clearer explanations of how DRA works and why it works that way. DRA is complex, but you can explain complex things in a clear manner if you break it down into less complex pieces and work with outsiders to ensure they follow the explanation at each step. If DRA is meant to be a living, breathing statistic that gets updated annually, then be willing to accept ongoing skepticism about the execution of the statistic. If you are rejiggering it frequently, then the audience is going to wonder if the current version is the right one. If you want to avoid that, you have to change the name each time you change the stat. I get that this is annoying, but it's part of the job. Posted in: Stat of the Week New English D Stat Calculators! By Neil Weinberg on May 28, 2014 | Leave a comment If you're new to New English D this year, you might not be aware of this feature, so I thought I'd put out a quick reminder. If you haven't been to our stat primer page, it offers tons of background on the advanced stats we use here and why they are better than the more traditional numbers. But built into four of those pages are calculators that you can play around with on your own. Fill out the boxes and you can get values for FIP, xFIP, wOBA, and WAR. I can build others if you'd like as well. Enjoy and please report any problems. Be aware that they can take a few seconds to respond if many people are using them. FIP Calculator xFIP Calculator wOBA Calculator WAR Calculator Wins Above Replacement (WAR) Calculator By Neil Weinberg on December 18, 2013 | 3 Comments One of the missions of New English D is to make sabermetrics more easily digestible. To that end, we have an extensive Stat Primer series that explains a lot of important concepts and stats. One of the most controversial, but important stats out there is Wins Above Replacement (WAR). I wrote about WAR over a year ago here, so feel free to read that as a primer for what WAR is trying to measure. I also apologize if it's not perfectly written, as it was one of the first pieces I put out there and was still working to develop some expert internet-writing skills. Calculate FIP, xFIP, and wOBA too! That said, people often complain that WAR is really too complicated and it doesn't make sense to them. Well, I'm going to give you the tools to calculate WAR right here and right now. I will make two quick points. This is an approximation of the FanGraphs version of WAR for position players, not pitchers. This is not perfect, mostly in the sense that it does not account for park factors. If your fake player plays in a hitter friendly park, this number will be too high. If they play in a pitcher friendly park, it will be too low. Not a huge amount, but some. This calculator isn't perfect because in order for it to be perfect, I would have to ask you to input way more information and I would have to learn how to be a much better coder. This doesn't account for league, which makes a small difference and it doesn't break down by number of games played at different positions if your player plays more than one. Here is how it works. Fill in the data from Cell B2 to Cell B11 with the basic statistics of your player. In Cell B17, type the number that corresponds with their position in the \"H\" column. In Cell B18, type the number of runs above or below average you player is on defense. A perfectly average defender at the position in question will be zero. Remember these are run values and generally range from -10 to +10. Do the same thing with baserunning runs in Cell B19. If you want more information on any of these numbers, visit our Stat Primer page for details. If you've done everything correctly, you should have a WAR value in B20. Remember, this doesn't adjust for park or league, so it won't be perfect, but it should give you a pretty nice idea if you're just looking to play around with some numbers. Essentially, this is a \"what if WAR machine.\" Right now, these numbers reflect the 2013 regular season. Feel free to play around with the numbers in the blue box if you wish to calculate based on different seasons. All of the numbers can be found on this FG page with the exception of Lg R and Lg PA, which are simply the total number of runs and plate appearances in the league that season. Enjoy and feel free to post if you catch any mistakes. This one was much harder to write than FIP, xFIP, and wOBA. Posted in: MLB Posts, Stat of the Week | Tagged: stat of the week, war, war calculator, wins above replacement The Nine Worst Wins of 2013 By Neil Weinberg on September 14, 2013 | Leave a comment If you're here, you've likely been exposed to our series on pitcher wins and why we want to kill them. It's become a pretty big topic of conversation around baseball and some people are calling for a cease fire because the win has been repeatedly slaughtered to the point that we've probably violated the Geneva Convention. So, I'll make sure to avoid overdoing it because apparently #KillTheWin is sabr-bullying. If you're new to the cause, check out the groundwork for why wins are a terrible statistic and then enjoy The Nine Worst Wins from 2013 (as of Sept 13th). You Can Have A Great Season and Not Win You Can Have A Bad Season and Win A Lot Wins Don't Even Out in Big Samples A Case Study in Wins 12 Assorted Facts About Wins from 2013 Dissecting the Case for Wins A Replacement for Wins So the methodology is quite simple. Below are the pitchers in 2013 who have earned a \"win\" sorted by the lowest Win Probability Added (WPA). What WPA does is measure how much the team's likelihood of winning changed as a result of every play and assigns that value to the pitcher and batter who took part. It's not a perfect stat for measuring a player's performance but it works for our purposes here for a simple reason. If a pitcher's team scores 10 runs in the first inning, that pitcher can pitch poorly and get a win, but most of the pro-win alliance thinks that's okay. They believe in something called \"pitching to the score\" which has been shown to be fiction. So in order to make the point clearly, I'll use WPA which is entirely dependent on context. If you're up 10, you're allowed to give up 5. If you're up 1, you better not give up two. There are other ways to do this, but I think this is the most valuable way to do it given the audience still in need of persuasion. Rk Player Date Tm Opp Rslt App,Dec 9 Randall Delgado 2-Aug ARI BOS W 7-6 GS-6 ,W 8 Brandon League 31-May LAD COL W 7-5 9-9 ,BW 7 CC Sabathia 18-Aug NYY BOS W 9-6 GS-6 ,W 6 Alfredo Simon 22-Apr CIN CHC W 5-4 13-13f,W 5 Rafael Soriano 17-May WSN SDP W 6-5 9-9 ,BW 4 Matt Belisle 28-Jul COL MIL W 6-5 8-8 ,BW 3 Joe Smith 26-Jun CLE BAL W 4-3 8-8 ,BW 2 Michael Wacha 19-Aug STL MIL W 8-5 7-7 ,BW 1 Kyuji Fujikawa 12-Apr CHC SFG W 4-3 9-9f ,BW Rk Player IP H R ER BB SO HR Pit 9 Randall Delgado 6 6 6 4 1 7 2 97 8 Brandon League 1 2 2 2 0 1 1 26 7 CC Sabathia 5.1 7 6 6 5 5 1 103 6 Alfredo Simon 1 1 2 1 0 1 1 15 5 Rafael Soriano 1 4 2 2 0 0 0 19 4 Matt Belisle 1 2 2 2 0 2 1 23 3 Joe Smith 1 3 2 2 1 0 0 21 2 Michael Wacha 1 4 3 3 0 1 1 30 1 Kyuji Fujikawa 1 3 3 3 0 0 0 30 Rk Player ERA RE24 WPA 9 Randall Delgado 6.00 -2.939 -0.392 8 Brandon League 18.00 -1.479 -0.404 7 CC Sabathia 10.12 -3.472 -0.410 6 Alfredo Simon 9.00 -1.537 -0.417 5 Rafael Soriano 18.00 -1.594 -0.430 4 Matt Belisle 18.00 -1.479 -0.431 3 Joe Smith 18.00 -1.490 -0.528 2 Michael Wacha 27.00 -2.537 -0.557 1 Kyuji Fujikawa 27.00 -2.537 -0.745 To date, there have been 282 wins in which the pitcher had a negative WPA in 2013. Above you've seen the nine worst including Fujikawa having just about the worst performance I could imagine in a win using this method. In fact, as far back as we have WPA data, it's the 14th worst such win. It looked like this! That's pretty bad. This is all by way of saying that wins aren't a useful statistic and that even if we allow for the idea of pitching to the score, we still have a ton of ridiculous wins every season. If every win was handed out perfectly the rest of the season, we would still have seen 11.6% of the wins in 2013 go to pitchers who hurt their team's chance to win. #KillTheWinButDoItWithoutBeingSoDramatic Posted in: MLB Posts, Stat of the Week, The Nine | Tagged: kill the win, MLB, the nine Could We Assign \"Wins\" Differently? By Neil Weinberg on September 3, 2013 | 7 Comments If you've been here before, or someone like Brian Kenny tweeted a link to this post, you know that we are big proponents of the #KillTheWin movement. We don't like wins and losses as a pitching statistic for many reasons. You can pitch well and not get a win, you can pitch terribly and get a win, wins don't even out, and wins are extremely misleading. Put simply, wins are dependent on things that pitchers can't control and it's silly to measure them based on something their teammates do. Here are links to all of our formative #KillTheWin work: You Can Pitch Great and Not Win You Can Pitch Poorly and Win Wins Don't Even Out Over Long Careers Wins Mislead You When Comparing Players Assorted Facts About Wins from 2013 Dissecting the Case in Support of Wins But today I'd like to address a solution that a lot of people are calling for. You see, the old guard won't let go of the wins and losses concept and language. They can't accept things like FIP, xFIP, and WAR, or even K%, BB%, GB%. Even ERA is doesn't satisfy their longing for the \"W.\" So I'd like to propose a simple idea that simply changes the methodology for awarding wins and losses. Currently, a starter has to pitch at least 5 innings, leave with a lead, and not watch the bullpen surrender that lead. If we invented wins and losses today, no doubt we wouldn't use such a silly rule. So let's use a better one. If there is an appetite for Wins and Losses, why don't we actually tie wins and losses to performance? Here are two basic proposals that do that while solving a couple of key issues with wins. The first problem with wins and losses is that it depends on how much and when your team scores. So what we want is something that only measures the impact of the pitcher on the game. Another problem with wins and losses is that the no-decision essentially erases everything you did on a given day. If a pitcher throws 7 shutout innings and gets a no decision, that game shows up in every single one of his stats except wins and losses. We want to judge every start a pitcher makes, not just one in which the right conditions are met by his offense and bullpen. To partially resolve this issue, let's turn to the 2013 Tigers as an example. Instead of wins and losses as determined by the current rule, what if we allocate them by Win Probability Added (WPA) or Run Expectancy 24 (RE24)? Those two stats are a bit complicated to calculate, but extremely easy to understand. WPA reflects the percentage by which a player improved his team's chances of winning. It is very context dependent, but you can still earn positive values even when your team is losing. RE24 is a similar statistic except it doesn't pay attention to the score of the game and just reflects how many runs above or below average you are contributing. Think of it this way, in a 10-0 game a solo homerun has a pretty low WPA because the game is already decided, but it has the same RE24 in a 10-0 as it does in a 2-0 game. Both allow for the addition of value in a context dependent sense, but both also allow a player to add value even when his team is not. Both of these stats are readily available on FanGraphs and Baseball-Reference. Below I present the 2013 Tigers with WPA and RE24 \"wins.\" If a pitcher has a positive WPA or RE24 for a single game they get a win. If it's negative, they get a loss. No no-decisions and no concern about how the game actually ended. Did the pitcher improve his team's chances of winning a single game? That's what wins and losses should tell us, so let's try this. There are obvious weakness to this approach, namely that I'm not addressing by how much a pitcher helped his team, but to answer that question, we have season long numbers that are more important. This approach is meant to give people who want to see wins and losses a better reflection of true value. Pitcher Starts W-L WPA W-L RE24 W-L Fister 28 12-7 18-10 19-9 Sanchez 24 12-7 16-8 17-7 Scherzer 27 19-1 22-5 22-5 Verlander 29 12-10 17-12 18-11 Porcello 26 11-7 15-11 16-10 You will notice a couple of things. You'll notice that Scherzer's no-decisions are primarily the function of his team bailing him out and Fister, Sanchez, and Verlander's are almost all a case of the Tigers not providing enough run support. Porcello's are divided pretty evenly. This is interesting because it shows that even on individual teams, wins\/losses\/no decisions are handed out irregularly despite the same contingent of position players. For the die-hard #KillTheWin-er, this approach is still too context dependent and derived from an illogical attempt to hand wins and losses to a single player. But for a more traditional observer, hopefully this is compelling. Even if you like wins and losses, surely you can appreciate that the actual way in which wins and losses are assigned is arbitrary and foolish. Why is 5 innings the cutoff? Why do you not get a win if you pitch 8 shutout innings and your team wins in a walkoff? Why should you get a win if you allow 6 runs? Even if you want to track day to day contribution, at least track it in a way that reflects what the player you're judging actually did. Now I'm not sure if this is the best way, but this is definitely an improvement over wins and losses as currently defined. The current stat makes no contribution to analysis, this one makes some contribution. I'd still rather pay attention to season long numbers, but if we're going to judge a player in each individual game, let's at least do it right. Posted in: MLB Posts, Stat of the Week, Tigers Posts | Tagged: kill the win, MLB, sabermetrics, stat of the week, wins Jon Heyman Kills The Win While Trying to Save It By Neil Weinberg on August 26, 2013 | 2 Comments Here at New English D we are on the front lines of the #KillTheWin movement. If you're new to the site and are open-minded, please check out our 5 part series on why wins aren't useful: All of those links make a singular case. Wins are not useful when evaluating individual pitchers. The goal of baseball fans and analysts is to properly understand the game we love. Wins don't cause poverty, but wins are detrimental to our understanding of baseball because so many people use them as a measure of value, which they are not. Today, Jon Heyman wrote about Max Scherzer (currently leading the league in wins by a lot) and couldn't resist fighting back against the #KillTheWin movement. He makes several points. First, he argues that Scherzer should narrowly beat Felix for the AL Cy. Hey, we agree on that! Second, he says those of us trying to kill the win are wasting our time. That's silly because we enjoy killing the win and baseball is about having fun, but I'm not going to engage in pettiness when the real issues are much more important. Next, Heyman says: Wins do matter (though clearly not nearly as much as we once thought \u2014 and I give the stat guys credit for pointing this out.) No starter gets to 19-1 only because they are lucky, or because they \"happened\" to be \"standing on the mound\" when his team scored a ton of runs, as some would have you believe. So here we see Heyman acknowledge that he places less stock in wins today that he used to. Meaning that he was wrong before and therefore could be wrong again. Furthermore, Heyman says no one goes 19-1 because of luck\/happenstance\/standing on the mound. Actually, Jon, they do. Scherzer is an excellent starting pitcher, but he is not meaningfully better than Felix. Certainly not better than Kershaw or Harvey. Yet he has many more wins than they do and many fewer losses. The difference is that the Tigers score crazy amount of runs for Scherzer because they are really good at scoring runs. Additionally, he gets more runs than his other rotation-mates. Scherzer gets 7.32 runs per 9. Felix gets 4.73. Chris Sale gets 3.03. Even if you want to dramatically oversimplify baseball and assume a pitcher controls everything that happens when he is on the mound (he doesn't), he still has no control over what his offense does. In order to get a win, you have to be in the game when your team takes the lead for the final time. If you team doesn't score, or scores AT THE WRONG TIME, you do not get a win regardless of how you pitched. It's obvious that Heyman knows this based on his comments throughout the piece: There are a lot better numbers to illustrate a pitcher's performance over a season than wins and losses. But does that mean a pitcher's record is now totally worthless? Heyman argues that wins are not the most important thing, but that they are not worthless. Which poses the important question at which I will now arrive. What do wins tell us that we can't see in other stats? What is the value of seeing a W\/L record beyond seeing things like ERA, K%, BB%, GB%, FIP, xFIP, WAR, RE24, SwStr%, IP, etc? What do wins and losses add to the discussion? Nothing. Not one thing. Heyman says consistency, but that isn't the case. Check out the link about about \"misleading\" and you'll see that argument doesn't hold water. Good, consistent pitchers can win less often than bad and inconsistent ones. Heyman says wins aren't about being in the right place at the right time, but they clearly are. The Tigers score a disproportionate number of runs for Scherzer than they do for his teammates. Scherzer is both good and lucky. They aren't mutually exclusive, but that doesn't mean he should get credit for something he had nothing to do with. Scherzer is great. He has an excellent W\/L record. Those two things are related, but not highly related. Good pitchers, on average, win more often than bad ones because they have some control over the number of runs they allow but that doesn't mean judging a player by wins and losses is useful. It adds nothing to our understanding and does more harm than good. Heyman cites Tillman making the ASG as case and point. Wins influence people's thinking, whether it's Tillman in the ASG or it's Dusty Baker leaving Bailey on the mound when he was losing it so he could \"have a chance to get a win.\" My argument here is that wins provide us with no meaningful information and at best are trivial and at worst are negatively impacting games. Heyman concludes: The goal, ultimately, is to win games when a pitcher takes the mound, and Scherzer has done that better than anybody. Yes, there is a lot of luck involved in getting pitcher wins. But in Scherzer's case, he has pitched great, too, and no one should claim he hasn't. Which is interesting, because the Scherzer is getting a lot of luck as far as wins go. Sale isn't pitching as well as Scherzer, but he's not pitching 9-12 to 19-1 worse. Also, Heyman is using a strawman argument in his closing. No one, not one single person, thinks Scherzer hasn't been great. He's been amazing. Fantastic. Cy Young or very close to it, brilliant. That's not what this is about at all. He's 19-1 and Chris Sale is 9-12. He's not \"10 wins\" better than Sale. Not under any real definition of pitching ability or performance. This is a statistic that doesn't reflect performance at all. It adds nothing to the conversation you can't get elsewhere. That's why we want to kill it. I would like to point out the broader issue. Heyman is actually one of the more evolutionary members of the old guard. He clearly sees the fault in wins, but still wants to defend them. Read his defense. Think about it for yourself, it's like he wants to hold onto wins because he's used to them. And that's not a good reason. \"How we've always done things\" is not a good way to make decisions. I don't understand the purpose of Heyman's argument. Why does he want to save them? What utility do they bring to the conversation? This is not a personal assault on Heyman, but he put his views out there in writing, so they are open to criticism. I'm an academic and a baseball writer, so I know about critical feedback. You're welcome to criticize my reasoning as well. I can take it, don't worry. I offered Heyman a chance to clarify his message on Twitter and he has yet to do so. If he writes back, I'll be glad to amend this post. There is no value in looking at wins and losses for a starting pitcher. That's not about Scherzer or Felix, it's about analysts and fans. In fact, Heyman and his fellow BBWAA members should use their access to go ask Scherzer about wins, or even Google his quotes on the issue. He gets it and he's the person who benefits most from looking at wins. If he doesn't care about them, it's time to let them go. Posted in: MLB Posts, Stat of the Week | Tagged: heyman, kill the win, MLB, pitching, wins The Nine Most Misleading Batting Averages of 2013 By Neil Weinberg on August 3, 2013 | Leave a comment On this site, we often discuss which statistics are misleading and which statistics are better at determining a player's value. Over in our Stat Primer section we have tons of posts about why pitcher wins are bad and why RBI aren't a good way to measure individual players. We also have a post about why on base percentage is better than batting average and why you should use Weighted On Base Average (wOBA) if you're really only interested in looking at a single number because it weighs each type of hit based on its actual contribution to scoring. You want to look at stats that correlate more highly with scoring and OBP and wOBA are much better than batting average (just click the OBP v AVG link above to see for yourself). All in all, for hitters I'd tell you to look at Weighted Runs Created Plus (wRC+) because that is a park and league adjusted version of wOBA, meaning that you can compare players at Petco and Camden Yards and players from 2010 and 1960. It's simple to understand as 100 is average and anything above it is that % better than average and anything below it is that much worse. One of our main goals is to make advanced statistics more popular in the broader baseball community because we think they will improve your enjoyment of the game. Simply put, many of the traditional stats were invented before we knew enough and had the ability to calculate better ones. It's always important to move forward. Today, I'm offering a bit of evidence from the 2013 season about why you should look beyond batting average when judging a player. Below you will find The Nine Most Misleading Batting Averages so far this season. The rules are simple. These are players who have a below average batting average and above average offensive value or an above average batting average and below average overall value. Players who had really good batting averages that still undersold their value (think Cabrera) are not included because that would just be a list of the best hitters in baseball and that would be boring. Think of these players as guys who either walk a ton or not at all and\/or guys with lots of power or no power. Batting average treats every hit the same and ignores walks. That's not a good idea. Batting average is a fine stat, but it should only be a compliment to on base percentage if you want something simple and wOBA or wRC+ if you want something more daring. This is a plot of AVG and wRC+ to show you that while batting average is important in determining offensive value, there is a lot it doesn't explain. About 54% of the variation in wRC+ can be explained by average. Walks, power, and ballpark make up the rest and we shouldn't ignore them: It's important to note that I make no adjustment for position, meaning that these are all deviations from league average (.257 AVG) and not based on their respective positions. These are batting averages that don't tell the whole story about a player, not batting averages that explain positional value. Rank Name Team PA BB% AVG OBP SLG wOBA wRC+ 9 Jose Altuve Astros 436 5.50% 0.284 0.323 0.362 0.298 87 8 Brandon Moss Athletics 346 9.50% 0.241 0.321 0.456 0.338 116 7 Pedro Alvarez Pirates 402 8.00% 0.240 0.301 0.490 0.337 117 6 Chris Carter Astros 390 12.30% 0.214 0.315 0.432 0.327 107 5 Adam Dunn White Sox 418 12.90% 0.217 0.323 0.457 0.337 109 4 Raul Ibanez Mariners 350 7.10% 0.249 0.303 0.520 0.353 126 3 Jose Bautista Blue Jays 457 12.90% 0.252 0.348 0.496 0.365 130 2 Alexei Ramirez White Sox 455 3.10% 0.277 0.302 0.349 0.285 73 1 Dan Uggla Braves 422 13.30% 0.198 0.315 0.419 0.325 106 What you have is three types of players. One are players who have a high average but never walk and don't hit for power. Two are players with great walk rates. Three are players with a ton of power. Each of those qualities makes batting average deceptive. We don't have to get rid of the stat, but it's important to understand that walking and extra base hits are very important and just dividing hits by at bats doesn't equal offensive value. I say this because the person who wins the batting title is only the best offensive player 30% of the time. We call that person the \"Batting Champion,\" but that's not really true. Offensive value is more complicated that H\/AB and it's important to start moving towards stats that capture that, especially because we already have those stats and it only requires a few minutes to learn about them. Posted in: MLB Posts, Stat of the Week, The Nine | Tagged: batting average, MLB, sabermetrics, stat of the week, the nine, wOBA Hidden Value: Assessing the Tigers on The Bases By Neil Weinberg on July 30, 2013 | 2 Comments Baserunning is pretty much the red-headed stepchild of baseball analysis. We care a lot about hitting. We care a lot about pitching. Most people given a courtesy nod to defense, even if they basically ignore it. But no one talks about baserunning aside from stolen base totals, or maybe stolen base efficiency. But there is so much more going on on the bases that we could be talking about. Going first to third, scoring on singles, not making outs you don't have to make. All of these are critical aspects of baserunning that we don't talk about, but very easily could. In the text of this post I'll be introducing some statistics (which are very simple) and discussing them in the context of the 2013 Tigers to date (July 30th). Let's start by digging deeper on stolen bases. Stolen bases add value to the team, about 1\/4 of the value added by a single. But getting caught is costly, and is about twice as costly as stealing a base is beneficial because the value of moving up a base is not as important as not making an extra out. In other words, you need to steal at about a 70% rate or better in order to be adding value to your team overall. Name wSB Andy Dirks 0.7 Don Kelly 0.3 Hernan Perez 0.2 Miguel Cabrera 0.1 Matt Tuiasosopo -0.1 Ramon Santiago -0.1 Omar Infante -0.2 Alex Avila -0.2 Austin Jackson -0.3 Torii Hunter -0.4 Avisail Garcia -0.4 Prince Fielder -0.6 Victor Martinez -0.8 Jhonny Peralta -0.9 Brayan Pena -0.9 Presented above are the number of runs each Tiger has added via SB and CS. As you can see, nobody is doing much of anything. The Tigers best basestealer isn't even up to a full run (10 runs = 1 win) of value and the worst basestealer costs about the same. The Tigers don't steal a lot of bases, but they don't get caught a ton either. All told they are a -3.7 wSB, which means their basestealing exploits has cost the team about one-third of a win. Not very significant. Now let's take a look at UBR, which is simply the same formula for all other baserunning activities. This includes the value of going first to third and the cost of getting thrown out trying to stretch something. I'm going to talk about some pieces of this in a moment, but first let me give you the overall numbers. Name UBR Austin Jackson 5.0 Omar Infante 1.6 Avisail Garcia 0.7 Alex Avila 0.6 Ramon Santiago 0.3 Andy Dirks -0.2 Bryan Holaday -0.6 Here we have a chance to see more overall value impact. It will not surprise you to learn that Austin Jackson is the Tigers best runner and that he has been worth half a win to the team simply on the bases (this does not include stealing). Kelly ranks well in this department and despite being slow, Cabrera's solid instincts help him add value here as well. Dirks is a bit surprising because he's the team's best basestealer, but it looks like he doesn't help much with the ball in play. Overall, the team has a -1.9 UBR, which is just a tick below average. Adding wSB and UBR together, the Tigers have cost themselves something like half a win this season with their baserunning (25th in MLB). You're not happy about that, but given their collection of lumbering sluggers, it's nice to see they aren't giving runs back on the bases they are earning with the bat. So now that we have an idea about the Tigers overall baserunning value, what are some other things we can track. Let's start with outs made on the bases. The table below is sorted by total outs, but includes where each out was made. These are outs made when the runner was not forced, so it would include something like getting thrown out at the plate trying to score from second, but not getting forced out in the middle of a double play: Player OOB1 OOB2 OOB3 OOBHm OOB Torii Hunter 1 1 1 1 4 Victor Martinez 0 1 0 3 4 Matt Tuiasosopo 0 0 1 3 4 Andy Dirks 1 0 0 2 3 Prince Fielder 0 0 0 3 3 Omar Infante 1 0 1 1 3 Austin Jackson 0 2 1 0 3 Jhonny Peralta 1 2 0 0 3 Miguel Cabrera 0 2 0 0 2 Don Kelly 0 0 1 1 2 Alex Avila 1 0 0 0 1 Avisail Garcia 0 0 0 0 0 Bryan Holaday 0 0 0 0 0 Brayan Pena 0 0 0 0 0 Hernan Perez 0 0 0 0 0 Ramon Santiago 0 0 0 0 0 You'll notice the Tigers have made 32 outs on the bases while the average team has made 33. Essentially, the Tigers know their limitations like with stolen bases. This is not a club blessed with speed, but they know not to push it and don't run into an inordinate amount of outs. It's important to recognize that the base coaches are partially responsible for this, so don't look at Fielder's 3 outs at home and put it all on him. This isn't a perfectly individual situation and it's important to consider the context of every action and game situations. It would just be way too difficult for me to show you the percentage of time Fielder scored on singles from second versus the times he stopped at 3B versus the times he got thrown out in a simple table. Now let's look at the Tigers' Extra Bases Taken Percentage. This is how often a player takes an extra base when the opportunity presents itself. Note that this is how often they go from first to third when the opportunity comes up not how often the make it when they try for it. Player XBT% Omar Infante 55% Torii Hunter 49% Austin Jackson 48% Miguel Cabrera 41% Avisail Garcia 40% Jhonny Peralta 37% Ramon Santiago 36% Don Kelly 33% Hernan Perez 33% Andy Dirks 29% Prince Fielder 29% Victor Martinez 23% Alex Avila 17% Brayan Pena 13% Matt Tuiasosopo 8% Bryan Holaday 0% League average is 40% and the Tigers as a unit take 35%. Some Tigers do this very well and some do it quite poorly. It's important to think about the last two stats together. The Tigers make an average number of outs and take a slightly below average number of extra bases. This is a team that knows what it can and can't do and doesn't run into a lot of outs relative to the rest of the league. Remember our lesson from the stolen bases section. Not making outs is more important than moving up a base. You can break these stats down further to each base situation."} +{"id":"RedPajamaCommonCrawl.0016","text":"Describe the nervous, endocrine, reproductive, and sensory systems The first set of body systems we'll learn about have been grouped together as the \"control systems.\" It is important to remember that this isn't a hard-and-fast categorization: we've simply grouped these systems together to help you organize your learning. These control systems all function in roles that control the signals that direct your body's actions. Identify the structure and function of the nervous system Identify the structure and function of the endocrine system Identify the structure and function of the reproductive system Identify the structure and function of the sensory systems The central nervous system includes the brain and spinal cord. The brain and spinal cord are protected by bony structures, membranes, and fluid. The brain is held in the cranial cavity of the skull and it consists of the cerebrum, cerebellum, and the brain stem. The nerves involved are cranial nerves and spinal nerves. Figure 1. The nervous system. The nervous system has three main functions: sensory input, integration of data and motor output. Sensory input is when the body gathers information or data, by way of neurons, glia and synapses. The nervous system is composed of excitable nerve cells (neurons) and synapses that form between the neurons and connect them to centers throughout the body or to other neurons. These neurons operate on excitation or inhibition, and although nerve cells can vary in size and location, their communication with one another determines their function. These nerves conduct impulses from sensory receptors to the brain and spinal cord. The data is then processed by way of integration of data, which occurs only in the brain. After the brain has processed the information, impulses are then conducted from the brain and spinal cord to muscles and glands, which is called motor output. Glia cells are found within tissues and are not excitable but help with myelination, ionic regulation and extracellular fluid. The nervous system is comprised of two major parts, or subdivisions, the central nervous system (CNS) and the peripheral nervous system (PNS). The CNS includes the brain and spinal cord. The brain is the body's \"control center.\" The CNS has various centers located within it that carry out the sensory, motor and integration of data. These centers can be subdivided to Lower Centers (including the spinal cord and brain stem) and Higher centers communicating with the brain via effectors. The PNS is a vast network of spinal and cranial nerves that are linked to the brain and the spinal cord. It contains sensory receptors which help in processing changes in the internal and external environment. This information is sent to the CNS via afferent sensory nerves. The PNS is then subdivided into the autonomic nervous system and the somatic nervous system. The autonomic has involuntary control of internal organs, blood vessels, smooth and cardiac muscles. The somatic has voluntary control of skin, bones, joints, and skeletal muscle. The two systems function together, by way of nerves from the PNS entering and becoming part of the CNS, and vice versa. General functions of the CNS The central nervous system (CNS) represents the largest part of the nervous system, including the brain and the spinal cord. Together with the peripheral nervous system (PNS), it has a fundamental role in the control of behavior. When the central nervous system becomes damaged or peripheral nerves become trapped, a variety of impacts are possible. It can increase or decrease your internal organs functionality, it can even affect your facial expressions, i.e. make you frown a lot, your smile may become lop sided, your lungs can overwork, or underwork, lung capacity may increase or decrease, your bladder can fill, but you become unable to urinate, your bowels become lapsed and you are unable to completely clear them upon each bowel movement, the muscles in your arms, legs and torso can become weaker and more fatty, not from lack of use, but from the nerves that run from your spine into them being restricted from working properly, you can suffer headaches, earaches, sore throats, blocked sinuses. Even your ability to orgasm can be affected. The CNS is conceived as a system devoted to information processing, where an appropriate motor output is computed as a response to a sensory input. Many threads of research suggest that motor activity exists well before the maturation of the sensory systems, and senses only influence behavior without dictating it. This has brought the conception of the CNS as an autonomous system. Neurons are highly specialized for the processing and transmission of cellular signals. Given the diversity of functions performed by neurons in different parts of the nervous system, there is, as expected, a wide variety in the shape, size, and electrochemical properties of neurons. For instance, the soma of a neuron can vary in size from 4 to 100 micrometers in diameter. The soma (cell body) is the central part of the neuron. It contains the nucleus of the cell, and therefore is where most protein synthesis occurs. The nucleus ranges from 3 to 18 micrometers in diameter. The dendrites of a neuron are cellular extensions with many branches, and metaphorically this overall shape and structure is referred to as a dendritic tree. This is where the majority of input to the neuron occurs. However, information outflow (i.e., from dendrites to other neurons) can also occur\u2014except in chemical synapse in which backflow of impulse is inhibited by the fact that axon do not possess chemoreceptors and dendrites cannot secrete neurotransmitter chemical. This explains one way conduction of nerve impulse. The axon is a finer, cable-like projection which can extend tens, hundreds, or even tens of thousands of times the diameter of the soma in length. The axon carries nerve signals away from the soma (and also carry some types of information back to it). Many neurons have only one axon, but this axon may\u2014and usually will\u2014undergo extensive branching, enabling communication with many target cells. The part of the axon where it emerges from the soma is called the axon hillock. Besides being an anatomical structure, the axon hillock is also the part of the neuron that has the greatest density of voltage-dependent sodium channels. This makes it the most easily-excited part of the neuron and the spike initiation zone for the axon: in neurological terms it has the greatest hyperpolarized action potential threshold. While the axon and axon hillock are generally involved in information outflow, this region can also receive input from other neurons as well. The axon terminal is a specialized structure at the end of the axon that is used to release neurotransmitter chemicals and communicate with target neurons. Although the canonical view of the neuron attributes dedicated functions to its various anatomical components, dendrites and axons often act in ways contrary to their so-called main function. Axons and dendrites in the central nervous system are typically only about a micrometer thick, while some in the peripheral nervous system are much thicker. The soma is usually about 10\u201325 micrometers in diameter and often is not much larger than the cell nucleus it contains. The longest axon of a human motor neuron can be over a meter long, reaching from the base of the spine to the toes. Sensory neurons have axons that run from the toes to the dorsal columns, over 1.5 meters in adults. Giraffes have single axons several meters in length running along the entire length of their necks. Much of what is known about axonal function comes from studying the squids giant axon, an ideal experimental preparation because of its relatively immense size (0.5\u20131 millimeters thick, several centimeters long). Sensory afferent neurons convey information from tissues and organs into the central nervous system. Efferent neurons transmit signals from the central nervous system to the effector cells and are sometimes called motor neurons. Interneurons connect neurons within specific regions of the central nervous system. Afferent and efferent can also refer generally to neurons which, respectively, bring information to or send information from brain region. Excitatory neurons excite their target postsynaptic neurons or target cells causing it to function. Motor neurons and somatic neurons are all excitatory neurons. Excitatory neurons in the brain are often glutamatergic. Spinal motor neurons, which synapse on muscle cells, use acetylcholine as their neurotransmitter. Inhibitory neurons inhibit their target neurons. Inhibitory neurons are also known as short axon neurons, interneurons or microneurons. The output of some brain structures (neostriatum, globus pallidus, cerebellum) are inhibitory. The primary inhibitory neurotransmitters are GABA and glycine. Modulatory neurons evoke more complex effects termed neuromodulation. These neurons use such neurotransmitters as dopamine, acetylcholine, serotonin and others. Each synapses can receive both excitatory and inhibitory signals and the outcome is determined by the adding up of summation. Watch this video for another introduction to the nervous system. This is the first in a series of nine videos. While you may enjoy all the videos in this series, you are only required to watch the first video. The endocrine system is a control system of ductless glands that secrete hormones within specific organs. Hormones act as \"messengers,\" and are carried by the bloodstream to different cells in the body, which interpret these messages and act on them. It seems like a far fetched idea that a small chemical can enter the bloodstream and cause an action at a distant location in the body. Yet this occurs in our bodies everyday of our lives. The ability to maintain homeostasis and respond to stimuli is largely due to hormones secreted within the body. Without hormones, you could not grow, maintain a constant temperature, produce offspring, or perform the basic actions and functions that are essential for life. The endocrine system provides an electrochemical connection from the hypothalamus of the brain to all the organs that control the body metabolism, growth and development, and reproduction. There are two types of hormones secreted in the endocrine system: Steroidal (or lipid based) and non-steroidal, (or protein based) hormones. The endocrine system regulates its hormones through negative feedback, except in very specific cases like childbirth. Increases in hormone activity decrease the production of that hormone. The immune system and other factors contribute as control factors also, altogether maintaining constant levels of hormones. Types of Glands Exocrine Glands are those which release their cellular secretions through a duct which empties to the outside or into the lumen (empty internal space) of an organ. These include certain sweat glands, salivary and pancreatic glands, and mammary glands. They are not considered a part of the endocrine system. Figure 2. Major endocrine glands. (Male left, female on the right.) 1. Pineal gland 2. Pituitary gland 3. Thyroid gland 4. Thymus 5. Adrenal gland 6. Pancreas 7. Ovary 8. Testis Endocrine Glands are those glands which have no duct and release their secretions directly into the intercellular fluid or into the blood. The collection of endocrine glands makes up the endocrine system. The main endocrine glands are the pituitary (anterior and posterior lobes), thyroid, parathyroid, adrenal (cortex and medulla), pancreas and gonads. The pituitary gland is attached to the hypothalamus of the lower forebrain. The thyroid gland consists of two lateral masses, connected by a cross bridge, that are attached to the trachea. They are slightly inferior to the larynx. The parathyroid glands are four masses of tissue, two embedded posterior in each lateral mass of the thyroid gland. One adrenal gland is located on top of each kidney. The cortex is the outer layer of the adrenal gland. The medulla is the inner core. The pancreas is along the lower curvature of the stomach, close to where it meets the first region of the small intestine, the duodenum. The gonads (ovaries and testes) are found in the pelvic cavity. Hormones and Types A hormone is a type of chemical signal. They are a means of communication between cells. The endocrine system produces hormones that are instrumental in maintaining homeostasis and regulating reproduction and development. A hormone is a chemical messenger produced by a cell that effects specific change in the cellular activity of other cells (target cells). Unlike exocrine glands (which produce substances such as saliva, milk, stomach acid and digestive enzymes), endocrine glands do not secrete substances into ducts (tubes). Instead, endocrine glands secrete their hormones directly into the surrounding extra cellular space. The hormones then diffuse into nearby capillaries and are transported throughout the body in the blood. The endocrine and nervous systems often work toward the same goal. Both influence other cells with chemicals (hormones and neurotransmitters). However, they attain their goals differently. Neurotransmitters act immediately (within milliseconds) on adjacent muscle, gland, or other nervous cells, and their effect is short-lived. In contrast, hormones take longer to produce their intended effect (seconds to days), may affect any cell, nearby or distant, and produce effects that last as long as they remain in the blood, which could be up to several hours. Table 1 shows the major hormones, their target and their function once in the target cell. Table 1. Major Horomes Endocrine Gland Hormone Released Target Tissue\/Organ Major Function of Hormone Hypothalamus Hypothalamic releasing and inhibiting hormones Peptide Anterior pituitary Regulate anterior pituitary hormone Posterior Pituitary Antidiuretic (ADH) Peptide Kidneys Stimulates water reabsorption by kidneys Oxytocin Peptide Uterus, mammary glands Stimulates uterine muscle contractions and release of milk by mammary glands Anterior Pituitary Thyroid stimulating (TSH) Glycoprotein Thyroid Stimulates thyroid Adrenocorticotropic (ACTH) Peptide Adrenal cortex Stimulates adrenal cortex Gonadotropic (FSH, LH) Glycoprotein Gonads Egg and sperm production, sex hormone production Prolactin (PRL) Protein Mammary glands Milk production Growth (GH) Protein Soft tissue, bones Cell division, protein synthesis and bone growth Thyroid Thyroxine (T4) and Triiodothyronie (T3) Iodinated amino acid All tissue Increase metabolic rate, regulates growth and development Calcitonin Peptide Bones, kidneys and intestine Lowers blood calcium level Parathyroids Parathyroid (PTH) Peptide Bones, kidneys and intestine Raises blood calcium level Adrenal Cortex Glucocorticoids (cortisol) Steroid All tissue Raise blood glucose level, stimulates breakdown of protein Mineralocorticoids (aldosterone) Steroid Kidneys Reabsorb sodium and excrete potassium Sex Hormones Steroid Gonads, skin, muscles and bones Stimulates reproductive organs and brings on sex characteristics Adrenal Medulla Epinephrine and norepinephrine Modified amino acid Cardiac and other muscles Released in emergency situations, raises blood glucose level, \"fight or flight\" response Pancreas Insulin Protein Liver, muscles, adipose tissue Lowers blood glucose levels, promotes formation of glycogen Glucagon Protein Liver, muscles, adipose tissue Raises blood glucose levels Testes Androgens (testosterone) Steroid Gonads, skin, muscles and bone Stimulates male sex characteristics Ovaries Estrogen and progesterone Steroid Gonads, skin, muscles and bones Stimulates female sex characteristics Thymus Thymosins Peptide T lymphocytes Stimulates production and maturation of T lymphocytes Pineal Gland Melatonin Modified amino acid Brain Controls circadian and circannual rhythms, possibly involved in maturation of sexual organs In simple terms, reproduction is the process by which organisms create descendants. This miracle is a characteristic that all living things have in common and sets them apart from nonliving things. But even though the reproductive system is essential to keeping a species alive, it is not essential to keeping an individual alive. In human reproduction, two kinds of sex cells or gametes are involved. Sperm, the male gamete, and a secondary oocyte (along with first polar body and corona radiata), the female gamete must meet in the female reproductive system to create a new individual. For reproduction to occur, both the female and male reproductive systems are essential. It is a common misnomer to refer to a woman's gametic cell as an egg or ovum, but this is impossible. A secondary oocyte must be fertilized by the male gamete before it becomes an \"ovum\" or \"egg.\" While both the female and male reproductive systems are involved with producing, nourishing and transporting either the oocyte or sperm, they are different in shape and structure. The male has reproductive organs, or genitals, that are both inside and outside the pelvis, while the female has reproductive organs entirely within the pelvis. The male reproductive system consists of the testes and a series of ducts and glands. Sperm are produced in the testes and are transported through the reproductive ducts. These ducts include the epididymis, vas deferens, ejaculatory duct and urethra. The reproductive glands produce secretions that become part of semen, the fluid that is ejaculated from the urethra. These glands include the seminal vesicles, prostate gland, and bulbourethral glands. Figure 3. The reproductive structures of the human male are shown. Table 2 describes the major components of the male reproductive system. Table 2. Components of the Male Reproductive System Location & Description Bulbourethral glands (2) Pea sized organs posterior to the prostate on either side of the urethra. Secretion of gelatinous seminal fluid called pre-ejaculate. This fluid helps to lubricate the urethra for spermatozoa to pass through, and to help flush out any residual urine or foreign matter. (< 1% of semen) Epididymis Tightly coiled duct lying just outside each testis connecting efferent ducts to vas deferens. Storage and maturation of sperm. Penis Three columns of erectile tissue: two corpora cavernosa and one corpus spongiosum. Urethra passes through penis. Male reproductive organ and also male organ of urination. Prostate gland Surrounds the urethra just below the urinary bladder and can be felt during a rectal exam. Stores and secretes a clear, slightly alkaline fluid constituting up to one-third of the volume of semen. Raise vaginal pH.(25-30% of semen) Seminal vesicles (2) Convoluted structure attached to vas deferens near the base of the urinary bladder. About 65-75% of the seminal fluid in humans originates from the seminal vesicles. Contain proteins, enzymes, fructose, mucus, vitamin C, flavins, phosphorylcholine and prostaglandins. High fructose concentrations provide nutrient energy for the spermatozoa as they travel through the female reproductive system. Testes Inside scrotum, outside of body. Gonads that produce sperm and male sex hormones.Production of testosterone by cells of Leydig in the testicles. Urethra Connects bladder to outside body, about 8 inches long. Tubular structure that receives urine from bladder and carries it to outside of the body. Also passage for sperm. Vas deferens Muscular tubes connecting the left and right epididymis to the ejaculatory ducts to move sperm. Each tube is about 30 cm long. During ejaculation the smooth muscle in the vas deferens wall contracts, propelling sperm forward. Sperm are transferred from the vas deferens into the urethra, collecting fluids from accessory sex glands en route The Female Reproductive System Reproduction can be defined as the process by which an organism continues its species. As noted earlier, in the human reproductive process, two kinds of gametes are involved: the male gamete (sperm) and the female gamete (egg or ovum). These two gametes meet within the female's uterine tubes located one on each side of the upper pelvic cavity, and begin to create a new individual. The female needs a male to fertilize her egg; she then carries offspring through pregnancy and childbirth. Figure 4. The reproductive structures of the human female are shown. (credit a: modification of work by Gray's Anatomy; credit b: modification of work by CDC) Produces eggs (ova) Secretes sex hormones Receives the male spermatazoa during Protects and nourishes the fertilized egg until it is fully developed Delivers fetus through birth canal Provides nourishment to the baby through milk secreted by mammary glands in the breast The major components of the female reproductive system are shown in Table 3. Ovaries (2) Ovoid structures on either side of the uterus in the pelvic cavity Primary sex organs of female; contain ovarian follicles that contain the oocytes. Oocytes are released during the ovulation stage of the menstrual cycle. Fallopian Tubes (2) Extend from lateral ares of uterus to near the ovaries Transport oocyte to uterus after fertilization and are the sites where fertilization by sperm actually occurs Uterus Pear shaped structure divided into the fundus and the cervix Site of fetal development during gestation Vagina Located between rectum and urethra; smooth muscle lined with an epithelial mucous membrane Path for menstrual blood and tissue to leave the body, as well as the fetus during childbirth. Produces a variety of secretions for lubrication and receives secretions that facilitate fertilization. Vulva Externally located: labia majora and minora, mons pubis, clithoris, vestibule, greater and lesser vestibular glands Sexual function: heavily innervated and provide pleasure when properly stimulated. Perineum Area between vagina and anus Helps form the muscular floor of pelvis; can be torn during vaginal childbirth Mammary glands Superficial to pectoral muscles Provide nourishment to the baby through milk secretions Comparing Male and Female Reproductive Systems The reproductive systems of the male and female have some basic similarities and some specialized differences. They are the same in that most of the reproductive organs of both sexes develop from similar embryonic tissue, meaning they are homologous. Both systems have gonads that produce (sperm and egg or ovum) and sex organs. And both systems experience maturation of their reproductive organs, which become functional during puberty as a result of the gonads secreting sex hormones. Gonad Testis Ovary M\u00fcllerian duct Appendix testis Fallopian tubes M\u00fcllerian duct Prostatic utricle Uterus, proximal vagina Wolffian duct Rete testis Rete ovarii Mesonephric tubules Efferent ducts Epoophoron Wolffian duct Epididymis Gartner's duct Wolffian duct Vas deferens Wolffian duct Seminal vesicle Wolffian duct Prostate Skene's glands Urogenital sinus Bladder, urethra Bladder, urethra, distal vagina Urogenital sinus Bulbourethral gland Bartholin's gland Genital swelling Scrotum Labia majora Urogenital folds Distal urethra Labia minora Genital tubercle Penis Clitoris Prepuce Foreskin Clitoral hood Bulb of penis Vestibular bulbs Glans penis Clitoral glans Crus of penis Clitoral crura The differences between the female and male reproductive systems are based on the functions of each individual's role in the reproduction cycle. A male who is healthy, and sexually mature, continuously produces sperm. The development of women's \"eggs\" are arrested during fetal development. This means she is born with a predetermined number of oocytes and cannot produce new ones. At about 5 months gestation, the ovaries contain approximately six to seven million oogonia, which initiate meiosis. The oogonia produce primary oocytes that are arrested in prophase I of meiosis from the time of birth until puberty. After puberty, during each menstrual cycle, one or several oocytes resume meiosis and undergo their first meiotic division during ovulation. This results in the production of a secondary oocyte and one polar body. The meiotic division is arrested in metaphase II. Fertilization triggers completion of the second meiotic division and the result is one ovum and an additional polar body. The ovaries of a newborn baby girl contain about one million oocytes. This number declines to 400,000 to 500,000 by the time puberty is reached. On average, 500-1000 oocytes are ovulated during a woman's reproductive lifetime. When a young woman reaches puberty around age 10 to 13, a promary oocyte is discharged from one of the ovaries every 28 days. This continues until the woman reaches menopause, usually around the age of 50 years. Occytes are present at birth, and age as a woman ages. Watch the first three videos in this playlist for a review of the reproductive system: We experience reality through our senses. Senses are the physiological methods of perception, so a sense is a faculty by which outside stimuli are perceived. The senses and their operation, classification, and theory are overlapping topics studied by a variety of fields. Many neurologists disagree about how many senses there actually are due to a broad interpretation of the definition of a sense. Our senses are split into two different groups. Our exteroceptors detect stimulation from the outsides of our body: this includes smell, taste, and equilibrium. The interoceptors receive stimulation from the inside of our bodies: this includes blood pressure dropping, changes in the glucose, and pH levels. Children are generally taught that there are five senses (sight, hearing, touch, smell, taste). However, it is generally agreed that there are at least seven different senses in humans, and a minimum of two more observed in other organisms. Sense can also differ from one person to the next. Take taste for an example: what may taste great to one person will taste awful to someone else. This has to do with how the brain interprets the stimuli that are received. Chemoreception The senses of gustation (taste) and olfaction (smell) fall under the category of chemoreception. Specialized cells act as receptors for certain chemical compounds. As these compounds react with the receptors, an impulse is sent to the brain and is registered as a certain taste or smell. Gustation and olfaction are chemical senses because the receptors they contain are sensitive to the molecules in the food we eat, along with the air we breathe. Gustatory System In humans, the sense of taste is transduced by taste buds and is conveyed via three of the twelve cranial nerves. Cranial nerve VII, the facial nerve, carries taste sensations from the anterior two thirds of the tongue (excluding the circumvallate papillae, see lingual papilla) and soft palate. Cranial nerve IX the glossopharyngeal nerve carries taste sensations from the posterior one third of the tongue (including the circumvallate papillae). Also a branch of the vagus nerve carries some taste sensations from the back of the oral cavity (i.e., pharynx and epiglottis). Information from these cranial nerves is processed by the gustatory system. Though there are small differences in sensation, which can be measured with highly specific instruments, all taste buds can respond to all types of taste. Sensitivity to all tastes is distributed across the whole tongue and indeed to other regions of the mouth where there are taste buds (epiglottis, soft palate). Papilla Papilla are specialized epithelial cells. There are four types of papillae: filiform (thread-shape), fungiform (mushroom-shape), foliate (leaf-shape), and circumvallate (ringed-circle). All papillae except the filiform have taste buds on their surface. Some act directly by ion channels, others act indirectly. Fungiform papillae: as the name suggests, are slightly mushroom shaped if looked at in section. These are present mostly at the apex (tip) of the tongue. Filiform papillae: these are thin, longer papillae that don't contain taste buds but are the most numerous. These papillae are mechanical and not involved in gustation. Foliate papillae: these are ridges and grooves towards the posterior part of the tongue. Circumvallate papillae: there are only about 3\u201314 of these papillae on most people and they are present at the back of the oral part of the tongue. They are arranged in a circular-shaped row just in front of the sulcus terminalis of the tongue. Olfactory System Olfaction is the sense of smell. In humans the sense of smell is received in nasopharynx. Airborne molecules go into solution on moist epithelial surface of nasal passage. An olfactory receptors neuron sends an impulse via Cranial nerve I the olfactory nerve. Although 80\u201390 percent of what we think is \"taste\" actually is due to smell. This is why when we have a head cold or stuffed up nose we have a harder time tasting our foods. Humans have 347 functional odor receptor genes; the other genes have nonsense mutations. This number was determined by analyzing the genome in the Human Genome Project; the number may vary among ethnic groups, and does vary among individuals. For example, not all people can smell androstenone, a component of male sweat. Each olfactory receptor neuron in the nose expresses only one functional odor receptor. Odor receptor nerve cells may function like a key-lock system: if the odor molecules can fit into the lock the nerve cell will respond. According to shape theory, each receptor detects a feature of the odor molecule. Weak-shape theory, known as odotope theory, suggests that different receptors detect only small pieces of molecules, and these minimal inputs are combined to create a larger olfactory perception (similar to the way visual perception is built up of smaller, information-poor sensations, combined and refined to create a detailed overall perception). An alternative theory, the vibration theory proposed by Luca Turin[1], posits that odor receptors detect the frequencies of vibrations of odor molecules in the infrared range by electron tunneling. However, the behavioral predictions of this theory have been found lacking[2]. An olfactory receptor neuron, also called an olfactory sensory neuron, is the primary transduction cell in the olfactory system. Humans have about 40 million olfactory receptor neurons. In vertebrates, olfactory receptor neurons reside on the olfactory epithelium in the nasal cavity. These cells are bipolar neurons with a dendrite facing the interior space of the nasal cavity and an axon that travels along the olfactory nerve to the olfactory bulb. Many tiny hair-like cilia protrude from the olfactory receptor cell's dendrite and into the mucus covering the surface of the olfactory epithelium. These cilia contain olfactory receptors, a type of G protein-coupled receptor. Each olfactory receptor cell contains only one type of olfactory receptor, but many separate olfactory receptor cells contain the same type of olfactory receptor. The axons of olfactory receptor cells of the same type converge to form glomeruli in the olfactory bulb. Olfactory receptors can bind to a variety of odor molecules. The activated olfactory receptor in turn activates the intracellular G-protein GOLF, and adenylate cyclase and production of Cyclic AMP opens ion channels in the cell membrane, resulting in an influx of sodium and calcium ions into the cell. This influx of positive ions causes the neuron to depolarize, generating an action potential. Individual olfactory receptor neurons are replaced approximately every 40 days by neural stem cells residing in the olfactory epithelium. The regeneration of olfactory receptor cells, as one of the only few instances of adult neurogenesis in the central nervous system, has raised considerable interest in dissecting the pathways for neural development and differentiation in adult organisms. In the Brain Figure 5. The Olfactory Nerve leading to the brain. The axons from all the thousands of cells expressing the same odor receptor converge in the olfactory bulb (Figure 5). Mitral cells in the olfactory bulb send the information about the individual features to other parts of the olfactory system in the brain, which puts together the features into a representation of the odor. Since most odor molecules have many individual features, the combination of features gives the olfactory system a broad range of odors that it can detect. Odor information is easily stored in long term memory and has strong connections to emotional memory. This is possibly due to the olfactory system's close anatomical ties to the limbic system and hippocampus, areas of the brain that have long been known to be involved in emotion and place memory, respectively. Pheromonal Olfaction Some pheromones are detected by the olfactory system, although in many vertebrates pheromones are also detected by the vomeronasal organ, located in the vomer, between the nose and the mouth. Snakes use it to smell prey, sticking their tongue out and touching it to the organ. Some mammals make a face called flehmen to direct air to this organ. In humans, it is unknown whether or not pheromones exist. Olfaction and Gustation Olfaction, taste and trigeminal receptors together contribute to flavor. It should be emphasized that there are no more than 5 distinctive tastes: salty, sour, sweet, bitter, and umami. The 10,000 different scents which humans usually recognize as \"tastes\" are often lost or severely diminished with the loss of olfaction. This is the reason why food has little flavor when your nose is blocked, as from a cold. The key nutrition players in our taste is the olfactory function, 80\u201390 percent of what we consider taste is dependent on our senses of smell. With aging our olfactory function declines. In the elderly careful monitoring of appetite is necessary due to the alterations in the olfactory function. The Sense of Vision Vision needs to have the work of both the eyes and the brain to process any information. The majority of the stimuli is done in the eyes and then the information is sent to the brain by the way of nerve impulses. At least one-third of the information of what the eye sees is processed in the cerebral cortex of the brain. The human eye is a elongated ball about 1-inch (2.5 cm) in diameter and is protected by a bony socket in the skull. The eye has three layers or coats that make up the exterior wall of the eyeball, which are the sclera, choroid, and retina. The outer layer of the eye is the sclera, which is a tough white fibrous layer that maintains, protects and supports the shape of the eye. The front of the sclera is transparent and is called the cornea. The cornea refracts light rays and acts like the outer window of the eye. Choroid The middle thin layer of the eye is the choroid, also known as the choroidea or choroid coat, it is the vascular layer of the eye lying between the retina and the sclera. The choroid provides oxygen and nourishment to the outer layers of the retina. It also contains a nonreflective pigment that acts as a light shield and prevents light from scattering. Light enters the front of the eye through a hole in the choroid coat called the pupil. The iris contracts and dilates to compensate for the changes in light intensity. If the light is bright the iris then contracts making the pupil smaller, and if the light is dim, the iris dilates making the pupil bigger. Just posterior to the iris is the lens, which is composed mainly of proteins called crystallins. The lens is attached by the zonules to the ciliary body that contains the ciliary muscles that control the shape of the lens for accommodation. Along with the ciliary body and iris, the choroid forms the uveal tract. The uvea is the middle of the three concentric layers that make up an eye. The name is possibly a reference to its almost black color, wrinkled appearance and grape-like size and shape when stripped intact from a cadaveric eye. The third or the innermost layer of the eye is call the retina. In adult humans the entire retina is 72 percent of a sphere about 22 mm in diameter. The retina lays over the back two thirds of the choroid coat, which is located in the posterior compartment. The compartment is filled with vitreous humor which is a clear, gelatinous material. Within the retina there are cells called rod cells and cone cells also known as photoreceptors (Figure 6). The rod cells are very sensitive to light and do not see color, that is why when we are in a darkened room we see only shades of gray. The cone cells are sensitive to different wavelengths of light, and that is how we are able to tell different colors. It is a lack of cones sensitive to red, blue, or green light that causes individuals to have deficiencies in color vision or various kinds of color blindness. At the center of the retina is the optic disc, sometimes known as \"the blind spot\" because it lacks photoreceptors . It is where the optic nerve leaves the eye and takes the nerve impulses to the brain. The cornea and the lens of the eye focuses the light onto a small area of the retina called the fovea centralis where the cone cells are densely packed. The fovea is a pit that has the highest visual acuity and is responsible for our sharp central vision\u2014there are no rods in the fovea. Figure 6. Retina's simplified axial organization. The retina is a stack of several neuronal layers. Light is concentrated from the eye and passes across these layers (from left to right) to hit the photoreceptors (right layer). This elicits chemical transformation mediating a propagation of signal to the bipolar and horizontal cells (middle yellow layer). The signal is then propagated to the amacrine and ganglion cells. These neurons ultimately may produce action potentials on their axons. This spatiotemporal pattern of spikes determines the raw input from the eyes to the brain. Photoreceptors A photoreceptor, or photoreceptor cell, is a specialized type of neuron found in the eye's retina that is capable of phototransduction. More specifically, the photoreceptor sends signals to other neurons by a change in its membrane potential when it absorbs photons. Eventually, this information will be used by the visual system to form a complete representation of the visual world. There are 2 types of photoreceptors: rods are responsible for scotopic, or night vision, whereas cones are responsible for photopic, or daytime vision as well as color perception. The visual system in the brain is too slow to process that information if the images are slipping across the retina at more than a few degrees per second, thus, for humans to be able to see while moving, the brain must compensate for the motion of the head by turning the eyes. To get a clear view of the world, the brain must turn the eyes so that the image of the object of regard falls on the fovea. Eye movements are thus very important for visual perception, and any failure to make them correctly can lead to serious visual disabilities. Having two eyes is an added complication, because the brain must point both of them accurately enough that the object of regard falls on corresponding points of the two retinas; otherwise, double vision would occur. The movements of different body parts are controlled by striated muscles acting around joints. The movements of the eye are no exception, but they have special advantages not shared by skeletal muscles and joints, and so are considerably different. Try This Experiment Hold your hand up, about one foot (30 cm) in front of your nose. Keep your head still, and shake your hand from side to side, slowly at first, and then faster and faster. At first you will be able to see your fingers quite clearly. But as the frequency of shaking passes about one hertz, the fingers will become a blur. Now, keep your hand still, and shake your head (up and down or left and right). No matter how fast you shake your head, the image of your fingers remains clear. This demonstrates that the brain can move the eyes opposite to head motion much better than it can follow, or pursue, a hand movement. When your pursuit system fails to keep up with the moving hand, images slip on the retina and you see a blurred hand. Depth Perception Depth perception is the visual ability to perceive the world in three dimensions. It is a trait common to many higher animals. Depth perception allows the beholder to accurately gauge the distance to an object. Depth perception is often confused with binocular vision, also known as Stereopsis. Depth perception does rely on binocular vision, but it also uses many other monocular cues. The Senses Of Hearing The ear is the sense organ that collects and detects sound waves and plays a major role in the sense of balance and body position. The sensory receptors for both hearing and equilibrium are mechanoreceptors found in the inner ear; these receptors are hair cells that have stereocilia (long microvilli) that are extremely sensitive to mechanical stimulations. Anatomy of the Ear The ear has three divisions: the outer ear, the middle ear, and the inner ear (Figure 7). Figure 7. Anatomy of the human ear. Outer Ear: Auricle, Ear Canal, Surface of Ear Drum The outer ear is the most external portion of the ear. The outer ear includes the pinna (also called auricle), the ear canal, and the very most superficial layer of the ear drum (also called the tympanic membrane). Although the word \"ear\" may properly refer to the pinna (the flesh covered cartilage appendage on either side of the head), this portion of the ear is not vital for hearing. The complicated design of the human outer ear does help capture sound, but the most important functional aspect of the human outer ear is the ear canal itself. This outer ear canal skin is applied to cartilage; the thinner skin of the deep canal lies on the bone of the skull. If the ear canal is not open, hearing will be dampened. Ear wax (medical name: cerumen) is produced by glands in the skin of the outer portion of the ear canal. Only the thicker cerumen-producing ear canal skin has hairs. The outer ear ends at the most superficial layer of the tympanic membrane. The tympanic membrane is commonly called the ear drum. Middle Ear: Air Filled Cavity behind the Ear Drum, includes most of the Ear Drum, and Ear Bones The middle ear includes most of the ear drum (tympanic membrane) and the 3 ear bones ossicles: malleus (or hammer), incus (or anvil), and stapes (or stirrup). The opening of the Eustachian tube is also within the middle ear. The malleus has a long process (the handle) that is attached to the mobile portion of the ear drum. The incus is the bridge between the malleus and stapes. The stapes is the smallest named bone in the human body. The stapes transfers the vibrations of the incus to the oval window, a portion of the inner ear to which it is connected. It is the final bone in the chain to transfer vibrations from the eardrum to the inner ear. The arrangement of these 3 bones is a sort of Rube Goldberg device: movement of the tympanic membrane causes movement of the first bone, which causes movement of the second, which causes movement of the third. When this third bone pushes down, it causes movement of fluid within the cochlea (a portion of the inner ear). This particular fluid only moves when the stapes footplate is depressed into the inner ear. Unlike the open ear canal, however, the air of the middle ear is not in direct contact with the atmosphere outside the body. The Eustachian tube connects from the chamber of the middle ear to the back of the pharynx. The middle ear in humans is very much like a specialized paranasal sinus, called the tympanic cavity, it, like the paranasal sinuses, is a hollow mucosa lined cavity in the skull that is ventilated through the nose. The mastoid portion of the temporal bone, which can be felt as a bump in the skull behind the pinna, also contains air, which ventilates through the middle ear. Inner Ear: Cochlea, Vestibule, and Semi-Circular Canals Figure 8. Cross section of the cochlea The inner ear includes both the organ of hearing (the cochlea, Figure 8) and a sense organ (the labyrinth or vestibular apparatus) that is attuned to the effects of both gravity and motion. The balance portion of the inner ear consists of three semi-circular canals and the vestibule. The inner ear is encased in the hardest bone of the body. Within this ivory hard bone, there are fluid-filled hollows. Within the cochlea are three fluid filled spaces: the tympanic canal, the vestibular canal, and the middle canal. The eighth cranial nerve comes from the brain stem to enter the inner ear. When sound strikes the ear drum, the movement is transferred to the footplate of the stapes, which attaches to the oval window and presses into one of the fluid-filled ducts of the cochlea. The hair cells in the organ of Corti are stimulated by particular frequencies of sound, based on their location within the cochlea. High pitch sounds are at a higher frequency and, due to the shorter wavelength they \"hit\" the membrane \"faster\" (ie. close to the oval window). In contrast, low frequency sounds have large wavelengths, and will travel further through the scala vestibuli before \"hitting\" the tectorial membrane near the apex of the cochlea. The fluid inside the cochlea is moved, flowing against the receptor (hair) cells of the organ of Corti, which fire in a graded response based on the volume of the sound. The hair cells then stimulate the nerve cells in the Spiral Ganglion, which sends information through the auditory portion of the eighth cranial nerve to the brain. Humans are able to hear sounds between about 20 Hz and 20,000 Hz. Mammals that can hear lower frequency sounds, such as whales and elephants, have a longer cochlea. Humans tend to lose high-frequency hearing first, which has led some teenagers to using high-frequency ring tones (above 17,000 Hz) that may go undetected by their middle-aged teachers. Hair Cell Hair cells are columnar cells, each with a bundle of 100\u2013200 specialized cilia at the top, for which they are named. These cilia are the mechanosensors for hearing. Lightly resting atop the longest cilia is the tectorial membrane, which moves back and forth with each cycle of sound, tilting the cilia and allowing electric current into the hair cell. Hair cells, like the photoreceptors of the eye, show a graded response, instead of the spikes typical of other neurons. Immediately over the hair cells of the organ of Corti is an overhanging \"tectorial membrane.\" When the Bones of the Middle Ear vibrate the oval window, these vibrations are transmitted to the fluid within the cochlea and eventually cause the round window on the cochlea to bulge outward. These vibrations deflect the membrane on which the Organ of Corti is located, causing the three rows of outer hair cells to \"rub\" against the overhanging tectorial membrane. By their muscle-like activity they ampify the weakest vibrations for the inner hair cells. The louder sounds are not amplified. The disturbed inner hair cells will then activate the cochlear nerve fibers. The current model is that cilia are attached to one another by \"tip links,\" structures which link the tips of one cilium to another. Stretching and compressing the tip links may open an ion channel and produce the receptor potential in the hair cell. These graded potentials are not bound by the \"all or none\" properties of an action potential. There are far fewer hair cells than afferent (leading to the brain) nerve fibers in the cochlea. The nerve that innervates the cochlea is the cochlear nerve, and forms cranial nerve number VIII with the vestibular nerve from the balance organ. Neuronal dendrites innervate cochlear hair cells. The neurotransmitter itself is thought to be glutamate. At the presynaptic juncture, there is a distinct \"presynaptic dense body\" or ribbon. This dense body is surrounded by synaptic vesicles and is thought to aid in the fast release of neurotransmitter. Efferent projections from the brain to the cochlea also play a role in the perception of sound. Efferent synapses occur on outer hair cells and on afferent dendrites under inner hair cells. Process of Hearing Detection of sound motion is associated with the right posterior superior temporal gyrus. The superior temporal gyrus contains several important structures of the brain, including: marking the location of the primary auditory cortex, the cortical region responsible for the sensation of sound. Sections 41 and 42 are called the primary auditory area of the cerebrum, and processes the basic characteristics of sound such as pitch and rhythm. The auditory association area is located within the temporal lobe of the brain, in an area called the Wernicke's area, or area 22. This area, near the lateral cerebral sulcus, is an important region for the processing of acoustic energy so that it can be distinguished as speech, music, or noise. It also interprets words that are heard into an associated thought pattern of understanding. The gnostic area of the cerebrum, (areas 5, 7, 39 and 40) helps to integrate all incoming sense patterns so that a common thought can be formed (correlated) using all arriving sensory information. Hearing Under Water Hearing threshold and the ability to localize sound sources are reduced underwater. in which the speed of sound is faster than in air. Underwater, hearing is by bone conduction and localization of sound appears to depend on differences in amplitude detected by bone conduction. Localization of Sound by Humans Humans are normally able to hear a variety of sound frequencies, from about 20Hz to 20kHz. Our ability to estimate just where the sound is coming from, sound localization, is dependent on both hearing ability of each of the two ears, and the exact quality of the sound. Since each ear lies on an opposite side of the head, a sound will reach the closest ear first, and its amplitide will be loudest in that ear. Much of the brain's ability to localize sound depends on interaural (between ears) intensity differences and interaural temporal or phase differences. Two mechanisms are known to be used. Bushy neurons can resolve time differences as small as the time it takes sound to pass one ear and reach the other (10 milliseconds). For high frequencies, frequencies with a wavelength shorter than the listener's head, more sound reaches the nearer ear. Human echolocation is a technique involving echolocation used by some blind humans to navigate within their environment. Process of Equilibrium Equilibrioception or sense of balance is one of the physiological senses. It allows humans and animals to walk without falling. Some animals are better in this than humans, for example allowing a cat (as a quadruped using its inner ear"} +{"id":"RedPajamaCommonCrawl.0017","text":"by Kaiter Enless March 8, 2020 March 8, 2020 I use that horrible coward's word \"interesting\" to describe your painting. Bad move. Now I have to find a way to fire myself as art critic, be hired on as lover. To be honest, the canvas looks like an unholy mess of blotches and streaks, scrawl and scribble. But that's an opinion best left to a bitten tongue. But, despite my imagination's best efforts, the positives aren't coming. \"Wonderful contours,\" \"A strikingly personal gesture.\" \"An infinite labyrinth of pain and joy.\" \"A volatile language of image.\" my brain is, at the moment, this unholy mess So maybe my mind was your subject matter. Mm\u2026 interesting. John Grey is an Australian author, published in Hawaii Pacific Review, Dalhousie Review and Qwerty, currently residing in the US. Poetryart critique John Grey literature painting poem Poetry prose reflection writing And Finally, Thanks To Winter by danklefstad February 25, 2020 February 25, 2020 Winter's about to strike again and I'm excited. It's almost March and we're expecting 11 inches along the Wisconsin-Illinois border. The approach of snow and falling temps focuses the mind like few things can. I'm writing this in stages, while panic-buying groceries, because I can't predict when I'll be able to leave the house again. But while trapped, I'll thread various plotlines \u2013 currently in my head \u2014 into a coherent narrative for a future novel. Here, art often depends on the whims of nature. If you're a creative person who lives above the 40th Parallel, you know January through March is a fertile time. After all, going outside is not only unpleasant, it can be dangerous. Your weather app's warning to hunker down not only keeps you safe, it discourages visitors from interrupting your process. I must use this opportunity. I vow to disable my internet and silence my phone. I've consumed plenty of content created by others in recent weeks. Now it's time to invent something of my own. Lean in, I tell myself, and don't stop writing until the last pile of snow finally melts. Hopefully, if you do the same, you'll have a solid second draft by the time spring arrives. Well done! Now let it rest. It's impossible to continue because robins are singing (when did they return?), daffodils are blooming, and trees are greening again. The whole earth is stirring with diversion \u2014 look a bunny! See? Who can create when nature demands so much attention? You might say we'll be used to these distractions by summer, but you'd be wrong. Almost overnight, people's clothes get more revealing. Engines rev and roar, and that sun; it rises early and stays up long after dinner. And when it finally gets low, I defy you not to be mesmerized by the sky turning orange, then tomato, then strawberry shake before fading to coal. No, summer is for editing, a process that's more craft than art. It's about weeding words, mowing sentences, shearing off entire paragraphs. You've had three months away from your manuscript, so now you can review it with fresh eyes. With careful pruning, it'll soon resemble a garden maze where your reader enters here, enjoys a laugh there, stumbles into trouble, then gets in even more trouble before ending at a koi pond where they can sit and ponder their journey. Satisfied with it? Send it to your publisher. The crisp air of autumn might tempt you to begin your next work, but I wouldn't. Not yet. Inspiration awaits in apple orchards and bonfires. As the sun sets earlier each day, people begin sharing family lore, including hauntings, and everything is so compelling you realize you're listening all the time \u2013 which is good. This is when you gather all those chronicles and tall tales, bottle them, and let the fermenting begin. Before you know it, you're in that period infused with nostalgia: the holidays. The smell of baked cookies and roasting meat sends me back to my grandma's kitchen, where I stare at a picture of a Black Forest cake and struggle to decipher the recipe. Or was it flourless chocolate with raspberry? When I ask my cousin, he insists the kitchen belonged to my allergic aunt who used karob instead, which may explain my perusing a real dessert book. Nonetheless, competing memories reveal how stories evolve. Steep in these a while longer. And when the New Year begins, and the noise subsides, you'll know the time for input is over. Go ahead \u2014 open that bottle of distilled experience and pour with abandon. Don't worry about containing spills; there'll be plenty of time to clean up later. A new wave of creation is underway up north! If you live further south, where each day is graced with warmth and sunshine, and creativity transcends seasons, I truly envy you. Still, this supports my theory that geography and climate have a greater hold on the imagination than we realize. Whether your locale lets your taps run freely or only when the time is right, make a point of experiencing both. Consider swapping houses with yours truly. This way, I could \u2013 without irony \u2014 paint seven self-portraits enjoying ice cream outdoors and caption them Monday through Sunday. I wonder what you'd create in a place that's pleasant for maybe 14 days every year. Don't worry, I'm not about to invade your neighborhood. Northern inhabitants like me appreciate how bad weather nourishes our dark side and, frankly, we don't like being creative all the time. But if you ever get tired of endless sunshine, and yearn for the rhythm of seasons, come up here after the holidays. Barricade yourself against the snow and wind. And if your time up here proves fruitful, be sure to include winter in your acknowledgements. I would understand how un-ironic that is. Non-fictionart author creativity nonfiction seasons winter writing Remarks On \"The Death Of The Author\" by Kaiter Enless February 4, 2020 July 1, 2020 In 1967, French essayist and literary hypothesizer Roland G. Barthes\u00b9 published The Death of the Author (La mort de l'auteur), which takes, as its central aim, the delegitimization of \"the Author\" (capitalization his) for the prioritization of \"the reader,\" a point arrived at by Barthes' through his belief that textual signification reached a point of coalescence only through the reader, and not through the author (even though they are also readers). The essay's title (not so much its contents) has become a popular slogan, deployed in literary circles as de facto justification for narcissistic misinterpretation. Under its auspices, if an author(s) expresses something, directly or through their work(s), which a member of their readership dislikes, then, under the auspices of the \"death of the author\" that reader may declare the author(s) intention(s) void, henceforth, and instead, declare their own \"reinterpretation(s)\" the valid one(s), even if the passage(s) is\/are clear in intent, or, is\/are clarified directly by the author(s). When one declares biographical information and authorial intention irrelevant to a textual fictive work, it is pertinent to ask why such persons read a particular author? Within the framework of \"death of the author\" theology, they're all the same, merely another jumble of text which can be extrapolated any which way one pleases. Indeed, one can rightly ask: why read any fiction at all? Why not read a instruction manual or a signpost, which can then be \"reinterpreted\" so as to make it amenable to the reader's hermetic and fragile sensibilities? In the observation of this practice, what one witnesses is not merely the death of authorial intent, but the death of art as a distinctive practice, for art, in any classical sense, can no more exist without authorial intention, and its evaluation, than it can without an audience. \u2026 literature is that neuter, that composite, that oblique into which every subject escapes, the trap where all identity is lost, beginning with the very identity of the body that writes. (Barthes, The Death of the Author) The pronouncement is made after a digression on Sarrasine, a novella by Balzac concerning a man who falls in love with a castrato disguised as a female who the protagonist describes (obviously incorrectly) as a near-perfect distillation of womanhood. Barthes declares that, in such lines, it is impossible to tell who is speaking, the protagonist or Balzac or \"universal wisdom\" or \"romantic psychology\" (though all of these \"voices\" would, of necessity, be under the direction of Balzac's, yet Barthes, for a reason never stated, classes them as if they were distinct persons), hence his reference to the 'oblique' nature of literature. Literature is indeed a composite, but it is in no way an \"oblique into which every subject escapes\" (the subject of desire\u2014for the author, the successful completion and warm reception of his creation\u2014cannot, de jure, vanish into itself) nor a \"trap where all identity is lost\" for literary style is every bit as distinctive as a fingerprint (ie. stylometry). Barthes is correct insofar as he realizes that there can be multiple \"voices\" within a work, but this in no way invalidates the stewardship of the author or authors (as in a collaborative effort). Indeed, upon the topic, Barthes himself writes \"Balzac, speaking of a castrato\u2026\" as if he already understands and accepts what he attempts to undermine\u2014that there is but a singular guide (a master \"voice\"). That admission, itself, undermines the whole premise. Probably this has always been the case: once an action is recounted, for intransitive ends, and no longer in order to act directly upon reality \u2014 that is, finally external to any function but the very exercise of the symbol \u2014 this disjunction occurs, the voice loses its origin, the author enters his own death, writing begins. (Barthes) Intransitivity is a verb property (in distinction to transitivity). Intransitive ends, then, are those which exclude questions of what or whom, confining description instead to the where, when and how\u2014already they are not \"external to any function but the very exercise of the symbol.\" Nevertheless, the feeling about this phenomenon has been variable; in primitive societies, narrative is never undertaken by a person, but by a mediator, shaman or speaker, whose \"performance\" may be admired (that is, his mastery of the narrative code), but not his \"genius\" Narrative is, at its point of origin, always undertaken by a person, regardless of the character or stage of development of the narrator's society. The reason why those who performed ancestral narratives did not claim (creative narrative) genius is rather obvious, they did not create the stories they communicated, and knew that others would know it\u2014one would not expect to hear a modern playwright adapting Macbeth to claim (creative narrative) \"genius\" in the enterprise, and if one did hear such a pronouncement, he or she would likely be swiftly reproached for it. \u2026it is logical that with regard to literature it should be positivism, resume and the result of capitalist ideology, which has accorded the greatest importance to the author's \"person\" The author still rules in manuals of literary history, in biographies of writers, in magazine interviews, and even in the awareness of literary men, anxious to unite, by their private journals, their person and their work; the image of literature to be found in contemporary culture is tyrannically centered on the author\u2026 His low opinion of authors is again clear in his encircling of person with quotation marks, as if the \"person\" of the author were merely an illusion, a view which is more elaborately expressed in Empire of Signs (1982), in which he speaks emphatically of undoing \"our own reality\" (page 6). Returning to his essay\u2014If one is speaking of literary history or biographies of writers then the writer should take center stage (particularly in the latter example). To say that \"biographies of writers\" should not be \"centered on the author\" is the same as saying that biographies shouldn't exist. That, of course, does not mean one should not mention reader's reactions and the change effected by the public reception of a text; consequently it may (or may not) be fair to criticize a historical (but not biographical) work concerning literature which sets out to cover a given period comprehensively, and yet focuses on an author (or set of authors) at the expense of all else. Though the Author's empire is still very powerful (recent criticism has often merely consolidated it), it is evident that for a long time now certain writers have attempted to topple it. In France, Mallarme\u00b2 was doubtless the first to see and foresee in its full extent the necessity of substituting language itself for the man who hitherto was supposed to own it; for Mallarme, as for us, it is language which speaks, not the author: to write is to reach, through a preexisting impersonality \u2014 never to be confused with the castrating objectivity of the realistic novelist \u2014 that point where language alone acts, \"performs,\" and not \"oneself\"\u2026 There is little to be said of this passage other than that Barthes is confused as to the topic of agency. He deploys \"speaks\" metaphorically, of course, and yet, to consider his example in the literal register proves clarifying\u2014for language cannot act or perform of its own accord anymore than a organ can play itself or a candle kindle its own flame. Barthes then digresses, at considerable length, on a number of writers, including the previously mentioned Mallarme, as well as Proust. I'll not dwell upon these passages, as they are merely reiterations of his previously mentioned belief that \"language\u2026 speaks, not the author,\" to which one might sardonically reply, \"It is the coconut which uses amphioctopus marginatus, not amphioctopus marginatus which uses the coconut.\" \u2026 linguistics has just furnished the destruction of the Author with a precious analytic instrument by showing that utterance in its entirety is a void process, which functions perfectly without requiring to be filled by the person of the interlocutors: linguistically, the author is never anything more than the man who writes, just as I is no more than the man who says I: language knows a \"subject,\" not a \"person,\" end this subject, void outside of the very utterance which defines it, suffices to make language \"work,\" that is, to exhaust it. A void, in any literal sense, would be void of any 'process' One may talk all one likes about what rocks are like in the absence of sensing apparatuses to perceive them, but it doesn't fundamentally matter, for there would then be nothing for the rocks to matter to. They would be, but they would not, could not, matter. The case is the same with regard to language. Language does not know a 'subject.' Language does not know. Language is not an agent. The absence of the Author (with Brecht, we might speak here of a real 'alienation:' the Author diminishing like a tiny figure at the far end of the literary stage) is not only a historical fact or an act of writing: it utterly transforms the modern text (or \u2014 what is the same thing \u2014 the text is henceforth written and read so that in it, on every level, the Author absents himself). Time, first of all, is no longer the same. The Author, when we believe in him, is always conceived as the past of his own book: the book and the author take their places of their own accord on the same line, cast as a before and an after: the Author is supposed to feed the book \u2014 that is, he pre-exists it, thinks, suffers, lives for it; he maintains with his work the same relation of antecedence a father maintains with his child. Quite the contrary, the modern writer (scriptor) is born simultaneously with his text; he is in no way supplied with a being which precedes or transcends his writing, he is in no way the subject of which his book is the predicate; there is no other time than that of the utterance, and every text is eternally written here and now. One can see how ironically authoritative Barthes takes his own absence of authority to be by declaring his baseless assertion to be \"a historical fact.\" This assertion of simultaneousness is clearly untrue, for the simple reason that the author must think of what is to be written before he or she writes. This is because (or: it follows that) to write can no longer designate an operation of recording, of observing, of representing, of \"painting\" (as the Classic writers put it), but rather what the linguisticians, following the vocabulary of the Oxford school, call a performative, a rare verbal form (exclusively given to the first person and to the present), in which utterance has no other content than the act by which it is uttered\u2026 the modern writer, having buried the Author, can therefore no longer believe, according to the \"pathos\" of his predecessors, that his hand is too slow for his thought or his passion, and that in consequence, making a law out of necessity, he must accentuate this gap and endlessly \"elaborate\" his form; for him, on the contrary, his hand, detached from any voice, borne by a pure gesture of inscription (and not of expression), traces a field without origin \u2014 or which, at least, has no other origin than language itself, that is, the very thing which ceaselessly questions any origin. If writing is, as Barthes asserts, \"no longer\u2026 an operation of recording, of observing, of representing\u2026\" then he could in no way record, observe or represent any lack of representation and is saying that he can say nothing. We know that a text does not consist of a line of words, releasing a single \"theological\" meaning (the \"message\" of the Author-God), but is a space of many dimensions, in which are wedded and contested various kinds of writing, no one of which is original: the text is a tissue of citations, resulting from the thousand sources of culture. Like Bouvard and Pecuchet, those eternal copyists, both sublime and comical and whose profound absurdity precisely designates the truth of writing, the writer can only imitate a gesture forever anterior, never original; his only power is to combine the different kinds of writing, to oppose some by others, so as never to sustain himself by just one of them; if he wants to express himself, at least he should know that the internal \"thing\" he claims to \"translate\" is itself only a readymade dictionary whose words can be explained (defined) only by other words, and so on ad infinitum\u2026 Succeeding the Author, the writer no longer contains within himself passions, humors, sentiments, impressions, but that enormous dictionary, from which he derives a writing which can know no end or halt: life can only imitate the book, and the book itself is only a tissue of signs, a lost, infinitely remote imitation. A text does consist of a line of words. That is all it consists of. Such a line may contain (and \"release\") a single meaning (theological or otherwise) or a multiplicity of meanings; which it contains is dependent upon intention and the presentation and apperception thereof. Misinterpretation in no wise invalids this fact. For example, if an author writes a particular line with a single purpose, regardless of the interpretations of others, the originary meaning will always remain the same, that is to say, just as intended. In his domain, the artist is absolute. From this point he notes that since writing cannot be truly deciphered (since it can never mean anything definitively), literary criticism must also be done away with (curiously, he did not, after his essay's completion, tender his resignation to the trade), along with god, reason, science and law. \u2026 criticism (even \"new criticism\") should be overthrown along with the Author. \u2026 to refuse to arrest meaning is finally to refuse God and his hypostases, reason, science, the law. The overthrown of criticism is a natural conclusion of the evacuation of meaning from authorship, and is just as mistaken for the same reasons. His railing against three hypostases in one ousia is shoehorned in suddenly, but isn't wholly incorrect, for to refuse to \"arrest meaning\" is indeed to refuse reason, science and law, but it is not to refuse God, for one can easily apply reason, engage in science and construct and follow law, without any belief in providence whatsoever. All of this, however, is far afield of authorship and its supposed demise. He then returns to Balzac, repeats the lines with which he opened his piece and concludes thusly, \u2026 the true locus of writing is reading. \u2026 a text is not in its origin, it is in its destination; but this destination can no longer be personal: the reader is a man without history, without biography, without psychology; he is only that someone who holds gathered into a single field all the paths of which the text is constituted. This is why it is absurd to hear the new writing condemned in the name of a humanism which hypocritically appoints itself the champion of the reader's rights. The reader has never been the concern of classical criticism; for it, there is no other man in literature but the one who writes. We are now beginning to be the dupes no longer of such antiphrases, by which our society proudly champions precisely what it dismisses, ignores, smothers or destroys; we know that to restore to writing its future, we must reverse its myth: the birth of the reader must be ransomed by the death of the Author. One of the reasons why \"the death of the author\" has become so popular is because of the high regard it supposedly has for the reader, which is taken up as a rallying cry\u2014Barthes and his acolytes striking out against supposed ivory tower art snobs\u2014and yet, consider his opinion of the readers in this last passage. For Barthes, readers are \"without biography\" and \"psychology\" merely a vector for the transmission of signification. This is well in keeping with the rest of the article, but it is completely out of step with the contemporary valorizations of the \"death of the author.\" Further, not only does there not need to be any antipathic bifurcation between authors and readers, there cannot be, for that is to propose a waltz without a partner where the loner refuses to box-step and the music plays itself. Or as Lamos of Films Lie put it, The death of the Author is also the inability to create, invent, or be original. It is the spinning out of control into the abyss of multiple meanings and inevitable meaninglessness. A declaration nullified by its very pronouncement. In closing, I am reminded of a quote by Simon Leys, who, in his essay The Imitation of Our Lord Don Quixote, wrote, Literary critics do fulfil a very important role\u2026 but there seems to be a problem with much contemporary criticism, and especially with a certain type of academic literary criticism. One has the feeling that these critics do not really like literature\u2014they do not enjoy reading. Worse even, if they were actually to enjoy a book, they would suspect it to be frivolous. Alan KcKee. (2003) Textual Analysis: A Beginner's Guide. SAGE publications. Eric Wayne. (2018) \"The Death of the Author\" Debunked. Art & Crit. Gemma Khaicy. (2013) Why hackers should be afraid of how they write. The Sydney Morning Herald. Honore de Balzac. (1830) Sarrasine. Project Gutenberg (2010-2016). Jane Alison. (2019) Beyond the Narrative Arc. The Paris Review. James Wood. (2020) What is at Stake When We Write Literary Criticism? Joris-Karl Huysmans, translated by Keene Wallace. (1891 French; 1928 Eng.) Las-bas. Originally published by Tresse & Stock. Jeanne Willette. (2013) Roland Barthes: Structuralism. Art History Unstuffed. Joseph M. Pierre. (2015) Culturally sanctioned suicide: Euthanasia, seppuku and terrorist martyrdom. World Journal of Psychiatry. Lamos Ignoramos. (\u2014) The Death of the Author: Roland Barthes and the Collapse of Meaning. Filmslie. Maddie Crum. (2016) 'Fight Club' Author Reflects On Violence & Masculinity, 20 Years Later. Huffington Post (USA). Michael Karlsberg. (2005) The Power of Discourse & The Discourse of Power: Pursuing Peace Through Discourse Intervention. International Journal of Peace Studies, volume 10, number 1. Pierre Haski. (2014) The Death of Simon Lays, Fierce Opponent of French Maoist Intellectuals. Not Bored (English Translation). Roland Barthes. (1982) Empire of Signs. Hill & Wang. Roland Barthes. (1967) The Death of the Author. English: Aspen, no. 5-6. Simon Leys. (2013) The Hall Of Uselessness: Collected Essays. The New York Review Of Books. T. S. Eliot. (1919) Tradition and the Individual Talent. The Egoist (later published in The Sacred Wood). Tulipsandmondays. (2014) A Case Against 'Death of the Author' Theory. Ididn'twantanyflowers. \u00b9 Roland Gerard Barthes was a literary critic and scholar of semiotics educated at the University of Paris and the author of numerous works including, Writing Degree Zero (1968), Empires of Signs (1983) and Criticism and Truth (1987). \u00b2 Etienne Mallarme (pen-name: Stephane Mallarme) was a French poet and literary critic, a contemporary of Rilke, Yeats and Verlaine. Mallarme was highly regarded by Huysmans, who praised the poet's writing extensively in his 1884 novel \u00c0 rebours. art Non-fiction Philosophyart critcism Jane Alison linguistics literary theory literature Paris Review Philosophy writing Circular 2\/1\/20 by Kaiter Enless February 1, 2020 From Cajun Mutt Press: Little Hymn In One Part by Mike James. \"Once, he found a perfectly good leather dog leash re-used to wrangle passing clouds.\" (James, Little Hymn In One Part) From Every Day Fiction: Marathon Girl by Tim Boiteau. \"Water station nine. Hydration, raisins, and knives, knives, knives. Knives for slashing, slicing and cutting, for gutting and jabbing, sticking and skewering \u2014 for stabbing in the back. The attendant eyes my blood-spattered arm approvingly. I snatch up another blade. And another.\" (Boiteau, Marathon Girl) From New Pop Lit: Hamburger Hill by John Higgins. \"He took the proffered hand\u2212 like a hiker's foot\u2212 and gently shook it.\" (Higgins, Hamburger Hill) From The Story Hive: Fox, Wolf & Dragon (part one) by R.C.D. \"\u2026 she was a giant magical spider, and possibly the creator of the whole world-\" (R.C.D., Fox, Wolf & Dragon) From Jane Dougherty Writes: Groundwater by Jane Dougherty. \"\u2026 ash falls with small explosions, red \/ flowers before the grey and dusty end.\" (Dougherty, Groundwater) From The Drabble: Gains by The Cheesesellers Wife. \"What do we gain and gather in all those places we go?\" (TCW, Gains) From Clint Smith Fiction: Intoning Malone by Clint Smith. art Non-fictionart blog blogs essays ezine ezines Fiction flashfiction journal literature litmag magazine prose shortstories stories verse writing Fiction Is Not (Intrinsically) A Lie by Kaiter Enless February 1, 2020 February 5, 2020 In 1923, Pablo Picasso, for The Arts: An Illustrated Monthly Magazine Covering All Phases of Ancient and Modern Art, said, \"We all know that art is not truth. Art is a lie that makes us realize truth, at least the truth that is given us to understand. The artist must know the manner whereby to convince others of the truthfulness of his lies. If he only shows in his work that he has searched, and re-searched, for the way to put over his lies, he would never accomplish any thing.\" The filmmaker Jean Cocteau said something similar in Le Paquet Rouge (Com\u0153dia, 1927), wherein he wrote, \"I am a lie that tells the truth.\" On January 9, 2009, at the Rochester Jewish Community Center Book Festival, the journalist and novelist Abraham \"Abe\" Rothman, said, \"Serious fiction is a lie that tells the truth.\" It would be Rothman's reformulation of the sentiment which would prove out over Cocteau and Picasso's and has since been widely circulated, in various further permutations, prominently and predictably by men and women of letters (such as John Dufresne, author of The Lie That Tells the Truth). The persistence and popularity of this adage is curious, given its spuriousness (when taken literally). All lies are fictions, but not all fictions are lies. To lie (from the Old English legan) is to attempt to convince some person or persons that a thing or things is true, even though one knows the thing or things asserted are false. To lie is to communicate to one's interlocutor(s) with deceptive intent. Rothman defined the word at the end of his aforementioned speech, \"a lie\u2013that is, a made-up, imagined untrue creation.\" This is not an accurate description of the fiction author, nor is it an accurate description of a lie. A imagined untruth may be a lie, or it may be a mistake, or it may be madness; one cannot say with certainty, as Rothman's description elides the centrality of intention. Further, it is erroneous to conflate the \"made-up\" and the \"imagined\" with the \"untrue.\" Consider this from Terrance Klein of America Magazine, \"Pablo Picasso once famously said that art is a lie that tells a truth. He's right. There is something artificial about a work of art.\" Klein is, I contend, mistaken. To explain: All extant houses were imagined (made-up) before they were built and are yet as real as their creators. And so it is for the fiction writer. Huysmans' Durtal is not a real person, but he is a real fictional person, and is only ever presented as such. Verne's Nautilus was no more false than a draftsman's architectural sketch. Yet, given that fiction writing is an art, it is artificial, and not \"natural\" which, due the squamous vitiations of contemporary philosophy, is, as if by providential decree, conflated with falsity \/ deception \/ inauthenticity, even though the acquisition of truth, of authenticity, requires the intensification and extension of artifice, not its minimalization; for one cannot attest to the truth or falsity of a phenomena which evades the congenital senses without first developing new senses (ie. telescopes, infrared cameras, Geiger counters\u2026) and concepts to interpret, govern and implement them, and such apparatuses emerge only through the invention, or rediscovery, of grounding and controlling concepts, which fiction, in no small measure, can, readily and guilelessly, provide. \u2014 (\u2014) Art Is A Lie That Makes Us Realize Truth. Quote Investigator. \u2014 (\u2014) lie. Etymology Online. Abraham Rothberg. (2010) Fiction is a lie that tells the truth. Edteck Press. Terrance Klein. (2012) The Assumption: A Lie That Tells The Truth. America: The Jesuit Review. art Non-fiction PhilosophyAbe Rothman America Magazine art Fiction Jean Cocteau legan Pablo Picasso Philosophy Terrance Klein truth writing Embrace Rejection by Kaiter Enless January 30, 2020 January 30, 2020 The following work is a transcript of the keynote speech for Rock Valley College's 35th Annual Writing Awards Ceremony, delivered by WNIJ broadcaster and author Dan Klefstad (Shepherd & the Professor). Congratulations in advance to the writers who will be recognized tonight. I look forward to reading your work and sharing the stage with you at future author events. And to those who don't receive an award: Take heart, you will be recognized one day. And, one day, you might even get the publishing contract your novel, academic paper, or memoir deserves. But I think we should all prepare ourselves for an industry that is structured to say No to your work. That's the default. Your job is to be so brilliant you force publishers and agents to flip the switch when they encounter your words. I've published many times, but I've also been rejected hundreds of times. In 2016, I got my first traditional contract for a novel \u2013 actually, a fictional memoir \u2014 about a woman who's a veteran, cop, and single mother. I realized I'd need some reviews, so I sent another round of query letters. The reviews couldn't have been more varied. They ranged from \"Unconventional and refreshing\" to \u2013 quote \u2014 \"It read like the ramblings of a crazy woman, and for a short amount of time that's fine, but not for 267 pages!\" Then she added: \"Many thanks to the author for providing me a digital copy of this book.\" I am living proof that bad reviews and rejection letters will make you stronger\u2026if you let them. One of the people who inspired me is not a writer, but a freelance I-T worker featured on NPR's \"Invisibilia\" podcast. His name is Jason Comley, a 30-something who spiraled into depression and paranoia after his wife left him. She found someone who was taller than he was and wealthier. Comley's feelings about himself got so bad that he became afraid to leave the house and meet new people. In his words: \"I had nowhere to go, and no one to hang out with\u2026 so I just broke down and started crying.\" Comley realized he was afraid, so he asked himself: afraid of what? \"I'm afraid of rejection,\" he realized. So Comley resolved to get over his fear. He decided to make a game out of rejection, and this is what I recommend you do. He made a point of getting rejected at least once every day by someone. After a while, it felt good to get rejected all the time because, as Comley put it: \"I disobeyed fear.\" Disobeyed. Comley really hit on something there. I never thought that fear depended on our obedience. But it does. And it's not like fear is the criminal justice system \u2013 it can't lock you in prison if you disobey. There's no enforcement mechanism! And if nobody can prosecute you for disobeying fear\u2026 then rejection is an empty threat. So how does a writer play Comley's rejection game? You write something, you submit it to a publisher. Pick a publication you aspire to be in or an agent you want to represent you. Then pick several more. Write, submit \u2013 don't even wait for the replies because those take weeks. Write, submit, and embrace the \"No thanks\" emails when they start coming in. And remember: The publishing industry has No as its default. Even after you get a good edit, the gatekeepers who are flooded with manuscripts will try to find a reason to keep you out. Dare them to. Because content is subjective and if they don't like your work now, they might like it later. Or another publisher might take a chance with you. It's worth pausing for a moment and reflecting on all the times publishers got it wrong. They said No to authors who'd go on to be blockbusters. JK Rowling's Harry Potter pitch was rejected a dozen times. John Grisham's first novel, A Time to Kill, got 24 rejections. Stephen King rejected himself initially \u2014 He threw out the first chapters to, Carrie. Fortunately, his wife fished the crumpled pages out of the garbage and made him finish it, which he did. Then it got thirty rejections. The list goes on and on, so I'm guessing several people here could \u2013 eventually \u2013 land a major contract or get into a prestigious journal. You just have to keep trying. Some of you may have been studying the market for the type of writing you do. You have a pretty good idea how your manuscript will fit in, and you can tell an agent or publisher at least three titles that resemble your work. That's a benefit because publishers would rather repeat someone else's success than take a chance on something unfamiliar. If you take this route, I hope you make lots of money. There is no shame in playing it safe and cashing a check. It means one day you'll have the freedom to take a risk, to experiment, to try to advance the craft in the way you think it should go. When you're ready to do this, that's the book I'll read. For those here who don't care about the existing market and who insist on being original\u2026 you're after my own heart. You're the writer other writers will love \u2013 and maybe even give you a couch to sleep on when your meal ticket dumps you. One day, and it may take a really long time, enough of the reading public will catch up to you. They'll like how you test the limits of their expectations \u2013 even their patience. They'll appreciate how you helped them see the world differently. But for many years, all those risks you're taking with form, character, and plot will be poison to publishers. And when you do finally publish, the reviewers will savage you. Embrace their attacks. Any professional reviewer who takes the time to bash you in public has at least taken the time to read your work. You got under their skin and they will remember you. (lean in) Send them another book. Let them shoot you full of arrows again. Someday, long after, they'll encounter you at a writer conference or online chatroom, and they'll see you survived them. You kept writing \u2013 despite their criticism \u2013 and managed to find an audience and build on it. They couldn't keep you down. They will respect that. A moment ago, I said \"You managed to find an audience and build on it.\" This is inevitable for any writer, or any artist, who has talent and keeps working to improve. Malcolm Gladwell writes about the theory that it takes 10-thousand hours to become a master of your craft. He explores this in his book Outlier. In one chapter, he calculates all the hours the Beatles rehearsed privately and played publicly before their landmark album Meet the Beatles came out in 1964. Ten thousand hours. In another chapter, Gladwell calculates all the hours Bill Gates wrote computer code \u2013 starting in high school \u2014 before co-founding Microsoft in 1975. Ten thousand hours. I think it's safe for you to expect a similar time investment. The Beatles were in their early 20s when they hit it big. Bill Gates was the same age. How old are you? Take a moment and think how many hours you have been writing and re-writing in class or on your own time. You might be closer to 10K than you realize. At some point in your efforts to get published, you'll walk into a bit of luck. I'm a big believer that people who strive make their own luck. The agents and publishers who have the power to keep you in obscurity just can't help themselves when they see someone struggling to get their manuscript through the door. In my case, a handful of agents offered advice \u2013 They took precious moments from their day to write me an email saying why my manuscript wasn't working for them and offered suggestions for improving it. If this happens to you, treat that advice like gold. Thank them, revise again, and then re-submit. Speaking of submissions\u2026 Industry insiders will tell you they don't like it when you submit to every publisher who handles science fiction or horror or literary criticism. They do have a point when they say \"Hey, we invested valuable time reading your submission and then you went with this other publisher (or agent).\" My thoughts on this are simple and direct: They have all the power. You are at a disadvantage. You need to do what's best for your manuscript, so I recommend you don't become too concerned when they complain about investing a little time in you. THAT'S THEIR JOB. Now, you can play fair and say in your query letter that you're submitting to everyone and that you'll inform them when you get an offer. Do this but know you don't owe them anything more. Let's fast forward a few years. You have a brilliant manuscript and got a professional edit. You finally found a publisher who believes in your book or article and signed the contract. Congratulations \u2014 Welcome to the world of literary promotion! You might know that each author must be the chief marketer of their work. Even large publishers with marketing staff can only do so much. Most publishers will give you resources and advice, but they don't have the staff to sell your book. So how do you pick up their slack and start selling? You can spend a lot of money paying for marketing services and, believe me, there are a lot of people out there who offer various packages and rates \u2013 and none of them can offer you any metrics on how successful their services are. Let's be clear: marketing is an art not a science. With this in mind, I'll tell you what I've learned through my own experience, and that begins with this: Never pay for promotion. I've never paid a penny. But I have spent many more hours marketing my writing than actually writing. I still don't know how I feel about that, and I cannot point to any metrics saying my marketing efforts are paying off. But I feel like I'm moving the ball forward and that's got to mean something. I'm still in the game. I'm\u2026 here\u2026 after all, so I must be doing something right. So what did I do? I looked up book bloggers. These are readers, just like you and me, except they maintain blogs containing their reviews plus other cute features like \"First Line Friday\" or \"Short Story Sunday\" or \"Monday Memoir.\" Each one has a TBR or \"to be read\" stack that's a mile high and I wanted to see if they'd move my book up. So I pitched them with the following line: \"Looking for extra content for your blog? How about an email Q & A?\" And a surprising number of bloggers jumped on this. They sent me a list of questions, I answered within a day or two, and \u2013 Voila \u2013 there's my interview on their blog, plus my photo and a link to the Amazon \"buy page\" for my book. It was the easiest thing I could do with my time, and now I have bloggers who are curious about me and my work. And it only takes one if they're part of a network, so I recommend you focus on these. Many bloggers have agreements with other bloggers where they share posts on their websites, and then post the links on Twitter, Facebook and other social media. Let me give you an example: Two years ago, Love Books Group reviewed four of my vampire stories that will be included in my next book. This Scottish blog gave me a good review, included a photo of me, and links to my other work available on Amazon. That's not remarkable. Here's what is: 18 UK-based bloggers shared it on their sites and tweeted it. Each member of this network averages 15,000 Twitter followers, and they're also active on Facebook, Pinterest and Instagram. 15,000 x 18 equals\u2026 I don't care what the number is, THAT is a network that's too important to ignore. It includes blogs like Chat About Books, Keeper of Pages, Linda's Book Blog, Between the Lines, Bits About Books, and Swirl & Thread. Each of them got to know me after I pitched an interview. Then I pitched my first vampire story \"The Caretaker\" and three of them gave enthusiastic reviews. In my experience, when one of them likes you, you're in. It's not necessary for them to like everything you write. The blogger at Swirl & Thread, for example, doesn't like vampires. Keeper of Pages loved my story \"The Caretaker\" but was not happy with my novel Shepherd & the Professor. This experience taught me something about what works and what doesn't with certain readers. That's how I got free publicity and laid the groundwork for sales of my forthcoming novel. If you write creative fiction, I recommend you get in this network or something similar. If you're an academic writer, find a journal that gets quoted in popular media. And in both cases, be sure to let your local media know about the attention you're getting \u2014 because reporters tend to chase the same stories and, depending on what else is going on in the news, you might be the story for one day. It seems ridiculous to have to say this, because you're all polite people, but being nice makes all the difference. Sadly, not everyone gets this, and I feel sorry for the writer who responds angrily to a bad review. The bloggers I know consider an attack on one an attack on all, and they will shut out any author who insults them. When I saw this on Twitter, it resembled an excommunication. I felt certain the offending author's writing would never again see the light of day, and he would die frozen and alone knowing it was his own damned fault. Which, of course, it was. It doesn't need to end this way. Don't like that two-star rating? Suck it up and say \"Sorry it wasn't your cup of tea,\" and thank them for their time. If the reviewer had a specific complaint, consider that when you write your next book or article. Then pitch them again. It's worth noting that amateur bloggers devote enormous amounts of time reading books and maintaining their sites. Ever wonder why? The ones I know don't get paid for reviews, although they make a little money from selling ad space. They do it because they love books so much that they need to share their feelings about them \u2014 even to total strangers. They also enjoy getting to know authors. They really want to shout your name from the rooftops. All you have to do is give them a reason to do so. Another way to promote your writing is through podcasts. Authors writing on any subject can reach new audiences by producing their own podcasts or getting invited on better-known ones. Any podcast that allows you to read an excerpt and talk about your work is worth investigating. A very well produced one lives on the Rockford Writers Guild website. Their \"Guildy Pleasures\" podcast features two Pushcart-prize winners, plus excellent emerging authors. I was the first guest, reading five of my vampire stories. Podcasts are great for authors because they're sharable on social media, and you can track metrics like \"full listens.\" But the audience is getting more and more sophisticated so there's less tolerance for schlocky production than, say, a decade ago. If you get invited to a podcast, make sure you do your part and rehearse the excerpt you want to read, and make sure you know exactly how you'll answer basic interview questions like \"What inspired you to write this book or article?\" Nobody wants to listen to meandering answers, and nobody wants to hear an author stumble their way through a reading. The same applies to bookstore or radio appearances. I can't tell you how many times I attended events where an author showed up and it was clear they weren't prepared. Or they stood, chin down, quietly reading their words without any emotion or emphasis. Remember: You have one chance to make a good impression on your audience \u2013 so knock 'em dead. I hope I made a good impression with you. One day when my career has stalled, and you're headlining a publishing or academic conference, I might want to hitch my wagon to your rising star. In the meantime, I'll do what I can to help your career. If you think it may help to drop my name, feel free to do so. I gave you A LOT of things to remember tonight. The short version is: write your very best work, get a professional edit, get 100 agents to reject you, pay nothing for promotion, be nice, and rehearse. Thank you for inviting me. And remember me when you're famous! art Non-fictionart author creativity Dan Klefstad digital copy Fiction Fiona literature marketing motivation NPR query rejection Rock Valley College speech submission WNIJ writing Circular 1\/22\/20 From Fictive Dream: Delirium by John C. Mannone. \"The brick-lumps sifted through the black morph into swarms of fire ants with glassy-grit teeth.\" (Delirium) From Spelk: Letters to Dead People by Foster Trecost. \"I sometimes write letters to my father, but he doesn't read them.\" \"Because dead people can't read letters.\" (Letters to Dead People) From The Drabble: Dreams of Unspecified Crimes by Howie Good. \"I think it was Freud who said dreams are the day's dark residue.\" (Dreams of Unspecified Crimes) From Caliath: To Taste of Salt by Jo\u00e3o-Maria. \"What's it like to bow up?, that rotten soliphsism of yours by which suns dawn merely to candle your rooms\u2026\" (To Taste of Salt) From Art & Crit: \"The Death of the Author\" Debunked by Eric Wayne. The belief that \"the author is dead\" is one of the unquestioned bad ideas that has become gospel in the art world. It's usually just asserted \u2014 along with its companion notions that originality is impossible, and the artist's intent is irrelevant \u2014 as if to deny it is as hopelessly naive as denying evolution. (Wayne) From New Pop Lit: Do Awards Matter? by Karl Wenclas. Awards ceremonies, like hall of fames\u2013 sports, music, and otherwise\u2013 are in reality highly successful PR appendages to their particular industry. (Wenclas) art Fiction Non-fictionart Fiction literature nonfiction prose verse writing Circular 12\/25\/19 (Yuletide Edition) Regular readers"} +{"id":"RedPajamaCommonCrawl.0018","text":"Emperor - In the Nightside Eclipse (1994) A lot has been said about Emperor through the years, and not all of it flattering (Norwegian black metal + popularity = walking target), but indisputably they were and will always remain one of the most important of the 'second wave' bands within the genre. They also bear a distinction as one of the most 'dignified' in the field, having conquered several shores with their mighty live performances and then choosing to avoid the pitfalls of stagnation when they felt they no longer had much to offer. This decision came after four full length efforts, each of which marked a notable stage of evolution, Ihsahn and Samoth never content to rest on their laurels by rehashing or sidetracking their writing process. My personal interest in their work waxed and waned through these changing tides, being of the tiny minority that found Anthems to the Welkin at Dusk and Equilibrium IX to be flawed outings beyond a few particular tracks, and later developing a fondness for their divisive grand finale, Prometheus - The Discipline of Fire & Demise. However, I have long treasured their debut In the Nightside Eclipse, not only as the masterpiece of Emperor, but one of the absolute pinnacles of the genre, the sort of rare accomplishment that is reached only a few times in each generation. In fact, I'd go so far to claim that In the Nightside Eclipse is greatest 'symphonic' black metal album ever written, even if that symphony consists of only Ihsahn with a keyboard and vivid imagination. So much about this record is enormous. The cover is by far one of 'Necrolord' Kristian W\u00e5hlin's most beloved images, a beautiful but menacing moonscape of towers and bridges, vortex clouds, woodland expanses, haunting spirits and battle starved humanoids, almost like the final battle of The Lord of the Rings being played out across a 2D nightmare diorama set against the band's impeccable logo and a wisely chosen, archaic title font: every depraved D&D maniac's dream come true. The production itself is airy and horrific, falling somewhere below a polished state without the intentional marring of fidelity committed by so many of the band's countrymen and peers. Complaints about the mix might be seen as partially valid, for example the rhythm guitars feel mildly faint against the swelling synthesizers and rasp, impish drawl of Ihsahn, but I can honestly say that I would have it no other way, and the very 'flaws' themselves of the production only add to its memorable nature. It also invoked a stark balance of terror and majesty that thousands of others have attempted but so often failed to emulate. Sure, In the Nightside Eclipse is rather dated in the grand scheme of its genre, but there is this timeless, authentic quality found somewhere in the margins of highly effective composition and thematic intent that has never ceased to thrill, and when I think back on many late autumn or winter night drives I took to and from my university, along the sparsely populated back roads of central and western Massachusetts, listening to this as my drug of choice, I still get the occasional shiver down my spine. Perhaps I'm just a spineless pantywaist for admitting it, but this album used to scare the fuck out of me, as I attempted to conjecture about the Norse madmen responsible for its existence and what a pale wraith of uncultured American flab I must have been by comparison... There are also songs. Eight beautiful, flawless songs that foster the cold moonlight and stir the despotic winds of egocentric fantasy. Twilight wanderings from the bleak core of the human psyche, the devious spirit, to the expanse of endless, distant fires that leer at us from beyond the known sphere upon which our flesh depends, the cosmic eaves of horror and uncertainty that bear down upon the soul. The cleverly (?) titled \"I Am the Black Wizards\" is probably the best known of these, a clarion call to battle against a thousand years and suns, a tribute to all black and blazing phantoms of antiquity. Samoth's guitars are scathing delights that resonate like frozen fire across the punishing prowess of Faust, the tongue of Ihsahn spewing wretched poetry, the backbone of Tchort rumbling beneath like a ghastly march towards oblivion. The gorgeous sequence at 1:50 is strung out across the starlight like a chorus of waning angels, twisting into a powerful momentum worthy of even Bathory's epic Blood, Fire, Death, and at 4:00 you can prepare yourself for one of the most captivating, eerie melodies in all human history. My wizards are many, but their essence is mine Forever there are in the hills in their stone homes of grief Because I am the spirit of their existence I am them. \"Cosmic Keys to My Creations and Times\" travels from an icy momentum to a schizoid funnel of discordant, driving chaos, then back again as the snarling erupts, while Faust gets so much exercise that it's a wonder he didn't suffer one or many heart attacks during the recording. \"Inno a Satana\" fills out like a contaminated muse, licking the wind with soaring, clean vocals and more of the brazen, synthesized choirs that work as well here as on nearly any other recording on Earth, while \"The Burning Shadows of Silence\" thrives on stun, whipping breezes of dementia that adorn the scintillating ghostlike savagery of the keys. \"The Majesty of the Nightsky\" rolls over you, transforming you into some fallen, final chess piece before the sailing Nordic melodies around :40 sweep your ashes and sorrows into the dust of ages, and the 9+ minute epic \"Into the Infinity of Thoughts\" cycles through its grim, ambient intro to some of the most threatening but beautiful black metal to ever lock up the joints of men. Really, every fucking song on this album is unmitigated awesome, and I am nearly as awestruck today as I was when I first heard it. You could say that Emperor were the first of their kind to take the 'high road' in black metal, to transform this vile and infectious new brand of extremity into something so much more grandiose than it might have deserved, while Darkthrone was well underway mastering the 'low road' of delicious primacy that was born of Hellhammer, Venom and Bathory. In the Nightside Eclipse is so desperate and inspired that even Emperor could not and never will surpass it, and clearly a standard was being set well out of the reach of most impersonators, even with over a decade of interim in which to refine it. Ambitious as they are, and try as they did, the later efforts do not possess this same level of consistency, exchanging atmosphere for the technicality inherent in progression, and the precision of bigger budget, studio accessibility. I wouldn't trade this album for a 100 Anthems to the Welkin at Dusk, and to my ears, it remains one of the greatest of its kind, alongside A Blaze in the Northern Sky, Hvis Lyset Tar Oss, Transilvanian Hunger, Black Shining Leather and Blood Fire Death. Verdict: Empiric Win [10\/10] (they can not be laid to rest forever) http:\/\/www.emperorhorde.com\/ Labels: 1994, black metal, emperor, Epic Win, norway Evocation - Apocalyptic (2010) Constant exposure to such a vast wealth of Swedish death metal, both old and new, serves as a double edged sword. It's clearly one of the most redundant sub-genres of the style, with a clear excess of players in the field hammering out the same riffs, the same tones and the same overall atmosphere to the point that the connoisseur's tastes are soured beyond repair. On the other hand, hearing so much of this approach in the past few years certainly goes a long way towards separating the chaff from the wheat, and as Evocation have already proven with their prior albums Tales from the Tomb and Dead Calm Chaos, they are not a band to be trifled with: something more than your run of the mill, competent practitioner of the form, but still being eluded triumphant overture that will elevate them into the pick of the litter. For sure, Apocalyptic is one of the better of this sort of offering I've heard in recent month, for Evocation do not merely rehash endless riffs from Entombed, At the Gates, Dismember, and so forth. They actually attempt to assert some of their own individuality to the proceedings, and this is often manifest by an enhanced attention to the underlying melody that complements the burgeoning brutality of that pure Swedish crunch. This is evident in \"Sweet Obsession\", the rather sultry opener that runs you through with a rare glimpse at beauty, and to a lesser extent \"Reunion in War\", \"Murder in Passion\", \"Curse on the Creature\" and \"Psychosis Warfare\", some of which seem to bear an influence of slightly more obscure bands Eucharist, Unanimated, Centinex and Utumno. These are measured off against the more expected, grisly brutality of \"We Are Unified Insane\", \"Infamy\", \"Parasites\", and the triumphant grooves of \"It Is All Your Fault\", which is perhaps one of the best of this lot. All of this is handled with precision and a professional solidarity to rival the legends of the genre, and in truth, Evocation may damn well deserve a trace of recognition hovering just below the bigger names (they've been around since 1991, just took a very long vacation for over a decade). I found the album to be a mild improvement over its predecessor Dead Calm Chaos, and sitting parallel to the 2007 full-length debut, with enough memorable material to render it obvious that time and effort were evoked here beyond the mere twiddling of knobs and simple carbon cloning of the classic guitar tone, which is obviously the most noted characteristic of the country's scene and the thousands of bands worldwide who aspire to copy it. If only more would take a page from Evocation's notebook, because this is one of the bands that prove there might be something left to explore in this tired, sagging schematic, without abandoning the fundamentals to oblivion. http:\/\/www.evocation.se\/ Labels: 2010, death metal, evocation, sweden, win Facebreaker - Infected (2010) It must be the coolest thing in the world to be a part of a band called Facebreaker. I mean, just think about that...you're rolling up to a gig with a bunch of other tough guy bands, only none of them have that distinction. You sign in to the club or hall, proudly exclaiming that Facebreaker have arrived. You meet a girl in a bar, she seems into you, and when she bats her eyes at you wolfishly and then asks you what band you're in? Facebreaker. Congratulations, you have scored. You get a friend request on MySpace from a band called Facebreaker, and there's just no way you could refuse it? I mean, if you did, they might break your fucking face! Nobody wants their face broken. There is just something so direct and hard ass about that name that only fear and respect can be inspired. Well played, you goddamn Swedes. Now that the cat's out of the bag, it's no surprise that Facebreaker are a Swedish death metal collaboration featuring members of other, established acts (kind of like Bloodbath, Jr.). Growler Robert Karlsson has featured in Edge of Sanity, Darkified, Scar Symmetry, Pan.Thy.Monium and the more recent Devian, and he's joined by a guitarist from several of his former demo-level bands: Janne Invarsson. Fleshing out the band are Jonas Magnusson and Mikael Wassholm of the short-lived Swedish death\/black act Ashes, and guitarist Mika Lagr\u00e9n. Infected is the third album from this entity, a polished and pure libation to the gods of Swedish old school death metal, with enough crunch, atmosphere and studio superiority that it begs some attention even despite its lack of inspiring riffs. Facebreaker, however, are also slow and warlike enough that they can conjure comparisons to the crunchy war-death of a Bolt Thrower or Hail of Bullets, and this album is actually quite close in composition to the latter (\"Cannibalistic\", \"Mankind Under Siege\", \"Into the Pit\"). So there's a little more here a mere mirror to the inescapable past, though fans of the primal Swedish butchery of Dismember, Bloodbath, Centinex, Grave and Entombed are all going to sprout instant erections at the muscular pandering of the guitar tones, and barbaric simplicity of the writing (\"Creeping Flesh\", \"Torn to Shreds\", \"Waiting for the Pain\"), provided they don't mind the lack of novelty. Most of the songs feature some worthwhile shredding, even though the base riffs would probably lack something had they not been mired in such a huge and reliable production. Personally, I found the material fun if ultimately forgettable, unlike the band's moniker. I don't recall being all that thrilled with their sophomore Dead, Rotten and Hungry, so I can attest that this is superior, and something can be said for the very modern atmosphere to which these Swedes have applied the tried and tested formula. Left Hand Path and Life is an Everflowing Stream this is not, you're looking at something more along the lines of The Fathomless Mastery or Resurrection Through Carnage, only 'tougher'. Infected hits like a ton of bricks, but you don't always want to stick around and see whatever got splattered beneath them. http:\/\/www.facebreaker.com\/ Labels: 2010, death metal, facebreaker, sweden, win Vex - Thanatopsis (2010) So, if a picture is worth a thousand words, I rather like the picture Vex puts out there on the cover to their full-length Thanatopsis. A skull, yellowed in decay, sitting before an old rock with what appears to be a rune carved upon its archaic surface. I like to think these two inanimate objects hold conversations with one another...certainly the cranium looks happy, as if the tall, grassy leaves were tickling it in the wind. That said, it doesn't offer even a hint of what the actual music will sound like, so when you begin to listen to the album, you might be quite surprised to discover that Vex are some long obscured treasure of progressive, moody melodic death\/black\/thrash metal that seems rather uncanny hailing from Texas, one of the brutal death capitals of the States. Yes, there is something understated and atypical about Thanatopsis, though the individual components are hardly unique: well plucked, darkly twined melodic rhythms racing across a tinny backdrop of drums. Blunt and bloodied vocals. Thrashing, warlike bursts of muted thrash chords that soon surge into ghastly death metal sequences. An atmospheric sheen to some of the better guitars that becomes mildly reminiscent of Swedish melodic death or black metal acts. Most importantly, though, Vex understand how to cycle through interesting riffs that complement the grim but uplifting pallor of the album packaging. They don't always strike gold with every pattern of notes, but for a band to encapsulate such a pure atmosphere straight through the core instrumentation is an ability to envy, and this is one of those albums where a band chops up a bunch of constituent elements like vegetables, throws them into the same side dish, and comes out with something fresh tasting. There are seven tracks here, beginning with the band's namesake \"Thanatopsis\", which might mislead the listener into thinking the band is instrumental, since a 6 minute composition with few leads or solos and no vocals is hardly common. To compensate, it is one of the most meandering of the experiences here, with clear elements of progressive influence in the bass lines. Better yet is \"Eyes of Wrath\", teasing with a surge of melodic black metal before it levels off into somber, engrossing riffs, prominent and interesting bass work, and dour vocals. \"Era of Delusion\" arrives like a beautiful mix of Night in Gales or Dark Tranquillity styled death metal, every riff worth hearing despite the rather desperate and downtrodden emotions inspired; \"Apocalyptic Dream\" transforms from warlike Metallica thrash chugging to an almost Viking swagger that recalls old Unleashed. The eight minute finale \"The Past is Frozen\" is loaded with lavish yet sparse, clean guitar sequences through which heavier riffs often cascade, and though it does at times feel the most scattershot of the pieces, it's one of the most intriguing. Thanatopsis is not always the smoothest of rides, and at times some of the transitions feel like the band are attempting to branch into too diverse of a sound all at once; as if a few riffs were latched onto to others where it doesn't best serve the whole of the songs. However, the majority of the individual guitars are promising, and overall, I really like the vibe the band are churning out, more sobering than blazing, borne more of focus than virtuosity. Vex have been around for 12 years, so one can't exactly call them new kids on the block, though their prior output was limited to a small series of demos and a recent split with local Texas death\/doom act Divine Eve, but there is something about this debut that I think might appeal to fans of other moody US beasts like Cobalt, Wolves in the Throne Room, or Agalloch, even though the styles do not always match up (Vex is also less boring in general). Here we've got something well off the beaten path, even though the stones paving said path have been lifted from more frequently traveled concourses. http:\/\/www.myspace.com\/vexhomepage Labels: 2010, death metal, texas, thrash metal, USA, vex, win Abominant - Where Demons Dwell (2010) There is always something to be said for persistence, and perhaps Abominant are one of our most stalwart American lessons in this virtue, having released nine full-length albums, all but hidden from mainstream recognition, offering nothing more than the purest of death metal aesthetics that conjure up the Florida blasting of a Morbid Angel or Malevolent Creation, with a tinge of the good old Dutch style of Sinister and Pestilence. At times, I feel like they're a poor man's Hate Eternal, but predating that Erik Rutan vehicle and catapulting through a wider range of storming dynamics. Granted, the few efforts I've heard from this Kentucky outfit have hardly been distinct, but perhaps Where Demons Dwell serves as the proper catalyst to a re-evaluation of the veterans' backlog, because this is a well-written, mature album that clenches the attention span through most of its eight compositions. It opens with \"Baptized by Steel\", a blazing piece which exchanges Morbid Angel like blasting for a pretty smooth, downtrodden breakdown and escalating groove that would have a crowd turn wild, though I wouldn't call this the highlight of the album. \"Bloodland\" offers some more uplifting, streaming guitars that are instantly more catchy, and the thrash breakdown is quite good, while \"Firestorm\" is one of the better sheer onslaughts on the album, the celerity of its primal grinding enhanced by a simple but entrancing half-melody and another of the band's characteristic breakdowns that waltzes between early 90s Pestilence and Ripping Corpse. \"Rain of Ash\" offers more ritual speed, the chords of the initial charge casting a ghastly old flavor soon eclipsed by the band's venomous adherence to raving lunacy, and right when you thought another blitz would taint the album monotonous, they slow to a dreary crawl through the opening moments of \"After the Fallout\", holding off the blasted tendency until the mid point. \"The Wolves of Hate\" and \"Blackened Earth\" both return to the frenzied pacing, but both are complete with quality riffing and a forceful veneer that proclaims Abominant was not born yesterday and might damn well outlive even the damned cockroaches in the end times. Speaking of end times, Where Demons Dwell closes with its title track, a ripping infernal holocaust that yet again visits that delightful old Pestilence churning as it bursts through the crust of purgatory. More of the thrashing breakdowns cede to a rather unexpected, melodic muting sequence deep in the track that truly wraps the experience, making it another of the album's best. Nothing could be sweeter than hearing a veteran band like this, far off the radars of most of the Nile, Suffocation and Cannibal Corpse worshiping death metal flock, create one of their most enduring pieces, and their long relationship with Deathgasm Records (sixth album through the label) seems to have paid off. I won't promise you that Abominant are technically explosive, unerringly brutal, or even mildly innovative; or that Where Demons Dwell is bound to achieve cult classic status, but there is no questioning the time and care placed in it, seasoned dynamics and willingness to explore and expand the typical blasting motif when the song itself calls for a deeper layer of disturbed consciousness. An American band, performing 90s style death metal without any trace of trendiness or bullshit: you could do a lot worse than this album. http:\/\/www.myspace.com\/abominant Labels: 2010, abominant, death metal, kentucky, USA, win Mr. Death - Death Suits You EP (2010) Mr. Death might seem a rather cosmopolitan spin on the classic Swedish death metal genre, what with their bloodied suit corporate zombie gimmick. Of course, this is not entirely novel within extreme metal as a whole, but I rather enjoy it when a band cultivates such a combination of class and carnage. Musically, they're even less novel, yet another in an endless cycle of bands dredging up the old school 90s dirt of Entombed, Carnage, Dismember, Grave, and their ilk to once again ravage the living, but Mr. Death seem to have one thing going for them: they know how to pace themselves, offering just the right balance of faster and mid-paced murder and groove to remind the listener exactly what he or she loved about the country's take on the genre in the first place. Death Suits You is a stopgap between full-length albums, following on the heels of last year's Detached from Life, a foul meaning if ultimately forgettable debut that served only to register them among the crop of nostalgic gravediggers that has exploded in recent years. No risks were taken, no brains consumed in its creation, but it was competent enough. The six songs here are not a major step away from that material, but I felt like the brooding, morbid grooves that cut through \"Curse of the Masses\", \"The Plague and the World It Made\", or \"On Day 51\" offer a glimpse at maturation alongside a faster moving, unbridled antiquity of the guitar riffing, very similar to how Entombed or Desultory expanded their sounds to incorporate a heavier rock and blues influence, more or less gimping themselves in the process. However, Mr. Death does not suffer the same problem, because they somehow keep the guitars on the course of evil, even with something like \"Strandead\", which surges back and forth from pure repulsion grind to a more uplifting, d-beat riff. That said, I didn't like all of the songs here quite the same. Opener \"March to the Dark\" in particular seemed like it might foster some promise, but I found myself numbing to its flustered gait. On the other hand, \"Celestial Suffering\" musters a doom-like intro worthy of Wolverine Blues, followed by the requisite rock pacing and a series of riffs that just seem to escalate in quality until the unexpected, transcendent melodies that charge into the eventual burnout. With more songs of this quality, Mr. Death are apt to turn a lot of heads loose from their sockets, since there is something more here than the tedium of the genre's unending saturation. Time will tell if the band follows up on these traces of potential, or if they whittle away into the shadows of overpopulation, but Death Suits You is only recommended to those who can't get enough of the style, hunting for slight variations on an apparently infinite theme. http:\/\/www.mrdeath.se\/home\/ Labels: 2010, death metal, Indifference, mr death, sweden Though it's certainly one of the more 'dated' films in the David Cronenberg horror backlog, capturing its period through a number of unfortunate hair choices, computer clean rooms, mannerisms and way cool mall food court and record shop sets, Scanners remains one of my favorites from the director. It's one of the first films in memory to truly put a 'serious' spin on the entire psychic potential of the human race, and in that way it recalls traces of Bester's The Demolished Man or Silverberg's excellent Dying Inside, only with an exploding head to boot...and Michael FUCKING Ironside, in one of his defining roles, before his genius was rationed out to the B-movie circuit by directors and casting agents that simply cannot fathom or begin to utilize his talents. ***WHERE SPOILERS & GRATING SYNTHESIZERS COLLIDE*** You'd think I was joking, especially if you've seen some of the crap the guy has participated in for a mere paycheck, but I'm really not. He's a distinct actor, with a distinct look about him, and one of my favorites. As Daryl Revok, the rogue 'scanner' attempting to breed a new race to dominate mankind in this 1981 sci-fi\/horror vehicle, he simply exudes menace, a magnificent demon that at one point drills a hole in his head to release some of the 'pressure' of hearing everyone's thoughts inside him. Opposite Ironside, we have Canadian painter Stephen Lack in a rare film appearance. Lack's bright blue eyes and demeanor seem perfect for the character of Cameron Vale, a vagabond Scanner who is being reserved as a foil for Revok, but the guy's acting does come off a little jilted in spot. Also appearing: Jennifer O'Neill as a female scanner, and Patrick McGoohan of The Prisoner fame (the original, not the shitty remake) as the ponderous Dr. Paul Ruth, who is responsible for the outbreak of these psychic powers. The plot is pretty simple, and we're not really insulted by some lengthy exposition. Cameron Vale is recruited by Dr. Paul Ruth to track down and defeat Revok, after the latter goes on a killing spree, eliminating a number of agents that work for ConSec, your basic corporation up to no good as you'll find in many sci-fi or cyberpunk staples. Turns out there is a greater conspiracy at work here, and Scanners throws a few minor surprises at us over the course of its 103 minutes, but the real 'horror' of the movie comes in its mere implications. What would happen if people really had these powers? Would they use them for the betterment of all man? Or attempt to destroy and replace all of us 'normals'? I feel that Scanners takes a pretty realistic approach to this, especially when considers the castigation and revenge motivation of its antagonist. Granted, the sequence of events flows along a little too easily for your average mystery based narrative, but it's still pretty cool, for two glaring reasons beyond Ironside's performance: These would be the score, and the special effects. The score is by Howard Shore, who many of you know from blockbusters like The Lord of the Rings films. But here, he's experimenting with turbulent electric sounds and simplistic synth-waves among more standard fare, and the result here is fucking brilliant, like Kraftwerk or some other primal electronic artist overdosing on Ephemerol (the Scanner-suppressant drug central to the storyline). It may feel very much planted in the late 70s experimentation of tech-savvy Krautrock or progressive rock bands, but it's perfect for the story, the setting, and the effects. Speaking of which, these are superb here, especially the infamous 'exploding head' scene and the end fight between Vale and Revok, which is arguably one of the coolest conflicts where neither opponent does anything but glare at one another. Veins stand out, fire bursts, and eyeballs melt. It's fucking great, and exactly what I would predict a psychic battle might look like! Scanners is a lot of fun, if you can immerse yourself into its time and place, a sense of perspective that is obviously required of any intelligent moviegoer. It's not perfect, and in retrospect it might not seem particularly scary, until you muse of the possibilities were such an accidental adaptation to occur in our real world species. The music and effects were top notch, and Michael Ironside excels in one of his earlier roles. I would love to have seen his 'method acting' between the various scenes, a Daryl Revok stalking about scaring the shit out of everyone in the cast and crew. However, I must caution the reader that all sequels for this film must be avoided! None of them involve Cronenberg. Scanners II and III are mediocre at best, and the Scanner Cop films are pathetic, without even an ironic entertainment value. Labels: 1981, horror film, scanners, science fiction, USA, win King Diamond - Fatal Portrait (1986) Kim Petersen (aka King Diamond) must be one of the hardest working men in all of the metal realm, or at least he was from the late 70s through the beginning of the 21st century. When his alma mater Mercyful Fate first broke up, our favorite falsetto rigorously pursued his dreams into a new solo project, and the initial body of work encompassing the first five albums from 1986-1990 is essential listening for anyone that can get past the obvious hurdle of all that damned screaming. Yes, five consecutive years, five consecutive efforts that ranged from flawless (i.e. Abigail, The Eye) to just being damned awesome, all beginning with this debut Fatal Portrait, a wondrous indoctrination into King's classy horror themes and night bathed landscapes of gleaming melody. Petersen was followed into this new project by Michael Denner and Timi Hansen, so the trio already had an extremely solid foundation to work with, made complete with the addition of budding newcomers Andy la Rocque and Mikkey Dee. The tricky bit was writing material that could distinguish itself from the legend of Mercyful Fate, and I feel like this mission was accomplished early with the debut. Sure, you can hear a little of the groove and swagger of the Danish mainstays, but the unified concept (for half the record) and haunted house vibes were new, and I feel like the actual guitar lines had a lot more memorable, and I daresay accessible material to offer the fan of traditional power\/speed metal. In fact, I'll go as far to say that I actually prefer King Diamond to Mercyful Fate overall: the former is responsible for a far more impressive, consistent body of work than the latter (excepting a few albums like The Graveyard or The Puppet Master), and while I certainly worship Don't Break the Oath for the masterpiece it is, few things can touch Kim's 1986-1990 creative spurt. Was the man possessed? As I hinted at, five of the tracks here represent a conceptual horror story, that of a dysfunctional mother who locks her young daughter in her attic, only to be haunted by her ghost through a painting of said offspring above the fireplace. You can probably guess what happens after this, but it's really not all that essential, because you'll be too enthralled with the music to really care about the underlying messages of King's 'narrator' character. The man rises and plummets his enchanting, high pitched screams through the epic opener \"The Candle\", which is initiated by some amazing atmospheric pipe organs and then cast intro cruise mode with a sorrowful, but badass melodic intercourse. This is followed by the doomed taint of \"The Jonah\", which one might envision as some delicious, bastard mesh of Mercyful Fate and early Candlemass. \"The Portrait\" rips along with glistening leads and cautionary, climaxing verses over which Petersen's voice crests majestically, and \"Dressed in White\" persists with surprisingly warm tones and some of the best, flowing melodic mute rhythms outside of Iron Maiden. The Fatal Portrait sequence is closed by \"Haunted\", which arrives at the end of the album, with some unsurprisingly great riffs and solid bass work from Hansen. Outside of the story itself, there are four tracks (not counting the bonus of \"The Lake\", which I covered in my review of The Dark Sides compilation EP). \"Charon\" offers perhaps the most easily accessible, killer verse rhythm on the album, minute melodic fills riding the cycles, a fine and fitting tribute to the grim ferryman. \"Lurking in the Dark\" cultivates into a crystalline vocal arch that I find unforgettable, despite this being my least favorite track on the album, and \"Halloween\" is tongue in cheek hilarity glazing another slew of great guitar rhythms and thick bass. It's all too perfect that the King offer up a tribute to his (and everyone's, really) favorite holiday, because he so embodies the cliches and spirit of the season), but for the record, he also hits up Christmas (the remastered CD also includes a bonus of \"No Presents for Christmas\"). The one other track here is \"Voices from the Past\", a brief instrumental with surging, shuffling guitars that start and stop to various, spooky ringing pianos and other creepiness. I don't know that I'd consider this one of Diamond's utmost masterworks, but only relative to the followup Abigail or the impressive, underrated witch-burning epic The Eye. If you were to compare it to anything post-1990, though, Fatal Portrait is godlike, and a cause to celebrate the fact that the King was not going to suck outside of Mercyful Fate. Production-wise, the vocals on the original mix are quite loud, and perhaps the rhythm guitars just a tad soft, though still graceful and audible enough to make out. The drums, leads, bass and synth line are all quite impressive, though, and the mix sounds very standard for its day and age, which is to say, it still rules today on any stereo you play it. A few of the songs fall just a fraction below others in terms of overall quality, but it's a safe bet for any fan of Fate or 80s melodic power, speed or heavy metal that doesn't immediately cringe at the Petersen's soaring pitch, and after the staring, striking visage that adorns its cover, I doubt I could ever look at a family portrait the same way again...good thing we've got Facebook instead?! Verdict: Epic Win [9.25\/10] (in every candle that I burn, burn!) http:\/\/www.covenworldwide.org\/ Labels: 1986, denmark, Epic Win, Heavy Metal, king diamond, speed metal Dark Angel - Darkness Descends (1986) 1986 was obviously an enormous year for metal music, thrash in particular, with monoliths like Master of Puppets and Reign in Blood collecting and consuming an eager audience like Martian tripods attacking the California landscape. The time was right to strike. The crowds wanted blood with their speed. They wanted crunch. They wanted unshakable violence, raw spectators of gladiatorial combat, and the Golden State was one of the first to heed the call, going on to spawn an enormous number of memorable bands like Sadus, Testament, Vio-Lence, Death Angel, Forbidden, and so forth in the span of only a few years. But one name stands as releasing perhaps the most extreme, intense thrash metal album of its generation, giving even Slayer a run for their money, and that name is Dark Angel, whose second full-length and Combat debut Darkness Descends sends shivers down even the most rugged thrasher's posterior. This album was important for a number of reasons, not the least of which is the emergence of Gene Hoglan as one of the prominent percussion forces in extreme metal. His rampant footwork and consistent bludgeoning are one of the most memorable characteristics here, upping the ante for thrash drummers everywhere as they had their heads spun off their necks in the destructive aftermath. By today's standards, in which the death and black genres have stolen metal music off to the coldest and most unfeeling, mechanistic of climates, this performance might seem like old hat, but for 1986 it was unbelievable, making even Dave Lombardo blink twice. Marrying this concrete precision shit storm was one of the more blazing guitar duos in the US, Eric Meyer and Jim Durkin, who decided that the best approach to writing was throwing everything, including the kitchen sink, directly into your face. Each of the seven compositions here cycles through a good number of cocaine rodeo riff assaults that almost unanimously deliver the ominous environs promised by the iconic cover image. I can't promise that every one of these riffs sticks, and surely this is one of the few shortcomings of the album that would hold it back from the attention whoring of a Slayer, Megadeth or Metallica, but they are at least effective as a whole. \"The Burning of Sodom\" is generally cited as the favorite here, and this is an understandable sentiment, because Don Doty's normally pinched vocal aggression takes a spin for a slightly higher pitched, punk\/crossover approach which is ironically much closer to his replacement Ron Rinehart (on the subsequent Leave Scars and Time Does Not Heal albums), and the guitars race and crash through a number of bombastic blitzkriegs and chaotic solo splices. However, my own personal preference lies for a number of other pieces, including \"Darkness Descends\" itself, which heralds its approach with scorching feedback and a biting, apocalyptic belligerence; \"Hunger of the Undead\", which sounds like Sadus and Nuclear Assault jamming together during a zombie revolt; and \"Merciless Death\", in which bassist Rob Yahn gets to show off a little in the intro before being smothered in bristling speed\/thrash metal. Doty's vocals were not always on point with me, but I will admit that he, like early Tom Araya, was exemplary at knowing precisely where to lay into a scream. The catty, grating voice he would normally hurl out across the energetic mesh of guitars would occasionally feel too light-hearted for the music, despite the blasphemy and gravitas of the lyrics, but there are certainly a number of lines where he's alight with the blistering menace of the instruments, and it all comes together like a drunk out of cold turkey rehab the first time he re-enters a liquor store. As I mentioned earlier, the riffs fly at you like an out of control pitching machine in some hellish batting cage, but not all of them penetrate the memory equally (I don't remember much of \"Black Prophecies\", for example). However, they are performed with such a taut intensity, ever on the verge of explosion, that they still sound like an impressive array beyond decades of shelf life, and even for 1986, there was a lot of bang for the buck here when compared to most thrash or speed metal efforts. Darkness Descends might not be a personal favorite, but it certainly deserves its place among the legendary thrash elite for the simple fact of its existence as a dark, looming sentinel of extremity, a standard against which many brutal thrash or death\/thrash records will always be compared. I might be in the minority in claiming to prefer the following albums Leave Scars and Time Does Not Heal, with their wall of text lyrical excavations and increased riffing complexity (which yielded mildly more memorable results), but this sophomore has always remained an enticing, reliable option for a refresher in the pure propulsion this genre once promised, a nuclear celebration of murder and mayhem that very few peers could stand alongside without having their knees broken and skins flayed off. Verdict: Win [8.75\/10] (paradise of pleasures lost) http:\/\/www.myspace.com\/darkfuckinangel Labels: 1986, california, dark angel, thrash metal, USA, win Slayer - Hell Awaits (1985) Slayer's sophomore Hell Awaits holds a number of memories for me, both chilling and comic, because it was one of those rare albums that experienced a sort of 'urban legend' cult status in my middle school years. Several peers and I once passed a cassette recording of both this and Show No Mercy around to one another, terrified of its contents, perhaps clinging to those vestigial traces of Christian upbringing. Copies were confiscated by teachers and parents, and a few of us got a good 'talking to', myself in particular, for spreading the twisted diocese of Satan through the rank and file of the innocent. Keep in mind that I was about 11-12 years old at this time, the target of crass, ignorant exaggerations by a Protestant flock, and by no means in thrall of the Prince of Hell. But the damage was done. I bought the actual cassette. My parents took it away. I stole it back. The top of the refrigerator was hardly a sufficient hiding place for my 'unapproved' stock of metal albums. They gave up. I bought the back patch, and was so armored the very day I parted ways from the Protestant faith (after being forced up through Confirmation prep class as an obligation). What an ironic portrait, a dorky pre-teen armed in denim and devils, striding proudly through a dull spring rain in 1986, having quit Church forever, wearing this image and title on my back. The prescient, magic 8-ball might read that my outlook was not so good. Alas, our figures of social authority had one thing right: Hell Awaits was one scary fucking record, especially when unleashed upon an audience whose idea of extreme was Dee Snider wearing blush and mascara. Granted, we had Welcome to Hell and Number of the Beast floating around by this time, but Slayer took this concept to an entirely new plateau, not only because of the lyrical content, but the cruelty of the riffs here that jettisoned the simplistic, scathing roots of Show No Mercy into an even sharper blade of menace and perdition. The songs were longer, more fleshed out, more 'mature', yet the blinding speed remained: Hanneman and King a pair of unstoppable ghouls cycling through a rogues gallery of bloodstained, fire-hardened riffs that would cement their stature as gods of diabolic thrash; Araya settling more into his distinct mid range, with nary a shriek to be experienced in most of the vocal passages; Lombardo breeding an entire new school of drummers that would follow his extremity into darker, restless climes. What better a herald to the fiery paths than a bath of feedback and cacodaemons exclaiming 'Join us' in reverse? Such is the de-Christening of \"Hell Awaits\" itself, the gallant vanguard that slowly and steadily escalated its warlike veneer into plodding, dire thrash, with that legendary ascent from conflagration at around 2:20. You are now at war, children, and Satan is your general. Let him ride upon your backs and piss upon the clouds of the Holy Host. But as charming a setup as this is, nothing, and I mean nothing can prepare one for the voracious evil that is \"Kill Again\", one of my personal favorite Slayer tracks, the perfunctory serial killer anthem that had to be one of the most bitter and extreme metal tunes I had heard for its day, once more incorporating Lombardo's warlike percussion into a salvo of beautifully belligerent riffs that seem to incite violence with their very notation, the chorus an unforgettably babbled hymn to atrocity: No apparent motive, just kill and kill again Survive my brutal thrashing, I'll hunt you till the end My life's a constant battle, the rage of many men, homicidal maniac! So how do you follow up a celebration of murder? How about with some fucking vampires? \"At Dawn They Sleep\" opens with a horrific bristling spike of carnal melody before it transforms into another of the band's undying, gibbering chorus sequences that seems to mock the listener through its cacophonous glee. These three tracks alone would place Hell Awaits fork and horns above most thrash\/speed metal histories, but Slayer were not finished with us yet, launching into the barbaric \"Praise of Death\" which serves as a sinister foreshadowing to the rampant, uncaring speed of their following masterpiece Reign in Blood. \"Necrophiliac\" is one of the best known songs from this album for a reason, it's rapid fire perversity transforming a sadistic and 'immoral' fetish into an act of glory worthy of any crude Colosseum, the crowd of sinners turning their thumbs proudly to herald the fused fornication of the living and the dead. Beyond this festering folly, we are led to what I might argue is the most unsung anti-hero of this record, \"Crypts of Eternity\", which opens with about a minutes of blistering, spiny necromantic guitars before it rolls into the verse and chorus, and an amazingly despotic bridge section that once more teases at what Slayer will produce in the following year, a turbulent breakdown festooned in a blaze of percussive exorcism. Lastly comes \"Hardening of the Arteries\", one of the album's faster pieces that strikes like a scourge or cat o' nine tails along the bared skin of the penitent with its apocalyptic poetics. While it certainly belongs here among this wretched flock, it is perhaps the one song here I don't think is perfect: for all the accoutrement of anguish created in the warlike, hammering finale, I found myself mildly disinterested. Slayer's sophomore was not only proof of the band's persistence, that they were no one trick pony with the masterful Show No Mercy, but it also remains one of the band's nearest flirtations with perfection, surpassed only by its closest brethren in bedlam. The album is not so fixed and fluid as its untarnished successor, but it's nearly as bewitching in the consistency of themes and the composition. There is nothing clean or polished about Hell Awaits, no salvation at the end of its corridor of sinful flesh, and it's a worthy archetype for some of the most demented extreme metal to have been produced since, an absolute necessity for any fan of speed, thrash, black or death metal that values the cautionary discomfort of unbridled anger and passion. Verdict: Epic Win [9.75\/10] (He shall soon fall to me) http:\/\/www.slayer.net\/us\/home Labels: 1985, california, Epic Win, slayer, speed metal, thrash metal Halloween - Don't Metal With Evil (1984) Decades later, I've still not made up my mind as to whether Don't Metal With Evil is one of the best, or worst album titles I've ever come across, but there can be no debate over the contents: some of the most entertaining Midwestern speed metal I've ever heard. The band name Halloween must have been in hot contention back in the 80s, after all it's about the coolest holiday on the calendar and just an utterance will conjure nostalgia for demons, spirits, witches, black cats, pumpkins, candy and horror in even the most stiffened, jaded mother fucker out there. This was a fairly theatrical act, fully embracing the subject matter into which they delved, and to this extent they might be compared to a King Diamond or Lizzy Borden, two of the 'shock metal' greats. The music is also comparable, because it's melodic and well written, accessible but raw in that delicious 80s aesthetic. I won't claim that Brian Thomas has the vocal chops of those masters, in fact his voice is the weakest link on this debut, but he does attempt some shrill, frightening notes on the album, and even at his worst he fit the splattering speed momentum of the band very well. The guitars are the dominant 'evil' here, Rick Craig spring loaded with riff after riff of thrusting, tasteful dirt rooted in Venom and Saxon, but a lot busier, with a propensity to shred off with numerous fills in pieces like \"Trick or Treat\" and \"Don't Metal With Evil\". The rhythm section was also well versed, Bill Whyte's drums crashing all over the mix and George Neil's bass strutting along as the perfect foundation for Craig's eccentricities. Don't Metal With Evil also has a great mix of material, between the vicious roadsters like \"Busted\", \"Trick or Treat \"and \"Fight the Beast\" to the mid-paced heavy metal hammering of \"Scared to Death\", \"Haunted\", and \"What a Nice Place\", reminiscent of a more complex Twisted Sister. There's only one arguable power ballad here, \"Justice For All\", and a potent, plodding piece called \"Tales from the Crypt\" that definitely channels a Maiden-esque appeal akin to what you'd find in late 80s Running Wild. The band doesn't take itself all that seriously, so you'll hear some cackling fun to inaugurate \"The Wicked Witch\", or some male cackling in \"Trick or Treat\". Lyrically there is some confusion, as the band veers through horror themes, typical 80s glam seduction (\"She's a Teazer\"), and even a few more poignant and serious (\"Justice for All\") themes, but such a blend is not uncommon for this period, and for 1984, Halloween's lyrics were actually decent. Demon spirits, hiding from the light Beggars and liars, roam the windy nights Witches and warlocks, die in bloody fights Trick or treat, it\u00b4s Halloween tonight! You're goddamn right it is, and Detroit's Heavy Metal Horror Show had a breakout record here which sadly never quite reaped the attention it could have. To it's credit, though, Don't Metal With Evil is one of those inspiring efforts that just hasn't seemed to age through the intervening decades, easily trumping everything the band have released since (though their output is sparse, they've continue to roll out new material every few years). Halloween were performing at an interesting nexus between the more radio prone glitz metal"} +{"id":"RedPajamaCommonCrawl.0019","text":"of Higher Education Montana State University-Great Falls College of Tech. Great Falls, MT 59405-4909 Montana State University-Northern Havre, MT 59501-7751 These Minutes were approved unanimously by the Board of Regents at the July 7-9, 2004 meeting in Pablo, MT Academic \/ Student Affairs Items System Issues Special Report from Athletic Committee Administrative\/Budget Items The Full Board convened at 7:30 a.m. Roll Call indicated a quorum present. Regents Present: Mike Foster, Lynn Morrison-Hamilton, Christian Hur Vice-Chair, John Mercer Chair, Richard Roehm, Mark Semmens, Lila Taylor. Also present was Commissioner Sheila M. Stearns Regents Absent: Governor Judy Martz ex officio, excused, and Superintendent of Public Instruction Linda McCulloch ex officio, excused Regent Hamilton MOVED for APPROVAL of the Minutes of the March 25-26, 2004 Regular Meeting in Dillon, MT and the Minutes of the April 14, 2004 Conference Call Meeting The Minutes were APPROVED unanimously on a 7-0 vote. ACADEMIC\/STUDENT AFFAIRS ITEMS Joint Nursing Approval Process \u2013 ITEM 123-102-R0504 - Establish a Review and Approval Process for Some Nursing Program Proposals, in Order to Coordinate That Review with the State Board of Nursing Attachment Deputy Commissioner Roger Barber gave a brief overview of the history of this item. Regent Hamilton MOVED for APPROVAL of item a. Item a. was APPROVED unanimously on a 7-0 vote. Update from Nursing Coordinating Group \u2013 Regent Roehm and Regent Hamilton 1. Helena Clinical Capacity Study Regent Roehm expressed disappointment with the lack of recommendations from the outside consultant. Regent Hamilton indicated the study was paid for the by the State Board of Nursing, and they were charting new territory. It was necessary to find someone from the outside who was qualified to participate. The Nursing Coordinating Group will discuss the possibilities of the study at the June meeting. Regent Foster noted that the study on the clinical capacity focused on Helena, which is only one portion of the state. He stated the other areas of the state will be different, and although the capacity may be tight in Helena, there is a lot of potential in Billings. Regent Hamilton explained the study was intended to be only in Helena, but they were hoping for recommendations for the whole state. Deputy Commissioner Barber attended two conference call meetings of the State Board of Nursing with the consultant. He reported that Dr. Vance used the same phrases repeatedly, such as \"inexact science, think out of the box, be flexible, be innovative, and take a risk.\" She did suggest rural settings, especially for those who would find themselves in rural areas. Dr. Vance is from NY City, and their programs are growing so quickly they also are looking for other appropriate clinical settings. She indicated there is no literature available on what makes an appropriate clinical setting. Dean Jean Ballantyne said there were some serious limitations to the study, but there also were some suggestions. However, no clarity was given for either Helena or the State of Montana. Some possible sites were listed, but no standards on the difficulty of the exposure, and what constitutes quality clinical education. Dean Ballantyne added that there is an acute shortage of faculty, and that needs to be addressed quickly. Regent Semmens noted the reference in the report to no articulation program between the Helena College of Technology and Carroll College, but the recommendation was to support the HCoT proposal for the LPN and the ASN. Regent Roehm indicated the problem was to ensure a quality clinical experience. He suggested the Veterans Hospital might work. Deputy Commissioner Barber noted that the State Board of Nursing had moved the Helena College of Technology proposal forward under the old process, before the new one was approved that morning. When it comes before the Board for approval they will have to consider the use of non-traditional clinical settings. Regent Semmens inquired about the articulation agreements between the Helena College of Technology and Carroll College, as well as others in general. Roger Barber responded there are agreements in place for some campuses in the system already. However, it appears it may be difficult to work out an agreement with Carroll College. The State Board of Nursing asked Carroll if they would be willing to work out an agreement, and Carroll indicated they would be willing to talk, but did not say they would come to an agreement. Regent Roehm indicated there is a benefit with the Nursing Coordinating Group in that Carroll College has a seat at the table, and there is discussion of the issues. Regent Mercer inquired as to the plain answer to the nursing shortage. He asked if the system was educating enough students, or if they leave the state because of low wages, and if there was a plan to get the answers. Regent Roehm indicated the system is educating enough, but there is the question of the kind needed and how many of each. There is also an aging workforce, along with the need for adequate faculty. The Montana Hospital Association is conducting a survey of the entire state covering the needs for number and type of nurses. Chair Mercer asked if this would get the answer to whether or not MUS was educating enough nurses. Regent Roehm said he suspected there is a greater need than there is capacity in the MUS. Roger Barber noted there are several barriers to filling the needs, such as some will not pass the licensure, and some will leave for better pay. Because of many factors, the answers will be complicated. President Gamble indicated the last survey showed that 68% stayed in state. Regent Foster indicated that St. Vincent's Healthcare stepped up with a scholarship program to keep the graduates at their facility. He said this is where the public and private entities need to join efforts. 2. Montana Hospital Association Survey Roger Barber reported the survey has been completed, the data has been put together, and the Montana Hospital Association will release an informal report next week. The Department of Labor has been involved in the survey because they must make projections on nursing needs in Montana. The survey was designed to capture the need for all kinds of health care workers. Most hospitals did not break the RNs into two and four year credentials. They are not sure if this means they don't need one or the other, but just RNs. The survey was sent to 120 clinical settings, with a response rate of just under 50%, and 75% from the hospitals. The Hospital Association intends to do a follow-up survey every year to obtain trend information. During the survey, there were 160 RN vacancies in Montana. The hospitals are paying a lot of money to cover those vacancies with overtime, part time, and traveling nurses. The Deputy Commissioner said one issue is the aging workforce in the healthcare arena, with the average age of RNs in Montana being 45. 3. LPN Consultant Regent Roehm indicated the Nursing Coordinating Group had agreed at its February 26 meeting to hire a facilitator for this issue. Roger Barber said they will fine-tune the charge, and suggested the time line is August but is open to change. The State Board of Nursing is trying to find a consultant, but is having difficulty doing so. Shelby Nursing Program \u2013 Regent Roehm Informational Item Regent Roehm explained that the program offered in Shelby was an idea generated by President Gamble to use a SWAT team approach, which would put a group in an area temporarily, to train a cohort, or relieve a problem. A letter was handed out by Rolf Groseth on the background of this item. He briefly explained the history, the decision to form a cohort in Shelby, and also indicated the community was very interested in working on this project. They believed they had residents committed to the community, who either could not or would not leave Shelby, but would be interested in pursuing a nursing education program. Mr. Groseth indicated they formed a pilot project, which required a lot of work over a number of months with health care providers. He said it was not their intention that this program would be permanent, but they would evaluate it to see what had been done right or wrong so they would be in a position to say if they would continue the program in Shelby, or put it another community with the same needs. Senator Black reported that Shelby had operated a very successful program. He and they feel the program should be retained for continuity and integrity. He stated it would damage the credibility of those in the program if it were cancelled. Mark Cross, CEO of the Medical Center in Shelby stated that the program was never presented to them as a SWAT program, but as a long-term program. They were surprised at the great response of those interested in the program. Quality was the main component, and they believed it could be maintained in Shelby. Across Montana, health care facilities are bringing in Philippine nurses, whose training is lacking. The cost is approximately $10,000 to bring these nurses into the community, as well as providing room and board, training, and help to bridge the culture gaps. Mr. Cross said there were at least six of these nurses in Glendive, one in Shelby, and two or three in Conrad. The need for training is long term, and the homegrown idea is to maintain people in their own communities because they will most likely stay there because they are tied by marriage, family or other long-term ties. If their residents go to Bozeman, Carroll College or Havre, they will probably stay in those larger cities because that is where the dollars are. Mr. Cross said that quality does not mean a four-year degree in a large community, but is based on the people driving the program. They are short of X-ray technicians, but in the past they used to send them to Weber State. Allan Underdal, Toole County Commissioner indicated he also did not remember this was an effort that was going to have an end and then be studied. It was going to be continued if successful. He stated that stopping a program is a disincentive to restart it. He urged the Board of Regents to look at the concept, and not stop the program for a review. In rural settings, there is a nursing shortage, and even Shelby prison has trouble finding RNs. Shelby uses satellite and interactive TV and urged the Board to continue to use these, and to expand their use. These graduates will be able to go from a $7 or $8 an hour job to a $20 an hour job, which is an incentive. Dean Ballantyne indicated she did not disagree with either of these gentlemen about the need for nurses, and that the program is helping to meet the need. She added on the quality issue, that nurses in any town need to be well prepared, and that is the system's responsibility. This program cannot be separated from MSU-Bozeman's or MSU-Northern's accreditation process. She indicated it also was necessary to consider the resources needed, and the cost of the program, as well as the faculty shortage that impacts the program. Although it should be done, there is the question of whether they can do it. Susan Raft gave a brief overview of the data on progress to degree and retention of the students in this cohort. Mr. Cross noted that although the students knew from the beginning that there would be only eight slots for the clinical training, they were willing to compete for two years for those slots. President Gamble explained his model was one he had seen work elsewhere, supplying the current need in an area to saturate the marketplace, and then move the program to another community where it is needed. It was always possible to return to the original community at a later time. He explained that nursing education is their most expensive program, and although they are committed to solve the nursing shortage problem, they need to see how it is working, and where it is working. There were different comments on the initial intent of the program. Whether this was to be a SWAT program, or a permanent program needs to be cleared up. Regent Roehm indicated this is a resource issue. He asked how much the system could spend before it becomes disproportionate to the balance of programs. This program is way over the norm for nursing costs. He said the bottom line is an economic issue, and a continuing presence in Shelby would be an economic boon for that city, but the MUS cannot be all things to all people. Regent Taylor stated that if Shelby put resources into the program thinking it was long term, then the system needs to be up front when going in. Mr. Cross indicated resources were utilized. They committed the facilities and equipment, and $10,000 to MSU to support the program, and Chester and Conrad each provided $3000. He stated all of these communities are financially strapped, but were committed to bringing in the program. He said he is an auditor and CPA, and he wanted to see the details behind the budget that had been presented. They are still committed to keeping the program. Regent Semmens asked if the Shelby hospital had a need for more than ten nurses at the present time. Mr. Cross indicated it would probably be enough for them, but would do nothing for Conrad, Chester and the surrounding area. Regent Semmens said he would agree to hit the area that needs the help and to saturate it, then move on. Mr. Cross offered that they could still do electronic training on the core courses and save some resources. He believes they should be kept in the loop on the financing, and thinks there are alternative resources. Regent Semmens asked Mr. Cross if he had the understanding this program would be permanent, to which he replied yes. Regent Semmens asked President Gamble what his plans were, assuming favorable pass rates, to either move to another rural area or stay in Shelby. President Gamble said that with limited resources, he has no intent to grow more sites. The idea was to satisfy the current need, and then to move to another area and fill their need. Regent Hamilton wished to clear up the issue of the intent of the program. She believed the program came to the Board for approval as a cooperative program between three campuses, but it was a pilot project. That means it may not be continued. She said they also touched on distance education as another initiative from the Shared Leadership group and the Nursing Coordinating group to establish a common core, and investigate how it can be delivered. They all agreed it was necessary to train those who are place bound, and acknowledge there is an increased cost in delivery away from campus. The Board needs to decide what commitment it will make. Chair Mercer asked what the express understanding of the program was, and he wants to see it in writing. He asked President Gamble to bring rationale to the Board for their participation, before discontinuing the program. He believes that if this experimental program meets the necessary quality, the MUS has a classic lab experience on how to improve the Montana economy. He recommended looking at the proposal for the next session to try this in several areas. MUS cannot fix this program alone. The taxpayers will have to pay for it. The Board took a ten-minute break and reconvened at 9:30 a.m. DISCUSSION WITH CAMPUS CEOs (President Gamble, President Dennison, Chancellor Capdeville, Dean Hoyle) Over the course of several meetings, all of the CEOs, on a rotating basis, will have an opportunity to talk with the Board about important higher education issues, trends and directions, and concerns related to their campuses. The Commissioner will determine the rotation. Please see attached reports President Gamble said he would provide a document of their five-year plan. He indicated planning over the past year has been fruitful, and the campuses responded positively. He indicated the plan is generally fashioned after the Mission Statement because it doesn't appear to have specific strategic priorities. He said they needed to do strategic visioning, deciding how the campuses will look in five years. He encouraged the Board to do a complete strategic plan for the entire system since it would make the jobs of the campuses much easier with those guidelines. He thanked the Board for providing creative approaches for the campuses, and believe the flexibility is good for them. He referenced creative acquisition, summer salary policy, refinancing for lower rates, and indicated he wanted to press a little further. He requested discussion of the degree that individual campuses could deviate from system processes. President Dennison said he wanted to focus on the national issue in education. The new bill HR 8243 (the Higher Education Act) was introduced early this month, and hearings will continue through the summer. The House will have its final version by the end of summer, and the Senate will have its own version. Although education does not want federal control of education, this bill has some elements of it in it. It is important to adopt a position, and then communicate that to the delegation. President Dennison said the bill has some good changes to loans, but it doesn't do much about the entire loan limit problem. It does have an option for students to consolidate their loans, but it forces them to take variable rather than fixed rates. He indicated there are several other items of concern, one being quality indicators and student learning outcomes. He asked the Board if they wanted to continue the way they are going, or if they want to have something imposed on them by the Federal bureaucracy. He said distance education is a big part of this, and it will open federal loans and grants for distance education, but asked what is the cost, and how would campuses deal with provisions that the accrediting agencies already do. President Dennison indicated this bill goes a bit too far. It even deals with a transfer of credits. There is already a survey being conducted on all the Montana campuses, which must publish the criteria of why they would or would not accept certain credits. There is a whole range of issues that must be reported in new formats and different ways, and it will require more people to accomplish the reporting. This mandate is unfunded. Chancellor Capdeville reported they had just held commencement, and that Commissioner Stearns was their speaker. She was in Havre for a couple days before that, talking at Rotary, touring tribal campuses, and doing other outreach. They celebrated the first four-year graduating class 50-year reunion. He indicated that Northern is unique, offering teacher education, technical education, and workforce development. He said the Board would have the opportunity to look at the IT infrastructure which the campus accomplished with the fees approved by the Board. They sometimes have trouble recruiting and retaining faculty, partly due to geography, but also due to low salaries. They are also faced with some enrollment decline in teacher education. He believes they have hit the line on teacher education, since there is not much salary differential to justify getting the Masters. Chancellor Capdeville reported they were able to raise over $2,000,000 for the new Applied Technology Center. Groundbreaking for the new facility took place the following day. They struggle to maintain state of the art equipment, and if it were not for the relationships they have developed over the years, they would not have the equipment. Nonetheless, when students leave MSU-Northern, they do very well. Companies from out of state love to recruit their students, but most of them want to return to Montana. He indicated that collaboration with the main campus, and sharing of resources has helped Northern immensely. Dean Hoyle passed out a folder of items, and pointed out the sheet with the bulleted items which lists their successes and progress over the past year. It then shows the constraints they face, potential opportunities, and finally their needs. Dean Hoyle noted the growth of the college, and that the placement rate was 96%, with virtually all of those in Montana. He said almost all their nurses stay in Helena and\/or Montana. Employers are beginning to act differently toward two-year education, and there is a campaign to improve the image, as a professional service of higher education skills. UM-Missoula provided the Helena College of Technology with a grant this year, which was used to hire a marketing person. They also contracted out some services rather than filling vacancies to cut back on expenditures. An expanded access center including advising and testing has been completed on campus, and they now serve twice as many students in half the time. The Helena campus received one of ten $10,000 grants for women in non-traditional jobs, and with the help of Senator Burns a $200,000 grant for their training site. Dean Hoyle said they are working with the City of Helena to expand their revenue streams. He would like to have more flexibility in management, and to function more as a business than a state institution. Regent Roehm urged the Commissioner and Board to address the five-year planning process for the MUS. He believes planning should be ongoing, with regular reassessment. Some areas of concern to him are distance education which should be led through the Commissioners office, the undercurrent on the structure of two-year education, compensation issues, and the mandated functions of budget and planning as the Board of Education. Regent Hamilton agreed, and asked for copies of the reports presented by President Gamble and President Dennison. She indicated the HEA item has been on the Agenda a couple times, and they still need to meet as a Board on that issue, and then communicate to the delegation. Regent Hamilton also believes the issue of flexibility will be very important, and it is be touched on by the Shared Leadership Group and the Budget Committee. Regent Taylor agreed that a planning process is needed at this time, as the targets are moving. Regent Semmens said the Budget Committee had opted to defer on the salary issue until they have more information. He asked Dean Hoyle to provide the source of data he referred to, which was in conflict with the data he knows himself. Regent Foster reinforced the need for flexibility, indicating they need to prepare, and then prepare to change. The focus on workforce development will be beneficial to all of Montana, and it puts the Board in the position of making sure they are addressing the differences between the two- and four-year campuses, and how to make it work smoothly. Regent Mercer noted that with the changes in the Board, and the problems in getting together, it would probably be a good idea to meet this fall to work on strategic planning, with input from the campuses. He would like to address the latitude of campuses to differ within the system, as well as within their own side of the system. He suggested the CEOs let the Commissioner know if they like this suggestion. END DISCUSSION WITH CEOs ACADEMIC\/STUDENT AFFAIRS ITEMS continued Military Studies - ITEM 122-2014-R0104 - Authorization to Establish a Minor in Military Studies; Montana State University-Bozeman (Revised) Summary Proposal Regent Hur MOVED for APPROVAL of item d. Regent Roehm asked if this item was authorized under Policy 303.1 which states that a minor must be taken along with the major. He said there appears nothing new is being offered, but only the courses they already have. He believes the proposal would be the same as giving a minor in university studies for taking core courses. Regent Roehm indicated the excellent opportunity this is to use history courses, which would be in the area of the major. He would not support the item. Chair Mercer asked if this item complied with the Regents Policy. Sr. Vice Provost Joe Fedock indicated it was their belief this does satisfy the requirements of the policy. He indicated one would take the courses along with the major, and this is fairly typical in the other 33 non-teaching minors. It represents a range of courses that complement the major. Deputy Commissioner Barber indicated a true minor is for the student's own interest. Some have breadth, and others are concentrated or specialized, and tend to reflect the culture of the campus. They could differ between MSU and UM. He believes the proposal meets the letter of the policy, and it has been through the internal review process, and approved by the appropriate administrators. Regent Semmens inquired if the proposal was for 18 credits, and if more than ROTC students were required to take these now, and if they could be used for other than a minor. Joe Fedock replied the requirements are for 24-29 credits, and they would be taken in addition to the major. The proposal is not limited to Cadets, but is open to all students. Regent Hamilton asked if there is articulation of this program with other campuses and if they had considered delivering the program to other communities, or the armed services. Joe Fedock replied the answer was no, but the comments were well taken. Chairman Mercer indicated it would not be fair to vote the proposal down based on the policy. However, the policies should be reviewed and updated with clearer language. Regent Roehm suggested a process for Roger Barber to obtain feedback from the CAOs as to whether or not the policy definitions describe what the Board wants, and if the proper rigor is required. Roger Barber and Commissioner Sheila Stearns agreed to handle this assignment. Item d. was APPROVED on a 6-1 vote with Regent Roehm dissenting. Admissions Policies \u2013 ITEM 123-103-R0504 \u2013 Amend Admissions Policies; MUS Regent Semmens MOVED for APPROVAL of item e. Deputy Commissioner Barber gave a brief history of his efforts with this item, wherein he tried to bring all the policies for resident students into one policy and all the policies for non-resident students into another policy. He explained that currently the policies indicate they do not apply to the two-year campuses, but they do want to be covered under them. He looked for those policies that related to all campuses, those for the four-year campuses, and those for the two-year campuses. He noted that UM directs some of its students to the College of Technology when they are admitted. Regent Roehm indicated he has often been confused on the accounting between UM-Missoula and their College of Technology. He said the total campus population including the College of Technology are listed as attending UM, but none of the others report that way. He asked that this information be broken out. President Dennison responded that students are reported attending the campus they are on, either UM or the College of Technology, and the same is true at Montana Tech and its College of Technology. Regent Hamilton referred to attrition rates and how they are tracked, and indicated she would like the Board to discuss methods of dealing with retention, progression and other issues related to these. She noted the large campuses have done a good job of tracking, but there is a need for better data on where the graduates go, and other indications of success. Regent Hamilton said that Native American students do a better job at the system campuses when they first graduate from the tribal colleges. She stated the Board needs to look at policy development as they make progress in P-20 to raise the bar. Regent Semmens suggested it may be necessary to impose more rigorous requirements, with the possibility the students may need to attend the CoTs first. Chairman Mercer asked if these proposed policy changes had been distributed to every high school counselor. Roger Barber replied he had not yet done so. Chairman Mercer then asked the Board to wait on this item until the high schools have had a chance to see the proposed changes. Commissioner Stearns advised she will be calling a meeting of the leaders in the system for mid-June. She suggested that these very issues be evaluated at that time, and suspected they could use more staff advice before returning with a refined proposal. Regent Semmens asked if there was any reason this item could not wait until the July meeting. The Deputy Commissioner indicated that would be best since the Board has not yet passed the new writing standards. He also reminded the Board that there is nothing new in the item before them, because all he did was attempt to consolidate several policies into two. Chair Mercer indicated that no matter what is done, everyone needs to see the changes in advance. He also feels it could be revised for simplicity, and a fresh look at it might make the difference. Regent Roehm MOVED to TABLE Item e. until the above considerations have been handled. Motion to TABLE was APPROVED on a 6-1 vote with Regent Hamilton dissenting. Letter to Congressional Delegation \u2013 Action Item \u2013 Student Regent Hur Regent Hur MOVED to APPROVE Item f. Regent Hur explained this letter is an opportunity for students to urge the Congressional Delegation to reconsider certain proposals in the Reauthorization Act. Regent Roehm asked that the letter be rewritten since it lacks supporting data. Regent Semmens agreed that a letter needs to go to the Delegation, but suggested the letter be substantive, and include several issues that are problems with specific recommendations and statistics. Chair Mercer stated the Board needs to write a letter. The students did it when no one else did. He recommended the students be involved in the drafting process, and follow the recommendations given here. Regent Hamilton agreed the letter needs supporting documentation, but reminded the Board that each of them can write a letter to the delegation in addition to the position taken by the Board. Commissioner Stearns agreed to work with the CEOs to create a letter with related data and good focus. A draft will be sent to the Board in the next few days. Regent Hur agreed to take the letter to the Commissioner and senior staff to work with the Board and students to get it modified and sent out. It was UNANIMOUSLY AGREED that the student letter should be revised, plus a letter is to be written on behalf of the Board to the Congressional Delegation covering the same issue. Military Sciences Minor Process at University of Montana-Missoula \u2013 Regent Mercer Attachment 1 Attachment 2 Attachment 3 Attachment 4 Attachment 5 Attachment 6 Chair Mercer referred to Attachment 3-Rationale of the documents provided by the campus, which states that many members of the committee were worried about Pentagon policy, and other things related to war. This is not the information that was provided to the Board in the beginning, and he stated that judging programs based on political beliefs is wrong. President Dennison agreed completely, and reminded faculty that when people raise these issues, the rest need to say they are not relevant and move ahead. Some faculty argued for the freedom of expression because it stimulates thoughts, and ideas. They expressed concern over limitations on political comments they believe they should be able to make. Chair Mercer exhorted them not to cover their political beliefs when judging programs. END ACADEMIC\/STUDENT AFFAIRS ITEMS ITEM 123-100-R0504 \u2013 Staff; Office Commissioner of Higher Education ITEM 123-1000-R0504 \u2013 Staff; The University of Montana-Missoula ITEM 123-1002-R0504 \u2013 Authorization to Confer the Title of Professor Emeritus of Sociology upon William M. McBroom; The University of Montana-Missoula ITEM 123-1003-R0504 \u2013 Authorization to Confer the title of Professor Emeritus of Political Science upon Forest Grieves; The University of Montana-Missoula ITEM 123-1004-R0504 \u2013 Authorization to Confer the Title of Professor Emeritus of English upon Bruce Bigley; The University of Montana-Missoula ITEM 123-1005-R0504 \u2013 Authorization to Confer the Title of Professor Emeritus of Biological Science and Zoology upon Delbert L. Kilgore, The University of Montana-Missoula ITEM 123-1006-R0504 \u2013 Authorization to Confer the title of Professor Emeritus of Geology upon Donald W. Hyndman; The University of Montana-Missoula ITEM 123-1007-R0504 \u2013 Authorization to Confer the Title of Professor Emeritus of Geology upon Don Winston; The University of Montana-Missoula ITEM 123-1500-R0504 \u2013 Staff; Montana Tech of The University of Montana ITEM 123-1500A-R0504 \u2013 Staff; Montana Bureau of Mines and Geology ITEM 123-1600-R0504 \u2013 Staff; The University of Montana-Western ITEM 123-1601-R0504 \u2013 Authorization to confer the Title of Professor Emeritus of Mathematics upon E. Otis Thompson; The University of Montana-Western ITEM 123-1602-R0504 \u2013 Authorization to Confer the Title of Assistant Professor Emeritus of Business upon Glenda Elser; The University of Montana-Western ITEM 123-1900-R0504 \u2013 Staff; The University of Montana \u2013 Helena College of Technology ITEM 123-2000-R0504 \u2013 Staff; Montana State University-Bozeman ITEM 123-2001-R0504 \u2013 Authorization to Confer the Title of Professor Emeritus of Microbiology upon John William Costerton; Montana State University-Bozeman ITEM 123-2300-R0504 \u2013 Staff; Agricultural Experiment Station ITEM 123-2400-R0504 \u2013 Staff; Cooperative Extension Service ITEM 123-2700-R0504 \u2013 Staff; Montana State University-Billings ITEM 123-2800-R0504 \u2013 Staff; Montana State University-Northern ITEM 123-2850-R0504 \u2013 Staff; Montana State University \u2013 Great Falls College of Technology Regent Roehm MOVED for APPROVAL of all staff items. Motion was APPROVED unanimously on a 7-0 vote. Labor Agreements\/Other Local Executive Boards - ITEM 123-106-R0504 \u2013 Confirmation of Governor Martz' appointments to Local Executive Boards; Montana University System Rural Physicians Incentives - ITEM 123-105-R0504 \u2013 Montana Rural Physicians Incentive Program; Montana University System Regent Roehm asked if the placement of a physician in Polson met the requirements of the Rural Physicians Incentive Program. Commissioner Stearns indicated the committee had reviewed that issue thoroughly, and it was within the requirements of the program. Regent Roehm MOVED for APPROVAL of items a. and b. Academic Items LEVEL II MEMO (Presented to the CAOs at this meeting) 1. University College - ITEM 123-2005-R0504 - Authorization to Reorganize Five University-wide Programs into an Administrative Structure entitled University College; Montana State University-Bozeman 2. Childhood Trauma - ITEM 123-1010-R0504 \u2013 The Montana Center for the Investigation and Treatment of Childhood Trauma at the Division of Educational Research and Service; The University of Montana-Missoula 3. Radiologic Technology (AAS) \u2013 ITEM 123-1001-R0504 - Radiologic Technology; The University of Montana-Missoula College of Technology and Montana Tech of The University of Montana College of Technology 4. Preservation Technology - ITEM 123-1502-R0504 \u2013 Historic Preservation Technology; Montana Tech of The University of Montana 5. Networking Technology - ITEM 123-1501-R0504 \u2013 Networking Technology; Montana Tech of The University of Montana Level I Memo MSU\u2014Great Falls' Academic Programming in Bozeman \u2013 Information Only \u2013 Dean Moe Regent Roehm MOVED for ACCEPTANCE of items a., b., and c. Motion was APPROVED unanimously on a 7-0 vote with Item a. to move to the full Board for Action at the July 7-9, 2004 meeting. Expend Student Computer Fees - ITEM 123-1503-R0504 \u2013 Authorization to Expend Student Computer Fees; Montana Tech of The University of Montana Expend Computer Fee - ITEM 123-2801-R0504 \u2013 Authorization to Expend Student Computer Fee Allocation; Montana State University-Northern Allocate Computer Fee - ITEM 123-1008-R0504 \u2013 Student Computer Fee Equipment Allocation; The University of Montana-Missoula Expend Computer & Equipment Fees - ITEM 123-1901-R0504 \u2013 Authorization to Expend Student Computer & Equipment Fees; The University of Montana-Helena College of Technology Status of Regent Approved Projects - ITEM 123-2006-R0504 \u2013 Annual Status Report on Regents Approved Projects; Montana State University - Bozeman Attachment Status of Regent Approved Projects - ITEM 123-1012-R0504 - Annual Status Report on Regents Approved Projects; The University of Montana - Missoula Attachment Regent Roehm MOVED for APPROVAL of items a. through f. END CONSENT AGENDA At 12:00 noon the Board recessed for lunch with student leaders, followed by a meeting with Faculty Senate Representatives The Board reconvened at 1:30 p.m. SPECIAL REPORT - Report from the Special Panel on the UM Athletics Deficit \u2013 Judge Dianne Barz Cover Letter from Judge Barz Executive Summary Report Reduction Plan Judge Barz requested Laurie Neils explain the layout of the Athletic Report which had been distributed to the Board. She indicated further they had 100 copies printed at a cost of $15 each, and portions of the report would be posted on the web site. Judge Barz introduced the members of the panel who were present, those being Pam Joehler, Mark Bruno, Jim Salisbury, Laurie Neils, and Trudy Collins. She thanked the members who had spent countless hours to conclude the review in a period of six weeks. She explained they had not conducted a full audit, nor did they review all the ProCard transactions. Among the findings and recommendations of the panel she reported: Auditing and Accounting: \u00b7 The UM President should re-assess the risk inherent in the financial operations of the athletic department. Therefore, he should communicate clearly his expectations of enhanced involvement and scrutiny over the financial activity of UM Athletics. \u00b7 The level of risk in athletics necessitates a closer review of special purpose audit reports and action plans. \u00b7 The Board of Regents should review the relationship of the GSA and UM. \u00b7 The President should provide written guidelines as to what is acceptable for campus personnel to seek reimbursement or pay for out of UM Foundation accounts. \u00b7 The UM Administration should monitor and control both the revenue and expenditure portions of the athletic operating budget throughout the fiscal year. The President should provide a realistic funding package for athletics that includes adequate institutional support. \u00b7 The Regents should review the revenues and expenses related to concessions, royalties, and collegiate licensing at UM to determine if adequate profits are being realized and subsequently allocated to the athletics budgets. \u00b7 The UM should establish and monitor a receivable from GSA for the amount of pledged scholarships donations for the fiscal year. GSA should establish a corresponding payable. These two entities should communicate with each other to make certain they are in agreement on the amount outstanding. \u00b7 The Panel recommends that the Board of Regents ask the Legislative Auditor to review the structure, functions, and staffing of the internal audit departments. The Board of Regents may want to consider establishing an audit oversight committee. \u00b7 The special purpose audit (NCAA) of athletics should be completed by December of each year and submitted to the Office of the Commissioner of Higher Education. \u00b7 The new athletics fiscal officer should develop a standard reporting format for athletics and develop automated systems that monitors revenue and expenses from all sources, including GSA and Foundation funds. \u00b7 All game guarantees should be contractually documented and recorded on the University's accounting records. \u00b7 The Board of Regents and UM should analyze the costs incurred versus the value received for trade-outs, comp tickets, and courtesy cars. Although the amounts seemed excessive to Panel members, we are not experts and do not have a reasonable basis for comparison. \u00b7 The new athletics fiscal officer should report to the athletic director as soon as is practicable. The Office of Administration and Finance should provide increased level of monitoring and oversight of athletics finances. \u00b7 Once the Board of Regents has approved a deficit reduction plan for UM, the University should review actual variances from the plan at least semi-annually. \u00b7 The UM should ensure that Athletic Department employees comply with policies and procedures regarding ProCard use and ensure that only appropriate travel and university related expenses are charged to the ProCard. \u00b7 The University should re-evaluate the number of ProCards issued in the Athletic Department. \u00b7 We recommend that the Regents require a thorough audit of UM Athletic Department ProCard charges for FY02 through FY04. \u00b7 The athletics fiscal officer should develop an operating budget plan in sufficient detail to evaluate the reasonableness of its assumptions. Input from coaches and other athletics department staff should be solicited and used in developing the budget. The budget should include all funding sources. \u00b7 The athletics fiscal officer should provide timely and meaningful budget status reports to athletic department management and head coaches on a regular basis. The budget status report should incorporate all funding sources. \u00b7 The athletics fiscal officer should not be responsible for advance travel for games. \u00b7 The athletic director should ensure that the operating budget is prepared in sufficient detail, with input from coaches and staff, and that includes all funding sources. The athletic director needs to be attentive to budget variances, provide appropriate oversight over the athletics fiscal officer, and communicate frequently with the President and the Office of Administration and Finance. \u00b7 Even though budget responsibilities are decentralized, given the history of athletics deficits, the Office of Planning, Budgeting, and Analysis (OPBA) should provide more thorough analysis of athletics budgets. The President and VP must develop comprehensive analysis tools that allows for better monitoring of the athletics fiscal operations for Administration and Finance. \u00b7 The President should have required the athletic director to be more accountable for presenting an operating plan in sufficient detail for OPBA to analyze and should have investigated when the athletic director and fiscal manager did not respond to OPBA's requests for information regarding the athletics budget. The President should have required the athletic director not only to raise revenues, but also to control costs. \u00b7 The Board of Regents should engage in public discussion and feedback on the athletic reports in November each year. The policy on negative fund balance should be re-evaluated to determine if the current policy provides disincentive to acknowledge deficits and problem areas. \u00b7 The University should evaluate the number of courtesy cars that are provided to the athletic department. \u00b7 Head coaches should be more involved in the budget development process and should receive monthly-standardized budget assessment reports. Chair Mercer thanked the panel for their dedication to this incredible task, and is amazed at the number of suggested items the panel put forth. He expressed how important it was that such a good cross section of Montana joined with the Montana University System to solve this problem. Chair Mercer assured the panel that the Board would use the report to be sure their actions reflect the advice of the panel. Regent Roehm asked the panel if there had been any influence from anyone that would hinder or affect the work of the panel. Judge Barz responded no, they had excellent cooperation from President Dennison, Robert Duringer, and the athletic department. Regent Roehm then asked if there was a climate established in the athletic department that being a championship team was more important than the budget, and if it influenced management reporting. Jim Salisbury indicated there was probably a culture to be national champions, and they needed to be on that track, and this probably was a case of the culture driving the train, not the fiscal issues. Regent Semmens commented on noncompliance with the policies on ProCards, and asked if there were any other areas where this was the case. Pam Joehler explained that on the budget side, the Office of Planning Budget and Analysis initiated a new budgeting process a couple years ago which incorporated processes that all were supposed to follow, but in the course of developing the budget and monitoring the assessment process, the athletic department failed to respond. It was very difficult to get information from athletics. The panel had a subcommittee look at a portion of the ProCard purchases, and although they have a well-developed policy and procedures manual, the procedures were not built in. They did not get into more than just the ProCards. Laurie Neils indicated they had been provided with a copy of the policy and procedures manual which covered many issues, and had a well developed list of actions. In many cases they weren't following them. Trudy Collins said they looked specifically at the personal use of cell phones, and the courtesy cars. In response to a question from Regent Semmens, Judge Barz referred to Finding 11, and said that Chuck Maes who did a line-by-line review, and tried to provide accounting for the past three years, could not do so. Jim Salisbury also noted that the fiscal officer left in September, and the athletic director in February, so that key people were missing when they were asking questions. Several members of the panel met with one person and they were disappointed there was no knowledge of the sudden increase in expenditures. Regent Hamilton referred to the same auditor finding problems in FY04 that should have been reported in FY02, and asked if there was a problem with the structure of the audits. Judge Barz replied they only wanted to point out that even the professional auditors from outside did not find the errors. Jim Salisbury said that one issue underscores the accounting in athletics, where money goes back and forth between GSA, athletics and the Foundation. Regent Hamilton then referred to the recommendation for a legislative audit, and asked if the system was not already audited by the state, and if so, why hadn't they caught it. Laurie Neils replied that the fiscal auditor attests to the fairness of the audits. There was reliance on NCAA auditors which is an external group. However, they look more at NCAA requirements than the big picture. She suggested the legislative auditor may want to look at which kind of audits to perform at UM, MSU and their peers. Regent Hamilton asked if the negative fund balance policy could have been a disincentive to report accurately. Trudy Collins replied there is a disincentive to report negative fund balances, and there is a real scramble at fiscal year end to make ends meet, without looking at what caused the deficits. Realizing the negative fund accounts need to be reported, she recommended the policy be reconstructed with better ideas. Ms. Neils also suggested adding to the report a section showing the funds transferred to make a negative fund whole. Regent Foster asked if the risk in athletics had to do with the financial aspect of donated funds. Judge Barz replied that was true, that the private sector is expected to provide 2\/3 or more of the funds they need, and it is very unpredictable. Mens' basketball is an example of not living up to expectations, with lack of attendance. Regent Roehm expressed concern that under GASB 39 transfers from affiliated foundations be accounted properly. Laurie Neils explained when funds are transferred to UM for athletics, they are deposited into the UM account and shown as restricted funding. The part that is difficult are the funds spent at the foundation for the benefit of athletics or others. The foundation report was requested for the evaluation, and it was difficult to get the information. Laurie Neils indicated she understands someone at the university is approving those expenditures. Regent Hur asked how the athletic deficit was able to recur after the CEOs had the charge to take care of the deficit. Laurie Neils replied that President Dennison took the charge seriously, and gave clear orders to have it cleared. Both Rob Edwards and Wayne Hogan knew it was the expectation to clear by FY03. Some funds had to be transferred to help fix it. There was reliance on other funds to cover up a problem. MSU let their deficit stand alone with no transfers. Regent Semmens asked if quarterly reviews of expenditures and revenues were not in place. Pam Joehler explained that once the budget office at UM implemented the new procedure they sat down quarterly to review the budget, but the problem was the difficulty in getting explanations from athletics to explain the problems. There were no consequences for not providing an explanation. Trudy Collins said the quarterly process looks only at the designated funds, but to get the true picture there is a need to combine all the funds together. Commissioner Stearns asked if the revenues were being checked off as they came in after July 1, 2003. Ms. Neils replied some came in after June 30, but were for FY02. Some were advertising revenues, but most came before June 30. The Commissioner commented that she thought Ms. Neils had told her at the end of the fiscal year that those in charge were celebratory for having solved the problem. Laurie Neils stated everyone on the panel thought the people involved had it balanced out at the end of the year. No one intentionally cooked the books. Rob Edwards told the panel that when the books closed positive, he knew of no errors, and if there were any they were done unknowingly, but he didn't think he had made any errors. Judge Barz said the panel was looking at credibility and all were totally surprised at the deficit, and the panel found it incredible they could be so stupid. Commissioner Stearns asked if the errors in athletic accounting were not so much traditional errors, as not adjusting to the changes in procedures. Jim Salisbury said it"} +{"id":"RedPajamaCommonCrawl.0020","text":"BRAZIL: Brasilia, Don't Honk Unless You Must Locals Hate It, Parking - Car Watchers Turn Violent Towards Cars If Not Paid Cathedral of Bras\u00edlia Brasilia, the capital of Brazil and the seat of government of the Distrito Federal, is a planned city. Inaugurated in 1960 in the Central Highlands of Brazil, it is a masterpiece of modernist architecture listed as a World Heritage Site by UNESCO and attracts architecture aficionados worldwide. Brasilia is also an important transportation hub for travel within Brazil. The basic structure of Brasilia was completed in just four years, from 1956 to 1960, under the leadership of President Juscelino Kubitschek, with the slogan fifty years of progress in five, and the city is in a sense a memorial to him. The cathedral has six columns representing two hands reaching up to almighty heaven. The city is designed in the shape of a giant bird or airplane, with various separated zones assigned for specific functions such as housing, commerce, hospitals and banking. Running down the center of the airplane's fuselage is the thoroughfare called the Eixo Monumental or Monumental Axis and at one end lay the government buildings. The arched wings are residential zones, with several rows of medium-rise apartment blocks with small commercial districts. The intersection is the commercial and cultural hub, with stores, hotels, and the cathedral. A huge artificial lake serves the city as both a leisure area and to diminish the effects of low humidity in drier months. Fifty-three years after its creation (1960), Brasilia is still developing a culture of its own. The city has often been criticized as a failed utopia where rationalized modernist planning has buried the human element. Yet Brazilians are quite proud of their capital, embodying a vision of a future when Brazil is no longer considered merely a developing country. Getting a grasp of Brasilia's addresses may be a little perplexing at first, as they are usually shortened to acronyms. Here are some useful tips: The Monumental Axis divides the city into north and south sectors. Acronyms ended in N refer to sectors on the northern side, while those ended in S are on the south. SHS\/SHN - Hotel sectors (Setor Hoteleiro) SCS\/SCN - Commercial sectors (Setor Comercial) SQS\/SQN - Residential sectors (Superquadras) CLS\/CLN (or SCLS\/SCLN) - Local commerce sectors (Com\u00e9rcio Local) along the wings. SES\/SEN - Embassies sector (Setor de Embaixadas Brasilia is the federal capital of Brazil and seat of government of the Federal District. The city is located atop the Brazilian highlands in the country's center-western region. It was founded on April 21, 1960, to serve as the new national capital. Brasilia and its metro area were estimated to be Brazil's 3rd most populous city. Among major Latin American cities, Brasilia has the highest GDP per capita at R$61,915 (US$36,175). Bras\u00edlia was planned and developed by Lucio Costa and Oscar Niemeyer in 1956 to move the capital from Rio de Janeiro to a more central location. The landscape architect was Roberto Burle Marx. The city's design divides it into numbered blocks as well as sectors for specified activities, such as the Hotel Sector, the Banking Sector and the Embassy Sector. Brasilia was chosen as a UNESCO World Heritage Site due to its modernist architecture and uniquely artistic urban planning. The centers of all three branches of the federal government of Brazil are in Brasilia, including the Congress, President, and Supreme Court. The city also hosts 124 foreign embassies. Brasilia International Airport connects the capital to all major Brazilian cities and many international destinations, and is the third busiest airport in Brazil. It is the second most populous Portuguese-speaking capital city after Luanda. The city was one of the main host cities of the 2014 FIFA World Cup and hosted some of the football matches during the 2016 Summer Olympic Games. Brasilia also hosted the 2013 FIFA Confederations Cup. The city has a unique status in Brazil, as it is an administrative division rather than a legal municipality like other cities in Brazil. Although Brasilia is used as a synonym for the Federal District through synecdoche, the Federal District is composed of 31 administrative regions, only one of which is the area of the originally planned city, also called Plano Piloto. The rest of the Federal District is considered by IBGE to make up Brasilia's metro area. Paranoa Lake is a large artificial lake that was built to increase the amount of water available and the region's humidity. It has Brazil's second largest marina, and hosts wakeboarders and windsurfers. Diving can also be practiced and one of the main attractions is Vila Amaury, an old village submerged in the lake. This is where the first construction workers of Brasilia used to live. According to the 2010 IBGE Census, there were 2,469,489 people residing in Bras\u00edlia and its metropolitan area, of which 1,239,882 were Pardo (multiracial) (48.2%), 1,084,418, White (42.2%), 198,072, Black (7.7%), 41,522, Asian (1.6%), and 6,128 Amerindian (0.2%). In 2010, Brasilia was ranked the fourth most-populous city in Brazil after Sao Paulo, Rio de Janeiro, and Salvador. In 2010, the city had 474,871 opposite-sex couples and 1,241 same-sex couples. The population of Brasilia was 52.2% female and 47.8% male. In the 1960 census there were almost 140 thousand residents in the new Federal District. By 1970 this figure had grown to 537 thousand. By 2000 the population of the Federal District had surpassed 2 million. The city of Bras\u00edlia proper was planned for only about 500 thousand inhabitants, but its metropolitan area has grown past this figure. From the beginning, the growth of Brasilia was greater than original estimates. According to the original plans, Brasilia would be a city for government authorities and staff. However, during the construction period, Brazilians from all over the country migrated to Brasilia, seeking public and private jobs. At the close of the 20th century, Bras\u00edlia held the distinction of being the largest city in the world which had not existed at the beginning of the century. Brasilia has one of the highest population growth rates in Brazil, with annual growth of 2.82%, mostly due to internal migration. Bras\u00edlia's inhabitants include a foreign population of mostly embassy workers as well as large numbers of Brazilian internal migrants. Today, the city has important communities of immigrants and refugees. The city's Human Development Index was 0.936 in 2000 developed level, and the city's literacy rate was around 95.65%. The Cathedral of Brasilia in the capital of the Federative Republic of Brazil, is an expression of the atheist architect Oscar Niemeyer. This concrete-framed hyperboloid structure, seems with its glass roof reaching up, open, to the heavens. On 31 May 1970, the Cathedral's structure was finished, and only the 70 m (229.66 ft) diameter of the circular area were visible. Niemeyer's project of Cathedral of Brasilia is based in the hyperboloid of revolution which sections are asymmetric. The hyperboloid structure itself is a result of 16 identical assembled concrete columns. These columns, having hyperbolic section and weighing 90 t, represent two hands moving upwards to heaven. The Cathedral was dedicated on 31 May 1970. The seats of the three branches of the Brazilian state are located in Brasilia. Until the 1980s, the Federal Government appointed the governor of the Federal District, and the laws of Brasilia were issued by the Brazilian Federal Senate. With the Constitution of 1988, Bras\u00edlia gained the right to elect its Governor, and a District Assembly or Camara Legislativa was elected to exercise legislative power. The Federal District does not have a Judicial Power. The Judicial Power which serves the Federal District also serves federal territories. Brazil does not have any territories, therefore, for now the courts only serve cases from the Federal District. At the northwestern end of the Monumental Axis are federal district and municipal buildings, while at the southeastern end, near the middle shore of Lake Paranoa, stand the executive, judicial, and legislative buildings around the Square of Three Powers, the conceptual heart of the city. These and other major structures were designed by Brazilian architect Oscar Niemeyer in the style of modern Brazilian architecture. In the Square of Three Powers, he created as a focal point the dramatic Congressional Palace, which is composed of five parts: twin administrative towers flanked by a large, white concrete dome the meeting place of the Senate) and by an equally massive concrete bowl the Chamber of Deputies, which is joined to the dome by an underlying, flat-roofed building. The Congress also occupies various other surrounding buildings, some connected by tunnels. A series of low-lying annexes largely hidden flank both ends. The National Congress building is located in the middle of the Eixo Monumental, the city's main avenue. In front lies a large lawn and reflecting pool. The building faces the Pra\u00e7a dos Tres Poderes where the Palacio do Planalto and the Supreme Federal Court are located. Also in the square are the glass-faced Planalto Palace housing the presidential offices, and the Palace of the Supreme Court. Farther east, on a triangle of land jutting into the lake, is the Palace of the Dawn or Palacio da Alvorada; the presidential residence. Between the federal and civic buildings on the Monumental Axis is the city's cathedral, considered by many to be Niemeyer's finest achievement. The parabolically shaped structure is characterized by its 16 gracefully curving supports, which join in a circle 115 feet (35 meters) above the floor of the nave; stretched between the supports are translucent walls of tinted glass. The nave is entered via a subterranean passage rather than conventional doorways. Other notable buildings are Buriti Palace, Itamaraty Palace, the National Theater, and several foreign embassies that creatively embody features of their national architecture. The Brazilian landscape architect Roberto Burle Marx designed landmark modernist gardens for some of the principal buildings. Both low-cost and luxury housing were built by the government in the Bras\u00edlia. The residential zones of the inner city are arranged into superquadras or superblocks: groups of apartment buildings along with a prescribed number and type of schools, retail stores, and open spaces. At the northern end of Lake Paranoa, separated from the inner city, is a peninsula with many fashionable homes, and a similar city exists on the southern lakeshore. Originally the city planners envisioned extensive public areas along the shores of the artificial lake, but during early development private clubs, hotels, and upscale residences and restaurants gained footholds around the water. Set well apart from the city are satellite cities, including Gama, Ceilandia, Taguatinga, Nucleo Bandeirante, Sobradinho, and Planaltina. These cities, with the exception of Gama and Sobradinho were not planned. The city has been both acclaimed and criticized for its use of modernist architecture on a grand scale and for its somewhat utopian city plan. After a visit to Brasilia, the French writer Simone de Beauvoir complained that all of its superquadras exuded the same air of elegant monotony, and other observers have equated the city's large open lawns, plazas, and fields to wastelands. As the city has matured, some of these have gained adornments, and many have been improved by landscaping, giving some observers a sense of humanized spaciousness. Although not fully accomplished, the Brasilia utopia has produced a city of relatively high quality of life, in which the citizens live in forested areas with sporting and leisure structure the superquadras flanked by small commercial areas, bookstores and cafes; the city is famous for its cuisine and efficiency of transit. Even these positive features have sparked controversy, expressed in the nickname ilha da fantasia or fantasy island, indicating the sharp contrast between the city and surrounding regions, marked by poverty and disorganization in the cities of the states of Goias and Minas Gerais, around Brasilia. Critics of Bras\u00edlia's grand scale have characterized it as a modernist platonic fantasy about the future. The major roles of construction and of services namely government, communications, banking and finance, food production, entertainment, and legal services in Brasilia's economy reflect the city's status as a governmental rather than an industrial center. Industries connected with construction, food processing, and furnishings are important, as are those associated with publishing, printing, and computer software. GDP is divided in Public Administration 54.8%, Services 28.7%, Industry 10.2%, Commerce 6.1%, Agribusiness 0.2%. Besides being the political center, Bras\u00edlia is an important economic center. Brasilia has the highest city gross domestic product (GDP) of 99.5 billion reais representing 3.76% of the total Brazilian GDP. The main economic activity of the federal capital results from its administrative function. Its industrial planning is studied carefully by the Government of the Federal District. Being a city registered by UNESCO, the government in Brasilia has opted to encourage the development of non-polluting industries such as software, film, video, and gemology among others, with emphasis on environmental preservation and maintaining ecological balance, preserving the city property. According to Mercer's city rankings of cost of living for expatriate employees, Brasilia ranks 45th among the most expensive cities in the world in 2012, up from the 70th position in 2010, ranking behind Sao Paulo (12th) and Rio de Janeiro (13th). Government,the public sector is by far the largest employer, accounting for around 40% of the city jobs. Government jobs include all levels, from the federal police to diplomacy, from the transportation bureau to the armed forces Communications,the telephony used to be a state monopoly, and Brasilia held the HQ of Telebras, the central state company; one of the enterprises that resulted from the privatization of the system in the 90's, Brasil Telecom, keeps it HQ in the city. The official Postal Service or Correios HQ is located in the city as well. As it is the main place of Federal Government news, it is also notable the activities of TV stations, including the main offices of four public networks like TV Brasil\/Agencia Brasil, TV Camara, TV Senado and TV Justi\u00e7a, the regional offices of four major private television networks like Rede Globo, SBT, Rede Bandeirantes and Rede Record and a main affiliate of RedeTV. Banking and finance,headquarters of the Banco do Brasil and the Caixa Economica Federal, both controlled by the Federal Government, and the Banco de Brasilia, controlled by the city local government. It is also the site of the headquarters of the Central Bank, the main government regulatory agency of the financial sector. Entertainment,the shopping malls Conjunto Nacional, ParkShopping, Patio Brasil Shopping, Brasilia Shopping, Boulevard Shopping, Taguatinga Shopping, Terra\u00e7o Shopping, Gilberto Salomao and Iguatemi Brasilia. Information technology Politec, Poliedro, CTIS, among others, and legal services. In the city include Construction Paulo Octavio, Via Constru\u00e7oes, and Irmaos Gravia among others. Food processing like Perdigao, Sadia. Furniture Making,Recycling like Novo Rio, Rexam, Latasa and others. Pharmaceuticals like Uniao Quimica. The main agricultural products produced in the city are coffee, guavas, strawberries, oranges, lemons, papayas, soy beans, and mangoes. It has over 110,000 cows and it exports wood products worldwide. The Federal District, where Brasilia is located, has a GDP of R$133,4 billion (about US$64.1 billion), about the same as Belarus according to The Economist. Its share of the total Brazilian GDP is about 3.8%. The Federal District has the largest GDP per capita income of Brazil US$25,062, slightly higher than Belarus. The city's planned design included specific areas for almost everything, including accommodation, Hotels Sectors North and South. New hotel facilities are being developed elsewhere, such as the hotels and tourism Sector North, located on the shores of Lake Paranoa. Brasilia has a range of tourist accommodation from inns, pensions and hostels to larger international chain hotels. The city's restaurants cater to a wide range of foods from local and regional Brazilian dishes to international cuisine. At the end of the Eixo Monumental or Monumental Axis lies the Esplanada dos Ministerios or Ministries Esplanade, an open area in downtown Brasilia. The rectangular lawn is surrounded by two eight-lane avenues where many government buildings, monuments and memorials are located. On Sundays and holidays, the Eixo Monumental is closed to cars so that locals may use it as a place to walk, bike, and have picnics under the trees. Pra\u00e7a dos Tres Poderes or Square of the Three Powers is a plaza in Brasilia. The name is derived from the encounter of the three federal branches around the plaza: the Executive, represented by the Palacio do Planalto or presidential office. The Legislative, represented by the National Congress or Congresso Nacional and the Judicial branch, represented by the Supreme Federal Court or Supremo Tribunal Federal. It is a tourist attraction in Brasilia, designed by Lucio Costa and Oscar Niemeyer as a place where the three branches would meet harmoniously. The Palacio da Alvorada is the official residence of the president of Brazil. The palace was designed, along with the rest of the city of Brasilia, by Oscar Niemeyer and inaugurated in 1958. One of the first structures built in the republic's new capital city, the Alvorada lies on a peninsula at the margins of Lake Paranoa. The principles of simplicity and modernity, that in the past characterized the great works of architecture, motivated Niemeyer. The viewer has an impression of looking at a glass box, softly landed on the ground with the support of thin external columns. The building has an area of 7,000 m2 with three floors consisting of the basement, landing, and second floor. The auditorium, kitchen, laundry, medical center, and administration offices are at basement level. The rooms used by the presidency for official receptions are on the landing. The second floor has four suites, two apartments, and various private rooms which make up the residential part of the palace. The building also has a library, a heated Olympic-sized swimming pool, a music room, two dining rooms and various meeting rooms. A chapel and heliport are in adjacent buildings. The Palacio do Planalto is the official workplace of the president of Brazil. It is located at the Pra\u00e7a dos Tres Poderes in Bras\u00edlia. As the seat of government, the term Planalto is often used as a metonym for the executive branch of government. The main working office of the President of the Republic is in the Palacio do Planalto. The President and his or her family do not live in it, rather in the official residence, the Palacio da Alvorada. Besides the President, senior advisors also have offices in the Planalto, including the Vice-President of Brazil and the Chief of Staff. The other Ministries are along the Esplanada dos Ministerios. The architect of the Palacio do Planalto was Oscar Niemeyer, creator of most of the important buildings in Brasilia. The idea was to project an image of simplicity and modernity using fine lines and waves to compose the columns and exterior structures. The Palace is four stories high, and has an area of 36,000 m2. Four other adjacent buildings are also part of the complex. The Portuguese language is the official national language and the primary language taught in schools. English and Spanish are also part of the official curriculum. International schools: - American School of Brasilia - Brasilia International School (BIS) - Escola das Na\u00e7oes - Swiss International School (SIS) - Lycee fran\u00e7ais Fran\u00e7ois-Mitterrand (LfFM) - Maple Bear Canadian School. - British School of Brasilia. Brasilia has two universities, three university centers, and many private colleges. Tertiary educational institutions are: - Universidade de Brasilia \u2013 University of Brasilia (UnB) (public) - Universidade Catolica de Brasilia \u2013 Catholic University of Brasilia (UCB) - Centro Universitario de Brasilia (UniCEUB) - Centro Universitario Euroamaricano (Unieuro) - Centro Universitario do Distrito Federal (UDF) - Universidade Paulista (UNIP) - Instituto de Educa\u00e7ao Superior de Brasilia (IESB) Brasilia\u2013Presidente Juscelino Kubitschek International Airport serves the metropolitan area with major domestic and international flights. It is the third busiest Brazilian airport based on passengers and aircraft movements. Because of its strategic location it is a civil aviation hub for the rest of the country. This makes for a large number of takeoffs and landings and it is not unusual for flights to be delayed in the holding pattern before landing. Following the airport's master plan, Infraero built a second runway, which was finished in 2006. In 2007, the airport handled 11,119,872 passengers. The main building's third floor, with 12 thousand square meters, has a panoramic deck, a food court, shops, four movie theatres with total capacity of 500 people, and space for exhibitions. Brasilia Airport has 136 vendor spaces. The airport is located about 11 km (6.8 mi) from the central area of Brasilia, outside the metro system. The area outside the airport's main gate is lined with taxis as well as several bus line services that connect the airport to Brasilia's central district. The parking lot accommodates 1,200 cars. The airport is serviced by domestic and regional airlines TAM, GOL, Azul, WebJET, Trip and Avianca, in addition to a number of international carriers. In 2012, Brasilia's International Airport was won by the InfrAmerica consortium, formed by the Brazilian engineering company ENGEVIX and the Argentine Corporacion America holding company, with a 50% stake each.During the 25-year concession, the airport may be expanded to up to 40 million passengers a year. In 2014 the airport received 15 new boarding bridges, totaling 28 in all. This was the main requirement made by the federal government, which transferred the operation of the terminal to the Inframerica Group after an auction. The group invested R$750 million in the project. In the same year, the number of parking spaces doubled, reaching three thousand. The airport's entrance have a new rooftop cover and a new access road. Furthermore, a VIP room was created on Terminal 1's third floor. The investments resulted an increase the capacity of Brasilia's airport from approximately 15 million passengers per year to 21 million by 2014.Brasilia has direct flights to all states of Brazil and direct international flights to Atlanta, Buenos Aires, Lisbon, Miami, Panama City, and Paris. Like most Brazilian cities, Brasilia has a good network of taxi companies. Taxis from the airport are available immediately outside the terminal, but at times there can be quite a queue of people. Although the airport is not far from the downtown area, taxi prices do seem to be higher than in other Brazilian cities. Booking in advance can be advantageous, particularly if time is limited, and local companies should be able to assist airport transfer or transport requirements. The Juscelino Kubitschek bridge, also known as the President JK Bridge or the JK Bridge, crosses Lake Paranoa in Brasilia. It is named after Juscelino Kubitschek de Oliveira, former president of Brazil. It was designed by architect Alexandre Chan and structural engineer Mario Vila Verde. Chan won the Gustav Lindenthal Medal for this project at the 2003 International Bridge Conference in Pittsburgh due to outstanding achievement demonstrating harmony with the environment, aesthetic merit and successful community participation. It consists of three 60 m (200 ft) tall asymmetrical steel arches that crisscross diagonally. With a length of 1,200 m (0.75 miles), it was completed in 2002 at a cost of US$56.8 million. The bridge has a pedestrian walkway and is accessible to bicyclists and skaters The Bras\u00edlia Metro is Bras\u00edlia's underground metro system. The system has 24 stations on two lines, the Orange and Green lines, along a total network of 42 km (26 mi), covering some of the metropolitan area. Both lines begin at the Central Station and run parallel until the Aguas Claras Station. The Brasilia metro is not comprehensive so buses may provide better access to the center. The metro leaves the Rodoviaria (bus station) and goes south, avoiding most of the political and tourist areas. The main purpose of the metro is to serve cities, such as Samambaia, Taguatinga and Ceilandia, as well as Guara and Aguas Claras. The satellite cities served are more populated in total than the Plano Piloto itself the census of 2000 indicated that Ceilandia had 344,039 inhabitants, Taguatinga had 243,575, and the Plano Piloto had approximately 400,000 inhabitants, and most residents of the satellite cities depend on public transportation. A high-speed railway was planned between Brasilia and Goiania, the capital of the state of Goias, but it will probably be turned into a regional service linking the capital cities and cities in between, like Anapolis and Alexania. The main bus hub in Brasilia is the Central Bus Station, located in the crossing of the Eixo Monumental and the Eixao, about 2 km (1.2 mi) from the Three Powers Plaza. The original plan was to have a bus station as near as possible to every corner of Brasilia. Today, the bus station is the hub of urban buses only, some running within Brasilia and others connecting Bras\u00edlia to the satellite cities. In the original city plan, the interstate buses should also stop at the Central Station. Because of the growth of Brasilia and corresponding growth in the bus fleet, today the interstate buses leave from the older interstate station called Rodoferroviaria, located at the western end of the Eixo Monumental. The Central Bus Station also contains a main metro station. A new bus station was opened in July 2010. It is on Sa\u00edda Sul (South Exit) near Parkshopping Mall and with its metro station, and it's also an inter-state bus station, used only to leave the Federal District. The average amount of time people spend commuting with public transit in Bras\u00edlia, for example to and from work, on a weekday is 96 min. 31% of public transit riders, ride for more than 2 hours every day. The average amount of time people wait at a stop or station for public transit is 28 min, while 61% of riders wait for over 20 minutes on average every day. The average distance people usually ride in a single trip with public transit is 15.1 km, while 50% travel for over 12 km in a single direction. The main stadiums are the Brasilia National Stadium Mane Garrincha which was reinaugurated on May 18, 2013, the Serejao Stadium home for Brasiliense and the Bezerrao Stadium home for Gama. Brasilia is known as a departing point for the practice of unpowered air sports, sports that may be practiced with hang gliding or paragliding wings. Practitioners of such sports reveal that, because of the city's dry weather, the city offers strong thermal winds and great cloud-streets, which is also the name for a manoeuvre quite appreciated by practitioners. In 2003, Brasilia hosted the 14th Hang Gliding World Championship, one of the categories of free flying. In August 2005, the city hosted the 2nd stage of the Brazilian Hang Gliding Championship. Brasilia is the site of the Autodromo Internacional Nelson Piquet which hosted a non-championship round of the 1974 Formula One Grand Prix season. An IndyCar race was cancelled at the last minute in 2015. The city is also home to Uniceub BRB, one of Brazil's best basketball clubs. Currently, NBB champion. The club hosts some of its games at the 16,000 all-seat Nilson Nelson Gymnasium. Temperatures seldom hit extremes. 17\u00b0C to 28\u00b0C (63 to 82\u00b0F) are the average lows and highs, but it can get as low as 1\u00b0C (34\u00b0F) in winter and get as hot as 34\u00b0C (92\u00b0F) in September\/October. In dry season (August\u2013September) the city's landscape, normally very green, becomes desert like and everyone must drink lots of water to prevent the unpleasant effects of dehydration. On the other hand, during those months the city is blessed with a gorgeous sunset in spectacular shades of orange, pink and red. The best months to go are probably May and June - still green, but no longer so hot, with fewer chances of rainfall. Official tourist info can be obtained from State Secretariat of Tourism of the Distrito Federal. There are also stands in the airport, the new rodoviaria and the Pra\u00e7a dos Tres Poderes. Due to long distances and falling prices in air travel, flying has become a practical way of getting to Brasilia. The city is a national air travel hub, and there should be plenty of flights. In fact you may find your plane touching down at Brasilia airport even if you're not starting or ending anywhere near, such as Salvador to Belem. On the other hand, despite being a major international capital, getting in directly from abroad is difficult in most cases. Most flights are domestic, and you will have to go through Brazilian customs and immigration elsewhere and re-board. However, there are currently several international non-stop flights from: Orlando (TAM), Buenos Aires (Aerolineas Argentinas), Paris (Air France), Lisbon (TAP Portugal), Lima (Lan Peru) and (TACA), Bogota (AviancaTaca), Miami (TAM Brazil) and (American Airlines), Panama City (COPA), Montevideo (Pluna), Santa Cruz, Bolivia (Amaszonas Airlines), Atlanta (Delta Airlines), Punta Cana (TAM), and seasonal to Santiago and Aruba (GOL). Presidente Juscelino Kubitschek International Airport, Brasilia's airport is situated 11 km (7 mi) from the city center and has one of the few tourist information services in town. It also has an exchange office at the arrivals area, another one at Banco do Brasil open Mo-Fri 11:00-16:00, departures area and several ATMs. There is an Executive Bus from airport to hotel zone and the central region for R$10. Taxis are annother convenient means of getting from the airport into the city. They are relatively expensive for Brazilian standards and the 20-minute drive to the hotel zone should cost about R$30\u201340. Regular buses number 102 and 102.1 are frequent and significantly cheaper. They link the airport to the main bus terminal at Rodoviaria, from where you can catch buses or the subway to other parts of the city. Due to its central location, Brasilia is well served by a bus network that connects it with the rest of Brazil. Travel times are about 15 hours from Sao Paulo, 18 hours from Rio, 10 hours from Belo Horizonte and 3 hours from Goiania. Buses from other states arrive at a dedicated bus station called rodoviaria, that is located at the central road (EPIA) and is connected to the city center by bus number 131, frequency each 10\u201320 minutes, from 5AM to midnight and taxis. Drivers coming from southern and Center-west states will arrive by the Saada Sul entrance. From other states, you'll enter Brasilia by Saida Norte. After you're inside the Federal District, keep following the Brasilia indicating traffic signs and Zona Central if you're staying at the hotel sector. The Eixo Rodoviario Road, that crosses the city's south, central, and north sectors, can be identified by the characteristics double strip of yellow raised pavement markers separating the two lanes of the road. Mapframe Rent a car, ride the buses, take a cab, hitchhike, but whatever you do, don't plan on getting around Brasilia on foot. The city was designed under the assumption that every resident would own an automobile. Obviously things didn't turn out that way, and the city's public transport is a solution to an almost deliberately designed problem. Fortunately it works fairly well. Note that the roads have few crosswalks or traffic lights, so being a pedestrian also requires some caution. Most local buses start from or go through the rodoviaria, at the precise center of the city, and run along the wings serving the residential zones or through the Monumental Axis. Some bus lines are very useful for moving around, as they link the central area of Brasilia or Setor Comercial, Setor de Diversoes etc. to Esplanada dos Ministerios, the airport and some of the main avenues L2 and W3. These used to be stripped red-and-white buses called zebrinhas or little zebras but now they are only distinguished from other bus lines by their numbers. Unlike many other Brazilian cities, passengers in Brasilia board buses by the front door. Buses must be flagged, otherwise they will only stop when a passenger requests to hop off. Single fares are R$3.00 for travel within Bras\u00edlia. There is no advance sale of tickets, pay as you board. Taxis are relatively expensive in Brasilia and usually cannot be hailed on the streets. Taxi stands, however, are close to all tourist attractions and any hotel will be able to call a cab or provide the phone number of the best known dispatch offices. All taxis must have taximeters and can start charging only after the passenger has boarded. When arriving at Brasilia airport, taxis are located immediately outside the arrival terminal. Although the airport is not far from downtown Brasilia, taxi prices are expensive compared to other cities in Brazil, and often there can be a long wait before a taxi become available. Pre-booking taxis or airport transfers is possible, although somewhat limited, through companies such as Brazil Airport Transfers. The Metro subway system started operating in 2001. Its Y-shaped line starts in the main bus station Rodoviaria de Brasilia Central station and makes its first stop at Setor Comercial Sul or Galeria station, which is fairly near some hotels South of Monumental Axis. It runs along the south wing, stopping at blocks 102, 108, 112 and 114, then going through suburbs. The subway uses to operate 6AM-11:30PM from Monday to Friday some stations stop selling tickets at 10:30PM, and from 7AM-7PM on Saturdays, Sundays and holidays. Its common to be offered special timelines on some holidays, like New Year's Eve and the April 21st city's anniversary. It's not particularly useful for tourists, as it does not visit the main attractions but does stop at attractions such as the Buddhist Temple. Single fare: R$4.00,R$3.80 with the rechargeable metro card. Some stops are still under construction and are indicated with a black dot as opposed to white dot on the metro map. Before going on the subway remember to have pocket money in small bills or coins,the Metro doesn't accept credit cards and won't give change above R$20. If you are not using city tour services, it would be a good idea to have a car available. The urbanistic plan of Brasilia was highly based on individual motorized transportation, so it is not surprising that a visit to the city will be much more pleasing having a car. Unlike other Brazilian big cities, traffic in Brasilia is not a major problem, although there are some jams during rush hours. There are public parking lots available at main sites, although it can be hard to find spots sometimes. As in other Brazilian towns, there usually are some watchers, people that offers to watch your car supposedly to protect it from robbers, expecting to get some money in return. They usually behave like beggars, although they can turn violent towards the cars if not paid, scratching or chipping the paint job, so it would avoid some trouble to just give a little money, something around 2 reais. If it bothers you, you can always park your car a little further from the main destinations, where there are no watchers, or in a paid garage, when available. Drivers behave a little differently than in other places in Brazil: Stop at pedestrian crossings - pedestrians will wave a hand before crossing or usually simply start walking. Keep an eye on the sidewalks at all times. Policemen enforce this rule and you can get fined if you disrespect it. Other cities are beginning to enforce this law as well. Use of horns,do not honk unless you really need to for safety reasons. Brasilienses hate it and really appreciate their driving to be as silent as possible. It is paramount to have a detailed map in hand when driving through the city, especially in the central area. It is far more convenient to have a good GPS system, because the access of some streets can be confusing, as there are lots of elevated interchanges and ramps. Do not expect the signs to be clear and ubiquitous, there are no signs telling you on what avenue you are on and streets rarely intersect. Smaller streets do not have names as they are defined by being between this and that square. This said, once you have understood the logic that rules ramps and intersections, theoretically you can throw your map away. The Three Powers Square or Pra\u00e7a dos Tres Poderes at the eastern end of the Monumental Axis. Includes the seats of the country's 3 highest authorities: the Congress, the Presidential Palace called Palacio do Planalto and the Supreme Court. The axis itself is aligned such that on April 21 Tiradentes Day, marking the death of the Brazilian independence martyr, the sun rises precisely between the two towers of Congress. The bronze statue of two abstract figures is named Os Candangos and represents the pioneering spirit of the workers who built the city. There's also a blind justice statue by the Supreme Court, a small museum about Juscelino Kubitschek, the Pantheon, the Eternal Flame monument, and a model, built to scale, of Brasilia itself, in an underground space. The fa\u00e7ade of the Palace of Justice has waterfalls that contrast with its stern geometrical beauty. National Theater Claudio Santoro - Brasilia's main theatre features 3 main halls for plays and concerts, art galleries and temporary art exhibitions, from 12h until 20h. Public works of art - Some of the finest Brazilian artists have created works in Brasilia: Burle Marx (landscape design), Athos Bulcao (geometric tile panels), Oscar Niemeyer (buildings and sculptures) Ceschiatti and Bruno Giorgio (sculptures). These can be seen on the streets, open air and for free. Dom Bosco Church, Av. W3 sul, quadra 702. A beautiful modern church built on concrete and blue stained glass. Bosco was a 19th-century Italian priest whose writings, some say, prophesied the creation of Brasilia. It's impossible not to notice the huge crystal chandelier hanging from the ceiling in the middle of the square church. Centro Cultural Banco do Brasil (CCBB) - SCES, Trecho 02, lote 22. Holds all kinds of exhibitions and cultural events. Russian paintings, musical concerts, documentaries, plays, thematic movie festivals, photography, you name it. There is no permanent exhibition or attraction so you've to check the programme before going or just go there and enjoy what's available. The easier way to reach it is through its own free bus line that runs from the city center and back. Check the official bus schedule for an up-to-date information. Opens Thu-Sun from 9h until 21h. Entrance fees may vary greatly or even be free depending on what's going on. But one thing is certain: it's usually CHEAP. Parque Olhos D'Agua - A park in the northern wing of the city that is mainly used for jogging. It also has many springs, streams and a small pond. Many of its facilities include a playground and two outdoor gyms. Paranoa Lake - Pontao has lakeside restaurants and a park while the Ermida Dom Bosco near SHIS QI 29, bus line 100\/123 chapel provides gorgeous views of the city from across the Lake, an excellent place to watch Brasilia's famous sunsets. You can swim in the lake at the Ecological Park next to the Ermida. Brasilia National Park - Cerrado vegetation and fauna, plus natural swimming pools. Po\u00e7o Azul - A waterfall forming beautiful blue pools on a quartz rock. Cinema Festival - Brasilia hosts one of the most important festivals of Brazilian cinema. The Festival de Cinema Brasileiro takes place late October\/early November and screens independent and mainstream movies that will hit the theaters the following year. Both short and feature films are presented, but the movies have no subtitles. State Secretary of Culture of the Distrito Federal Agenda - The biggest cultural schedule of Brasilia. It keeps track of all exhibitions and shows playing in the city. You can choose the listings by month or type of attraction or see the complete schedule for the current month. Basketball - If you happen to be in Brasilia between January and June, you should not miss the games of Brasilia's home team Universo BRB for the national league of basketball. Runner-up of the 2009 season, Universo is well known for playing great games and drawing a big audience for Brazilian standards, which peaked 11.000 people during the 2009 finals. The season games happens in Clube da CEB or CEB's club, at SGAS 904. Ticket costs R$10.00. If you actually want to play basketball, the city's park has plenty of courts available for public use. Your best chance to catch some locals playing is going on the weekends. Jogging - Brasilia's most popular sport by far. There are running tracks in the National Park and in the City's Park. The Eixo Rodoviario road is closed to traffic on Sundays (8h-18h) and can be also used for jogging, cycling and skating. Jogging on weekends in the City's Park is one the most popular activities among locals. Don't miss the coconut water vendors. Besides that, 5 km and 10 km races happens almost bi-monthly. Wakeboard - Wakescola de Brasilia. The only wakeboard school in the city. Expensive. Brasilia's residential wings have many local shops such as groceries, drugstores, bakers, restaurants, hairdressers and so forth, and that is where townspeople do much of their daily shopping. The now somewhat decadent W3 avenue used to be the equivalent of a city's high street and still concentrates a large portion of the city's street commerce. Shopping malls, however, also play an important part when it comes to shopping in town. The Setor de Diversoes is a fairly nice shopping area at the center of the city, very close to Rodoviaria. The northern side, called Conjunto Nacional, is a bit more upscale, while the southern side has interesting small shops with books, music, and clothing that appeal to the local skateboard-riding youths. Notice that this southern side at night is very dangerous, being the favorite spot for hookers and drug dealers. On Sundays there is a flea market at the base of the Television Tower. Half of the stands are also open during the week and you can get local crafts and souvenirs hard to find in shopping malls. Some off-center places can also be of interest for travellers. The imports market popularly known as Feira do Paraguai is the place to go for cheap electronics ,cameras and replacement accessories, batteries etc. and other travel items such as backpacks, flashlights and so forth. From Rodoviaria, take bus 124.2 shorter trip or bus 124. Records and books - FNAC, at the Parkshopping mall has a good assortment of English-language travel guides and Brazilian music CDs. Livraria Cultura, at the Casa Park mall, has bilingual staff and an extensive collection of Brazilian CDs and foreign-language literature especially in English, French, Spanish, Italian and German. Both malls are close to each other and can be easily reached by subway through the almost self-explanatory named Shopping station. Brasilia does not have a typical, regional cuisine. Nevertheless, restaurants serve food from many Brazilian states, as well as international fare. Self-service or por quilo restaurants are very common and usually cheaper than their a la carte counterparts. Most of Brasilia's real table service restaurants are located at the residential wings, usually a bus or taxi ride away from most tourist attractions. One of the most popular streets is the CLS 405 from rodoviaria, take bus 114, with choices ranging from sushi to Brazilian, Mexican and French food. Regarding tips, visitors are expected to pay at least 10% of the bill. Such amount is commonly printed on the invoice and most of the time it's OK to include the tip in your credit\/debit card since most of the restaurants share the total amount with all employees. Self-service restaurants usually don't charge tips. A convenient place for finding reasonably priced food is the food court of the Conjunto Nacional mall. The mall is located right beside the main bus terminal rodoviaria and at walking distance from many hotels and of the main attractions such as the Three Powers Square. SCLS 201. Right beside Banco Central's main building, this street is packed with cheap self-service restaurants and a few ranging from mid-range to splurge. Local chain Giraffas in several locations around town rivals McDonalds in the fast food market by serving sandwiches and cheap beef\/chicken + rice-and-beans set meals. Green's has lots of options for vegetarians or people craving healthy food. Imagine, sprouts! They also have fish and meat. That is definitely not a cheap place Velha Guarda 302 Norte, Bloco D - It may be the most Brazilian experience a foreign visitor could have, a cheap and totally out of the beaten path reataurant. Very simple profile and accommodations, but very well served in what matters, the food. They have menu of the day, which varies along the week but always with a huge portion of beef\/poultry\/pork plus salad, egg and rice & beans. Price: R$9.00 Don Durica \u2013 SCLN 201, Bloco A,Mo-Sat 11:30AM-3PM\/6PM-midnight. This all-you-can-eat buffet offers more than 50 dishes for lunch, mainly from Minas Gerais cuisine. Vegetarians may try and escape ubiquitous meat dishes of Brazilian cuisine at Bardana - SCLS 405 bloco A. Try the tropical juices too. Bottarga Ristorante - SHIS QI 05 conjunto 09 Tue-Sat 12:30-15:00 and 20:00-00:00. Sun 12:30-16:30. French-Italian inspired cuisine. Main dishes from R$49 simple risotto to R$99. Good selection of wines for Brasilia. Despite not being particularly famous for its nightlife, Brasilia has some hangouts that save visitors from night-time boredom. Please observe that smoking in the dancefloor is not allowed - all clubs have an smoking area, so people can smoke or just get some fresh air without leaving the club. Beirute - CLS 109 Bloco A near 108 Sul metro station. Opens daily, until 2AM. One of the oldest and most traditional bars in town, serves reasonably priced beer and Arab food, and attracts a mixed crowd of students, journalists, gay people and intellectuals. Is also one of the best places to pick up flyers and find out the best parties to go. Club 904 - SGAS 904 - Asa Sul. It hosts two of the parties that gathers most of the youth in the city. 5uinto on Thursdays, an electronic music party and Play, on Fridays, a rock music party. Gate's Pub - CLS 403 Bloco B near 102 Sul metro station. This pub-cum-club has a dartboard and is one of the few places to offer a week-round choice of nights, ranging from Brazilian music to alternative electronic stuff. Opens Mo\/We 9PM, Tu\/Thu\/Sat\/Sun 10PM. Fri 11PM. Admission R$5 - R$18 there are usually discounts before 11PM. Por-do-Sol - CLN 408 BL C, s\/n lj 24 - Asa Norte. Favorite bar of University of Brasilia students. It is always crowded, so it is a great place to see different people. The beer doesn't get any cheaper elsewhere. You have to get it on the counter, though. You can see the youth of Brasilia over here, drinking beer and talking about anything. Some consider the whole 408 quadra as a sort of alcoholic set-up, due to the many bars. UK Brasil Pub - SCLS 411 BL B Lj. 28 - Asa Sul. Live music with local bands, mostly covers of famous bands. Doesn't accept credit cards. There's a separate room where you can smoke. Tu-Sa from 18h. Landscape Pub - SHIN CA 7, Bloco F-1 - loja 33 - Lago Norte. This pub has two floors: the dancefloor and a dancefloor-lounge upstairs, and an external area when you can smoke, chat and meet new people. It's a reduct of the underground scene of Brasilia,there you can hear Beatles, Strokes and some new DJs. Chiquita Bacana - 209 Sul, bloco A - loja 37 - Asa Sul near 108 Sul metro station. It's a nice bar in Brasilia. It's not a cheap one,one Stella Artois Long Neck costs R$5, but they have a good decoration and a good variety of booze and snacks. They have narguiles to rent too. Agua Doce Cacha\u00e7aria - CLS 412, Bl A Lj 3 - Asa Sul near 112 Sul metro station. Specialized in cacha\u00e7a, the Brazilian destilled beverage made of sugar cane. Opens Tuesday to Sunday until 2AM. Bonnaparte - SHS Quadra 02 Bloco J, S\/N - Setor Hoteleiro Sul - Brasilia - DF - Brasil. The bar is in principle like a canteen with 3-4 TV sets. Keep away from this place, especially if you are on a budget trip. They don't inform you about the entrance fee before you leave. It will cost you 36 reais for a single beer Although the city's music scene is no longer as vibrant as it was in the 80s, when it bred some of the greatest pop\/rock talents of recent generations with bands like Capital Inicial and Legiao Urbana,live shows of local bands are frequent. Daily listings in Portuguese can be found at the local newspapers or the Correioweb and Candango websites. Most of the city's accommodation is located at the Hotel Sectors SHS and SHN, two central areas located on both sides of Eixo Monumental. During weekdays, hotels are usually busy due to the capital's political activity and it is advisable to book in advance. Typical prices are R$200 for a double room and R$95 for a single. Most ot the hotels have an off-price for the weekends. Many simple pousadas are located at W3 Sul avenue. They are often non-regulated by tourist authorities and their quality and security may"} +{"id":"RedPajamaCommonCrawl.0021","text":"The story of my boyhood and youth 1. A Boyhood in Scotland [Page 1] When I was a boy in Scotland I was fond of everything that was wild, and all my life I've been growing fonder and fonder of wild places and wild creatures. Fortunately around my native town of Dunbar, by the stormy North Sea, there was no lack of wildness, though most of the land lay in smooth cultivation. With red-blooded playmates, wild as myself, I loved to wander in the fields to hear the birds sing, and along the seashore to gaze and wonder at the shells and seaweeds, eels and crabs in the pools among the rocks when the tide was low; and best of all to watch the waves in awful storms thundering on the black headlands and craggy ruins of the old Dunbar Castle when the sea and the sky, the waves and the clouds, were mingled together as one. We never thought of playing truant, but after I was five or six years old I ran away to the seashore or the fields almost every Saturday, and every day in the school vacations except Sundays, though solemnly warned that I must play at home in the garden and back yard, lest I should learn to think bad thoughts and say bad words. All in vain. In spite of the sure sore punishments that followed like shadows, the natural inherited wildness in our blood ran true on its glorious course as invincible and unstoppable as stars. My earliest recollections of the country were gained on short walks with my grandfather when I was perhaps not over three years old. On one of these walks grandfather took me to Lord Lauderdale's gardens, where I saw figs growing against a sunny wall and tasted some of them, and got as many apples to eat as I wished. On another memorable walk in a hayfield, when we sat down to rest on one of the haycocks I heard a sharp, prickly, stinging cry, and, jumping up eagerly, called grandfather's attention to it. He said he heard only the wind, but I insisted on digging into the hay and turning it over until we discovered the source of the strange exciting sound\u2014a mother field mouse with half a dozen naked young hanging to her teats. This to me was a wonderful discovery. No hunter could have been more excited on discovering a bear and her cubs in a wilderness den. [Page 2] I was sent to school before I had completed my third year. The first schoolday was doubtless full of wonders, but I am not able to recall any of them. I remember the servant washing my face and getting soap in my eyes, and mother hanging a little green bag with my first book in it around my neck so I would not lose it, and its blowing back in the sea wind like a flag. But before I was sent to school my grandfather, as I was told, had taught me my letters from shop signs across the street. I can remember distinctly how proud I was when I had spelled my way through the little first book into the second, which seemed large and important, and so on to the third. Going from one book to another formed a grand triumphal advancement, the memories of which still stand out in clear relief. The third book contained interesting stories as well as plain reading- and spelling-lessons. To me the best story of all was 'Llewellyn's Dog', the first animal that comes to mind after the needle-voiced field mouse. It so deeply interested and touched me and some of my classmates that we read it over and over with aching hearts, both in and out of school and shed bitter tears over the faithful dog, Gelert, slain by his own master, who imagined that he had devoured his son because he came to him all bloody when the boy was lost, though he had saved the child's life by killing a big wolf. We have to look far back to learn how great may be the capacity of a child's heart for sorrow and sympathy with animals as well as with human friends and neighbors. This auld-lang-syne story stands out in the throng of old schoolday memories as clearly as if I had myself been one of that Welsh hunting party\u2014heard the bugles blowing, seen Gelert slain, joined in the search for the lost child, discovered it at last happy and smiling among the grass and bushes beside the dead, mangled wolf, and wept with Llewellyn over the sad fate of his noble, faithful dog friend. [Page 3] Another favorite in this book was Southey's poem 'The Inchcape Bell', a story of a priest and a pirate. A good priest in order to warn seamen in dark stormy weather hung a big bell on the dangerous Inchcape Rock. The greater the storm and higher the waves, the louder rang the warning bell, until it was cut off and sunk by wicked Ralph the Rover. One fine day, as the story goes, when the bell was ringing gently, the pirate put out to the rock, saying, 'I'll sink that bell and plague the Abbot of Aberbrothok.' So he cut the rope, and down went the bell 'with a gurgling sound; the bubbles rose and burst around', etc. Then 'Ralph the Rover sailed away; he scoured the seas for many a day; and now, grown rich with plundered store, he steers his course for Scotland's shore.' Then came a terrible storm with cloud darkness and night darkness and high roaring waves. 'Now where we are,' cried the pirate, 'I cannot tell, but I wish I could hear the Inchcape bell.' And the story goes on to tell how the wretched rover 'tore his hair', and 'curst himself in his despair', when 'with a shivering shock' the stout ship struck on the Inchcape Rock, and went down with Ralph and his plunder beside the good priest's bell. The story appealed to our love of kind deeds and of wildness and fair play. A lot of terrifying experiences connected with these first schooldays grew out of crimes committed by the keeper of a low lodging-house in Edinburgh, who allowed poor homeless wretches to sleep on benches or the floor for a penny or so a night, and, when kind Death came to their relief, sold the bodies for dissection to Dr Hare of the medical school. None of us children ever heard anything like the original story. The servant girls told us that 'Dandy Doctors', clad in long black cloaks and supplied with a store of sticking-plaster of wondrous adhesiveness, prowled at night about the country lanes and even the town streets, watching for children to choke and sell. The Dandy Doctor's business method, as the servants explained it, was with lightning quickness to clap a sticking-plaster on the face of a scholar, covering mouth and nose, preventing breathing or crying for help, then pop us under his long black cloak and carry us to Edinburgh to be sold and sliced into small pieces for folk to learn how we were made. We always mentioned the name 'Dandy Doctor' in a fearful whisper, and never dared venture out of doors after dark. In the short winter days it got dark before school closed, and in cloudy weather we sometimes had difficulty in finding our way home unless a servant with a lantern was sent for us; but during the Dandy Doctor period the school was closed earlier, for if detained until the usual hour the teacher could not get us to leave the schoolroom. We would rather stay all night supperless than dare the mysterious doctors supposed to be lying in wait for us. We had to go up a hill called the Davel Brae that lay between the schoolhouse and the main street. One evening just before dark, as we were running up the hill, one of the boys shouted, 'A Dandy Doctor! A Dandy Doctor!' and we all fled pellmell back into the schoolhouse to the astonishment of Mungo Siddons, the teacher. I can remember to this day the amused look on the good dominie's face as he stared and tried to guess what had got into us, until one of the older boys breathlessly explained that there was an awful big Dandy Doctor on the Brae and we couldna gang hame. Others corroborated the dreadful news. 'Yes! We saw him, plain as onything, with his lang black cloak to hide us in; and some of us thought we saw a sticken-plaister ready in his hand.' We were in such a state of fear and trembling that the teacher saw he wasn't going to get rid of us without going himself as leader. He went only a short distance, however, and turned us over to the care of the two biggest scholars, who led us to the top of the Brae and then left us to scurry home and dash into the door like pursued squirrels diving into their holes. [Page 5] Just before school skaled (closed), we all arose and sang the fine hymn 'Lord, dismiss us with Thy blessing'. In the spring when the swallows were coming back from their winter homes we sang\u2014 Welcome, welcome, little stranger, Welcome from a foreign shore; Safe escaped from many a danger... and while singing we all swayed in rhythm with the music. 'The Cuckoo', that always told his name in the spring of the year, was another favorite song, and when there was nothing in particular to call to mind any special bird or animal, the songs we sang were widely varied, such as The whale, the whale is the beast for me, Plunging along through the deep, deep sea. But the best of all was 'Lord, dismiss us with Thy blessing', though at that time the most significant part I fear was the first three words. With my school lessons father made me learn hymns and Bible verses. For learning 'Rock of Ages' he gave me a penny, and I thus became suddenly rich. Scotch boys are seldom spoiled with money. We thought more of a penny those economical days than the poorest American schoolboy thinks of a dollar. To decide what to do with that first penny was an extravagantly serious affair. I ran in great excitement up and down the street, examining the tempting goodies in the shop windows before venturing on so important an investment. My playmates also became excited when the wonderful news got abroad that Johnnie Muir had a penny, hoping to obtain a taste of the orange, apple, or candy it was likely to bring forth. [Page 6] At this time infants were baptized and vaccinated a few days after birth. I remember very well a fight with the doctor when my brother David was vaccinated. This happened, I think, before I was sent to school. I couldn't imagine what the doctor, a tall, severe looking man in black, was doing to my brother, but as mother, who was holding him in her arms, offered no objection, I looked on quietly while he scratched the arm until I saw blood. Then, unable to trust even my mother, I managed to spring up high enough to grab and bite the doctor's arm, yelling that I wasna gan to let him hurt my bonnie brither, while to my utter astonishment mother and the doctor only laughed at me. So far from complete at times is sympathy between parents and children, and so much like wild beasts are baby boys, little fighting, biting, climbing pagans. Father was proud of his garden and seemed always to be trying to make it as much like Eden as possible, and in a corner of it he gave each of us a little bit of ground for our very own in which we planted what we best liked, wondering how the hard dry seeds could change into soft leaves and flowers and find their way out to the light; and, to see how they were coming on, we used to dig up the larger ones, such as peas and beans, every day. My aunt had a corner assigned to her in our garden which she filled with lilies, and we all looked with the utmost respect and admiration at that precious lily-bed and wondered whether when we grew up we should ever be rich enough to own one anything like so grand. We imagined that each lily was worth an enormous sum of money and never dared to touch a single leaf or petal of them. We really stood in awe of them. Far, far was I then from the wild lily gardens of California that I was destined to see in their glory. When I was a little boy at Mungo Siddons's school a flower-show was held in Dunbar, and I saw a number of the exhibitors carrying large handfuls of dahlias, the first I had ever seen. I thought them marvelous in size and beauty and, as in the case of my aunt's lilies, wondered if I should ever be rich enough to own some of them. [Page 7] Although I never dared to touch my aunt's sacred lilies, I have good cause to remember stealing some common flowers from an apothecary, Peter Lawson, who also answered the purpose of a regular physician to most of the poor people of the town and adjacent country. He had a pony which was considered very wild and dangerous, and when he was called out of town he mounted this wonderful beast, which, after standing long in the stable, was frisky and boisterous, and often to our delight reared and jumped and danced about from side to side of the street before he could be persuaded to go ahead. We boys gazed in awful admiration and wondered how the druggist could be so brave and able as to get on and stay on that wild beast's back. This famous Peter loved flowers and had a fine garden surrounded by an iron fence, through the bars of which, when I thought no one saw me, I oftentimes snatched a flower and took to my heels. One day Peter discovered me in this mischief, dashed out into the street and caught me. I screamed that I wouldna steal any more if he would let me go. He didn't say anything but just dragged ma along to the stable where he kept the wild pony, pushed me in right back of its heels, and shut the door. I was screaming, of course, but as soon as I was imprisoned the fear of being kicked quenched all noise. I hardly dared breathe. My only hope was in motionless silence. Imagine the agony I endured! I did not steal any more of his flowers. He was a good hard judge of boy nature. I was in Peter's hands some time before this, when I was about two and a half years old. The servant girl bathed us small folk before putting us to bed. The smarting soapy scrubbings of the Saturday nights in preparation for the Sabbath were particularly severe, and we all dreaded them. My sister Sarah, the next older than me, wanted the long-legged stool I was sitting on awaiting my turn, so she just tipped me off. My chin struck on the edge of the bath-tub, and, as I was talking at the time, my tongue happened to be in the way of my teeth when they were closed by the blow, and a deep gash was cut on the side of it, which bled profusely. Mother came running at the noise I made, wrapped me up, put me in the servant girl's arms and told her to run with me through the garden and out by a back way to Peter Lawson to have something done to stop the bleeding. He simply pushed a wad of cotton into my mouth after soaking it in some brown astringent stuff, and told me to be sure to keep my mouth shut and all would soon be well. Mother put me to bed, calmed my fears, and told me to lie still and sleep like a gude bairn. But just as I was dropping off to sleep I swallowed the bulky wad of medicated cotton and with it, as I imagined, my tongue also. My screams over so great a loss brought mother, and when she anxiously took me in her arms and inquired what was the matter, I told here that I had swallowed my tongue. She only laughed at me, much to my astonishment, when I expected that she would bewail the awful loss her boy had sustained. My sisters, who were older than I, oftentimes said when I happened to be talking too much, 'It's a pity you hadn't swallowed at least half of that long tongue of yours when you were little.' [Page 8] It appears natural for children to be fond of water, although the Scotch method of making every duty dismal contrived to make necessary bathing for health terrible to us. I well remember among the awful experiences of childhood being taken by the servant to the seashore when I was between two and three years old, stripped at the side of a deep pool in the rocks, plunged into it among crawling crawfish and slippery wriggling snake-like eels, and drawn up gasping and shrieking only to be plunged down again and again. As the time approached for this terrible bathing, I used to hide in the darkest corners of the house, and oftentimes a long search was required to find me. But after we were a few years older, we enjoyed bathing with other boys as we wandered along the shore, careful, however, not to get into a pool that had an invisible boy-devouring monster at the bottom of it. Such pools, miniature maelstroms, were called 'sookin-in-goats' and were well known to most of us. Nevertheless we never ventured into any pool on strange parts of the coast before we had thrust a sick into it. If the stick were not pulled out of our hands, we boldly entered and enjoyed plashing and ducking long ere we had learned to swim. [Page 9] One of our best playgrounds was the famous old Dunbar Castle, to which King Edward fled after his defeat at Bannockburn. It was built more than a thousand years ago, and though we knew little of its history, we had heard many mysterious stories of the battles fought about its walls, and firmly believed that every bone we found in the ruins belonged to an ancient warrior. We tried to see who could climb highest on the crumbling peaks and crags, and took chances that no cautious mountaineer would try. That I did not fall and finish my rock-scrambling n those adventurous boyhood days seems now a reasonable wonder. Among our best games were running, jumping, wrestling, and scrambling. I was so proud of my skill as a climber that when I first heard of hell from a servant girl who loved to tell its horrors and warn us that if we did anything wrong we would be cast into it, I always insisted that I could climb out of it. I imagined it was only a sooty pit with stone walls like those of the castle, and I felt sure there must be chinks and cracks in the masonry for fingers and toes. Anyhow the terrors of the horrible place seldom lasted long beyond the telling; for natural faith casts out fear. Most of the Scotch children believe in ghosts, and some under peculiar conditions continue to believe in them all through life. Grave ghosts are deemed particularly dangerous, and many of the most credulous will go far out of their way to avoid passing through or near a graveyard in the dark. After being instructed by the servants in the nature, looks, and habits of the various black and white ghosts, boowuzzies, and witches we often speculated as to whether they could run fast, and tried to believe that we had a good chance to get away from most of them. To improve our speed and wind, we often took long runs into the country. Tam o'Shanter's mare outran a lot of witches\u2014at least until she reached a place of safety beyond the keystone of the bridge\u2014and we thought perhaps we also might be able to outrun them. [Page 10] Our house formerly belonged to a physician, and a servant girl told us that the ghost of the dead doctor haunted one of the unoccupied rooms in the second story that was kept dark on account of a heavy window-tax. Our bedroom was adjacent to the ghost room, which had in it a lot of chemical apparatus\u2014glass tubing, glass and brass retorts, test-tubes, flasks, etc\u2014and we thought that those strange articles were still used by the old dead doctor in compounding physic. In the long summer days David and I were put to bed several hours before sunset. Mother tucked us in carefully, drew the curtains of the big old-fashioned bed, and told us to lie still and sleep like gude bairns; but we were usually out of bed, playing games of daring called 'scootchers', about as soon as our loving mother reached the foot of the stairs, for we couldn't lie still, however hard we might try. Going into the ghost room was regarded as a very great scootcher. After venturing in a few steps and rushing back in terror, I used to dare David to go as far without getting caught. The roof of our house, as well as the crags and walls of the old castle, offered fine mountaineering exercise. Our bedroom was lighted by a dormer window. One night I opened it in search of good scootchers and hung myself out over the slates, holding on to the sill, while the wind was making a balloon of my nightgown. I then dared David to try the adventure, and he did. Then I went out again and hung by one hand, and David did the same. Then I hung by one finger, being careful not to slip, and he did that too. Then I stood on the sill and examined the edge of the left wall of the window, crept up the slates along its side by slight fingerholds, got astride of the roof, sat there a few minutes looking at the scenery over the garden wall while the wind was howling and threatening to blow me off, then managed to slip down, catch hold of the sill, and get safely back into the room. But before attempting this scootcher, recognizing its dangerous character, with commendable caution I warned David that in case I should happen to slip I would grip the rain-trough when I was going over the eaves and hang on, and that he must then run fast downstairs and tell father to get a ladder for me, and tell him to be quick because I would soon be tired hanging dangling in the wind by my hands. After my return from this capital scootcher, David, not to be outdone, crawled up to the top of the window-roof, and got bravely astride of it; but in trying to return he lost courage and began to greet (to cry), 'I canna get doon. Oh, I canna get doon.' I leaned out of the window and shouted encouragingly, 'Dinna greet, Davie, dinna greet, I'll help ye doon. If you greet, fayther will hear, and gie us baith an awfu' skelping.' Then, standing on the sill and holding on by one hand to the window-casing, I directed him to slip his feet down within reach, and, after securing a good hold, I jumped inside and dragged him by his heels. This finished scootcher-scrambling for the night and frightened us into bed. [Page 11] In the short winter days, when it was dark even at our early bedtime, we usually spent the hours before going to sleep playing voyages around the world under the bedclothing. After mother had carefully covered us, bade us goodnight and gone downstairs, we set out on our travels. Burrowing like moles, we visited France, India, America, Australia, New Zealand, and all the places we had ever heard of; our travels never ending until we fell asleep. When mother came to take a last look at us, before she went to bed, to see that we were covered, we were oftentimes covered so well that she had difficulty in finding us, for we were hidden in all sorts of positions where sleep happened to overtake us, but in the morning we always found ourselves in good order, lying straight like gude barns, as she said. [Page 12] Some fifty years later, when I visited Scotland, I got one of my Dunbar schoolmates to introduce me to the owners of our old home, from whom I obtained permission to go upstairs to examine our bedroom window and judge what sort of adventure getting on its roof must have been, and with all my after experience in mountaineering, I found that what I had done in daring boyhood was now beyond my skill. Boys are often at once cruel and merciful, thoughtlessly hard-hearted and tender-hearted, sympathetic, pitiful, and kind in ever changing contrasts. Love of neighbors, human or animal, grows up amid savage traits, coarse and fine. When father made out to get us securely locked up in the back yard to prevent our shore and field wanderings, we had to play away the comparatively dull time as best we could. One of our amusements was hunting cats without seriously hurting them. These sagacious animals knew, however, that, though not very dangerous, boys were not to be trusted. One time in particular I remember, when we began throwing stones at an experienced old Tom, not wishing to hurt him much, though he was a tempting mark. He soon saw what we were up to, fled to the stable, and climbed to the top of the hay manger. He was still within range, however, and we kept the stones flying faster and faster, but he just blinked and played possum without wincing either at our best shots or at the noise we made. I happened to strike him pretty hard with a good-sized pebble, but he still blinked and sat still as if without feeling. 'He must be mortally wounded,' I said, 'and now we must kill him to put him out of pain,' the savage in us rapidly growing with indulgence. All took heartily to this sort of cat mercy and began throwing the heaviest stones we could manage, but that old fellow knew what character we were, and just as we imagined him mercifully dead he evidently thought the play was becoming too serious and that it was time to retreat; for suddenly with a wild whirr and gurr of energy he launched himself over our heads, rushed across the yard in a blur of speed, climbed to the roof of another building and over the garden wall, out of pain and bad company, with all lives wideawake and in good working order. [Page 13] After we had thus learned that Tom had at least nine lives, we tried to verify the common saying that no matter how far cats fell they always landed on their feet unhurt. We caught one in our back yard, not Tom but a small one of manageable size, and somehow got him smuggled up to the top story of the house. I don't know how in the world we managed to let go of him, for as soon as we opened the window and held him over the sill he knew his danger and made violent efforts to scratch and bite his way back into the room; but we determined to carry the thing through, and at last managed to drop him. I can remember to this day how the poor creature in danger of his life strained and balanced as he was falling and managed to alight on his feet. This was a cruel thing for even wild boys to do, and we never tried the experiment again, for we sincerely pitied the poor fellow when we saw him creeping slowly away, stunned and frightened, with a swollen black and blue chin. Again\u2014showing the natural savagery of boys\u2014we delighted in dog-fights, and even in the horrid red work of slaughter-houses, often running long distances and climbing over walls and roofs to see a pig killed, as soon as we heard the desperately earnest squealing. And if the butcher was good-natured, we begged him to let us get a near view of the mysterious insides and to give us a bladder to blow up for a foot-ball. But here is an illustration of the better side of boy nature. In our back yard there were three elm trees and in the one nearest the house a pair of robin-redbreasts had their nest. When the young were almost able to fly, a troop of the celebrated 'Scottish Grays' visited Dunbar, and three of four of the fine horses were lodged in our stable. When the soldiers were polishing their swords and helmets, they happened to notice the nest, and just as they were leaving, one of them climbed the tree and robbed it. WIth sore sympathy we watched the young birds as the hard-hearted robbers pushed them one by one beneath his jacket\u2014all but two that jumped out of the nest and tried to fly, but they were easily caught as they fluttered on the ground, and were hidden away with the rest. The distress of the bereaved parents, as they hovered and screamed over the frightened crying children they so long had loved and sheltered and fed, was pitiful to see; but the shining soldier rode grandly away on his big gray horse, caring only for the few pennies the young songbirds would bring and the beer they would buy, while we all, sisters and brothers, were crying and sobbing. I remember, as if it happened this day, how my heart fairly ached and choked me. Mother put us to bed and tried to comfort us, telling us that the little birds would be well fed and grow big, and soon learn to sing in pretty cages; but again and again we rehearsed the sad story of the poor bereaved birds and their frightened children, and could not be comforted. Father came into the room when we were half asleep and still sobbing, and I heard mother telling him that 'a' the barns' hearts were broken over the robbing of the nest in the elm'. [Page 14] After attaining the manly, belligerent age of five or six years, very few of my schooldays passed without a fist fight, and half a dozen was no uncommon number. When any classmate of our own age questioned our rank and standing as fighters, we always made haste to settle the matter at a quiet place on the Davel Brae. To be a 'gude fetcher' was our highest ambition, our dearest aim in life in or out of school. To be a good scholar was a secondary consideration, though we tried hard to hold high places in our classes and gloried in being Dux. We fairly reveled in the battle stories of glorious William Wallace and Robert the Bruce, with which every breath of Scotch air is saturated, and of course we were all going to be soldiers. On the Davel Brae battleground we often managed to bring on something like real war, greatly more exciting than personal combat. Choosing leaders, we divided into two armies. In winter damp snow furnished plenty of ammunition to make the thing serious, and in summer sand and grass sods. Cheering and shouting some battle-cry such as 'Bannockburn! Bannockburn! Scotland forever! The Last War in India!' we were led bravely on. For heavy battery work we stuffed our Scotch blue bonnets with snow and sand, sometimes mixed with gravel, and fired them at each other as cannon-balls. [Page 15] Of course we always looked eagerly forward to vacation days and thought them slow in coming. Old Mungo Siddons gave us a lot of gooseberries or currants and wished us a happy time. Some sort of special closing-exercises\u2014singing, recitations, etc.\u2014celebrated the great day, but I remember only the berries, freedom from schoolwork, and opportunities for runaway rambles in the fields and along the wave-beaten seashore. An exciting time came when at the age of seven or eight years I left the auld Davel Brae school for the grammar school. Of course I had a terrible lot of fighting to do, because a new scholar had to meet every one of his age who dared to challenge him, this being the common introduction to a new school. It was very strenuous for the first month or so, establishing my fighting rank, taking up new studies, especially Latin and French, getting acquainted with new classmates and the master and his rules. In the first few Latin and French lessons the new teacher, Mr Lyon, blandly smiled at our comical blunders, but pedagogical weather of the severest kind quickly set in, when for every mistake, everything short of perfection, the taws was promptly applied. We had to get three lessons every day in Latin, three in French, and as many in English, besides spelling, history, arithmetic, and geography. Word lessons in particular, the wouldst-couldst-shouldst-have-loved kind, were kept up, with much warlike thrashing, until I had committed the whole of the French, Latin, and English grammars to memory, and in connection with reading-lessons we were called on to recite parts of them with the rules over and over again, as if all the regular and irregular incomprehensible verb stuff was poetry. In addition to all this, father made me learn so many Bible verses every day that by the time I was eleven years of age I had about three fourths of the Old Testament and all of the New by heart and by sore flesh. I could recite the New Testament from the beginning of Matthew to the end of Revelation without a single stop. The dangers of cramming and of making scholars study at home instead of letting their little brains rest were never heard of in those days. We carried our school-books home in a strap every night and committed to memory our next day's lessons before we went to bed, and to do that we had to bend our attention as closely on our tasks as lawyers on great million-dollar cases. I can't conceive of anything that would now enable me to concentrate my attention more fully than when I was a mere stripling boy, and it was all done by whipping\u2014thrashing in general. Old-fashioned Scotch teachers spent no time in seeking short roads to knowledge, or in trying any of the new-fangled psychological methods so much in vogue nowadays. There was nothing said about making the seats easy or the lessons easy. We were simply driven pointblank against our books like soldiers against the enemy, and sternly ordered, 'Up and at'em. Commit your lessons to memory!' If we failed in any part, however slight, we were whipped; for the grand, simple, all-sufficing Scotch discovery had been made that there was a close connection between the skin and memory, and that irritating the skin excited the memory to any required degree. [Page 16] Fighting was carried on still more vigorously in the high school than in the common school. Whenever any one was challenged, either the challenge was allowed or it was decided by a battle on the seashore, where with stubborn enthusiasm we battered each other as if we had not been sufficiently battered by the teacher. When we were so fortunate as to finish a fight without getting a black eye, we usually escaped a thrashing at home and another next morning at school, for other traces of the fray could be easily washed off at a well on the church brae, or concealed, or passed as results of playground accidents; but a black eye could never be explained away from downright fighting. A good double thrashing was the inevitable penalty, but all without avail; Fighting went on without the slightest abatement, like natural storms; for no punishment less than death could quench the ancient inherited belligerence burning in our pagan blood. Nor could we be made to believe it was fair that father and teacher should thrash us so industriously for our good, while begrudging us the pleasure of thrashing each other for our good. All these various thrashings, however, were admirably influential in developing not only memory but fortitude as well. For if we did not endure our school punishments and fighting pains without flinching and making aces, we were mocked on the playground, and public opinion on a Scotch playground was a powerful agent in controlling behaviour; therefore we at length managed to keep our features in smooth repose while enduring pain that would try anybody but an American Indian. Far from feeling that we were called on to endure too much pain, one of our playground games was thrashing each other with whips about two feet long made from the tough, wiry stems of a species of polygonum fastened together in a stiff, firm braid. One of us handing two of these whips to a companion to take his choice, we stood up close together and thrashed each other on the legs until one succumbed to the intolerable pain and thus lost the game. Nearly all of our playground games were strenuous\u2014shin-battering shinny, wrestling, prisoners' base, and dogs and hares\u2014all augmenting in no slight degree our lessons in fortitude. Moreover, we regarded our punishments and pains of every sort as training for war, since we were all going to be soldiers. Besides single combats we sometimes assembled on Saturdays to meet the scholars of another school, and very little was required for the growth of strained relations, and war. The immediate cause might be nothing more than a saucy stare. Perhaps the scholar stared at would insolently inquire, 'What are ye glowerin' at, Bob?' Bob would reply, 'I'll look where I hae a mind and hinder me if ye daur.' 'Weel, Bob,' the outraged stared-at scholar would reply, 'I'll soon let ye see whether I daur or no!' and give Bob a blow on the face. This opened the battle, and every good scholar belonging to either school was drawn into it. After both sides were sore and weary, a strong-lunged warrior would be heard above the din of battle shouting, 'I'll tell ye what we'll dae wi' ye. If ye'll let us alane we'll let ye alane!' and the school war ended as most wars between nations do; and some of them begin in much the same way. [Page 18] Notwithstanding the great number of harshly enforced rules, not very good order was kept in school in my time. There were two schools within a few rods of each other, one for mathematics, navigation, etc., the other, called the grammar school, that I attended. The masters lived in a big freestone house within eight or ten yards of the schools, so that they could easily step out for anything they wanted or send one of the scholars. The moment our master disappeared, perhaps for a book or a drink, every scholar left his seat and his lessons, jumped on top of the benches and desks or crawled beneath them, tugging, rolling, wrestling, accomplishing in a minute a depth of disorder and din unbelievable save by a Scottish scholar. We even carried on war, class against class, in those wild, precious minutes. A watcher gave the alarm when the master opened his house-door to return, and it was a great feat to get into our places before he entered, adorned in awful majestic authority, shouting 'Silence!' and striking resounding blows with his cane on a desk or on some unfortunate scholar's back. [Page 19] Forty-seven years after leaving this fighting school, I returned on a visit to Scotland, and a cousin in Dunbar introduced me to a minister who was acquainted with the history of the school, and obtained for me an invitation to dine with the new master. Of course I gladly accepted, for I wanted to see the old place of fun and pain, and the battleground on the sands. Mr Lyon, our able teacher and thrasher, I learned, had held his place as master of the school for twenty or thirty years after I left it, and had recently died in London, after preparing many young men for the English Universities. At the dinner-table, while I was recalling the amusements and fights of my old schooldays, the minister remarked to the new master, 'Now, don't you wish that you had been teacher in those days, and gained the honor of walloping John Muir?' This pleasure so merrily suggested showed that the minister also had been a fighter in his youth. The old freestone school building was still perfectly sound, but the carved, ink-stained desks were almost whittled away. The highest part of our playground back of the school commanded a view of the sea, and we loved to watch the passing ships and, judging by their rigging, make guesses as to the ports they had sailed from, those to which they were bound, what they were loaded with, their tonnage, etc. In stormy weather they were all smothered in clouds and spray, and showers of salt scud torn from the tops of the waves came flying over the playground wall. In those tremendous storms many a brave ship foundered or was tossed and smashed on the rocky shore. When a wreck occurred within a mile or two of the town, we often managed by running fast to reach it and pick up some of the spoils. In particular I remember visiting the battered fragments of an unfortunate brig or schooner that had been loaded with apples, and finding fine unpitiful sport in rushing into the spent waves and picking up the red-cheeked fruit from the frothy, seething foam. [Page 20] All our school-books were extravagantly illustrated with drawings of every kind of sailing-vessel, and every boy owned some sort of craft whittled from a block of wood and trimmed with infinite pains\u2014sloops, schooners, brigs, and full-rigged ships, with their sails and string ropes properly adjusted and named for us by some old sailor. These precious toy craft with lead keels we learned to sail on a pond near the town. With the sails set at the proper angle to the wind, they made fast straight voyages across the pond to boys on the other side, who readjusted the sails and started them back on the return voyages. Oftentimes fleets of half a dozen or more were started together in exciting races. Our most exciting sport, however, was playing with gunpowder. We made guns out of gas-pipe, mounted them on sticks of any shape, clubbed our pennies together for powder, gleaned pieces of lead here and there and cut them into slugs, and, while one aimed, another applied a match to the touch-hole. With these awful weapons we wandered along the beach and fired at the gulls and solan-geese as they passed us. Fortunately we never hurt any of them that we knew of. We also dug holes in the ground, put in a handful or two of powder, tamped it well around a fuse made of a wheat-stalk, and, reaching cautiously forward, touched a match to the straw. This we called making earthquakes. Oftentimes we went home with singed hair and faces well peppered with powder-grains that could not be washed out. Then, of course, came a correspondingly severe punishment from both father and teacher. Another favorite sport was climbing trees and scaling garden-walls. Boys eight or ten years of age could get over almost any wall by standing on each others' shoulders, thus making living ladders. To make walls secure against marauders, many of them were finished on top with broken bottles imbedded in lime, leaving the cutting edges sticking up; but with bunches of grass and weeds we could sit or stand in comfort on top of the jaggedest of them. [Page 21] Like squirrels that begin to eat nuts before they are ripe, we began to eat apples about as soon as they were formed, causing, of course, desperate gastric disturbances to be cured by castor oil. Serious were the risks we ran in climbing and squeezing through hedges, and, of course, among the country folk we were far from welcome. Farmers passing us on the roads often shouted by way of greeting, 'Oh, you vagabonds! Back to the toon wi' ye. Gang back where ye belang. You're up to mischief, Ise warrant. I can see it. The gamekeeper'll catch ye, and maist like ye'll a' be hanged some day.' Breakfast in those auld-lang-syne days was simple oatmeal porridge, usually with a little milk or treacle, served in wooden dishes called 'luggies', formed of staves hooped together like miniature tubs about four or five inches in diameter. One of the staves, the lug or ear, a few inches longer than the others, served as a handle, while the number of luggies ranged in a row on a dresser indicated the size of the family. We never dreamed of anything to come after the porridge, or of asking for more. Our portions were consumed in about a couple of minutes; then off to school. At noon we came racing home ravenously hungry. The midday meal, called dinner, was usually vegetable broth, a small piece of boiled mutton, and barley-meal scone. None of use liked the barley scone bread, therefore we got all we wanted of it, and in desperation had to eat it, for we were always hungry, about as hungry after as before meals. The evening meal was called 'tea' and was served on our return from school. It consisted, as far as we children were concerned, of half a slice of white bread without butter, barley scone, and warm water with a little milk and sugar in it, a beverage called 'content', which warmed but neither cheered nor inebriated. Immediately after tea we ran across the street with our books to Grandfather Gilrye, who took pleasure in seeing us and hearing us recite our next day's lessons. Then back home to supper, usually a boiled potato and piece of barley scone. Then family worship, and to bed. [Page 22] Our amusements on Saturday afternoons and vacations depended mostly on getting away from home into the country, especially in the spring when the birds were calling loudest. Father sternly forbade David and me from playing truant in the fields with plundering wanderers like ourselves, fearing we might go on from bad to worse, get hurt in climbing over walls, caught by gamekeepers, or lost by falling over a cliff into the sea. 'Play as much as you like in the back yard and garden,' he said, 'and mind what you'll get when you forget and disobey.' Thus he warned us with an awfully stern countenance, looking very hard-hearted, while naturally his heart was far from hard, though he devoutly believed in eternal punishment for bad boys both here and hereafter. Nevertheless, like devout martyrs of wilderness, we stole away to the seashore or the green, sunny fields with almost religious regularity, taking advantage of opportunities, when father was very busy, to join our companions, oftenest to hear the birds sing and hunt their nests, glorying in the number we had discovered and called our own. A sample of our nest chatter was something like this: Willie Chisholm would proudly exclaim, 'I ken (know) seventeen nests, and you, Johnnie, ken only fifteen.' 'But I wouldna gie my fifteen for your seventeen, for five of mine are larks and mavises. You ken only three o' the best singers.' 'Yes, Johnnie, but I ken six goldies and you ken only one. Maist of yours are only sparrows and linties and robin-redbreasts.' Then perhaps Bob Richardson would loudly declare that he 'kenned mair nests than onybody, for he kenned twenty-three, with about fifty eggs in them and mair than fifty young birds\u2014maybe a hundred. Some of them naething but raw gorblings but lots of them as big as their mithers and ready to flee. And aboot fifty craw's nests and three fox dens.' [Page 23] 'Oh, yes, Bob, but that's no fair, for naebody counts craw's nests and fox holes, and then you live in the country at Belle-haven where ye have the best chance.' 'Yes, but I ken a lot of bumbee's bests, baith the red-legged and the yellow-legged kind.' 'Oh, wha cares for bumbee's nests!' 'Weel, but here's something! Ma father"} +{"id":"RedPajamaCommonCrawl.0022","text":"Best of MHN BOOK BOMB Shelter Sample Chapters & Short Stories The Culture War is Coming For You Whether You Like it Or Not February 11, 2021 correia45 272 Comments THE WOKE: Everyone we don't like is a nazi. If you disagree with us about anything, you're a nazi. That black woman? Nazi. That Jewish guy? Jewish nazi. That old guy who literally got blown up fighting nazis? Also a nazi for not agreeing with us. If you question this in any way? Nazi. And we're going to get crazier and crazier so that we can weaponize this until we can bully everyone into compliance. THE DEMOCRATS: Cool. We can use you useful idiots to consolidate power. THE MEDIA: We are happy to reinforce this nonsense. HOLLYWOOD: We can still keep raping each other though right? THE WOKE: Sure. THE REPUBLICANS: Duuuuuuuuuuuur\u2026 BIG TECH: Awesome, then we'll start installing a dystopian nightmare system that makes everyone you guys designate as undesirable subhuman filth unable to function in society. GINA CARANO: You guys are kinda acting like nazis. DISNEY: FIRED! This post isn't really about Gina Carano. Her firing is just another milestone in the culture war. I've been talking about this problem for about a decade now, as it's gotten worse and worse, accelerating as big powerful lefty institutions discovered that they could harness the fire. You either toe their arbitrary line, or they try to destroy you. And of course, regular people see this and understand it, but they keep their mouths shut because they don't want to get cancelled themselves. Or they actively join in condemning whoever just got cancelled, in the hopes that they'll be seen as friendly. Only that only works temporarily, because eventually the mob will turn on them too. We've seen that happen over and over with \"allies\". You're only an ally as long as you are useful. When there are no Other-Than-Lefty targets, they eat each other in a cannibal feeding frenzy. I've documented a bunch of those here over the years. But as soon as there is an OTL target, they fixate on that. The nail that sticks up must be hammered down. Of course the social justice mobs don't actually give a shit about any of the stuff they claim to. They're just in this to feel powerful. They'll happily destroy any of the groups they're claiming to want to help on any given day. There isn't a lot of rhyme or reason to their bullshit. That's because it isn't about \"the victims\". The oppressed can be swapped out as needed. They're just a handy excuse. Of course the DNC and their allied megacorporations don't give a shit about any of this woke nonsense. They just use the woke as clubs against their foes. They are the epitome of Useful Idiots. They use SJWs the same way they use BLM or Antifa, or whatever disaffected organization they can get some mileage out of today, and then they ignore them when they are inconvenient. You can go look at Gina Carano's tweet for yourself and see how \"Anti-Semitic\" it is. It shows young victims of the Holocaust in a concentration camp labeled Germany 1944 next to a pic of migrant kids in cages labeled America 2020, which insensitively minimizes the magnitude of the horrors of the Holocaust. Oh wait\u2026 Sorry. That tweet was from her costar Pedro Pascal and is in no way controversial at all. My bad. Gina's tweet says absolutely nothing negative about Jews at all. It is about how it was the German people (not just the German government) harming the Jews after a propaganda campaign convinced the people it was okay to, accompanied by an image of a Jewish woman being victimized. Don't take my word for it. Both of these are still screen capped and on the internet. (WordPress is being buggy today and not letting me post Jpegs). So alluding to the fact that some people today are acting like the actual nazis did is a super insensitive hate crime, but those same people literally labeling everyone they disagree with nazis (one of the most evil organizations in history, which logically should be destroyed) regardless of their beliefs is perfectly fine. The narrative will be about how Carano is Anti-Semetic and the regular useful idiots will run with it. Bullshit. She's at worse ineloquent. But that's a lame excuse too, because I'm a really successful professional wordsmith, and these same fuckers keep trying to cancel me for all sorts of insane made up nonsense things I never wrote. It doesn't matter how clearly or understandably you state your point, they'll just twist it into whatever horrible thing they want it to be and run with that instead. If I recall correctly the last time they labeled Gina Carano as Anti-Semitic it was because she put up the famous picture of the lone man in the crowd who DID NOT SALUTE and something about be that guy. Back when Americans actually learned history, we all knew this picture. And somehow the historical ignoramuses took that and ran with it to prove she was a Jew hating nazi\u2026 which is literally fucking backwards as to the point of the meme. But it doesn't matter what you do or say. They just lie and make shit up. And when she didn't bend the knee, that made her target number one. People are supposed to cower before the mob and apologize and beg forgiveness. It doesn't matter if you did anything wrong or not. That's how it works. Celebrities, big companies, it doesn't matter, you have to do the public show trial apology to placate them (actual behavior doesn't matter, just the show) And if you don't, it makes you a continual target, and they will keep coming after you, over and over, forever. People making excuses for the cancelling are fools. They might even be well intentioned, but they are still fools. They are allowing the left to weaponize internet outrage into a tool that can be used to selectively dehumanize and remove voices that stand in the way. They tested this out on the most extreme voices, and when they got away with that without too much backlash, they keep working their way inward, labeling the next level extreme, and then the next, and the next. So on and so forth, until everyone who isn't in lockstep compliance with the leftist orthodoxy of the day is a dangerous extremist. And in just a few years we've gone from don't let those dangerous extremists share their dangerous extreme ideas on certain internet sites, to they shouldn't be allowed to have jobs, bank accounts, credit cards, or any ability to communicate. While the bar for \"extremism\" has been lowered to include basically whoever they want at any given moment. \"Hey, why is a Detroit election van dropping off dozens of big mystery boxes to the supposedly shut down vote counting center at 3:00 AM way after the deadline? There are several angles of this event on security camera videos. I don't know. Maybe we should audit that or something?\" -Shut up, you extremist insurrectionist domestic terrorist. Now we need to remove you from society for everyone's safety. We're slouching our way toward a Chinese Communist social credit system, only because it's disorganized and coming from multiple allied angles instead of codified by a central committee, people are acting like it is fine. The problem with what Gina Carano said isn't that our modern left acts like nazis, it is that any historical comparison will never line up perfectly because we live in different situations\/cultures. People get all fake-outraged like \"how dare she compare the bullshit we are putting modern republicans through currently to the absolute horrors suffered by Jews!\" except that the butt hurt people are picturing 1943 level nazi evils, when our current modern left is probably only about at a 1933 level of nazi fuckery. The Nazis didn't suddenly appear on the scene and kill millions of people overnight. It took years of consolidating power, propaganda, and growing evil. Today the left is still pushing and seeing what they can get away with. Both them and the nazis used statist control freak behavior designed to dehumanize and remove all opposition to their power grabs. Our modern left has not got to the cattle cars and concentration camps part\u2026 yet. This may hurt some feelings, but this comparison is far more accurate than the casual, tiresome, endless \"everyone I don't like is a nazi\" line they use against all of us (regardless of our actual beliefs). I'm not saying that Gina Carano getting fired is \"tyranny\". I am however saying that her firing is yet another warning to entertainers and people in the public eye that we must always comply with the rigid groupthink narrative, or they'll never work for the handful of megacorporations which absolutely dominate their industry ever again. Meanwhile, if you have the proper politics you can apparently be a horrible piece of shit and get a pass for years. The message is clear. Be on the winning team, or else. The left has paid attention to the culture war for a long time, because they understand the value of entertainment products for shaping philosophy. They locked up most of publishing years ago, and writers like me who talked about it got dismissed as cranks. Then they did video games, comic books, RPGs, podcasting, Youtubing, whatever, it doesn't matter, if it is something that they can sink their hooks into, they will, and then they'll go about driving out everyone who doesn't toe their line. They did the same thing to academia. They did the same to news. So now all your entertainment, education, and information has to follow leftist orthodoxy or else, and that's been growing and accelerating for years\u2026 and yet conservatives are continually shocked when the left sets the tone and the rules of discourse in our culture, and yet they roll over and act like all this culture war stuff is meaningless. It isn't. Don't think you're safe. It is coming for you too. Gina Carano is a wildly popular actress on the biggest show streaming. The rest of us are nobodies in comparison. So what happens when one of us says something that could be construed as bad? (and as we've seen, they can declare anything bad). You're fucking toast. The message is clear, you think wrong, you'd better keep your mouth shut or we'll ruin you. It's the same reason they've gone nuts censoring social media for the last few years. They want you to feel isolated, alone, and unable to speak (if you speak you might discover that you're not alone). If you go someplace else to talk to people who agree with you, they crush those places. They can't allow dissent. We all have to agree or else. They need to control the space so that they can label all dissenting views as fake news. If you go someplace that doesn't adhere to rigid leftist orthodoxy, then you'll get mocked as being in a \"right wing echo chamber\", which is ironic considering since they control all entertainment\/news\/media\/publishing you'd basically have to live in a cave in the forest to avoid being exposed to leftist views. And the powerful lefty institutions fucking love this. Because this gives them a giant club to dominate American culture. (Those 1933 nazi propagandists would have loved the internet!) People ask me what the solution is. Sorry. I don't have a good easy answer. I'm just a pebble in the avalanche. Fisking the WaPo Editor Who Is Sad He Doesn't Get To Act Like The Mafia Anymore Read the Room, Jeep! Previous PostRead the Room, Jeep!Next PostFisking the WaPo Editor Who Is Sad He Doesn't Get To Act Like The Mafia Anymore 272 thoughts on \"The Culture War is Coming For You Whether You Like it Or Not\" Erik Testerman says: \"Disney canceled Gina Carano apparently because of a social media post where she highlighted the dangers of dehumanizing others, but they rehired JAMES GUNN who made numerous disturbing remarks about rape and pedophilia,\" Cheong wrote. \"Just so you know, this is where Disney stands on morality.\" https:\/\/www.dailywire.com\/news\/gina-carano-dropped-by-talent-agency-after-star-axed-from-disney-show-over-social-media-post?utm_source=facebook&utm_medium=social&utm_campaign=benshapiro&fbclid=IwAR2ugIekDlIM7yo9c-vYV1Pv89wZt8LS4TeKFpOMB1E8JFMCJdhwy_EL7zs Nicki says: It addition to them licking China's taint by bowing to the genocide in Xinjiang in the Mulan movie. Screw them. Kristopher Poitras says: All I've seen today are posts about the horrible \"anti-Semitic\" post from her and how she deserved to get fired. And when I commented that in fact it was not Anti-Semitic at all, I was quickly informed that I must be a white nationalist Trump loving Nazi. Yeah. That's it. So, if your opinion differs from theirs in any way, you must be evil. Synova says: Almost worse is the person who \"helpfully\" points out that it doesn't matter if she thinks that it's antisemitic or not, it only matters that a Jewish person might think so. Elevating the abandonment of your own discernment to a virtue is chilling. Making it a moral mandate that others must also abandon their own discernment is scary shit. Cadeyrn says: Interestingly, it doesn't look like the SJWs actually asked any Jewish people about their opinions. A work colleague who is Jewish commented to me: \"What she posted isn't anti-Semitic. Refusing to see how the Holocaust began with dehumanizing others is the thing which denies the Holocaust and is anti-Semitic.\" He then went on to crack a good joke about who's a rebel against which empire that I can't effectively reproduce. Redneck Irish Jew says: I am Jewish. There was nothing anti-semitic about Carano's comments. Only some Goyim ultra liberal douche would interpret Carano's post as insulting to Jews. I can't stand it when waspy a-holes tell Jews when we should be offended. Disney Boys, we let you know when it happens. Your first clue will be the garden hose spray of blood escaping your sapheno-femoral junction, and your second will be when the flames of hell are warming your backsides. Anyway, Disney was looking for a reason to can her. The minute she tweeted something that they could CLAIM was offensive, that was it. Whether it really was offensive meant nothing to them. The tyrant will always find a pretext for his tyranny. Fen says: \"Whether it really was offensive meant nothing to them\" Fen's Law: The Left doesn't really believe in the things they lecture the rest of us about. Applied here, it means they don't care about anti-semitism. We can argue it wasn't anti-semitic till we are blue in the face and it won't make a difference, because that's not their true position. They aren't there. We are shelling a hill they never occupied to begin with. Wasting time, energy and ammunition. Carano had to be punished because she spotlighted how the Left's dehumanizing propaganda is the same tactic used to radicalize the German public into harming the Jews. To the Left, it is bad timing to have that warning placed in the public consciousness, as it ruins any surprise they intended to inflict on us. Now the rollout for the hotline to report your neighbor's Wrong Thought must be postponed? All they've done is create a Streisand Effect. Her message is reaching thousands instead of the hundreds if they had just left her alone. One more reason why I encourage us to fight back. If we don't get on the field, the other team can't score an own goal. History is full of causes that were hopeless until Murphy was given a chance to intercede. Although I am reading that Carano's agency has also dumped her. I hope her sacrifice isn't for nothing. I wonder how many more of us this has to happen to before something is done. That Other Ogre says: Fen, I like the law, but it's only half accurate. Certainly there are lefties who use the outrage solely as a club, but even worse is that there are those who *actually believe all that shit*. \"True Believers\", \"Useful Idiots\", \"Painfully Naive\", take your pick. But I've got\u2026 well, former close friends who fall into the category. It's depressing to watch. :-\\ Joe in PNG says: Part of being Woke is knowing What Minorities Think & Feel better than the minorities themselves. Mary Catelli says: That's just the start. The full-blown Woke is when you know that if someone doesn't agree with you about What Minorities Think & Feel must not be a minority. (See Biden about voting for him and being black.) junior says: Either that, or the minority is so cowed by the presence of his or her white oppressors that the minority is afraid to speak out in his or her own defense. And so the white progressive must speak out on because the minority is too scared to do so. \"so the white progressive must speak out on because the minority is too scared to do so.\" Yah, it's the soft bigotry that the minority is not capable of defending their own interests. These people use black corpses as props to Virtue Signal as Righteous Dudes. It's sickening. Worse, it's now against their self-interest to end oppression, because they would run out of props to boost their self-esteem. I am expecting a whole new round of Virtue Signaling to compensate for the knowledge that the stole an election. On some level, they have to know they cheated their fellow countrymen. In my experience, the sequence goes 1. The minority agrees with me! 2. The minority is too frightened\/suffering from false consciousness to realize the truth. 3. The minority is an imposter (when it dawns on them that that much resistance to their wisdom can not be fear or ignorance). But no doubt there is variation. Agent Fen says: Well\u2026 I'm feeling a bit ironic right now LOL I just dumped a rant about it on FB (have been avoiding FB for a while but this pissed me off). So I'm probably in for it. I did throw ad some additional background for people. \"I don't know how many here have ever gone to the \"Museum of Tolerance\" but I took my daughter to the LA branch once for a school report. One of the most unsettling exhibits was called \"Ordinary People\". It documented how most ordinary citizens, at best, did not oppose what was happening. Many took active part.\" hooodathunkit says: \"One of the most unsettling exhibits was called \"Ordinary People\". It documented how most ordinary citizens, at best, did not oppose what was happening. Many took active part.\" That's the takeway from Carano's first meme about dehumanizing neighbors. Very powerful, on point, and (unfortunately) very timely. Shadowdancer Duskstar \/ Cutelildrow says: This was repeatedly pointed out again and again. Larry's been doing it for far, far longer than I have. The crime you're punished for is mere disagreement against 'those who are better.' The moment we gave up reason and the ability to discern, and the ability to say 'no' and back it up was when the culture war was lost. And I hate it. Br'er Tiger says: I don't say it wasn't anti-Semitic (at first). I ask them to explain how it was anti-Semitic. They are usually just repeating what they've read, and haven't even seen it themselves. Brena.B says: This has been going on for well over a decade. I lost an IT training job in the Albany, New York area back in 2001 for the crime of reading a gunsmithing book on my lunch break. I was actually called into the head of the company's office and told not to do that again, because it made people uncomfortable. A little over a month later, I was \"downsized.\" Even though my student assessments were excellent. Gail Finke says: My son, now 25, was reprimanded by his first grade teacher for having a book about the American Civil War, with contemporary battleground photographs, in the classroom. The book was FROM THE SCHOOL LIBRARY, and he had checked it out during library time. \"It's a trap!\" -Adm. Ackbar Mel Todd says: Lol \u2013 I got fired once because the owner found out I played DnD (technically I was playing White Wolf VtM but ..) and was actually scared I was raising demons and doing magic. Seriously if I could do that would I have been working at that job? Heresolong says: Nothing says \"nerd level 20\" like pointing out that it isn't actually Dungeons & Dragons that you play. Ask me how I know. ???? Marisa says: I think the uproar about D&D lasted for like one minute after the 60 minute program. Its certainly not religious people who have problems with it, as many( like Larry) are involved in playing it or ( like Tracy Hickman) writing it. Sadly, getting fired because you read American history seems far more likely today. Ron Griffis says: As always, on point and well said. Karl Lembke says: And this meme, of course, is a violation of Facebook's community standards. I got a nasty note from them when they yanked my comment. https:\/\/knowyourmeme.com\/memes\/everyone-i-dont-like-is-hitler They don't like the truth. Especially when it's presented in such a gloriously deft way. J.M. says: Timing was really convenient since Josh Whedon got #meetooed by almost the entire female cast of Buffy this week. Almost as if Disney wanted to shift attention from the bad behavior of the director of multiple blockbusters. aivanther says: I'm sure it's all a coincidence. Carano's been drawing a lot of fire lately from the SJWs who wanted her fired from The Mandalorian. It started when she refused to put her pronouns in her Twitter profile. \"That Other Ogre, M44, fuck\/off\" Did I get the format right? \ud83d\ude09 Beans says: And yet, nothing happened to JW and he's still living high on the hog. Blake Redfield says: Not exactly; he'll still be suffering from these allegations by not having any work at Disney or the other studios, no invites to cons, plus a whole lot of other things, most likely. Interesting that nothing's been heard from Alyson Hannigan or her hubby, Alexis Dennisof. gmmay70 says: nazis (one of the most evil organizations in history, which logically should be destroyed)\" And the International Socialists \u2013 who said, \"Hold my beer\" \u2013 get wistful homages in the NYT. Joe Vasicek says: Yep. The Nazis were certainly evil, but the Russian Communists were worse, and the Chinese Communists were the worst of all three. But Disney apparently has no problem taking their money, or using the slave labor of their Uyghur concentration camps to make movies, TV shows, and other products. Jordon Petterson an interesting take on how the horrors of the Nazi pale in comparison to the Marxists, but no one is taught the history today: https:\/\/youtu.be\/NDTbNmUgeXk 120 million murdered in the last century alone. boballab says: He also has a lecture where he tells his students straight out that over 90% of them, if they lived in Germany in the 30's into the 40's would have been a Nazi or at minimum just fell inline. https:\/\/www.youtube.com\/watch?v=tVCAhGL0ohw&t=150s I guess the only question is, does anyone outdo the Nazis on a murders per year per capita basis? It would be a difficult equation to solve, given the fairly rapidly shifting political boundaries of the time, but I'm sort of vaguely imagining it as \"number of people murdered divided by number of people under political control over time that political control was held\". Like, *numerically*, Pol Pot didn't kill nearly as many people as the Nazis, but it was something like 25% of the entire population of the country he controlled, in what, four years? So while raw numbers certainly have relevance, and I'm absolutely not saying that \"there are lots of Chinese so it was less bad when Mao murdered a whole fuck ton of them\", I do wonder if we can come up with some sort of \"Evil Factor\" that takes the variables into account. Is it worse to murder a million people out of a population of a billion, or 95% of a population of 100,000? Does it matter if you commit the murders over the course of 100 years instead of all in one week? Yeah, I realize that I'm super weird. Wishing for \"like\" button. I have to admit that it always frustrates me when otherwise intelligent people seem to be under the impression that the political spectrum runs from \"International Socialism\" on the left to \"National Socialism\" on the right, with no other options. It is a bit of deliberate obfuscation by the Left, that one is either with them on the Right Side of History, or is a nasty Nazi. Tamara Wilhite says: The site MyLife is trying to do exactly that, and they're now adding the \"social\" aspect \u2013 by saying your score is lower because you have connections to low scoring people. This system could easily be expanded by correlating gun permits, hunting licenses, voting data and FEC donor data. There was already a \"Trumpwatch\" list in hit list format showing the names, addresses on a map and donation amount of conservative donors. TarsTarkas says: How do you know they aren't diddling with your score whether or not you are connected to low-scoring people? Answer. You don't. That's pretty devious \u2013 it serves to isolate those with \"wrong thought\" Although I think the conservative boycott tactic is wrong. We keep falling back to a new position, only to have that position likewise compromised by Marxists because we aren't actually fighting the cause of the compromise. Ditch Google for Bing, and when Bing becomes infested with SJW moderation drop back to DuckDuckGo, and when DuckDuckGo becomes infested\u2026. The tactic is not sustainable. Even Drudge has gone wobbly. At some point we are going to have to make a stand. Dan Lane says: O'Sullivan's law, friend. Also Jerry Pournelle's Iron Law of Bureaucracy. The first states that any organization not leftist will *become* leftist over time if not explicitly guarded against. Leftism is entropy, and will destroy the organization from within. The only way to survive is to cut it out, root and branch. Normies will create a thing, an organization. They will be dedicated to why they created the thing, and how they do it. They will hire people based on their ability to do the job, because they want their thing to succeed. Leftists don't think that way. The leftist will hire based on ideology. Leftists and *only* leftists will be hired by that person, once they have the ability to do so. The organization will become leftist over time in this manner, and the reason for its existence will be completely erased. It will become yet another organization based on leftism, supporting leftism, and agitating for more leftism. The Iron Law of Bureaucracy does not only apply to government bureaus, but to most any organization these days. It states that in any organization there will be but two basic kinds of people: Those devoted to the goals of the organization, those who joined or started it to do a thing. And the second, those devoted to the organization itself. I'm sure it is clear how the two dovetail in practice. Bryant Kingry says: Perhaps a Cina Garano character will make her way into the eventual MHI screenplay\u2026 David Tygart says: Part of the difficulty inherent in attempting to follow the dictates of the Woke crowd is that those dictates change so often because they believe in nothing. I would prefer to maintain my beliefs. Oh they believe in something. Power. The accumulation of it, along with cash and babes (or boys). The constant changing is so that they can sort out who is paying attention and doing the necessary labor to remain up to date. If you're using the respectful language of 20 years ago, you're clearly a hater because you don't bother to stay current. Ashley R Pollard says: A good point. All this furore reminds me more of Stalin's purges than Hitler's madness. For example, people being purged and their likenesses removed from pictures of them with Stalin, Cancelling people strikes me as a more modern version of this. Both Hitler and Stalin and Mao committed purges against identifiable population groups. Just Stalin and Mao had better PR specialists working for them, often in our own State Department\u2026 \"Part of the difficulty inherent in attempting to follow the dictates of the Woke crowd is that those dictates change\" That's deliberate. The goal is get you accustomed to denying reality, because if they can force you to deny your reality they control your reality. So they keep changing Wrong Think from one frivolous denial to another. It's not the actual Thing that matters to them, it's the ACT of getting you to deny a Thing. So many more Things will be declared out of bounds. Tomorrow the color \"Blue\" will be designated racist. And once they have our neural pathways established to deny truth, quite a number of people will convince themselves that it is indeed racist, simply to avoid the dissonance in their head. Athena M. says: I keep telling people to re-read 1984 and then think \"why bother, they're living it.\" Sardaukar says: Athena, I've had better reactions to having folks watch the movie 1984 than read it first. It's a very powerful flick. Several have then gone out and read the book afterwards. Have 'em watch Terry Gilliam's Brazil. I think we may approaching that sort of dystopia more closely. Ferric says: Brave New World all the way if you ask me, though Brazil gave me awful nightmares. Kristophr says: It is getting to the point when you have to move to Eastern Europe or Russia to avoid this Orwellian crap. Emilio says: There was a novel about that, but I cannot remember the title or the author\u2026 Shigor says: probably Hogan's Multiplex man (or possibly some other novel, I'm not sure) \u2013 I remember how funny it seemed in nineties that Eastern Europe would stick with liberty while the rest of the world would devolve to totality we've been through. Not that funny anymore. Eastern Europe is holding up a bit and will hold up for some time, but considering how the rest of the EU sees us and how part of our politics are either oldschool commies (rebranded in other parties) or getting woke for the younger generations, not sure if it will hold much longer. Considering that Biden is going for gun ban we here in Czech republic will be probably the last country that allows assualt rifles for self defense for normal citizens, so I won't have to lose content of my gun safe in a boating accident for some time just yet. But Russia \u2013 the Orwell is actually strong with this one. Goverment mandated cameras in cars, internet under \"control\"\u2026 That's how there are so many 'Driving in Russia' videos out there. Downloaded from the mandated cameras and monetized. Christopher Schwehr says: I pray that eastern Europe will hold out for some time, but when you're in between two separate madhouses (one gradually devolving into izlamist tyranny and the other having never really recovered from the collapse of the Soviet Union). Perhaps a mutual protection pacts amongst some of the eastern european nations will come about? Bugmaster says: Yeah, I would avoid moving to Russia if I were you; at least, not unless you genuinely love Putin and never expect to criticize him in any way. Otherwise, you risk accidentally slipping on ice and falling backwards onto a bullet 9 times in a row. You know, natural causes. Well, at least you would know who your enemy is. I spent all of yesterday at Ace's trying to explain that maybe Barr wasn't a Super Secret Deep State Agent, maybe he backed off because he lost faith that we would support him. And I am still not certain if I am right. There have been so many betrayals that I no longer know who to trust. Rob Crawford says: You've noticed that one of the right's weaknesses is the speed with which it bayonets it's own, as well? Instapundit has hordes of commenters angry whenever they see an article they disagree with linked, and not all of them are trolls. We can't win by mirroring our opposition; we need to be smarter, which means not cutting off sources of information just because we don't like what they say. Too old to move that much\u2026.If they come for me one day, the best thing to do is just make sure I take a large honor guard to Valhalla with me\u2026 Vatertortuga says: While I don't subscribe to that religion, I find myself wanting lots of company from the opposing team when I go before the throne for judgement. \"make sure I take a large honor guard to Valhalla\" It won't go down that way. It will happen one sunny Spring morning, a knock on your door by a polite young policewoman asking you to come downtown to answer a few questions from detectives. \"No need to call your daughter, we found her picking up the kids from school. They're waiting for you now but appear distraught. If you like, we can let you see them before the interview?\" And while you are being processed a SWAT detail will comb through you home for weapons. Concerned neighbors will be warded off with implied references to distribution of narcotics or child pornography or whatever will cause them to abandon any defense of you. And you will disappear. The next face you see will be mine, offering you a piece of my rat in exchange for news about the world outside the camps. Ian Bruene says: Kindly explain how to perform this 100 million times, with no slip ups, and fast enough that no one figures out the game. Show your work. It's not about figuring out the game, it's about being able to do something about it once you realized it's being played and they are all against you. As for showing my work, I give you the 20th Century dictatorships of Lenin, Stalin, Mao, Pol Pot and others. Prove me wrong. Yes it is: the entire reason to pull that kind of trick is to confiscate without triggering a mass uprising. Once everyone figures out the game they know the red line has been crossed. Your question reduces to \"Will Americans rise up?\". That can't be answered 100% until it happens or not, but the trend line is pretty clearly pointing towards \"yes\". And they still believe in their hearts that if they back us into a corner and make it clear that we no longer have anything to lose that it will all go their way. Belief in the inevitable superiority of the Aryan race (or in this case, the fascist left) was also the downfall of the nazi's. \"believe in their hearts\" Why shouldn't they? We keep teaching them that there are no consequences for backing us into a corner. After a certain point we share blame for our oppression. California is fairly unique in that \"political affiliation\" is a protected class and being fired for political beliefs or activities is considered wrongful termination under CA labor law. I've pointed this out several times and I get \"ok, yeah, but Gina's tweet compared Republics to Jews in the Holocaust and that's NOT political\" I shouldn't be surprised but how the hell do these people function in real life ? Also, she never mentioned Republicans or conservatives, but rather people whose political views are different, which means she can totally claim that. Disclaimer: Not a lawyer It's not what the law says, it's how it's interpreted and enforced. Republican and conservative aren't political affiliations, they are masks the Avowed Enemies of Freedom and Everything We Hold Dear hide behind to destroy our fragile democracy \/ sarc \"how the hell do these people function in real life ?\" Most of them don't, frankly. I forget where I saw this, but something like 20% of households in the United States don't have a single income earner, and that's held fairly steady for several decades (if someone else has a source for that, please correct me). Prescription medication. The docs have been writing them up like we are lab rats in a beta test. I still have a few Woke friends (because of Archery) and they are easily on 4-5 meds to deal with mental health issues. It can be a little scary once you realize you are not dealing with a Person but with some very potent drugs. If the walls ever come down, the pharmacies will close and these people will go stark raving mad. Do not be at all surprised by what you witness. Anything is possible. Hopefully we can allow people who need medication the dignity of not having to purchase street drugs. I would think the FBI has better things to do then to frighten doctors, but there you have it. People who take medication are people, btw. They don't turn into medication themselves. One of the refrains I hear is \"human rights are not political\" which sounds nice on its face, I guess, but is arbitrarily applied. Chrismouse says: Their concept of human rights includes the right to an abortion, for teenagers to receive abortions without parental knowledge or consent, and children and teenagers to receive puberty blockers without parental consent. Also that education, healthcare, and housing are human rights. So really they are saying that nothing is political at the same time they are saying *everything* is. Well, it would imply that political opponents have human rights, looked at from one direction. But mostly it means that if you complain about injecting politics into something non-political, like football, that you're erasing and denying the rights of people whose identities are political in special ways that other people's aren't. Exactly that. I've seen that argument play out so many freaking times on every corner of the internet. If I so much as say, \"Hey, I go to cat groups so I can escape from the world for a little while, please leave the current events somewhere else,\" then I'd have a gazillion people pouncing on me and saying that I'm \"sheltering bigots\" or some nonsense. Gina has always been my pick for Julie if an MHI movie or series ever happens. As always, Larry nails the situation perfectly. Oh, Gina Carano with glasses! Nanashi says: She's not a redhead. The Phantom says: Hair dye for the win. I'm pretty sure she actually naturally has red, or red-tinted, hair. I'd go with her for Heather, anyway. She has the right physical presence for a force-of-nature character like her. I was reading Erik Larson's history about the first American ambassador to Nazi German in 1933, a book called \"In the Garden of Beasts,\" and near the end he shares a quote from a British observer that I shared with my students today in context to this. The observer wrote on the National Socialist movement, \"All the young are in the net, anyone who tried to keep out of being a Nazi is hazed until they change their mind; a form of mass cruelty which exists only in such a country.\" After reading this I replaced \"Nazi\" with other forms of ideology in today's world and asked if it sounds familiar. Insectress says: A dude I went to grad school with is all about how all conservatives and\/or Republicans are evil, and how all forms of Christianity are based on perpetuating white colonial and racist beliefs and power structures. I know for certain that if he knew anything about my politics or beliefs, he would attempt to doxx and smear me. I mainly stick around to get a look into the thought processes of the woke. See the thing the wokistas don't know is \u2026 We can keep our mouths shut. They can't. And we're studying them. Ronald Stier says: When members of the National Socialist Workers Party hate being called National Socialist Workers Party members . They're member of the National Sockalist *Wokester* Party, which is clearly better, because reasons. Just throwing my 2 cents in: Gina carero is correct in her analysis. The use of mobs to enforce government will is common in history, from witch trials, to protestant persecution during the European wars of religion, to many programs against Jews, the Armenian genocide, African genocide, suppression of blacks post civil war in the southern USA, to abuse of whites in south Africa post Mandela. Government troops didn't have to get their hands dirty with mobs and militias doing the grunt work. In addition while government agencies are sometimes constrained by law, mobs of brainwashed people are not. My apologies for poor grammar. Typing on a phone is not my forte. I'm waiting for the Theme Police to start censoring ebooks at Amazon. You -know- they're going to do that. Just a matter of time. LOOKING FOR A MONSTER HUNTERS FAN SITE I really love this series and want to find a fan site to discuss fun stuff like \"Do werewolves go into heat?\", \"Does Owen Pitt have a brother named Brad?\", or \"Franks vs\u2026 , who would win? As this site apparently has nothing to do with MHI, I was wondering if anyone here has a good recommendation? correia45 says: There is a fan page on Facebook (Monster Hunter International: Hunters Unite) and a fan page on MeWe (Monster Hunter Nation) and my newsletter (the sign up is on this page) is only book related stuff. But since I'm the guy who writes MHI and this is my personal blog where I can write about whatever I feel like, oh well. Don't like it. Keep on scrolling. I don't give a shit. \ud83d\ude00 Thanks for the links, and can't wait for the next book! Also, you're obviously right about you doing what you like with your site. Still, may want to add a political discussions tab so everyone can find what they want. Otherwise, it's kind of like going to remington.com and finding nothing but cornbread recipes. No matter how much you like cornbread, it's not what you were looking for. No skin off my nose either way, but doing something simple that works better for everyone is almost never a bad thing. And it isn't simple at all. But thanks for the unheeded advice about how I should conduct my business. But I've been doing this for a long time and probably know more about how to be a successful writer than you do. One of the reasons I'm as successful (after being consistent in quality and prolific in output) is because I'm part of the tiny percentage of authors who openly deviates from the mushy oatmeal of Manhattan publishing groupthink. I just gave you three mostly politics free resources. I'll be damned if I shut up on my personal blog to suit you too. \ud83d\ude42 Besides, as we've seen with dozens of other writers\/actors\/influencers who are Other Than Left, I could hide all my personal politics in the deepest darkest hole, and someone would still come along and complain that wasn't good enough and I need to hide them more. Now, if I was a leftist on the other hand, then I could say whatever I wanted with impunity, be cheered for it, and get a lot of money worth of free advertising from the adoring media. So you'll live. \ud83d\ude00 Then there's the fact that a lot of us originally came for the political rants, and stayed for the stories. Same. I found this site because of his Opinion On Gun Control. The fisk re Tony Stark was gravy. I stuck around because I want to write, but I keep getting hung up on character dialogue. I don't understand how people can stand around in a night club and talk about \"nothing\". It's a huge blindspot for me. Plus, after reading his tips, I am not sure if I have the discipline to do what he does. On the bright side, I'm learning about a host of good authors I was ignorant of. I stalled on Poul Anderson and Frank Herbert, so coming here was like finding pirate treasure \ud83d\ude42 I have a ton of reading to catch up on. And I have yet to read my first Monster Hunter book. Do you envy me? What should I start with? Stuart the Viking says: Fen, I am also a wanna-be writer, so take this with a grain of salt. If your characters are standing around talking about \"nothing\", then I think that's part of your problem. Pointless dialog is pointless. You can, however, use pointless-seeming dialog as a window into a character. As a way to show the reader what kind of person your character is. If they say \"How about those Mets?\" Is the character a baseball super-fan? Is he secretly making fun of baseball super-fans, or being funny? Or is he one of those people who are unable to relate to others without the crutch of talking about sports? Thanks Stuart. And I think I get it. Pointless dialogue doesn't have to be pointless. We can give it purpose. I may try parking myself where people engage in small talk and actually listen till I get the hang of it. Yes. You should go stalk someone else instead of me, guy who has commented over 30 times in the last day. That sounds like a splendid idea. Yah sorry about the 30 comments. I was awake all night and the people here were interesting. Hey Steve, would you mind terribly if I came into your house and reorganized your 8-track collection to suit my tastes? Interesting what you choose to respond to. If Steve was unaware he transgressed, I'm pretty sure our host set him straight. Why do you need to peck at him? Are you a Thread Vulture, picking over carcasses already mauled by the Lion? Nah. You smell like a bully from here. Why don't you go back to spreading lies about me. It's more entertaining. \ud83d\ude42 Says the guy spamming up the thread making demands that other people indulge his revolutionary fantasies. But I'm the bully. Self Awareness 1 General Fen 0 So pointing out that these little narcissistic demands that blog owners write about what you want them to write about seems to have you tilted a bit. Interesting. And please, do go on about the \"lies\" I'm telling about you, General Fen of Teen Girl Squad. Not sure what happened to you lately, but Triggered Projecting Asshole Narcissist isn't a good look for anybody The notion that her tweet was anti-Semitic is a complete and blatant lie. And as a Jew from the Soviet Union, with half my family having been murdered by the actual Nazis and their civilian accomplices all over Europe, I am sick of these leftist scum using me as a cover in their fascist takeover. kamas716 says: Those shouting \"Nazi\" the loudest are the ones conforming most to the actual policies of the Nazis. I sent Disney+ some feedback this morning and pointed out that they just proved how right her tweet actually is. I doubt they have the self awareness to understand that though. Ah, but we're 'good' Nazis! So that makes it OK! Kanan Jarrus says: Hopefully they will realize the error of their ways when we all cancel Disney+ right back. Funny how quickly they fire a woman who has an opinion that isn't in lockstep with leftist ideology. Never think that they don't \"understand.\" They understand just fine. This is policy, not a mistake. This is the hill Disney has chosen to die on. (Corporately speaking, of course.) We should respect their choice and help them along with it. ~:D Brad R. Torgersen says: Seeing the cookie-cutter attack headlines which sprang up in 24 hours, it's making my eye twitch with memories about SP3. Same thing happened to us back then. I imagine Disney's Carano-haters had their fingers poised on the SEND button ready to launch the same attack verbage to all the culture geek punditry and media. It's all lies, of course. Carano said nothing bad about Jews, and never has. \"Abhorrent\" is a wholesale creation of the Carano-haters. They are depending on people to not research what Carano actually posted. Guaranteed those same people are the ones whose antisemitism is purely conditional. the Lucas Film statement that Carano's statement \"denigrated\" people and cultural is a bald-faced lie. And they do it because no one will contradict them. I went and read what Carano said as soon as I saw this thing blow up. Saying that the shirtstorm is \"all lies\" is like calling the Titanic a \"boat.\" Technically true, misleading by understatement. ~:D Why they -really- hate her is she's right. That's the unforgivable sin these days, calling the Left on their bullshit and getting a bulls-eye on them. Oh well,"} +{"id":"RedPajamaCommonCrawl.0023","text":"Posts Tagged 'real nba jerseys for sale' But what they held was far more repulsive: a sex, 30 mar\u00e7o, 2018 But what they held was far more repulsive: a recruitment flier for the Ku Klux Klan titled \"AMERICA WAKE UP,\" packaged with a roll of cheap candy. Was it a genuine. 12, 2017\u2033 > >Politics sully cost benefit analysis of regulations Scott Pruitt, the Environmental Protection Agency administrator, announced Monday his intent to withdraw the Clean Power Plan. An iron man at center for the Packers for 12 seasons (1973 84), McCarren played in 162 consecutive games the fourth longest streak in team history helping him earn the nickname \"Rock.\" He was voted to retro basketball jerseys the Pro Bowl in 1982 and '83. Earlier, he had been a co captain at the University of Illinois as both a junior and senior. McCarren, 65, originally is from Park Forest, Ill. 5th Round Pick: Shelton Gibson, WR The Eagles are deep at receiver, so Gibson not dressing is not fully stitched nfl jerseys as bad as Pumphrey being a healthy scratch. Fifth round picks http:\/\/www.cheapsoccerjerseyschina.com\/ are not expected to contribute right away, so Gibson not playing against the Redskins is not a huge deal but the rest of the rookies around him not playing does make it look bad. The Jets and Bills could be in the QB market and getting in front of them is a must. The Titans' primary need is at wide receiver and moving down a few spots wouldn't prevent them from securing the replica jerseys draft's top pass catcher. So the two teams that swapped spots last season can do it again. Elliott, the fourth overall pick of the 2016 draft, has three business days to file an appeal, which he is planning to do according to a statement by his attorneys. The appeal would be scheduled \"promptly,\" according to the letter the NFL sent the running back. The Cowboys, the reigning NFC East champions, are set to open the season a month from Sunday against the Giants. If the suspension is upheld, Elliott would be eligible to return Oct. 29 against the Redskins. How does the NFL Draft work? 28 Apr From the section American football Read more on NFL Draft 2017: How does it work?Excited about the new NFL season? Get involved Our guide to everything you need to know about American shop nhl jersey football and how you can get involved in your own 'game day'. Related: 12 Actors Who Massively Transformed Themselves for a RoleSometimes you need extra support, which is why svelte actress Elizabeth Rohm (\"Joy,\" \"American Hustle\") heads to Live In Fitness cheap basketball jerseys whenever she can. \"When my schedule allows it, I love intense, immersive workouts like the ones Eric Viskovicz crafts at Live In Fitness,\" she said at the Fit Club TV Grammys event. \"But in between those visits to Eric, I rely on the classics: body sculpting classes and basic weight training mixed with hot yoga.\" all nfl football jerseys. Tags:best place to buy basketball jerseys, buy original football jersey online, cheap custom team football jerseys, real nba jerseys for sale, where to buy jerseys They use this as a way to keep you distracted seg, 22 janeiro, 2018 They use this as a way to keep you distracted. At the time he issued a statement saying, am not going to stand up to show pride in a flag for a country that oppresses Black people and people of color. Of all the activities one can enjoy in all the world, sex is easily a top 10 event. Expect Ty Montgomery to still see action in the backfield but with Eddie Lacy now on Seattle's roster, it'll be interesting to see how the Packers deploy rookie RB, Jamaal Williams.. Most of them told me in no uncertain football jerseys terms that they had stopped watching the NFL due to the controversy surrounding Kaepernick and other players across the NFL protesting the national anthem by sitting, kneeling, http:\/\/www.kevindurantjerseys.com\/ or demonstrating in other ways. 1. Starting left tackle George Fant suffered what looked like a serious right leg injury midway through the quarter. While he said adults should remain free to choose to participate in football or other sports, he praised Urschel's decision to retire.. In the year that Luke Hodge and Sam Mitchell joined Hawthorn, it was impossible for a player to be openly homosexual. But Arizona has ways of getting Fitz free, particularly by lining him up in the slot. Houston's defense got things going when Andre Hal intercepted Marcus Mariota on the game's third play. To the Philadelphia Museum of Art and Kelly Drive will be closed at Fairmount Ave. No need in going over how much different a team Seattle has been under kevin durant youth jersey Pete Carroll at home, but especially after losing last week, they'll be an even bigger sense of urgency. This is usually suicide, you all black football jersey do not see the big boys in the city markets investing everything in one stock do you? No. But in a few months, the 2017 season should be the start or return of something fun still dangerous as hell but fun. You can watch Carolina Panthers vs Jacksonville Jaguars Live. Whereas in college, they could get by on sound technique, in the NFL most players were amongst the fastest and most technically sound players on their college teams.Playing ExperienceMost NFL players begin playing the sport in Pop Warner basketball jersey 2016 and recreation leagues as children. Carson Palmer, ARI, at Seattle: Against what once looked to be long, LONG odds, Palmer has re emerged as one of the game's best quarterbacks. The offensive line gets the leftovers. We do everything we can to make sure we're enforcing our policies and holding the standards to the highest level. The History of the GameWhile the rowdy British sports of rugby and soccer may have provided the origins for the concept of running toward a goal while holding a ball, American football with a set of rules and markings on the field began in the late 1800s at Ivy League universities in the Eastern states. Atkins works out with Clif Marshall, performance director at Ignition APG in Cincinnati, Ohio. One was more specifically football uniform editor geared for an NFL style of play than the other.. Sure, quarterbacks have gone from sensations to flops quickly and you need look no further than former NFC East passer Robert Griffin III for an example of what you want to avoid. He's dark and striking, and a sly smile often plays around his lips. \"Now maybe I'm not watching it as carefully as other people. Obviously, AFL Media is a big part of what we do. The entire Pittsburgh Steelers team, save one player, refused to come out of the tunnel leading to the field nfl jersey store until after the anthem.. Murrah. By the end of the Birds' 28 23 victory, referees flagged Philly 10 times for 126 yards, while Carolina finished with one penalty for one yard. Oakland has just four through five weeks this season, with two coming on special teams. The overall average is $80,111, according to a survey of trainers by the National Athletic Trainers Association.. That started another little something, but it all turned out to bemuch ado about nothing. Prosise had just 11 yards, and Eddie Lacy, who was brought here, coincidentally, from Green Bay, totaled just three yards on five carries.. The whole idea behind having this created is to use it in a video production which will reveal the winner of the Superbowl. Tags:basketball jersey design reversible, custom football team, design your football uniform, exclusive baseball jerseys, real nba jerseys for sale Several other players stood with a raised fist. A middle linebacker is the \"quarterback\" of the defense and helps the fo Several other players stood with a raised fist. A middle linebacker is the \"quarterback\" of the defense and helps the football team defensive line prepare for various offenses by the opponent. Der Flgelstrmer ist aktuell fr Inter Mailand in der Serie A aktiv. 10 season opener. 'Drunk packing' could have dangerous http:\/\/www.satalawyers.com\/2017\/11\/19\/are-being-oppressed-indianapolis-didnt-have-much-defense-to-burn-in-the-first-place-so-the-loss-of-davis-is-significa\/ consequences On some college campuses, there's a practice called \"drunk packing\" and students say they do this to help a friend who may have drank too much. Brady, who turned 40 custom authentic nfl jerseys last month, hasn't missed a regular season game because of injury since tearing a ligament in his left knee in the season opener in 2008. And buyers aren't sleeping on CBS's coast to coast package either. It's very scary. Lamp's 2016 performance against Alabama's talented edge players was a resume builder that shined a spotlight on his potential as a pro.. In 2002, synthetic fibers designed for NASA were introduced, making shoulder pads lighter and more breathable. Others include Dallas Cowboys rookie Taco Charlton, who landed a deal with a taco chain, Los Angeles Chargers rookie offensive guard Forrest Lamp, who signed a deal with Lamps Plus, and Denver Broncos rookie tight end Jake Butt, who has an agreement with Charmin.. He was 29 for 41 yards for 292 yards and threw 45 and 10 yard TD passes to Golladay, along with short passes to Theo Riddick and Marvin Jones for scores.A snap after Golladay ran past Bethel and fully extended to catch a long TD pass, Miles Killebrew intercepted Palmer's pass and returned it for a score with 4:13 remaining (see full recap).Fournette, Jaguars spoil Texans' return to HoustonHOUSTON Leonard Fournette ran for 100 yards and a touchdown in his NFL debut, and Jacksonville had 10 sacks and forced four turnovers to help the Jaguars to a 29 7 win over the Houston Texans on Sunday.. Green Bay Packers quarterback Brett Hundley (7) throws against the Minnesota Vikings in the first half of a football game in Minneapolis, Sunday, Oct. 38 overall, and he was a candidate to start at right guard. Analysis: No surprise here. Cowboys always stand for the anthem while lined up on the sideline. If Lynch makes the right decision, he'll get past the line of scrimmage. Here's the rub: Garrett will be good, but probably not great. Shot through with the most elite teams in the NFC (also on the schedule are the Packers, Falcons and Seahawks), the Fox roster all but guarantees that \"America's Game of the Week\" will claim its ninth consecutive year as TV's most watched, highest rated individual program.. The funds, which amount to about $354 per resident, will be taken from an increased tax on hotel rooms that currently pays for schools and transportation, among other things.We can be selfish as sports fans, closing our eyes to the absurdity of giving millions to fund billionaires playpens. Despite their strange, even grotesque appearance and their nickname as the \"cockroaches of the sea,\" lobsters are a tasty delicacy enjoyed by humans around the world. To Drew Brees and you could be looking at a frightening offense. I'm Black, but I'm not a na. Paul's who won national honors and national championships at Alabama. Louis, Missouri who did so much to try to help him. This is where the defense took over.. Think everyone is really excited to play, says sophomore quarterback Justin Herbert. He was a yearly pain to Georgia Tech, rushing for 183, 146 and 196 yards against the Yellow Jackets. When Clays healthy, he can rush with the best of them (in NFL history), said Packers defensive coordinator Dom Capers, an NFL coach for three decades. THE TAKE: After releasing veteran Jason McCourty earlier in April, the Titans biggest need entering the draft is at cornerback. We recently chatted with the NFL star about football, food, fashion, and fitness.. BLACKISTONE: Sure. Controversy over the anthem is a barrier to having honest conversations and making real progress on the underlying issues, Goodell wrote. The University of Alabama's defensive coordinator Kirby Smart earns $750,000 yearly according to a February 2010 article for ESPN. It was the longest rushing play for the Bears since Kahlil Bell's 72 yarder against Philadelphia on Nov. Believe me, I was truly lost. To this day, I'll bounce things off Bill and look for advice and counsel. 31 0 is now the Carolina lead over Seattle at halftime.. \"He did a phenomenal job there,\" Ryan said, \"getting stronger, faster and then it is not Chinese to him anymore.\". The Vikings drafted a well regarded offensive lineman, Pat Elflein, with their next pick. Jerry Jones, America's team, the Superdome, the Rose Bowl, and all that stuff.. I love to hear other ideas cus for the most part its still a work in progress i hope i don't have to complete. Almost everyone needs to open up their hip flexors. However, the offensive line is still a work in progress, and is the main reason Schwartz won't be marching Stafford out there in Week One. But yeah, I haven't had a whole lot of contact with them, so that makes it so much more exciting.\". Since entering league in 2015, leads NFL with 14 INTs.. However, the team never came to be. Swearinger was evaluated for a stinger and returned. This team doesnt get better until the talent does.. The defen. \"It wasn't like they won a lot of games. A day's workout centered on five pieces of equipment Frog Trainer, Rage Soft Stones, RealRyder indoor cycler, Nexersys, and Sparc Trainer each designed to enhance a different element of Elliott's game by helping strengthen his core and endurance, as well as hand speed and power. This is their right to demonstrate. I have to learn a different offense, a different signal system. GREENE: Is I mean, you have interviewed fans on both sides of this, some of them telling you that they essentially agree with what the president says, that these protests are disrespectful to to the flag and the anthem. Buoniconti now needs constant in home nursing care. That's going to change quickly, Waller said. I dread the start of another NFL season. No matter how big the wave, we will always be your calm in the storm. A player wants the privilege of making millions of dollars in the NFL, or other leagues, he or she should not be allowed to disrespect our Great American Flag Country and should stand for the National Anthem, Trump wrote. Or you stay off carbs. Nation World 2 days ago Blazers 3 on 3: Blazers NBA season predictions. Carson Palmer, ARI, at Seattle: Against what once looked to be long, LONG odds, Palmer http:\/\/www.streetofthefishingcat.com\/?p=5162 has re emerged as one of the game's best quarterbacks. When he signed at Alabama, Robinson was Louisiana second ranked prep prospect and played against him three times in college. There are baseball themed curtains available, but you also can make your own. (AP Photo\/Matt Dunham). The average hourly wage for pianists falls between $20.15 and $50 as of January 2011, according to PayScale; these wages translate to annual earnings between $24,165 and $94,476, depending upon the amount of work a pianist secures.. Of the 45 injuries, 14 of them led to permanent disabilities, including paralysis. The idea of who can play, who can't play, who's best for our system and not best for our system are decisions that should be made by those 32 teams.\". Moss, third in NFL historywith 15,292 receiving yards, is now eligible this summer for a gold jacket from the Pro Football Hall of Fame. Chris Berman was the last to speak, describing Katherine's life journey and their life together. Now the AFL has a pride round, and the US, always leading these jerseys online things, has had its first gay NFL draftee.. Most of Robinson writing centers on education and travel.More Articles Offensive Coordinator Job Description How Much Does a Professor at a University Make Per Year? The Average Salary of a Professional Orchestral Tuba Player What Is the Starting Salary for a Professional Softball Player? NFL Football Referee Salary Requirements to Become an NFL Football Player. That's the best season the Dolphins had have in the past 25 years.. I know hes engaged and taking the next step to being an adult, but hes not quite there yet. As a rookie, he played 244 snaps with the Titans' defense (23 percent) and 113 plays on special teams. But did people do that to you? I mean, did you ever doubt that you could actually do both?. For example, if a player is ruled to be out of bounds when receiving a ball but the coach feels differently, he may throw a red flag. What got where they at? The United States. So that failure was tough; that was a tough pill.\". But the Patriots released him in 2013, shortly after he was arrested in the killing of semi pro football player Odin Lloyd, who was dating the sister of Hernandez fiance. The court hearing is the first since the league and Brady with the NFL players' union traded filings in the scandal known as \"Deflategate,\" a dispute over whether Goodell was justified in suspending Brady four games for his role in http:\/\/www.wholesalecheapjerseys2011.com\/ using underinflated footballs during the AFC championship game in January. Los Angeles Chargers WR Mike Williams (Clemson) 8. In any event, the selection will provide fodder for a fan base with extensive experience in dealing with anti social behavior by running backs. EntertainmentEntertainment NewsThe SceneGeorge to the Rescue1st LookOpen HouseBreakfast With Open HouseCOZI TVTalk StoopWorth The TripB. After a while, it's hard to sympathize with him.. Our thoughts and prayers are with everyone in the impacted area.\". The shafts come in many colors plus a high grade hard rock maple adds durability. Utah is still recovering from its 30 24 injury marred win over Arizona on Friday night. The spread as home underdogs and 6 3 straight up.. As for the value of a deal like Mack's, it all depends. Joe Giglio: Defense, defense, defense. White will be counted on to step in for Gilmore, who bengals jersey made his first Pro Bowl last season (as an injury replacement). Between the two, Blizzard has regional, minor, and major league organizations covered.. Snap the strap to secure it.. A seasoned commentator may earn much more annually than a new commentator without any experience on the radio or in front of television cameras. Americans have long been at peace with the income inequality displayed by celebrities who earn millions for playing 16 games each year or acting in a movie. Senior NFL referee Ed Hochuli has a \"day job\" as a partner in a Phoenix law firm. It is also helpful to participate in internships and volunteer opportunities with the college football team. Carolina Panthers: What you need to know First Coast News 23 hours ago Panthers at Jaguars: Game time, TV schedule, online streaming, and more. Is best known for his infamous 1995 acquittal in the grisly slayings of his ex chiefs jersey wife Nicole Brown Simpson and her friend Ron Goldman in what was called the of the century. Squat at the hips, lift the kettlebell and walk. You know I think the league has nipped that and taken away some of those unnecessary shots that guys have taken and that probably shortened careers quite a bit. Hernandez was named The Courant's high school defensive player of the year after playing his junior year as both a defensive end and tight end. Us and Seattle are usually in the mix. Maybe Bryan Bulaga's ankle has gotten noticeably better while he's been battling the flu bug the past two days. Of a sudden, it become a big deal now, about oppression, Ditka told Jim Gray on Westwood One pregame show ahead of the Bears Night Football loss to the Vikings. (Brett Coomer\/Houston Chronicle via AP, Pool, File). Football reveres mayhem. Especially with the kids.. Kennedy, \"Those who make peaceful revolution impossible will make violent revolution inevitable.\". After all, by focussing on Kaepernick's method of protest, Trump has done his damnedest to draw our eyes away from why the athlete started doing this in the first place. OnlineInternet critics, or music critics who write for online publications, earn from $18,000 to $60,000 annually. And so did the loss of starting quarterback Deondre Francois to a knee injury. (Published Tuesday, Sept. Trademarking phrases is nothing new: The most famous case is sports announcer Michael Buffer, who currently makes more money from his phrase \"Let's get ready to rumble\" than he does from actually announcing boxers and letting them know that there might be rumbling. \"Jeff said, basically, 'I would not. The Bills also traded away Sammy Watkins, clearing the way for Matthews and rookie Zay Jones to absorb most of the targets from Tyrod Taylor. In fact, the only major modification since was the addition of the 'G' helmet logo, which was added in 1961 and has never left. (For a more accurate sense of how much you should be lifting, check out \"How Can I Tell if My Weights Are Heavy Enough?\"). Louis to throw for 4,671 yards and 35 touchdowns and rank third in the league with a passer rating of 104.6. \"I just wanted to show them that I was with them today, especially in the backdrop of our president making the comments about our players, about their mothers,\" Alexander said. He a guy I enjoyed talking to. As for the NFL, if they are asking to be carried on Basic cable (non Digital) as is MASN they are out of line. The rules of hauling shit from country to country apply to these useless garments the exact same way they do to everything else: Every piece of clothing has to be stored, shipped, taxed and distributed. I want to be in my best condition everyday. The coach saw plenty of that consistency Tuesday. There were two other NFL transactions on Monday involving players from Alabama high school and colleges. Detroit or Saints? 55 inch Plasma or 55 inch LED? Giants or Falcons? Yes some great games ahead. Of course, a significant amount of that revenue goes to paying the players on each team. The Rams have the fifth spot in the waiver wire order, and when their turn comes up they have their pick among the players left over nfl jersey cost after the turns of the four teams ahead of them expire. He also ran for 7 TDs in his first season at Kent State.. Due to the array of logistical responsibilities inherent in the role, excellent organizational skills are paramount. \"(Holley) makes the most of the opportunities he gets and he makes big plays.\". He had a 21 7 career record on the mound and batted.313 with 15 homers and cheap jerseys wholesale 72 runs batted in.. We will implement changes in our talent lineup this week. 12. GOLDMAN: Well, Monday night tonight, you've got the Dallas Cowboys visiting Arizona. I just see respect for their own individual opinions. The preseason \"problem,\" in the minds of some on the management side, has been addressed by going to variable ticket pricing, by which customers don't pay as much for tickets to preseason games as they pay for those to regular season games.. Lombardi was also GM of the in 2013 and 2014. New Orleans Saints OT Ryan Ramczyk (Wisconsin). His favorite sportscaster of all time: Vin Scully, for professional and personal reasons. Unfortunately, today's announcement demonstrates that thousands of Hoosiers are already being hurt by the actions of Republicans in Congress and the Administration.\". Across the country, local jails are packed with people who have not been convicted of any crime but can't afford bail. In past 2 on road, has 654 pass yards (327 per game), 5 TDs 2 INTs for 95.6 rating. Kickoffs, Trump tweeted that he approved of players locking arms, saying it represented solidarity for the country.. These players are less desirable as they tend to be older and often do not have more than a year or so left on their contracts. \"It's about interval explosions and recovery,\" Musico says. A penalty on official football jerseys fourth and 21, however, kept the Carolina drive alive until Newton retreated to the sideline when Gano came in for the potential game winner.. Simpson reacts after learning he was granted parole at Lovelock Correctional Center July 20, 2017 in Lovelock, Nevada. His opinions do not necessarily reflect that of CBS or 98.5 The Sports Hub.. NFL spokesman Joe Lockhart said Monday that he hadn't seen any business impact positive or negative in the aftermath of the president's comments. AB: You've done a couple sponsorships on facilities the last couple years, withCarilion Court at Cassell ColiseumandUnion Bank's new partnership with English Field. Unlike its \"SNF\" units, which are not uniformly priced, the rates for NBC's Thursday night quintet effectively were non negotiable. \"To me, this is bigger than football and it would be selfish on my part to look the other way. Last year the league signed a 10 year partnership with the Premier League's Tottenham, pledging to play a minimum of two games per year at its new stadium, which is slated to open in 2018, plus official jersey site at least two at Wembley through 2020.. I was the youngest of four. All of the survivors that have been located are receiving medical care.Colin Kaepernick Files Grievance Against NFLMcManus said early Sunday morning police were called after a passenger in the truck asked a Walmart employee for water. That certainly won't be the same story in Week Two if Beckham takes to the field.. Irvin had create custom basketball uniforms fellow linebacker Bobby Wagner to thank for the tip (or whatever exactly it was), after Wagner managed to knock the ball loose from Rams receiver Lance Kendricks.The back to back scores effectively knocked out St. They wait until the following film. All rooms in the hotel are suites, which include a separate living area, bedroom, sofa, wet bar and a work desk. But you know what? It's totally disrespectful.\". Snyder is adamantly opposed to changing the name, telling USA Today, \"We'll never change the name. So why do players cling to practice squads? In high schools, practice squad players hold out hope that they will make varsity the next year. The part that I brought up was the part that was left out. But when you look closely, those declines weren't hard to predict. As Americans, we are fortunate to be able to speak openly and freely.\". Looking into the eyes of players who just a season before had gone 1 10 1, Lombardi said, \"I have never been on a losing team, gentlemen, and I do not intend to start now.\" True to his word, Lombardi never knew a losing season as a head coach.. The conservative play calling started early for the Illini. They traded their first round pick to the Saints for wide receiver Brandin Cooks, minimized the departure of No. \"I'm looking at, did they even evaluate him? Did anybody look at him? Did they shrug it off? What's the report back? Well, they're saying, 'Oh, he got shaken up on the field.' They won't use the word 'concussion.' I'm like an educated, informed spectator. As a highly recruited junior, was a key player in a 10 4 season that ended with a last second loss to unbeaten Clinton Massie in the state semifinals.. Whether you're new to Madden, or you have been playing for years, there is a simple strategy that you can begin using that will allow you to frustrate your opponent, get more wins, and move up on the Xbox Live or PS3 leaderboards. Of course he's one of the top 96 quarterbacks in the http:\/\/who2kill.com\/te-jason-witten-had-59-rec-it-wasnt-until-the-later-1930s-that-people-began-to-get-serious-games-between-1890-1950-a\/ league. Simone Boyce reports for the KTLA 5 News at 10 on September 23, 2017.. Asked about reports that Goodell would not be pictured on the scoreboard during the game, so as not to rile up the fans, a Patriots spokesman said the team did not typically show people in suites on the scoreboard.. Orgeron has no quality wins in his first full season. For example, the Kansas City Chiefs hired Todd Haley as their head coach in 2009. The defense intercepted Cousins twice in the final two minutes.. Once again, their offensive game plan will likely centre around feeding rookie, workhorse RB Leonard Fournette but, against one of the stoutest run defences in the NFL, that'll be a tough challenge.. Longtime NFL groundskeeper George Toma is the NFL's groundskeeper for Super Bowl games because of his attention to detail. In the Jimmye Laycock Football Center, alongside the. When lineman Junior Seau retired from the NFL, it took him about two years to start showing mental and emotional symptoms. Have a family member, friend or sports videographer tape you at a game. And the Packers could be without Aaron Rodgers the rest of the season. Walker is on the ride for the 12th time, he said hooked on a ride that he initially thought was met him at a race one time and we were talking about different things. Weve got more good teams than weve ever had. He was one of the closest guys I've been around in coaching. Like a center in basketball, Roberts is terrific at using his wide frame to box out defenders and go get the rock. In October of 2015, the network laid off 300 behind the scenes producers, programmers and editors.In March, Miller told Deitsch that no one's job is safe at ESPN outside of the core personalities at the network.Miller mentioned personalities such as Scott Van Pelt, Mike Greenberg, Michael Smith, Jemele Hill and anyone on \"Around the Horn\", \"PTI\" or \"First Take\" as stars that are likely the safest.The Hollywood Reporter says other ESPN personalities will see 'their roles significantly reduced' or will not have expiring contracts renewed.ESPN put out a statement via its in house 'Front Row' website to provide further context on the company's strategy going forward.Daniel Roberts of Yahoo reports a source at ESPN told him that an emphasis on versatility will be placed on employees that remain with the company.A source at ESPN frames the cuts this way: \"We are focusing on people that can be versatile and appear cross platform. More than 30 years after he took his last NFL snap, Easley will join the legends of the league in Canton, Ohio, on Saturday as one of 310 Pro Football Hall of Famers.. If you have a good time consuming our products and experiences, you share it.\". Ward (ankle). She helps assemble the advance scouting reports on Jacksonville's opponents, which are distributed to the coaching staff on the Monday leading up to a game. Giant prints aren't limited to baseball stadiums. I hope Pierson El doesn't mind if I steal the adjective \"annoying\" to describe disruptive defenses in the future. These are the kinds baseball jersey embroidery of days Plaxico Burress would dream about while incarcerated in federal prison for gun charges. The lowest paid 10 percent earned an annual wage of $20,300, while the lowest paid 25 percent earned an annual wage of $28,240. FINLEY: It's that high running out the tunnel with a hundred thousand people screaming at you, you know, I mean the fame, the fortune of course. The killing of African American males spawned the Black Lives Matter movement and spilled into the sporting arena. Roethlisberger hit Martavis Bryant for a 27 yard score in the first quarter and flipped a shovel pass to JuJu Smith Schuster that the rookie turned into a 4 yard score. In order to satisfy their lust for feats of athleticism, most of the small towns filling in the gaps between cities like Dallas and Houston have turned to high school football in hopes of patching up that void in their souls. Maybe the fans should be forgiven for their short memories. Schultz has an economics degree from Xavier University and a masters in journalism from Northwestern University.. Wednesday at the state prison in Shirley, Correction Department spokesman Christopher Fallon said. Jonathan Bullard handled double teams well as did Roy Robertson Harris, who added a pass deflection, batting down a ball headed for a wide open Mohamed Sanu. Trubisky is excited to be a Chicago Bear.. Atlanta averages 26 points a game. Trends and OutlookNFL commissioner Roger Goodell has expressed his desire to alter the league's rookie salary structure, according to a 2010 piece by Don Banks of Sports Illustrated. His latest book publication, a Demos City Novel is forthcoming from J Taylor Publishing in June 2014. 2 did not prove to be good fortune for Jacksonville. That recipe makes for a strong pairing with a Ravens defense that has struggled immensely to defend the pass, allowing at least two touchdown passes in six of seven games going into their Week 9 bye. For years, the Raiders struggled with coming to the East Coast. Linebacker CoachingLinebackers line up directly behind the defensive line and in front of the secondary in a typical defensive football formation. 3rd Round Pick: Rasul Douglas, CB Douglas was a healthy scratch, which really speaks to how far behind this team views him, considering the depth issues they have at where to order football jerseys cornerback. BOSTON Ex NFL star Aaron Hernandez, who is already serving a life sentence for a 2013 murder, was acquitted Friday in a 2012 double slaying prosecutors said was cheap nhl jerseys fueled by his anger over a spilled drink. Lane and Adams tangled and fell to the ground, Adams shoving Lane as much Lane shoved Adams. Tags:cheap sports jerseys, custom nfl jerseys, nike nfl jerseys, real nba jerseys for sale, youth stitched nfl football jerseys A party erupted inside the Oakland Coliseum when a dancing Lynch was shown on video boards inside the stadium. The Unite sex, 10 novembro, 2017 A party erupted inside the Oakland Coliseum when a dancing Lynch was shown on video boards inside the stadium. The United States is the greatest country in the world. Then divide the $26,000 by the $100 to work out how many points you make a year, and that is 260, then divide by 52 to see how numerous points profit a week, and that comes to 5pts a week. Those in full time positions might work in the marketing offices of NFL teams.. We decided to build a web site with NFL products and when anyone purchases $50.00 or more, we donate $5.00 of our profits to the ALS Chapter in St. The Sports Xchange Frank Cooney, The Sports Xchange NFL Analysis: Projecting 2014 breakout players Every season players emerge from the shadows of anonymity, or something less than stardom, and play so well they demand to be considered among the best in the league. Why you seen us now keeping the specialists. \"Denise, she says I raped her, and it wasn like that,\" babbled the player as White ran up the aisle to an empty room. If the agencies like your demo, they will contact you when a project becomes available that matches your voice style.. As a result, Kurt Warner and the Jets' Bart Scott have joined a chorus of current and former players saying they wouldn't want their children to play football because of the potential of brain trauma.. I knew where he was going, too. Jimmye Laycock's football program will remain with Nike, which sponsors his football camp every summer. Thats the type of guy I am. That's how bad it was visually over there.\". To an extent, Bortles's failure is emblematic of the NFL's ills both a dire lack of talented quarterbacks, and a culture that gives him a starting job while Colin Kaepernick languishes.. In the NFL, he was a three time MVP and unanimous first team All NFL eight times. An custom jordan basketball jerseys additional 12 footballs are marked with the letter \"K,\" and are used specifically for kicking. The NFL, http:\/\/agency.blokkmedia.com\/?p=7885 as addictive as its product is, could be slipping and for now, you have proof in the TV ratings.. It's what you do with your situation once you get there.\". He can also play the ball with a high level of skill, which is something even some of the best CB's don't have. Darrell has done a nice job at tackle and then we feel good about what Austin has done at the center position. Here are a few suggestions on how to become a famous dancer.Develop your talent. The store basically offers three high quality designs of cues: Eliminator Pool Cue, MLB \"Eliminator\" Pool Cue and NFL \"Eliminator\" Pool Cue. As Americans, we are fortunate to be able to speak openly and freely.\". Respect organizations and teams that win and that where we have to get. We support this cause not just with our words, but financially as well, and it is serving hundreds of veterans in need right here in Colorado. The obvious areas the Rams could look to tinker with is the offensive line, which is at eight total after the release of veteran Cody Wichmann and four others.. I could practice every day. Taking only what they need, as opposed to in the past. He's fired! He's fired!\" Trump said.Replying to a tweet about a news article about Trump's comments, Kaepernick's mother Teresa Kaepernick said: \"Guess that makes me a proud b!\"Calif. After the ball is caught, tuck it under your arm to prevent a fumble (loss of the ball) or prevent a drop. \"He's great,\" said Calhoun, noting O'Brien's extensive high school experience. \"We were a team that threw the ball quite a bit, played in a lot of big games and lost some big games, and Case saw how those guys reacted to both of those situations and admired their character.\". The man second from right is unidentified. I understand where he coming from. Atlanta Falcons long snapper Josh Harris was charged with a fumble against the Dolphins. Facts About Sports Broadcasting By Jack Powell Sports of nearly all kinds are popular all over the world, and part of the reason why they are so popular is that they can be broadcast http:\/\/www.buzzyears.com\/portal\/index.php\/2017\/11\/10\/we-would-govern-ourselves-with-everybody-having-their-say-love-it-or-leave-it-quote-of-the-day-ii-with-tottenham-this\/ to wide audiences on television and radio. \"And I think the last is just what we do from a medical support standpoint,\" Goodell said. And make no mistake, there's already a strong racial undercurrent in this chasm so far, the protesting football players are black, and the most visceral reaction toward the protesters has come from the league's majority white fan base. Measure out about 6 to 8 inches from the front wheels and use the marker to make a circle. Remember, we'll get to that) would give Toronto an excuse to finally fix that once futuristic and now putrid eyesore that is the SkyDome, er, the Rogers Center. For Americans to be bashed for having a peaceful protest is disrespectful for everything that America stands for.. Publications from the Detroit Free Press to the International Business Times have now picked up on the denial. His journalism awards include a 2012 Jesse H. With the temperatures still comfortable it is also the perfect time to enjoy an ice coffee.Ask A Cleveland Expert: Easy Breakfast Meals For KidsBusy families tend to sacrifice nutrition. When people are watching football games or any other sports at their home, they are usually sitting down. At WKU, Selig hired and fired David Elson as football coach and replaced him with Willie Taggart, now at Oregon. This happened 12 years ago and served as White window into the netherworld of hustlers gaming athletes. The fact is that he now going into the Hall of Fame and he very, very qualified and deserving. Certainly, Breaux could fix the issue by being more physical at the line when he recognizes the play or by calling for a switch. The leader of our country feels that way, we have to continue to protest, and we have to continue to work to change our communities, Smith said after the game. Controller ControversyThe Xbox released in North America and Europe with the \"standard\" controller, which (by most standards) was a massive input device for gamers with average sized hands. A player wants the privilege of making millions of youth basketball singlets dollars in the NFL, or other leagues, he or she should not be allowed to disrespect our Great American Flag (or Country) and cheap nfl jerseys should stand for the National Anthem, Trump tweeted. \"Another important consideration identified in the Policy is 'the extent china jerseys to which the club and relevant individuals cooperated with the investigation.' The Wells report identifies two significant failures in this respect. Of the more than 13,000 votes cast, here is how it broke down:. The draft is the most important part of fantasy football and also the most exciting. WashingtonAll conference: 5 (2 first team). And we hope to see some of our Australian NFL players really break through and shine this season, including Brad Wing at Pittsburgh, Jesse Williams at Seattle and David Yankey at Minnesota.. I seem to be a lot higher on Humphrey than other mock draft pundits. You're off balance. You just try to narrow your focus, make it play by play, day by day, game by game.\". On the other hand, a business has reputation and morale to worry about.. Fifth Circuit Court of Appeals Friday requested a ruling by Sept. The Bears didn't throw to him once in preseason, and that was a ruse as he was targeted a game high 12 times, catching eight passes for 47 yards. A life that ended yesterday in prison, the same day a handful of Patriots visited the White House with their Super Bowl LI rings. My dad was a big dude, Khalil said following a training camp practice. Walker is on the ride for the 12th time, he said hooked on a ride that he initially thought was met him at a race one time and we were talking about different things. A lot of personnel has changed with the addition of Mangini, but the \"Mangenius\" (as he was called briefly in New York) still must find a way to get more production from an underachieving defense, and find a solution to the question of who is their starting quarterback, Derek Anderson or Brady Quinn. They will showthe Sunday fixtures each week, ending with the blockbusterSunday Night Football(which run from early Monday morning till Mondayafternoon). Horse racing as an illustration is a great selection for placing a gamble. Some kneeled. His average salary ranks 26th among quarterbacks in the NFL.. Fan favorite and former Westlake High standout Spruce did not make the cut. (Photo by Hannah Foslien\/Getty Images). Utah congressional delegation and top state leaders vowed to work to get the monument repealed. He said he expected the Penguins to be back at the White House next year.. Now they return to their hurricane riddled digs to take on AFC South rival Tennessee, which lost nfl jerseys montreal at home to the Raiders. NBC is also making a killing on its new five game \"Thursday Night Football\" package, which kicks off on Nov. LinemenOffensive and defensive linemen are generally the largest players on the field, in terms of overall size and body mass. Emil Rivera Lopez on Aug. He has contributed to several special interest national publications. To do this exercise, start by holding a kettlebell in your right hand with your right arm straight so that the kettlebell is directly over your right shoulder. While many people say that nothing beats going to a live event, sports on TV and radio have the added advantage of including play by play commentary to help viewers follow the action. \"I was surprised, but I'm just blessed to have an opportunity,\" Vick said after the Eagles lost 38 27 to the Jets in the preseason finale. 19, 2016\u2033 > >NFL draft preview: CornerbacksDan WiedererAs the NFL draft nears, we taking a 10 day position by position look at what out there and what the Bears need. At least seven team owners donated $1 million each to Trump's inaugural committee. Local officials have formulated a plan to finance new stadium that will keep the team in their present home. A general view of AT Stadium before a game between the Detroit Lions and the Dallas Cowboys on December 26, 2016 in Arlington, Texas. \"I've broken every finger. Letters To The EditorColumbus Day ideaAnother Columbus Day passed with more articles, pro and con, regarding the value, meaning or intent of this day. As a teacher of American History and Political Science, I have my own feelings of disappointment when I see someone appear to disrespect our nation's flag. You could buy them and give them to the kids, but I think the real message is that there are adults out there who care about you and want you to do well and are willing to take some of their time and contribute to that.\". First rounder Shaq Lawson was pegged the savior for Ryan's defense in Year 2, yet plain basketball jerseys won't be returning to the field any time soon following his shoulder surgery. Thought we were probably moving past this. In an interview with NerdWallet, Owens and his friend Eric Dickerson, the Hall of Fame running back most famous for his time with the Los Angeles Rams, talked about their experiences and what young athletes should know about building http:\/\/www.digitaldente.com.br\/digital\/they-want-a-better-way-forward-one-that-less-partisan-and-more-inclusive-13-pour-sa-part-kennedy-tait-une-menace-con\/ a solid financial future.. I just didn't see him finish some plays. If your like me you are probably thinking this really sucks. In other words, look for a fight that you are expected to lose. Pressure is only something you feel when you have to force something.. You need years of experience. The Galway Film Fleadh are delighted to announce a very special evening of film, whiskey and food in the company of one of America's greatest bands the Grateful Dead where director Amir Bar Lev will be on hand to answer everything you ever wanted to know about the Grateful Dead but were possibly too stoned to ask. But he's missed just two games in seven years, way back in 2012. There are a lot of people I owe for where I'm at right now.\". There are no guarantees of a career in the NFL, though, far basketball uniform prices from it. However, despite the ridiculous contract Matt Stafford received last week, Detroit has no running game to speak of, a hodge podge of so so receivers and an average defense. Still, Omalu advocates, among other measures, a ban on heading under the age of 18. The restaurant will also offer breakfast pizza and mimosas. \"Los abucheos en el juego de ftbol americano de la NFL de anoche, cuando todo el equipo de Dallas se arrodill, fueron los ms fuertes que jams escuch\", escribi en otro. Chris Collinsworth was especially incensed, perhaps ignoring the fact that Lynch has run the ball from the one yard line 5 times this season for an average of 1 yard and only 1 touchdown. Has 19 tackles INT in past 3 at home. One of the greatest baseball players of his generation how much he had ridden. And you're probably seeing the start of that when personalised basketball vest it comes to sports media rights. After encountering two shoeless men who were begging at a stoplight, Levy, a former sneaker sold his collection of 150 youth football jerseys pairs and donated the proceeds to two of the city homeless charities. The harsh federal drug sentences are well documented, but similar mandatory minimum laws exist through the country. \"You catch as many as you can at night, put them over the fire, scrape all their fur off, cut them open, take their insides out, and you pretty much just eat it like that,\" says Levy. Hurst became the top major league pitching prospect in the First Coast region and one of the best among high school players in the nation. Aside from that instance, though, Harvey custom jerseys for football said Thompson's statements to the Columbus District Attorney and the NFL were \"absolutely truthful.\". Hate to knock a guy down on his luck, but recording an Xmas album for kids during this period wasn't the wisest move. I say they'll win by three scores at least. In the letter, Bennett supporters said, Bennett has been sitting during the replica american football jerseys anthem precisely to raise these issues of racist injustice that are now an intimate part of his life. 3. The problem isn't one thing. So, we survive the spread and at least they throwing the ball, so they develop stronger arms and, ostensibly, a little bit better accuracy than wishbone guys did. I must describe one incident while on a high mountain, which we called \"the hill\" in Korea.It seemed like a replica of the American Revolution battles. This is their second game in Seattle in the last 16 years. Let not be divided in that pursuit. Assuming GM Jon"} +{"id":"RedPajamaCommonCrawl.0024","text":"[a \/ b \/ c \/ d \/ e \/ f \/ g \/ gif \/ h \/ hr \/ k \/ m \/ o \/ p \/ r \/ s \/ t \/ u \/ v \/ w \/ wg] [i \/ ic] [cm \/ y] [r9k] [an \/ cgl \/ ck \/ co \/ fa \/ fit \/ hc \/ jp \/ mu \/ n \/ po \/ sp \/ tg \/ toy \/ trv \/ tv \/ x] [rs] [status] [Home] [Return] Posting mode: Reply Password (Password used for file deletion) Supported file types are: GIF, JPG, PNG Maximum file size allowed is 3072 KB. Images greater than 250x250 pixels will be thumbnailed. Read the rules and FAQ before posting. \u3053\u306e\u30b5\u30a4\u30c8\u306b\u3064\u3044\u3066 - \u7ffb\u8a33 4chan turns five 4 4\/4 years old today, October 1st 2008 File :1222844149.jpg-(63 KB, 400x630, marines1.jpg) Anonymous 10\/01\/08(Wed)02:55 No.2709630 Anon needs suggestions badly! \"Humans are insane. You see, Humans have this concept called \"Vengeance\". Once, a Vuux warship blew away one of their early colony ships. Fifty Terran geo-helio-cycles later, without a word, they glassed the entirety of the Vuux homeworld and called it even. Not one senator in the Union even dared bring it up with their ambassador. They have no compunction to follow the Concord of Equal Force!\" \"The Human muscle-to-mass ratio is incomprehensible. Their world must have been at least half-again as large as ours. Their biology defies reason, they breathe oxygen and yet can swim in liquids without trouble. They can kill with their manipulator extremities, and more. One prisoner slammed his brain case into a guard, and then beat them to death with his bare hands.\" >> Anonymous 10\/01\/08(Wed)02:56 No.2709633 \"Of all the violence-capable sophont clades, Humans are the only ones who strap themselves into armored shells and drop out of the atmosphere onto enemy positions. And that's only after they soften up any ground resistance with orbital bombardment. We are certain that they have secretly developed mind-upload technology (and thus a kind of technical immortality). The other possibility, that they are willing to throw themselves into the path of anti-starship weapons without hesitation and risk their consciousnesses, is unthinkable.\" \"I once met a Human at a waystation on a Class 1 world. It did some kind of rough work for one of their colonies. It called itself a \"search and retrieval expert\" but I'm guessing the translation software couldn't find the proper words. A few weeks later, it returns to the waystation, sans its trans-grav (rented, I might add). Apparently the people it was hunting took down its transport, but it continued on foot after escaping the wreckage and patching itself up. The scary part was that it was wearing clothes fashioned from Tharge pelts, had its targets' ears on a necklace (DNA proof, I guess), and had fashioned a spear from a jagged piece of the trans-grav's hull and an Iron-root. And it was honestly none the worst for wear, just sauntered over to the AENet terminal and collected on its kills.\" >> Salamanders Fanboi !!3huhktkKj6R 10\/01\/08(Wed)02:59 No.2709652 Humans, fuck yeah. I want to cast humans as the warlike-type, with a great endurance (physical and mental) as compared to the aliens. File :1222844439.jpg-(691 KB, 1199x1525, 1220449683815.jpg) Ouuuughh those are some pretty manly humans. Conan in space. Humans: Fan-fucking-tastic. Holy fucking shit. Sauce, or failing that, moar. This shit is great. Basically, humans are Rorschach in SPAAAAACE. They're the fuckers who hid in your cryo-compartment and then twist off yoru mandibles. >> OP 10\/01\/08(Wed)03:02 No.2709671 File :1222844576.jpg-(200 KB, 1067x780, marines2.jpg) The picture? No clue. I wrote the text. File :1222844634.jpg-(136 KB, 653x644, 1221873251184.jpg) Aliens prefer to use only robotic armies while the humans have a living\/machine mix of cybernetic soldiers in power armor and straight up AIs. >Of all the violence-capable sophont clades, Humans are the only ones who strap themselves into armored shells and drop out of the atmosphere onto enemy positions. And that's only after they soften up any ground resistance with orbital bombardment. The Codex Astartes names this maneuver Steel Rain. We shall descend upon the enemy, we shall overwhelm them, we shall leave none alive! File :1222844667.jpg-(55 KB, 640x439, 120597440443.jpg) It's kind of nice to have a universe where humans are thuggish brutes with little or no compunction regarding genocide. Oh wait, 40K. OK, another universe. I'm actually kind of interested in the aliens. Maybe I'm just more civilised. Or maybe I prefer bigger guns. Sorta like Mass Effect. Humans are so fucking hard-core that we make the other alien races piss themselves with fear at thought of us turning on them. Fuck yeah, Humanity! We'll free the shit outta you! write more nao Hello, fellow rpgnetter. Nice to see a scenario in which humans ARENT pissed on by every alien race and their macbook-aesthetic tech. This was Heinlein's greatest lesson - Mankind always wins because mankind is the baddest of asses. It's definitely way better than the usual \"Oh humans are not as good as us space elves\" crap sci-fi likes to throw at us. We're a race that's constantly at war with ourselves, and most of our important technology starts as a military application first, you'd think we'd be good at fucking over the other guy by now. Also seconding sauce\/moar. >> Some RPGnet lurker 10\/01\/08(Wed)03:08 No.2709705 I saw that thread, but I was channeling this one: http:\/\/forum.rpg.net\/showthread.php?t=353845 Humans seem quite hardcore, OP. May I suggest Supernova-ing all star systems they inhabit? Then dumping all remaining matter in black holes. It's the only way to be sure! ITT, basement-dwelling neckbeard losers try to pretend that BEING HUMAN MAKES THEM AWESOME. I am disgusted. Well, yeah, the flip side is that it doesn't really help you if you're a species that can benchpress their own body weight when we remove your atmosphere all the way to the Oort Cloud. File :1222845218.jpg-(20 KB, 439x318, I'm having a stroke.jpg) I was thinking of giving humans their own space (centered around Earth, I guess) and have them encroaching on the aliens' Union space. So, a little border conflict, resource wars. Each side taking on traits and culture along the edges, with more insulated communities deeper inside pushing a more reactionary stance. Or perhaps the aliens are really old and have genetically- and socially-engineered violence out of most of the clades. So these humans show up and are totally badass compared to what exists. Suddenly you have humans out-performing and out-competing centuries old alien institutions, etc. ... what are you, some kind of typing monkey? OF COURSE BEING HUMAN MAKES US AWESOME! ITT: We put little to no effort into our trolling attempts. Pretty neat stuff, OP. It really catches you off guard because, as some people pointed out, it's not often you see the Humans shown in this kind of light. We're normally the generic, jack-of-all-trades ones. Frankly I think it's bullshit, and would welcome seeing more Human portrayals like your own. Good stuff. Now write more. I'll work on some stuff and post it tomorrow. I need to collapse and sleep. Or sleep-type. I don't know. >ITT: We put little to no effort into our trolling attempts. Putting effort into trolling is a bad idea, as you risk getting no result for a substantial investment; it's best to troll frequently and with no effort applied; you'll get lucky at some point, and until you do, the sheer quantity of trolling is in and of itself a troll. I've always liked sci-fi that had humanity's dominant traits as tenacity and adaptability. Aggression is all well and good, but if we're ever at a stage where we have a unified world governement, I believe there will be less MUST KILL ALL WHO ARE DIFFERENT and more EXPLOIT THEM FOR OUR OWN BENEFIT. No there won't. That's all humans have ever been really good at. I whole heartedly, 101% support this writefaggotry. ... What are you even getting angry at? Us enjoying the idea of humans being a dominant species in the galaxy in the far future? OH HEAVEN FORBID! NEXT WE'LL BE SAYING SOMETHING HORRIBLE LIKE WE ENJOY BEING HUMAN! You read 4chan. This is what humans are like. That's shameful, not enjoyable. tl;dr double nigger Ko'vash tau'va vor shi. Then perhaps you kill yourself, what with you being one of us 'shameful creatures'. I must have missed the part where the OP said humans were at a stage where they had a unified world government. That's another good way to make humans unique. Humans could be one of the few species in space who's homeworld hasn't become a monoculture. >> Stranger 10\/01\/08(Wed)03:31 No.2709823 After today, this topic made my night. You've helped me believe we humans probably could outkill anything among the stars. And if D&D is right, we'll probably fuck and impregnate anything we don't kill immediately. Fucking awsome ! I had thought about this before, also read about it in a few books, but didn't see anything with this level of badassitude. Anyway, humans breathe oxygen, one of the most poisonous materials in the universe. It's the same fucking thing that makes FIRE. It fucking kills METALS, and we need it to BREATHE. From a totally alien being's viewpoint that must be at least startling, if not outright scary. I read in arthur c. clarcke's book odissey 3010, that this is what enables us to be so fast, compared to his slow, amphibious aliens. The chemical reactions that fuel our body are pretty powerful, relatively speaking. Also, check out the local fauna, which from a sci-fi viewpoint, was turned into wallets and clothes. Even our cows, which we eat, are FUCKING MONSTROUS. An alien will shit himself if a cow moos at him, it's a fucking 500kg slab of muscle and fat, capable of crushing a man to death. We made an industry of killing , eating, and using their bodily remains. I like this viewpoint. In a multi-alien galaxy, making human the \"baseline\" is silly, forcing every alien playable race to be \"humans in a funny suit\". May be good for fantasy, but not sci-fi. wait a second. does this mean +4 str ? ITT Star Control. +4str +4stam. LEATHER BELT. This needs to be developed a little, i think. not too much, just flesh out some different perspectives, i.e. what humans think of the aliens etc. still, bloody awesome job. Is that an oh-so-subtle Heinlein reference in the second section? Best part of this thread was \"EYE OF THE TIGER\" came on as I started reading. >> Fapanon 10\/01\/08(Wed)03:41 No.2709884 This is why I don't like Star Trek \"lol we advanced beyond that\", bullshit. People are innately aggressive and predatory, we want our territory. We also want our bitches, if it has a hole or a vaguely phallic proturbance someone somewhere will fuck it. Fuck yeah, humans. Aliens can suck on our terrifyingly rigid genitalia. \"Humans are not only immune to our Gifts, but nullify their effects in a large radius. For this reason, they refuse to believe in the existence of 'psionics' (as they disparagingly call the Gifts).\" Look at what else we do! We roll POISON into little cylinders and SMOKE IT TO RELAX! We expose ourselves to harsh environments with nothing but nylon for shelter for pleasure! Some countries even allow Everydayman Pissant to carry around death dealing projectiles. I'd be fucking terrified of us too! File :1222847343.gif-(70 KB, 485x213, vux-sitting.gif) >Vuux >Vux Animooted. >Humans could be one of the few species in space who's homeworld hasn't become a monoculture. Exactly. I mean, we're able to fly into space NOW and have been killing each other for thousands of years. What makes anyone think we would drop that habit once we can fly out a bit further? Human Pride niggaz. We're hard as fucking nails. I shall bump this thread, for the glory of Mankind. All that you see around you is the work of human hands. >> parable one !!HfL9M9xslOG 10\/01\/08(Wed)03:50 No.2709963 there are way too many Captain Zelnick\/Admiral ZEX fanfics out there. goddamn i love this thread, talk about an ego boost We take our own violent nature, and turn it into entertainment. Action movies, violent video games, even sports like martial arts or fencing are all derived from actions which, in the end, are intended to end the lives of sentient beings. and we enjoy them in our spare time. We're willing to purge entire subsections of our species on the flimsiest of ridiculous and completely nonsensical justifications. Imagine what we'd do to the fucking xenos. Not enough. Oh, how I long for your squiddy embrace, ZEX. One Human can be bad enough, but get a few of them together and you better watch what you say. This topic is one reason why I like 40k so much. Because humans were a bunch of psycho mother fuckers that willingly killed off any alien and treated them all like the bitches they really were. Not the other way around. >>2709933 The good countries even allow Everydayman Pissant to carry around death dealing projectiles. >One prisoner slammed his brain case into a guard, and then beat them to death with his bare hands. FUCK YEAH BRAINCASE That's what I'm calling my head from now on. Orks. End of Thread. \"Humans present a substantial problem for the Theory of Evolution. It is difficult to find an aspect of human biology that is remotely competitive. They metabolise a variety of corrosive gases, their process of reproduction is lethally dangerous and their respiration and food orifices are combined in such a fashion as to almost guarantee suffocation by misconsumed food articles. And that's not to consider the damage done to their spine and musculature by an inexplicable instinct to balance on the hind legs.\" I've always wondered what the Orks thought of the other races. Don't fuck up a good thread. I won't comment upon your viewpoint, but I'm sure others will be tempted to, and it has potential for shitstorm. take it to \/k\/ Humans cook their food by blasting it with microwave radiation. They're scary. \"Yeah, that's why our ambassadors keep 'em away from regen facilities and the Academies. I mean, in the first, half the patients would die. In the second, all those especially Gifted students would get Blanked.\" *shudders in his carapace* \"Excrement! It's eerie enough for me to be around them, but for someone very sensitive like Academy students... Well, you remember the infamous 89939 experiments, right?\" Humies are made for gettin' stomped by da WAAAAAAAAGH And they consider that the lowest of the food they make. WATCH OUT, YOU ALIEN MOTHERFUCKERS, I'VE GOT A BRAINCASE AND I WILL USE IT TO BEAT YOU TO DEATH. We poison our air and water to weed out the weak. We set off fission bombs in our only biosphere. We nailed our god to a stick. Don't fuck with the human race. dakka dakka choppa choppa? A human is always armed, so long as he has his braincase. Yeah, most of the time they use small, controlled fires. Some of even us use the verb for sex as both an insult and an implication of violence. Language shows a lot about us. I kind of want to ehar about an alien ivnasion that goes instantly and terribly awry for the aliens. None of this heroic struggle by outgunned human resistance fighters stuff, I want to see alien generals having an O SHI moment before they get stomped and kicked off our planet. Pursuit predators. Humans are the goddamn terminator. Or the Luggage. We drink poison too, and derive enjoyment from the temporary malfunctioning it causes in our higher brain functions. The higher the toxin level the greater the beverage; diluting the toxin with water is severely frowned upon. Alan Dean Foster wrote a trilogy based on this premise of humans being the ultimate insane warrior race. The Damned was about two collectives, one a mind controlling bunch of aliens called the Amplitur who absorbed other cultures as semi-mind controlled communists, the other the allied races of the Weave. The problem was no race was actually good at war. And then they found humanity....and humans were insane. And they fought well....so well they scared the hell out of everyone.........and were naturally immune to the mind control powers of the Amplitur. This only made the weave even more nervous about their new found allies...... >> Amazing 10\/01\/08(Wed)03:59 No.2710049 \"You want to know about the humans? Let me tell you something, comrade. You want to stay far away from them if they're in a fighting mood, because there are plenty of them to go around, and they're not at all shy about killing each other to get the pleasure of killing you.\" \"Eighteen years back, I was serving with the Coalition in the Battle of N49. Us, the [Andromedans], and the [Milky Way Defense Command], all against the Red Star Council. And about halfway through the battle one of their big cruisers- you know the type- gets into a direct gun-duel with one of the Council's big gunships. They get torn apart in short order, but we've got our hands full and no way to evac them. We expected them to sue the Council for their surrender, and I think they did too.\" \"Instead, the crazy [untranslatable] fire up the main engines and drive their ship STRAIGHT INTO THE COUNCIL BATTLECRUISER. And as if that wasn't enough, while everyone's staring at the debacle, they touch off their reactors!\" \"There were seventeen thousand humans crewing that ship. I saw the battle report afterwards- the Council folded almost immediately after the battlecruiser went. They deemed it \"a regrettable but acceptable loss.\" \"Stay far away from the human sectors, comrade.\" RAPE RAPE RAPE RAPE RAPE Jesus christ I can only apologise for the huge pile of typos in that post. I think I've only read one instance of that, and it was in the Hitchhiker's Guide to the Galaxy series, of all places. FUCK YEAH DRUGS! We synthesise chemicals that are put into our brains to trigger chemical shock for the EXPRESS PURPOSE OF HALLUCINATING! We are FUCKING HARDCORE! http:\/\/en.wikipedia.org\/wiki\/The_Damned_Trilogy Humans are actually ambush predators par excellence. Pursuit and all that? Not so much. But Jesus Christ we will fuck your shit up in a surprise attack with everything we have. We cover our food in neurotoxin. For the flavour. Entire sectors of the Human leisure industry are dedicated to the production and sale of liquid inebriants which damage the body's internal organs and cause dehydration. Humans sometimes make a GAME out of consuming these inebriants. huh, doesn't look like it's on bookchan Actually, we're exceptional at pursuit. There's plenty of stuff that can run faster than us, but there's very little that can run longer than us. There's tribal hunting methods that just consist of constantly chasing an animal over a long stretch of land until it dies of exhaustion, and it works surprisingly well. I think following things for days until they literally fall down dead counts as pursuit. We're ok at ambush, but only really good at it with weapons - pursuit just involves out-Luggaging everything else. Also we're pretty much the fastest thing on the planet, for sustained travel. The Alan Dean Foster trilogy is actually pretty entertaining for a light read. This thread MUST be archived. For the glory of humanity! Add paintball and airsoft to the list. Hell, add nerf. We make harmless versions of weapons as toys for children. actually... that is actually pretty fucking disturbing... Almost BOOZEMIND >but only really good at it with weapons Note that the very first technological innovations of humanity were ways to more efficiently kill other creatures. What are the books called? Humans. The only species willing to strap explosives to themselves, infiltrate a public facility, and kill or maim an untold number of innocents to prove a point. For great justice, ARCHIVE THIS THREAD! Humans are so hardcore their first innovations were ways of making killing easier. Don't mess with homo sapiens sapiens. My grandpa was stationed in Korea after the war. They had little league football. It scared the SHIT out of the Asians! And they are constantly in pursuit of building and owning machines that will allow us to go faster, despite the damage they may cause to the biosphere. In fact, the faster a human is capable of going, the greater his status appears to be. It took more than 50 Terran years from the invention of the \"motorcar\" before laws were passed to ensure the use of safety restraints in said vehicles. File :1222848534.jpg-(20 KB, 242x250, DoW-Emperor40k.jpg) I am the Emperor of Mankind and I not only approve of this thread, but I demand archive for the honor of our race. Similar story with Canadian troops and hockey. Out of curiosity what? I know a number of things in food are poison but which one is neurotoxic? >> Dawgas !P6pMZ.8ybs 10\/01\/08(Wed)04:09 No.2710145 This thread is awesome. We should make a second one of this sometime, maybe tomorrow Yet weapons were mounted in said vehicles almost instantly. If you're going to compare humans to aliens, keep in mind that humans have LUDICROUS endurance compared to other members of the animal kingdom, because there were substantial periods in human history when anybody who couldn't keep tracking prey for days at a time without proper rest would starve to death right off. Any race with ANY significant physical advantages is likely to lack that, and the mental traits that come with it. >>2710097, too. OP said he would do more writefaggotry tomorrow... Hot Sauce. The burning effect comes from extremely diluted toxins. Humans consider one of the greatest career paths available to be piloting conveyances that use explosions for thrust. It's already on sup\/tg\/. That's a really good point I hadn't really thought of. This thread has filled me both with \"FUCK YEAH HOMOSAPIENS!\" and terror of my own race. Humans are constantly conditioned almost from birth to regard lethal violence as valid entertainment, and are taught to revere those who choose to kill other humans as a career. We routinely bombard ourselves with high amplitude sonic vibrations as a recreational activity. The more intense energy output used in this activity, the better the experience. Rock on Humanity! \"I was attending a gathering at the human ambassadors residence of Seare, and happened upon the children of the human occupants. They were watching what appeared to be live footage of a war, but was revealed to be a tactical simulation, analogous to that used in our military education establishments. We must keep close watch on these children, and others like them. there must be some thought of training them as the next generation of generals. The thought of otherwise exposing infants to the horrors of war is ludicrous\" Legion commanders! Dare not underestimate the humans! Their main means of locomotion burn up unreplaceable parts of their home world made from the bones of dead animals! It doesnt end there Dur'as'ka! These locomotion devices can explode with simple pressures! Who are these death craving fiends? Mmmm.... Jalapeno Chili. I can't seem to find it. \"Log, day six. [Pursuit\/flight] continues. Crew mental status worsens. Have increased [combat drug] dosages. [Expletive] hyom'ns.\" The resultant damage to the senses is a badge of honour. \"Rock on humanity.\" \"I said ROCK ON HUMANITY.\" The human taste in literature is highly disturbing, to say the least. While they have some civilised pieces, regarding philosophy and emotion, too much is simple obscenity. murders are glorified, and the more they kill, the more famous they become, while wars are remembered almost fondly, referred back to time and time again in tale after tale of slaughter and debauchery. What kind of race could revel in its own sociopathy? Just to add to the thread a little. Humans are as \"hardcore\" as they are because we evolved as territorial, tribal predators. Frankly, even at our most primitive, we're little walking gangs of rape for most other animals. We're even instinctively programmed to find a way to destroy, rather than flee, superior threats. Notice how every monster movie ends with the monster getting fucked over? Admittedly, there might be some hardcore stuff out there, but it's going to have to work very hard to be scarier than us. Nevermind I found it. Large and potentially dangerous doses of highly toxic chemicals and radiation are widely accepted as valid treatments for a variety of ailments. Even in medicine, the humans are exceedingly brutal. I'm now imagining an entire human division throwing up the horns before diving into battle with the foul otherworlders. That and tanks equipped with massive banks of speakers blasting AC\/DC and KISS as sonic warfare. The aliens are surrendering and whimpering, and their captors are headbanging as they direct them to the back of the lines. Humans took a long time to fully develop methods of preserving history, and so much of their past is only remembered by what methods of war were currently being waged and what ores were in use for weapons. http:\/\/www.alandeanfoster.com\/version2.0\/frameset.htm do I hear some GOLDFISH WARNING all up in this (rock band + powerful transmitters + enemy communication frequencies...) Put your tentacles in the air or we WILL play Iron Maiden. Also consider that our tech might be WAY in advance of any aliens we encounter. Its our turn to gang probe. The fact that Humans expose themselves to sunlight in order to damage their skin and make it assume a darker hue just adds weight to the theory that this species is in love with death. Some humans even worship a insane sociopathic god that commits all kinds of atrocities like killing their own children and yet they consider this god to be loving and merciful. If it has holes, it will be fucked by some enterprising soul. No exceptions. \"Put hands, claws, tentacles or whatever fucking extremities you have in the air or we will play Korn at 150 FUCKING DECIBELS MOTHERFUCKERS!\" Fuck, if I was an alien and I saw our world history... FUUUUUUUUUUUUUCK! I mean, we tested the A bomb when several people WHO BUILT IT said there was a chance that it would END ALL LIFE AS WE NOW IT. And now we're firing up the LHC which MIGHT make a black hole. We are ALL crazy motherfuckers. In fact they routinely thank this god for allowing them to sacrifice children to him. \"Of the mighty armada that had left Imperial space to claim the blue planet there was no word. The transmissions had ceased abruptly, but long range communication was prone to mishaps, and no one was overly concerned.\" \"When the transit pod dropped from hyperspace it was assumed to be space junk at first, but a very weak transponder signal caused enough interest that the Governor-General ordered an investigation. The pod's sole occupant, a technician from the Armada's flagship had been driven to insanity by what he had witnessed, but he still managed to push a box into the Governor-General's grasp before collapsing.\" \"None of us were quite expecting what we found inside, if we knew to expect anything at this point. Staring back from the box were the lifeless eyes of the Lord Admiral, well two of his lifeless eyes at least, the third had been destroyed by a projectile which had left a gaping exit wound amongst his antennae. Accompanying the head was a small piece of paper on which was drawn a crude representation of a four-limbed biped, raising the middle digit of his forelimb in some sort of gesture.\" \"A translation of the short accompanying text proved to be a suggestion to do something physically impossible.\" You only have to look at the gloomy obsession with treatment of deceased humans in early cultures (see embalming, insistence on using 'special' ground to bury the deceased) to come to the conclusion that the entire race is close to being a violent death cult. Humans can make implements of death out of ANYTHING, despite lacking any built-in weapons. Now consider the (rather different) mindset a, say, defanged and declawed intelligent tiger (or whatever) would have. It's not really a neurotoxin, but it does trigger pain receptors, which is just as badass. Humans preferentially select foods that mimic their response to damage. For the flavor. Also, it think it was a series of Niven stories that had humanity narrowly stalemate our first interstellar war, but the second time we were invaded we kicked so much alien ass that we were an overnight superpower. Apparently the rate at which we coopted tech was completely unheard of. It doesn't matter what weapon you use against the humans, within [ten years] they'll be using it against you at a scale you could hardly imagine. Rather than fight disease directly, humans deliberately inject themselves with crippled versions of deadly plagues, so that their bodies will shrug them off with minor effects. Their immune systems are so hardy that even the quickest-mutating pathogen barely effects them; they call this \"just a cold\" and treat their infection like a minor inconvenience! Actually, I think it's more likely that we encounter a species that is similar in overall advancement, but has very different specialties. For example, a race with advanced travel and communication technologies owing from a social structure based on peaceful expansion and fleeing as conflict resolution. Then the encounter us, where deadly ballistic weapons are common among civilians and there is more than enough nuclear bomb to make our planet uninhabitable. This \"human\" race is an interesting topic of debate. While it is easy to simply dismiss them as an entire race of demented sociopaths, the fact that their culture has not self-destructed in an orgy of uninhibited violence seems to imply there is something more to them. The manner in which their culture adapts these violent tendencies to survive past the lifetimes of its individual members can possibly be explained in the brevity of their own existence. A \"human\" seeks out every avenue of its existence and takes from it all it can before being snuffed out like the flames that spawn from the poisonous gas they breathe. Is it so hard then to admire their passion. We see them as monsters, but perhaps in them there is something we ourselves can aspire to. >> Excerpt from \"Design For Great-Day\" Anonymous 10\/01\/08(Wed)04:27 No.2710247 by Alan Dean Foster. The 'alien' is a human. The alien scrutinized the trooper as casually as if different life-forms in radically different shapes were more common than pebbles on a shingle beach. This inspection continued for several minutes, during which time communications flew across the ether but no one took any action. All waited to see what the alien would do next. As for the trooper yclept Yadiz, he became so embarrassed by his own futility that he began swapping his weapon from hand to hand and back again. \"Surely it's not that heavy,\" remarked the alien with complete and surprising fluency. As he spoke he eyed the weapon and sniffed. Startled, the trooper dropped the gun, which promptly went off with a high-pitched, ear-splitting crash. A piece of rock flew into shards and something whined shrilly through the air. The alien turned and followed the whine with its eyes until the sound finally died out. Then the creature said gently to Yadiz, \"Wasn't that rather silly?\" Hahaha, bravo. Their own physicians claim that, \"it kills the same number of human and cancerous cells, but the human has more.\" They do this with their own bodies! Imagine their willingness to expend people with whom they have no personal connection! There's an Asimov story with a similar theme to this thread. An ancient alien empire allies with earth, but is conspiring to take us over, as they consider us weak and young (They are about 500 times older than us or some shit). When it comes to the battle, we completely and utterly obliterate them, because while they have been in peace for millennia, we have been fighting and, well, necessity is the mother of invention. So humans are... Noise Marines. This is a species that traditionally provides nutrition for its helpless, live birthing young, for up to the first or second orbital year of their lives. By dispensing a fluid from engorged fat-surrounded glands. When the human larvae are dispensed, they are still physically attached to the gestation chamber of the female. No wonder they are so enamored with violence... the first act the young witnesses is this connection with its mother being severed with a sharp knife. Many believe that they will be rewarded for detoting garments packed with explosives in public spaces whilst still maintaining that the deity is benevolent. The belief that a deity can be glorified through the detonation of crude explosive devices has been present in almost all sects almost since the invention of explosives. The Human Navy has preserved the use of boarding parties as a primary means of victory. After pursuing their quarry to the point of total exhaustion on both sides, the Humans will summon up the energy for one last push: they set upon the vessel in small landing boats with the intent of overrunning the crew. These teams often pack sufficient munitions to scuttle the ship in the event they do not overtake their intended victims, for while looting is always in the forefront of the Human mind their leaders are not by any means above committing these teams to suicidal missions if it appears they may lose the upper hand. Woe betide any crewman who does not parish in the initial fighting, as the Humans are well known for their brutality and willingness to leave any survivors to drift through space until their eventual death. Note that most tribal warfare in our prehistory revolved around systematic genocide of opposing social groups. Not in pitched fights - those were usually more for ritual & show than anything - but hideously lopsided ambushes and night raids on women, children, and men unable to defend themselves. In virtually every primitive culture documented, at least 20% of the death rate is\/was from interpersonal violence, and that is an absolute baseline. Extermination: the uniquely human excellence. Humans are the Chaos gods. Tzeentch's ingenuity, Nurgle's endurance, Slaanesh's lust for experience, and of course Khorne's RIPNTEAR. Well that guy's done for. I mean he'd be scrwed with a regular human, but that's not a regular human he's got there, it's Michael Caine! And our dedication to self-destruction must be Malal. >> Prisoner, part 1. Anonymous 10\/01\/08(Wed)04:31 No.2710277 I don't exactly remember what happened. I was on Ta'Kee, in the single bar they had. It's this tradepost station above one of their mining colonies. These little Mara'Kee skittering around, making little \"tap-tap\" noises. They didn't drink anything though, no. They were just moving around, cleaning, or some such. I don't know. Only patrons at the bar were humans, anyway, and one Soo. Anyway, I was sitting there, yeah ? minding my own bussiness and all, drinking some vodka, and suddenly here comes this 'kee, with his crew of eight or something, and walks up to my table. So this damn bug, much bigger then the rest, reaching almost to my ribs yeah ? I'm talking really big. Anyway he walks up to me, and says \"Human Claydon Nash, you must accompany us to the detention cell, there you will await trial\". I spit my vodka, which causes the little bugs to move back and make these \"krick krick\" noises really fast. The big one raises this baton thing in one of it's arms, or legs, or whatever. \"Cease all attacks, Human Claydon Nash, and accompany us immediately\". I look around, of course everyone is looking away, except the soo, which stares at me with these freaky eye things. I tell him, like, \"fuck it, buggy, i'll go\". I hear his translator clicking at him, then some of the little ones go around my back, and we start walking out of the bar. This seems appropriate, somehow. Fuck your scything space-lasers. We've got men with future-shotguns slamming into your hull AND THEY ARE GOING TO SKULLFUCK YOU WITH MAGSPIKE BOOTS. that works damn well, really. Things get serious at the detention block, though. I ask the big one what's going on, only it takes a few tries because his translator doesn't get me. Then he tells me \"The Vau-Vau-X unity has requested you for questioning\". I start shitting my pants, yeah ? few months before that I was with the crew of bastards and we hijacked a few of their electronics convoys. Maybe broke a few Vau along the way, but it's not like they care, yeah ? So I say to him, \"look, mate, no way i'm going. They want me bad. Just let me get outta here, i'll make it worth your while.\" I swear, bugs can't blink, but he managed it anyway. \"I do not comprehend. You want me to act against my orders, and compensate me with credits ?\" \"Hell yeah, buggy. The Vau are going to kick my ass bad. I need to get out of here. Didn't do anything bad to you and yours, mate.\" \"I have been given strict orders, human. The Vau-Vau-X have expressed a high degree of will to aquire you, and my superiours have issued a legal warrant for your deportation\". So this is serious, yeah ? So I see I have one option. Partial transcript follows. \"Humans are quite resilient as implant carriers. They can survive receiving a full neurotransfer suite... after reaching their FULLY GROWN PHASE[1]. They can even learn to use it. Not to its full potential, obviously, but passably well.\" \"I think I can explain why they can learn to use such things. They quite often use the brute-force approach.\" \"Brute force? I suppose they have muscle in excess, but how is that relevant?\" \"Brute force in the problem-solving sense. The technique in which each possible solution is tested. They'll attempt anything, if desperate enough; they're heedless of low success rates, of risk. The problem [with humans using these methods] is that it sometimes works. Remember when they [2] captured that trade combine freighter?\" \"Yes. They use technology [from that ship in]... all their new ships now.\" \"Exactly. Let me give you of some privileged information [3]. They had no idea how the interface worked, when they initiated a Jump away from the escort ships. Doing such a thing is obscenely unlikely. They did not attempt it twice. [4]\" [1] Medical report on human resilience is in the public database. M2.9718 [2] A human subfaction, see infogather report 7.422 [3] Gathered using standard methods for nonconsentual information dissemination [4] They spent nearly half a cycle determining the interfacing functions before attempting a second jump, back to their primary system. See infogather report 7.582 \\=\/- FUCK YEAH! SLAANESH! -\\=\/ I jump the buggy, head butting it in the fucking face. It falls. Now the small ones are jumping all over me, stinging. They have this poison, yeah ? and i'm half drunk on vodka anyway. So i'm like \"DIE FUCKERS\", pummeling left and right until I hear them running away. Turns out buggy poison makes you a bit high, and with the alcohol, I could barely walk straight. I think I stepped on the big one when I started walking, they make this \"crunch\" sound, heh, anyway... So I start walking out of detention, and at the doorway back to the common area, I see this team of bugs holding their tazer things. I start to run out, and they all shoot me at the same time. Here I am , with like five tazers stuck in me, high on poison, drunk, I swear to god, fuck it. Most tazers just annoy, but one stuck in my leg, and I can't work it because it locked up, I guess it hurt like a motherfucker too. So I limp as fast as I can towards the door, throw the baton at one of the bugs, knocking it out, the door is looked so I fucking KICK IT OPEN, with a bit of the wall around it crashing on a few bugs outside. Tazers fall out, more bugs are comming, and I run like MAD. In the common areas no one even tries to stop me, and I think when I passed the bar, I could hear some human chearing for me. Bugs are waiting at the airlock to my ship. I rush them, I swear to god I love the crunch sound. they hit me with their batons a few times, they supposed to stun you or something. Gave me some nasty burns, but I didn't feel at the time. The various human cultures seem incapable of forming a single coherent whole as is the norm throughout the rest of the galaxy. Whereqas others formed a single coherent cultural whole for the species, the humans obstinately refuse to do the same and regularly indulge in brief but highly destructive bouts of intercultural culling. Humanity also has a habit of keeping the sub-species 'canine' as a pet. This animal varies in size and shape, but most have enough jaw strength to bite through flesh and bone... And they keep these things as PETS, often bought for their children! However, it must be noted that humans go through some lengths to train these beasts to the point of absolute loyalty. The human capacity to change is fascinating. I myself have witnessed a human military officer, who is tasked solely with the purpose of abusing his subordinates until they bond, take a group I suspected of severe genetic ailments - excess fat tissue, panic during crisis situations - and turn them into the perfect murder machines that have come to know and fear. We have long suspected that humans in their homelands are weaker than those we regularly encounter, but it is clear that even the weak ones can become dangerous with minimal effort. I would not advise an invasion of any human-controlled system at this time. Lame HUMEN IZ BESTEST thread designed to make neckbeards feel less insecure about themselves even though 40k already sucks massive EMPRAHREEM cock So the inner airlock door is fucking locked. I have no idea what to do, when I see the Soo from the bar slithering at me from behind. I almost jump him when he says \"I come to you in peace, human. I will help you.\" He looks at the broken bugs with no emotion, and back at me. \"I have urgent need of transportation, and I can help you. Do we have an accord\" ? I'm like, groaning inside. Here I am, running from bug and vau law, about to make a deal with a SOO. maybe I should go turn myself in, yeah ? No. I say, after a few seconds \"Sure thing, mate.\" I make room for the little guy at the door. He takes out this electronic kit, and messes around with the lock until it opens. I hear click click sounds of bugs running from behind, but the Soo was good, and the door opened fast. So I was out of there in a few minutes, And now I'm burned on 'kee stations too. And I owe a favor to a soo. And the vau are after me. I'm high, drunk, bleeding, covered with electric bruises. And i'm thinking \"GOD DAMN, I DIDN'T EVEN FINISH THE VODKA !\" Token troll is token. FUCK YEAH HUMAN WARLUST. I can just imagine an entire army of aliens being outright terrified of a single slightly maladjusted US Marine with a combat knife or a hatchet because their directed-energy weapons might kill one of them, but gives us a mild sunburn. \"Look out! It has a sharp piece of metal! All is lost!\" way to read the thread, WH40K stuff is barely mentioned TROLL. GET. THE. FUCK. OFF. MY. THREAD. \"Your basic human is between three and twenty-five feet tall, and is mostly composed of an oily goo wrapped in a t-shirt.\" \"Is it true that they bite you on the neck to drain your transmission fluid, and then you become human yourself?\" \"Sure, why not?\" Like that Simpsons episode when Kodos and Kang are ran out of town by Moe with a nailbat. Humans are an incredibly odd species. While most creatures couldn't dream of putting themselves in danger, they do it for the sake of health. They put all sorts of chemicals in their body to cure ailments. They don't even understand how any of it works. They simply know that it doesn't kill them, and they're happy with that. They even frequently experiment with new chemicals, trying to cure more ailments with potentially deadly ingredients! If I was an alien, I'd be more worried about people like disgruntled arab farmers and angry yokels of various kinds. >are ran A butthurt alien! Get him, men! They'll keep slaves of ANYTHING they can get their grippers on. From the tiniest aquatic invertebrate to massive land herbivores, and carnivores of various sizes. Even other humans, as part of their utterly bizarre monogamous mating habits, though a good number of them seem to have the common sense to defy those bonds and safely disperse their genetic material through a variety of outside mates. Did I mention some of them keep inanimate rocks as \"pets\"? Some humans even deliberately put themselves in incredible danger just for fun. IT'S FUCKING ON, NOW. Dark-skinned people don't even feel it. Addendum: This anthropologist has found evidence that humans once excised parts of patient's brains, unknowing of the consequences, in order to attempt to 'cure' them. It seems that even their medicine is based around destruction and experimentation. The preoccupation with hurling themselves out of moving aircraft and off cliffs and bridges is another symptom of a species-wide psychosis. All human children, from the earliest stages of post-uterine development, are encouraged to partake in feats of violence and strife with one another, to establish which group is the victor. With no tangible benefit presenting itself, they compete purely for the sake of dominion and ego. Often these competitions will involve forceful physical contact and injuries, which is considered a part of the developmental process. It should come as no surprise that the species is so malajusted. they have claimed that they do this for the \"high,\" which is a release of endorphins easily achieved by amusing oneself in any number of safe and prosocial manners. \"Observation indicates that many of their tactical simulations- used to desensitize their offspring to violent actions- are not given freely, but instead must be purchased of the offspring's own time and money. In this way, training for what is often bloody combat, simulated homicide, and sometimes even wanton acts of destruction is seen as a sort of commerce and reward.\" Read up on some human history. During their early evolutionary history, there were several human sub-species. One among them called \"Neanderthal\". Do you know what the humans did to all of their species brothers? They utterly exterminated them down to the last one until they were the only kind of human left. They will willingly exterminate members of their own race for any reason and sometime none at all. Think of what they would do to use if they could? WE'RE COMING FOR YOU NEXT, ET. This thread seems to be slowly slipping away from human badassery to condescending space elves looking down on our violent ways. It has been suggested that the harsh environment the human species originated in is responsible for much of their aggression. The environment of Sol-3 (or Earth, colloquially) is volatile in the extreme. Massive salt water oceans are pulled about the surface of the planet by lunar tides. This combines with a constant colossal movement of air about the planet to make storms of mind boggling size and ferocity. \"Hurricane\" is a water\/air hybrid storm that flings masses of water and air about, sometimes leveling or flooding whole cities. \"Tornado\" is an electrically charged vortex of winds that can demolish even the strongest human structure, yet they commonly build vast both vast cites and, even more astounding, clusters of flimsy dwellings called 'mobile homes', in areas renowned for the violence of these storms. The planetary temperatures create both vast areas of frozen water and dehydrated desert, and humanity has filled even these inhospitable climes with everything from crude structures hand made of local materials to large 'resorts' where humans PAY to subject themselves to prolonged exposure to solar radiation or swim in large tubs of water filled with chlorine! And they are terrified by us. My Species boner is so hard right now. Perhaps, then, their constant infighting is for the best. With any luck, they will not turn their attentions to our confederation of species in full force ever. We are dealing with a race bred and trained to slaughter other creatures. You misunderstand. We're pantomiming space-elf criticism of our species in order"} +{"id":"RedPajamaCommonCrawl.0025","text":"From Infogalactic: the planetary knowledge core This article is about the country. For the U.S. state, see Georgia (U.S. state). For other uses, see Georgia (disambiguation). Lua error in Module:Coordinates at line 668: callParserFunction: function \"#coordinates\" was not found. \u10e1\u10d0\u10e5\u10d0\u10e0\u10d7\u10d5\u10d4\u10da\u10dd (Georgian) Sakartvelo \u10eb\u10d0\u10da\u10d0 \u10d4\u10e0\u10d7\u10dd\u10d1\u10d0\u10e8\u10d8\u10d0 Dzala Ertobashia Strength is in Unity Anthem: \u10d7\u10d0\u10d5\u10d8\u10e1\u10e3\u10e4\u10da\u10d4\u10d1\u10d0 Tavisupleba Georgia proper shown in dark green; areas outside of Georgian control shown in pattern Capital Tbilisi Kutaisi (legislative) Georgian[1] Ethnic groups (2014) Georgians \u2013 86.8% Azerbaijanis \u2013 6.2% Armenians \u2013 4.5% Others \u2013 2.8% Georgian Orthodox Church Unitary semi-presidential constitutional republic[a] \u2022 President Giorgi Margvelashvili \u2022 Speaker of the Parliament Irakli Kobakhidze \u2022 Prime Minister Giorgi Kvirikashvili \u2022 from the Russian Empire 26 May 1918 \u2022 Soviet re-conquest 25 February 1921 \u2022 from the Soviet Union \u2022 Current constitution 24 August 1995 \u2022 Total 69,700 km2 (120th) \u2022 2016 estimate 3,720,400[b][2] (131st) \u2022 2014 census 3,713,804[b][3] \u2022 Density 53.5\/km2 (137th) 138.6\/sq mi \u2022 Total $37.38 billion[4] (115th) \u2022 Per capita $10,100[4] (107th) \u2022 Per capita $3,908[4] (110th) Gini (2014) 40.9[5] high \u00b7 70th Georgian lari (\u20be) (GEL) GET (UTC+4) .ge .\u10d2\u10d4 a. ^ Moved in 2013 from a president-parliamentary system to a premier-presidential system. b. ^ Excluding occupied territories. Georgia ( i\/\u02c8d\u0292\u0254\u02d0rd\u0292\u0259\/; Georgian: \u10e1\u10d0\u10e5\u10d0\u10e0\u10d7\u10d5\u10d4\u10da\u10dd, tr. Sakartvelo, IPA: [s\u0251k\u02b0\u0251rt\u02b0v\u025bl\u0254] ( listen)) is a country in the Caucasus region of Eurasia. Located at the crossroads of Western Asia and Eastern Europe, it is bounded to the west by the Black Sea, to the north by Russia, to the south by Turkey and Armenia, and to the southeast by Azerbaijan. The capital and largest city is Tbilisi. Georgia covers a territory of 69,700 square kilometres (26,911 sq mi), and its 2016 population is about 3.72 million. Georgia is a unitary, semi-presidential republic, with the government elected through a representative democracy. During the classical era, several independent kingdoms became established in what is now Georgia. The kingdoms of Colchis and Iberia adopted Christianity in the early 4th century. A unified Kingdom of Georgia reached the peak of its political and economic strength during the reign of King David IV and Queen Tamar in the 12th and early 13th centuries. Thereafter the kingdom declined and eventually disintegrated under hegemony of various regional powers, including the Mongols, the Ottoman Empire, and successive dynasties of Iran. In the late 18th century, the eastern Georgian Kingdom of Kartli-Kakheti forged an alliance with the Russian Empire, which directly annexed the kingdom in 1801 and conquered the western Kingdom of Imereti in 1810. Russian rule over Georgia was eventually acknowledged in various peace treaties with Iran and the Ottomans. Following the Russian Revolution in 1917, Georgia obtained its short-lived independence and established the first-ever republic led by the Social-Democrats in 1918, only to be invaded by Soviet Russia in 1921 and subsequently absorbed into the Soviet Union as the Georgian Soviet Socialist Republic. Since the establishment of the modern Georgian republic in April 1991, post-communist Georgia suffered from civil and economic crisis for most of the 1990s. Following the bloodless Rose Revolution in 2003, Georgia pursued a strongly pro-Western foreign policy, aimed at NATO and European integration, and introduced a series of democratic and economic reforms, which brought about mixed results, but strengthened state institutions. The country's Western orientation soon led to the worsening of relations with Russia, culminating in the brief Russo-Georgian War in August 2008. Georgia is a member of the United Nations, the Council of Europe, and the GUAM Organization for Democracy and Economic Development. It contains two de facto independent regions, Abkhazia and South Ossetia, which gained very limited international recognition after the 2008 Russo-Georgian War. Georgia and the overwhelming majority of the international community consider the regions to be part of Georgia's sovereign territory under Russian military occupation.[7] 2.1 Prehistory 2.2 Antiquity 2.3 Middle Ages up to Early Modern Period 2.4 Georgia in the Russian Empire 2.5 Declaration of independence 2.6 Georgia in the Soviet Union 2.7 Georgia after restoration of independence 2.8 Russo\u2013Georgian War and since 3 Government and politics 3.1 Foreign relations 3.3 Law enforcement 3.4 Human rights 4 Administrative divisions 5 Geography and climate 5.1 Topography 5.3 Biodiversity 6.1 Tourism 6.2 Transport 7.1 Religion 7.2 Education 8.1 Architecture and arts 8.2 Media 8.3 Music 8.4 Cuisine 9 International rankings Main article: Name of Georgia (country) \"Gorgania\" i.e. Georgia on Fra Mauro map \"Georgia\" probably stems from the Persian designation of the Georgians \u2013 gur\u011f\u0101n, in the 11th and 12th centuries adapted via Syriac gurz-\u0101n\/gurz-iy\u0101n and Arabic \u0135ur\u0135an\/\u0135urzan. Lore-based theories were given by the traveller Jacques de Vitry, who explained the name's origin by the popularity of St. George amongst Georgians,[8] while traveller Jean Chardin thought that \"Georgia\" came from Greek \u03b3\u03b5\u03c9\u03c1\u03b3\u03cc\u03c2 (\"tiller of the land\"). As Prof. Alexander Mikaberidze adds, these century-old explanations for the word Georgia\/Georgians are rejected by the scholarly community, who point to the Persian word gur\u011f\/gur\u011f\u0101n (\"wolf\"[9]) as the root of the word.[10] Starting with the Persian word gur\u011f\/gur\u011f\u0101n, the word was later adopted in numerous other languages, including Slavic and West European languages.[10][11] This term itself might have been established through the ancient Iranian appellation of the near-Caspian region, which was referred to as Gorgan (\"land of the wolves\"[12]).[10] The native name is Sakartvelo (\u10e1\u10d0\u10e5\u10d0\u10e0\u10d7\u10d5\u10d4\u10da\u10dd; \"land of Kartvelians\"), derived from the core central Georgian region of Kartli, recorded from the 9th century, and in extended usage referring to the entire medieval Kingdom of Georgia by the 13th century. The self-designation used by ethnic Georgians is Kartvelebi (\u10e5\u10d0\u10e0\u10d7\u10d5\u10d4\u10da\u10d4\u10d1\u10d8, i.e. \"Kartvelians\"). The medieval Georgian Chronicles present an eponymous ancestor of the Kartvelians, Kartlos, a great-grandson of Japheth. However, scholars agree that the word is derived from the Karts, the latter being one of the proto-Georgian tribes that emerged as a dominant group in ancient times.[10] The name Sakartvelo (\u10e1\u10d0\u10e5\u10d0\u10e0\u10d7\u10d5\u10d4\u10da\u10dd) consists of two parts. Its root, kartvel-i (\u10e5\u10d0\u10e0\u10d7\u10d5\u10d4\u10da-\u10d8), specifies an inhabitant of the core central-eastern Georgian region of Kartli, or Iberia as it is known in sources of the Eastern Roman Empire.[13] Ancient Greeks (Strabo, Herodotus, Plutarch, Homer, etc.) and Romans (Titus Livius, Tacitus, etc.) referred to early western Georgians as Colchians and eastern Georgians as Iberians (Iberoi in some Greek sources).[14] Today the full, official name of the country is \"Georgia\", as specified in the Georgian constitution which reads \"Georgia shall be the name of the State of Georgia.\"[15] Before the 1995 constitution came into force the country's name was the Republic of Georgia. Main article: History of Georgia (country) Main article: Prehistoric Georgia The territory of modern-day Georgia was inhabited by Homo erectus since the Paleolithic Era. The proto-Georgian tribes first appear in written history in the 12th century BC.[16] The earliest evidence of wine to date has been found in Georgia, where 8000-year old wine jars were uncovered.[17][18] Archaeological finds and references in ancient sources also reveal elements of early political and state formations characterized by advanced metallurgy and goldsmith techniques that date back to the 7th century BC and beyond.[16] In fact, early metallurgy started in Georgia during the 6th millennium BC, associated with the Shulaveri-Shomu culture.[19] Ancient Georgian states of Colchis and Iberia, 500\u2013400 BC The classical period saw the rise of a number of early Georgian states, the principal of which was Colchis in the west and Iberia in the east. In the 4th century BC, a unified kingdom of Georgia \u2013 an early example of advanced state organization under one king and an aristocratic hierarchy \u2013 was established.[20] In Greek mythology, Colchis was the location of the Golden Fleece sought by Jason and the Argonauts in Apollonius Rhodius' epic tale Argonautica. The incorporation of the Golden Fleece into the myth may have derived from the local practice of using fleeces to sift gold dust from rivers.[21] Known to its natives as Egrisi or Lazica, Colchis was also the battlefield of the Lazic War fought between the Byzantine Empire and Sassanid Persia. After the Roman Republic completed its brief conquest of what is now Georgia in 66 BC, the area became a primary objective of what would eventually turn out to be over 700 years of protracted Irano\u2013Roman geo-political rivalry and warfare.[22][23] From the first centuries A.D, the cult of Mithras, pagan beliefs, and Zoroastrianism were commonly practised in Georgia.[24] In 337 AD King Mirian III declared Christianity as the state religion, giving a great stimulus to the development of literature, arts, and ultimately playing a key role in the formation of the unified Georgian nation,[25][26] The acceptance led to the slow but sure decline of Zoroastrianism,[27] which until the 5th century AD, appeared to have become something like a second established religion in Iberia (eastern Georgia), and was widely practised there.[28] In the ensuing period, until the course of the 7th century, what is now Georgia remained dominated by the Romans and Sasanians. Middle Ages up to Early Modern Period Located on the crossroads of protracted Roman\u2013Persian Wars, the early Georgian kingdoms disintegrated into various feudal regions by the early Middle Ages. This made it easy for the remaining Georgian realms to fall prey to the early Muslim conquests in the 7th century. Despite the capture of Tbilisi in 645 AD by Muslims, Kartli-Iberia retained considerable independence under local rulers.[citation needed] Queen Tamar of Georgia presided over the \"Golden Age\" of the medieval Georgian monarchy. Her position as the first woman to rule Georgia in her own right was emphasized by the title \"Mepe mepeta\" (\"King of Kings\").[29] The Kingdom of Georgia reached its zenith in the 12th to early 13th centuries. This period during the reigns of David IV (called David the Builder, r. 1089\u20131125) and his granddaughter Tamar (r. 1184\u20131213) has been widely termed as Georgia's Golden Age or the Georgian Renaissance.[30] This early Georgian renaissance, which preceded its Western European analogue, was characterized by impressive military victories, territorial expansion, and a cultural renaissance in architecture, literature, philosophy and the sciences.[31] The Golden age of Georgia left a legacy of great cathedrals, romantic poetry and literature, and the epic poem \"The Knight in the Panther's Skin\", the latter which is considered a national epic.[32][33] Kingdom (Empire) of Georgia in 1184\u20131230 at the peak of its might David suppressed dissent of feudal lords and centralized the power in his hands to effectively deal with foreign threats. In 1121, he decisively defeated much larger Turkish armies during the Battle of Didgori and liberated Tbilisi.[34] At the height of its dominance, the Kingdom's influence spanned from the south of modern-day Ukraine, to the northern provinces of Persia, while also maintaining religious possessions in the Holy Land and Greece.[citation needed] The 29-year reign of Tamar, the first female ruler of Georgia, is considered the most successful in Georgian history.[35] Tamar was given the title \"king of kings\" (mepe mepeta).[29] She succeeded in neutralizing opposition and embarked on an energetic foreign policy aided by the downfall of the rival powers of the Seljuks and Byzantium. Supported by a powerful military \u00e9lite, Tamar was able to build on the successes of her predecessors to consolidate an empire which dominated the Caucasus, and extended over large parts of present-day Azerbaijan, Armenia, and eastern Turkey as well as parts of northern Iran,[36] until its collapse under the Mongol attacks within two decades after Tamar's death in 1213.[37] The revival of the Kingdom of Georgia was set back after Tbilisi was captured and destroyed by the Khwarezmian leader Jalal ad-Din in 1226.[38] The Mongols were expelled by George V of Georgia, son of Demetrius II of Georgia, who was named \"Brilliant\" for his role in restoring the country's previous strength and Christian culture.[citation needed] George V was the last great king of the unified Georgian state. After his death, different local rulers fought for their independence from central Georgian rule, until the total disintegration of the Kingdom in the 15th century. Georgia was further weakened by several disastrous invasions by Tamerlane. Invasions continued, giving the kingdom no time for restoration, with both Black and White sheep Turkomans constantly raiding its southern provinces. As a result, the Kingdom of Georgia collapsed into anarchy by 1466 and fragmented into three independent kingdoms and five semi-independent principalities. Neighboring large empires subsequently exploited the internal division of the weakened country, and beginning in the 16th century up to the late 18th century, Safavid Iran (and successive Iranian Afsharid and Qajar dynasties) and Ottoman Turkey subjugated the eastern and western regions of Georgia, respectively.[citation needed] The rulers of regions that remained partly autonomous organized rebellions on various occasions. However, subsequent Iranian and Ottoman invasions further weakened local kingdoms and regions. As a result of incessant wars and deportations, the population of Georgia dwindled to 250,000 inhabitants at the end of the 18th century.[citation needed] Eastern Georgia (the larger part of Georgia), composed of the regions of Kartli and Kakheti, had been under Iranian suzerainty since 1555 following the Peace of Amasya signed with neighbouring rivalling Ottoman Turkey. With the death of Nader Shah in 1747, both kingdoms broke free of Iranian control and were reunified through a personal union under the energetic king Heraclius (Erekle) II in 1762. Erekle, who had risen to prominence through the Iranian ranks, was awarded the crown of Kartli by Nader himself in 1744 for his loyal service to him.[39] Erekle nevertheless stabilized Eastern Georgia to a degree in the ensuing period and was able to guarantee its autonomy throughout the Iranian Zand period.[40] In 1783, Russia and the eastern Georgian Kingdom of Kartli-Kakheti signed the Treaty of Georgievsk, by which Georgia abjured any dependence on Persia or another power, and made the kingdom a protectorate of Russia, which guaranteed Georgia's territorial integrity and the continuation of its reigning Bagrationi dynasty in return for prerogatives in the conduct of Georgian foreign affairs.[41] However, despite this commitment to defend Georgia, Russia rendered no assistance when the Iranians invaded in 1795, capturing and sacking Tbilisi while massacring its inhabitants, as the new heir to the throne sought to reassert Iranian hegemony over Georgia.[42] Despite a punitive campaign subsequently launched against Qajar Iran in 1796, this period culminated in the 1801 Russian violation of the Treaty of Georgievsk and annexation of eastern Georgia, followed by the abolition of the royal Bagrationi dynasty, as well as the autocephaly of the Georgian Orthodox Church. Pyotr Bagration, one of the descendants of the abolished house of Bagrationi, would later join the Russian army and rise to be a prominent general in the Napoleonic wars.[citation needed] Georgia in the Russian Empire Main article: Georgia within the Russian Empire King George XII was the last king of Kartli and Kakheti, which was annexed by Russia in 1801. The Bagrationi royal family was deported from the kingdom. The current pretenders' restoration to the throne is discussed in Georgian society in the present day.[43] On 22 December 1800, Tsar Paul I of Russia, at the alleged request of the Georgian King George XII, signed the proclamation on the incorporation of Georgia (Kartli-Kakheti) within the Russian Empire, which was finalized by a decree on 8 January 1801,[44][45] and confirmed by Tsar Alexander I on 12 September 1801.[46][47] The Georgian envoy in Saint Petersburg reacted with a note of protest that was presented to the Russian vice-chancellor Prince Kurakin.[48] In May 1801, under the oversight of General Carl Heinrich von Knorring, Imperial Russia transferred power in eastern Georgia to the government headed by General Ivan Petrovich Lazarev.[49] The Georgian nobility did not accept the decree until 12 April 1802, when Knorring assembled the nobility at the Sioni Cathedral and forced them to take an oath on the Imperial Crown of Russia. Those who disagreed were temporarily arrested.[50] In the summer of 1805, Russian troops on the Askerani River near Zagam defeated the Iranian army during the Russo-Persian War (1804\u20131813) and saved Tbilisi from reconquest now that it was officially part of the Imperial territories. Russian suzerainty over eastern Georgia was officially finalized with Iran in 1813 following the Treaty of Gulistan.[51] Following the annexation of eastern Georgia, the western Georgian kingdom of Imereti was annexed by Tsar Alexander I. The last Imeretian king and the last Georgian Bagrationi ruler, Solomon II, died in exile in 1815, after attempts to rally people against Russia and to enlist foreign support against the latter, had been in vain.[52] From 1803 to 1878, as a result of numerous Russian wars now against Ottoman Turkey, several of Georgia's previously lost territories \u2013 such as Adjara \u2013 were recovered, and also incorporated into the empire. The principality of Guria was abolished and incorporated into the Empire in 1829, while Svaneti was gradually annexed in 1858. Mingrelia, although a Russian protectorate since 1803, was not absorbed until 1867.[53] Main article: Democratic Republic of Georgia Declaration of independence by the Georgian parliament, 1918 After the Russian Revolution of 1917, Georgia declared independence on 26 May 1918, in the midst of the Russian Civil War. The Menshevik Georgian Social-Democratic Party won the parliamentary election. Its leader, Noe Zhordania, became prime minister. The 1918 Georgian\u2013Armenian War, which erupted over parts of Georgian provinces populated mostly by Armenians, ended because of British intervention. In 1918\u20131919, Georgian general Giorgi Mazniashvili led an attack against the White Army led by Moiseev and Denikin in order to claim the Black Sea coastline from Tuapse to Sochi and Adler for independent Georgia.[54] The country's independence did not last long. Georgia was under British protection from 1918\u20131920.[citation needed] Georgia in the Soviet Union Main article: Georgian Soviet Socialist Republic Despite the Soviet takeover, Noe Jordania was recognized as the legitimate head of the Georgian Government by France, UK, Belgium, and Poland through the 1930s.[55] In February 1921, Georgia was attacked by the Red Army. The Georgian army was defeated and the Social-Democratic government fled the country. On 25 February 1921, the Red Army entered Tbilisi and installed a communist government loyal to Moscow, led by Georgian Bolshevik Filipp Makharadze.[citation needed] Nevertheless, there remained significant opposition to the Bolsheviks, and this culminated in the August Uprising of 1924. Soviet rule was firmly established only after this uprising was suppressed.[56] Georgia was incorporated into the Transcaucasian SFSR, which united Georgia, Armenia and Azerbaijan. Later, in 1936, the TSFSR was disaggregated into its component elements and Georgia became the Georgian SSR.[citation needed] The 11th Red Army of the Russian SFSR holds a military parade, 25 February 1921 in Tbilisi Joseph Stalin, an ethnic Georgian born Ioseb Besarionis Dze Jugashvili (\u10d8\u10dd\u10e1\u10d4\u10d1 \u10d1\u10d4\u10e1\u10d0\u10e0\u10d8\u10dd\u10dc\u10d8\u10e1 \u10eb\u10d4 \u10ef\u10e3\u10e6\u10d0\u10e8\u10d5\u10d8\u10da\u10d8) in Gori, was prominent among the Bolsheviks. Stalin was to rise to the highest position, leading the Soviet Union from 3 April 1922 until his death on 5 March 1953.[citation needed] Georgia after restoration of independence On 9 April 1991, shortly before the collapse of the Soviet Union, the Supreme Council of Georgia declared independence after a referendum held on 31 March 1991.[57] On 26 May 1991, Gamsakhurdia was elected as the first President of independent Georgia. Gamsakhurdia stoked Georgian nationalism and vowed to assert Tbilisi's authority over regions such as Abkhazia and South Ossetia that had been classified as autonomous oblasts under the Soviet Union.[citation needed] He was soon deposed in a bloody coup d'\u00e9tat, from 22 December 1991 to 6 January 1992. The coup was instigated by part of the National Guards and a paramilitary organization called \"Mkhedrioni\" (\"horsemen\"). The country became embroiled in a bitter civil war, which lasted until nearly 1995. Eduard Shevardnadze (Soviet Minister of Foreign Affairs from 1985 to 1991) returned to Georgia in 1992 and joined the leaders of the coup \u2014 Tengiz Kitovani and Jaba Ioseliani \u2014 to head a triumvirate called \"The State Council\".[citation needed] Simmering disputes within two regions of Georgia, Abkhazia and South Ossetia, between local separatists and the majority Georgian populations, erupted into widespread inter-ethnic violence and wars. Supported by Russia, Abkhazia, and South Ossetia achieved de facto independence from Georgia, with Georgia retaining control only in small areas of the disputed territories. In 1995, Shevardnadze was officially elected as president of Georgia.[citation needed] The Rose Revolution, 2003 During the War in Abkhazia (1992\u20131993), roughly 230,000 to 250,000 Georgians[58] were expelled from Abkhazia by Abkhaz separatists and North Caucasian volunteers (including Chechens). Around 23,000 Georgians[59] fled South Ossetia as well, and many Ossetian families were forced to abandon their homes in the Borjomi region and moved to Russia.[citation needed] In 2003, Shevardnadze (who won re-election in 2000) was deposed by the Rose Revolution, after Georgian opposition and international monitors asserted that the 2 November parliamentary elections were marred by fraud.[60] The revolution was led by Mikheil Saakashvili, Zurab Zhvania and Nino Burjanadze, former members and leaders of Shevardnadze's ruling party. Mikheil Saakashvili was elected as President of Georgia in 2004.[citation needed] Following the Rose Revolution, a series of reforms were launched to strengthen the country's military and economic capabilities. The new government's efforts to reassert Georgian authority in the southwestern autonomous republic of Ajaria led to a major crisis early in 2004. Success in Ajaria encouraged Saakashvili to intensify his efforts, but without success, in breakaway South Ossetia.[citation needed] These events, along with accusations of Georgian involvement in the Second Chechen War,[61] resulted in a severe deterioration of relations with Russia, fuelled also by Russia's open assistance and support to the two secessionist areas. Despite these increasingly difficult relations, in May 2005 Georgia and Russia reached a bilateral agreement[62] by which Russian military bases (dating back to the Soviet era) in Batumi and Akhalkalaki were withdrawn. Russia withdrew all personnel and equipment from these sites by December 2007[63] while failing to withdraw from the Gudauta base in Abkhazia, which it was required to vacate after the adoption of the Adapted Conventional Armed Forces in Europe Treaty during the 1999 Istanbul summit.[64] Russo\u2013Georgian War and since Main article: Russo\u2013Georgian War See also: International recognition of Abkhazia and South Ossetia Political tensions between Georgia and Russia began escalating in April 2008.[65][66] On 1 August 2008 South Ossetian separatists blew up a Georgian military vehicle injuring five Georgian peacekeepers, which Georgian snipers responded to by killing six South Ossetian militiamen. Low-level skirmishes followed, with South Ossetian forces shelling some villages under Georgian control, eliciting responses from Georgian peacekeepers.[67][68][69][70][71] US Secretary of State Condoleezza Rice holding a joint press conference with Georgian president Mikheil Saakashvili during the Russo-Georgian war On 7 August 2008, Georgian forces began shelling the South Ossetian capital, Tskhinvali; this was followed, on 8 August 2008, by an advance of Georgian Army infantry, tanks, and police commandos into South Ossetia; the action was supported by artillery and air support,[72] leading to the capture of a number of key South Ossetian towns and retreat of Russian peacekeepers and South Ossetian forces.[73][74] However, after a Russian peacekeepers' base was shelled and personnel killed, units of the Russian 58th Army, supported by irregular forces, entered South Ossetia through the Roki Tunnel, thus leading to a three-day battle which left the city of Tskhinvali in ruins.[75][76][77] Georgian forces were subsequently forced to retreat and the Russian Air Force began launching airstrikes against Georgian forces in South Ossetia, and multiple targets inside Georgia proper.[78] The Georgian Air Force resisted and later continued to carry out air strikes against Russian troops. A second front was opened when the separatist Republic of Abkhazia, with Russian support, launched an offensive against Georgian troops in the Kodori Valley. Georgian troops offered minimal resistance and soon withdrew.[79][80] Russian paratroopers launched raids against military bases in Senaki, Georgia, from Abkhazia, whilst the Russian Navy stationed a task force off the coast of Abkhazia, and sank a Georgian Coast Guard cutter.[citation needed] File:Russian Military Bases in Abkhazia (2011-2016 Data).svg Russian forces, upon crossing into Georgia proper, soon entered Gori where Georgian forces had earlier regrouped before retreating to Tbilisi. Irregulars such as Ossetians, Chechens and Cossacks followed; looting, killing, and arson was reported.[81][82] Russian troops removed military equipment abandoned by retreating Georgian troops in Gori and the port of Poti, where several naval and coast guard vessels moored in the harbour were scuttled.[83] On August 12, 2008, President Medvedev announced a halt to further Russian military operations in Georgia[84] and ordered a gradual withdrawal from Gori, Poti and other established checkpoints. Despite this Russian forces remained in South Ossetia and Abkhazia,[85][86] the independence of which it soon recognized.[87] Because of the intensive fighting in South Ossetia, there were many disputed reports about the number of casualties on both sides, which targets had fallen under aerial attacks, the status of troop movements, and the most current location of the front line between the Georgian and Russian-Ossetian units.[88] Since the war, South Ossetian and Russian officials have made a number of claims[76] that the Georgian Army was responsible for killing 1,400\u20132,000 South Ossetian civilians. Human Rights Watch and European Union investigators in South Ossetia have subsequently accused Russia of exaggerating the scale of such casualties.[89][90][91][92] All sides sustained casualties, with Georgia accounting for the greatest number of military casualties with 170 confirmed dead or missing.[93] Since the war, Georgia has maintained that Abkhazia and South Ossetia are under Russian occupation and remain, legally, part of Georgia.[94][95] Georgia has gained much international support for this position although attempts at limiting international access to and enforcing an economic embargo of the two break-away regions have produced mixed results.[96] Main article: Politics of Georgia (country) Georgia is a representative democratic semi-presidential republic, with the President as the head of state, and Prime Minister as the head of government. The executive branch of power is made up of the President and the Cabinet of Georgia. The Cabinet is composed of ministers, headed by the Prime Minister, and appointed by the President. Notably, the ministers of defense and interior are not members of the Cabinet and are subordinated directly to the President of Georgia. Giorgi Margvelashvili is the current President of Georgia after winning 62.12% of the vote in the 2013 election. Since 2015, Giorgi Kvirikashvili has been the prime minister of Georgia.[citation needed] Georgian parliament building in Kutaisi Legislative authority is vested in the Parliament of Georgia. It is unicameral and has 150 members, known as deputies, of whom 75 are elected by plurality to represent single-member districts, and 75 are chosen to represent parties by proportional representation. Members of parliament are elected for four-year terms. Five parties and electoral blocs had representatives elected to the parliament in the 2008 elections: the United National Movement (governing party), The Joint Opposition, the Christian-Democrats, the Labour Party and Republican Party.[citation needed] On 26 May 2012, Saakashvili inaugurated a new Parliament building in the western city of Kutaisi, in an effort to decentralise power and shift some political control closer to Abkhazia.[97] The elections in October 2012 resulted in the victory for the opposition \"Georgian Dream \u2013 Democratic Georgia\" coalition, which President Saakashvili acknowledged on the following day.[98] Although considerable progress was made since the Rose revolution, former President Mikheil Saakashvili stated in 2008 that Georgia is still not a \"full-fledged, very well-formed, crystalized society.\"[99] The political system remains in the process of transition, with frequent adjustments to the balance of power between the President and Parliament, and opposition proposals ranging from transforming the country into parliamentary republic to re-establishing the monarchy.[100][101] Observers note the deficit of trust in relations between the Government and the opposition.[102] Different opinions exist regarding the degree of political freedom in Georgia. Saakashvili believed in 2008 that the country is \"on the road to becoming a European democracy.\"[99] Freedom House lists Georgia as a partly free country.[103] In preparation for 2012 parliamentary elections, Parliament adopted a new electoral code on 27 December 2011 that incorporated many recommendations from non-governmental organizations (NGOs) and the Venice Commission. However, the new code failed to address the Venice Commission's primary recommendation to strengthen the equality of the vote by reconstituting single-mandate election districts to be comparable in size. On December 28, Parliament amended the Law on Political Unions to regulate campaign and political party financing. Local and international observers raised concerns about several amendments, including the vagueness of the criteria for determining political bribery and which individuals and organizations would be subject to the law. As of March 2012, Parliament was discussing further amendments to address these concerns.[104] Main article: Foreign relations of Georgia Pro-NATO poster in Tbilisi Georgia maintains good relations with its direct neighbours (Armenia, Azerbaijan, and Turkey) and is a member of the United Nations, the Council of Europe, the World Trade Organization, the Organization of the Black Sea Economic Cooperation, the Organization for Security and Cooperation in Europe, the Community of Democratic Choice, the GUAM Organization for Democracy and Economic Development, the European Bank for Reconstruction and Development[105] and the Asian Development Bank.[106] Georgia also maintains political, economic, and military relations with France,[107] Germany,[108] Israel,[109] Japan,[110] South Korea,[111] Sri Lanka,[112] Turkey,[113] Ukraine,[114] the United States,[115] and many other countries.[116] The growing U.S. and European Union influence in Georgia, notably through proposed EU and NATO membership, the U.S. Train and Equip military assistance program, and the construction of the Baku\u2013Tbilisi\u2013Ceyhan pipeline have frequently strained Tbilisi's relations with Moscow. Georgia's decision to boost its presence in the coalition forces in Iraq was an important initiative.[117] Georgia is currently working to become a full member of NATO. In August 2004, the Individual Partnership Action Plan of Georgia was submitted officially to NATO. On 29 October 2004, the North Atlantic Council of NATO approved the Individual Partnership Action Plan (IPAP) of Georgia, and Georgia moved on to the second stage of Euro\u2013Atlantic Integration. In 2005, by the decision of the President of Georgia, a state commission was set up to implement the Individual Partnership Action Plan, which presents an interdepartmental group headed by the Prime Minister. The Commission was tasked with coordinating and controlling the implementation of the Individual Partnership Action Plan.[citation needed] On 14 February 2005, the agreement on the appointment of Partnership for Peace (PfP) liaison officer between Georgia and NATO came into force, whereby a liaison officer for the South Caucasus was assigned to Georgia. On March 2, 2005, the agreement was signed on the provision of the host nation support to and transit of NATO forces and NATO personnel. On March 6\u20139, 2006, the IPAP implementation interim assessment team arrived in Tbilisi. On April 13, 2006, the discussion of the assessment report on implementation of the Individual Partnership Action Plan was held at NATO Headquarters, within 26+1 format.[118] In 2006, the Georgian parliament voted unanimously for the bill which calls for integration of Georgia into NATO.[citation needed] The majority of Georgians and politicians in Georgia support the push for NATO membership.[119] George W. Bush became the first sitting U.S. president to visit the country.[120] The street leading to Tbilisi International Airport has since been dubbed George W. Bush Avenue.[121] On October 2, 2006, Georgia and the European Union signed a joint statement on the agreed text of the Georgia\u2013European Union Action Plan within the European Neighbourhood Policy (ENP). The Action Plan was formally approved at the EU\u2013Georgia Cooperation Council session on 14 November 2006, in Brussels.[122] In June 2014, the EU and Georgia signed an Association Agreement, which entered into force on July 1, 2016.[123] On 13 December 2016, EU and Georgia reached the agreement on visa liberalisation for Georgian citizens.[124] On 27 February 2017, the Council adopted a regulation on visa liberalisation for Georgians travelling to the EU for a period of stay of 90 days in any 180-day period.[125] Main articles: Georgian Armed Forces and Role of Georgia in the War in Afghanistan (2001\u201314) Georgian built Didgori-2 on a parade in 2011 Georgia's military is organized into land and air forces. They are collectively known as the Georgian Armed Forces (GAF).[126] The mission and functions of the GAF are based on the Constitution of Georgia, Georgia's Law on Defense and National Military Strategy, and international agreements to which Georgia is signatory. They are performed under the guidance and authority of the Ministry of Defense.[citation needed] The military budget of Georgia for 2017 is 748\u20be million, by 78\u20be million more than in 2016. The biggest part, 62.5% of the military budget is allocated for maintaining armored forces readiness and potency development.[127] After its independence from the Soviet Union, Georgia began to develop its own military industry. The first exhibition of products made by STC DELTA was in 1999.[128] STC DELTA now produces a variety of military equipment, including armored vehicles, artillery systems, aviation systems, personal protection equipment, and small arms.[129] During later periods of the Iraq War Georgia had up to 2,000 soldiers serving in the Multi-National Force.[130] Georgia also participated in the NATO-led International Security Assistance Force in Afghanistan. With 1,560 troops in 2013, it was at that time the largest non-NATO[131] and the largest per capita[132][133] troop contributor. Over 11,000 Georgian soldiers have been rotated through Afghanistan.[134] As of 2015[update], 31 Georgian servicemen have died in Afghanistan,[135] most during the Helmand campaign, and 435 were wounded, including 35 amputees.[136][137] Main article: Law enforcement in Georgia (country) Georgian police's new patrol car Ford Taurus Police Interceptor In Georgia, law enforcement is conducted and provided for by the Ministry of Internal Affairs of Georgia. In recent years, the Patrol Police Department of the Ministry of Internal Affairs of Georgia has undergone a radical transformation, with the police having now absorbed a great many duties previously performed by dedicated independent government agencies. New duties performed by the police include border security and customs functions and contracted security provision; the latter function is performed by the dedicated 'security police'. Intelligence collecting in the interests of national security is now the remit of the Georgian Intelligence Service.[citation needed] In 2005, President Mikheil Saakashvili fired the entire traffic police force (numbering around 30,000 police officers) of the Georgian National Police due to corruption.[138][139] A new force was then subsequently built around new recruits.[138] The US State Department's Bureau of International Narcotics and Law-Enforcement Affairs has provided assistance to the training efforts and continues to act in an advisory capacity.[140] The new Patruli force was first introduced in the summer of 2005 to replace the traffic police, a force which was accused of widespread corruption.[141] The police introduced an 022 (currently 112) emergency dispatch service in 2004.[142] Main article: Human rights in Georgia Human rights in Georgia are guaranteed by the country's constitution. There is an independent human rights public defender elected by the Parliament of Georgia to ensure such rights are enforced.[143] Georgia has ratified the Framework Convention for the Protection of National Minorities in 2005. NGO \"Tolerance\", in its alternative report about its implementation, speaks of a rapid decrease in the number of Azerbaijani schools and cases of appointing headmasters to Azerbaijani schools who don't speak the Azerbaijani language.[144] The government came under criticism for its alleged use of excessive force on 26 May 2011 when it dispersed protesters led by Nino Burjanadze, among others, with tear gas and rubber bullets after they refused to clear Rustaveli avenue for an independence day parade despite the expiration of their demonstration permit and despite being offered to choose an alternative venue.[145][146][147][148] While human rights activists maintained that the protests were peaceful, the government pointed out that many protesters were masked and armed with heavy sticks and molotov cocktails.[149] Georgian opposition leader Nino Burjanadze said the accusations of planning a coup were baseless, and that the protesters' actions were legitimate.[148][150] Main articles: Administrative divisions of Georgia (country), Abkhazia and Adjara See also: Occupied territories of Georgia Map of Georgia highlighting the disputed territories of Abkhazia and Tskhinvali Region (South Ossetia), both of which are uncontrolled by the central government of Georgia Georgia is divided into 9 regions, 1 city, and 2 autonomous republics.[126] These in turn are subdivided into 67 districts and 12 self-governing cities.[151] Georgia contains two official autonomous regions, of which one has declared independence. Officially autonomous within Georgia,[152] the de facto independent region of Abkhazia declared independence in 1999.[153] In addition, another territory not officially autonomous has also declared independence. South Ossetia is officially known by Georgia as the Tskinvali region, as it views \"South Ossetia\" as implying political bonds with Russian North Ossetia.[154] It was called South Ossetian Autonomous Oblast when Georgia was part of Soviet Union. Its autonomous status was revoked in 1990. De facto separate since Georgian independence, offers were made to give South Ossetia autonomy again, but in 2006 an unrecognised referendum in the area resulted in a vote for independence.[154] In both Abkhazia and South Ossetia large numbers of people had been given Russian passports, some through a process of forced passportization by Russian authorities.[155] This was used as a justification for Russian invasion of Georgia during the 2008 South Ossetia war after which Russia recognised the region's independence.[156] Georgia considers the regions as occupied by Russia.[94][157] Both republics have received minimal international recognition. Adjara under local strongman Aslan Abashidze maintained close ties with Russia and allowed a Russian military base to be maintained in Batumi. Upon the election of Mikheil Saakashvili in 2004 tensions rose between Abashidze and the Georgian government, leading to demonstrations in Adjara and the resignation and flight of Abashidze. The region retains autonomy, as a sign of Ajaria's reconnection with the central Georgian government, the Georgian Constitutional Court was moved from T'bilisi to Batumi.[158] Template:Regions of Georgia Population [3] Abkhazia Sukhumi 8,660 242,862est 28.04 Adjara Batumi 2,880 333,953 115.95 Guria Ozurgeti 2,033 113,350 55.75 Imereti Kutaisi 6,475 533,906 82.45 Kakheti Telavi 11,311 318,583 28.16 Kvemo Kartli Rustavi 6,072 423,986 69.82 Mtskheta-Mtianeti Mtskheta 6,786 94,573 13.93 Racha-Lechkhumi and Kvemo Svaneti Ambrolauri 4,990 32,089 6.43 Samegrelo-Zemo Svaneti Zugdidi 7,440 330,761 44.45 Samtskhe-Javakheti Akhaltsikhe 6,413 160,504 25.02 Shida Kartli Gori 5,729 300,382est 52.43 Tbilisi Tbilisi 720 1,108,717 1,539.88 Geography and climate Main article: Geography of Georgia (country) See also: Borders of the continents K\u00f6ppen climate classification map of Georgia Georgia is situated in the South Caucasus,[159][160] between latitudes 41\u00b0 and 44\u00b0 N, and longitudes 40\u00b0 and 47\u00b0 E, with an area of 67,900 km2 (26,216 sq mi). It is a very mountainous country. The Likhi Range divides the country into eastern and western halves.[161] Historically, the western portion of Georgia was known as Colchis while the eastern plateau was called Iberia. Because of a complex geographic setting, mountains also isolate the northern region of Svaneti from the rest of Georgia.[citation needed] The Greater Caucasus Mountain Range forms the northern border of Georgia.[161] The main roads through the mountain range into Russian territory lead through the Roki Tunnel between Shida Kartli and North Ossetia and the Darial Gorge (in the Georgian region of Khevi). The Roki Tunnel was vital for the Russian military in the 2008 South Ossetia war because it is the only direct route through the Caucasus Mountains. The southern portion of the country is bounded by the Lesser Caucasus Mountains.[161] The Greater Caucasus Mountain Range is much higher in elevation than the Lesser Caucasus Mountains, with the highest peaks rising more than 5,000 meters (16,404 ft) above sea level. The highest mountain in Georgia is Mount Shkhara at 5,068 meters (16,627 ft), and the second highest is Mount Janga (Dzhangi\u2013Tau) at 5,059 m (16,598 ft) above sea level. Other prominent peaks include Mount Kazbek at 5,047 m (16,558 ft), Shota Rustaveli 4,860 m (15,945 ft), Tetnuldi 4,858 m (15,938 ft), Mt. Ushba 4,700 m (15,420 ft), and Ailama 4,547 m (14,918 ft).[161] Out of the abovementioned peaks, only Kazbek is of volcanic origin. The region between Kazbek and Shkhara (a distance of about 200 km (124 mi) along the Main Caucasus Range) is dominated by numerous glaciers. Out of the 2,100 glaciers that exist in the Caucasus today, approximately 30% are located within Georgia.[citation needed] Tusheti region in northeast Georgia The term Lesser Caucasus Mountains is often used to describe the mountainous (highland) areas of southern Georgia that are connected to the Greater Caucasus Mountain Range by the Likhi Range.[161] The area can be split into two separate sub-regions; the Lesser Caucasus Mountains, which run parallel to the Greater Caucasus Range, and the Southern Georgia Volcanic Highland, which lies immediately to the south of the Lesser Caucasus Mountains.[citation needed] The overall region can be characterized as being made up of various, interconnected mountain ranges (largely of volcanic origin) and plateaus that do not exceed 3,400 meters (11,155 ft) in elevation. Prominent features of the area include the Javakheti Volcanic Plateau, lakes, including Tabatskuri and Paravani, as well as mineral water and hot springs. Two major rivers in Georgia are the Rioni and the Mtkvari. The Southern Georgia Volcanic Highland is a young and unstable geologic region with high seismic activity and has experienced some of the most significant earthquakes that have been recorded in Georgia.[citation needed] The Krubera Cave is the deepest known cave in the world. It is located in the Arabika Massif of the Gagra Range, in Abkhazia. In 2001, a Russian\u2013Ukrainian team had set the world depth record for a cave at 1,710 meters (5,610 ft). In 2004, the penetrated depth was increased on each of three expeditions, when a Ukrainian team crossed the 2,000-meter (6,562 ft) mark for the first time in the history of speleology. In October 2005, an unexplored part was found by the CAVEX team, further increasing the known depth of the cave. This expedition confirmed the known depth of the cave at 2,140 meters (7,021 ft).[citation needed] File:Relief Map of Georgia.svg The landscape within the nation's boundaries is quite varied. Western Georgia's landscape ranges from low-land marsh-forests, swamps, and temperate rainforests to eternal snows and glaciers, while the eastern part of the country even contains a small segment of semi-arid plains. Forests cover around 40% of Georgia's territory while the alpine\/subalpine zone accounts for roughly around 10 percent of the land.[citation needed] Much of the natural habitat in the low-lying areas of western Georgia has disappeared during the past 100 years because of the agricultural development of the land and urbanization. The large majority of the forests that covered the Colchis plain are now virtually non-existent with the exception of the regions that are included in the national parks and reserves (e.g. Lake Paliastomi area). At present, the forest cover generally remains outside of the low-lying areas and is mainly located along the foothills and the mountains. Western Georgia's forests consist mainly of deciduous trees below 600 meters (1,969 ft) above sea level and contain species such as oak, hornbeam, beech, elm, ash, and chestnut. Evergreen species such as box may also be found in many areas. Ca. 1000 of all 4000 higher plants of Georgia are endemic in this country.[162] View of the cave city of Vardzia and the valley of the Kura River below The west-central slopes of the Meskheti Range in Ajaria as well as several locations in Samegrelo and Abkhazia are covered by temperate rain forests. Between 600\u20131,000 metres (1,969\u20133,281 ft) above sea level, the deciduous forest becomes mixed with both broad-leaf and coniferous species making up the plant life. The zone is made up mainly of beech, spruce, and fir forests. From 1,500\u20131,800 metres (4,921\u20135,906 ft), the forest becomes largely coniferous. The tree line generally ends at around 1,800 metres (5,906 ft) and the alpine zone takes over, which in most areas, extends up to an elevation of 3,000 metres (9,843 ft) above sea level. The eternal snow and glacier zone lies above the 3,000 metre line.[citation needed] Eastern Georgia's landscape (referring to the territory east of the Likhi Range) is considerably different from that of the west, although, much like the Colchis plain in the west, nearly all of the low-lying areas of eastern Georgia including the Mtkvari and Alazani River plains have been deforested for agricultural purposes. In addition, because of the region's relatively drier climate, some of the low-lying plains (especially in Kartli and south-eastern Kakheti) were never covered by forests in the first place.[citation needed] The general landscape of eastern Georgia comprises numerous valleys and gorges that are separated by mountains. In contrast with western Georgia, nearly 85 percent of the forests of the region are deciduous. Coniferous forests only dominate in the Borjomi Gorge and in the extreme western areas. Out of the deciduous species of trees, beech, oak, and hornbeam dominate. Other deciduous species include several varieties of maple, aspen, ash, and hazelnut. The Upper Alazani River Valley contains yew forests.[citation needed] At higher elevations above 1,000 metres (3,281 ft) above sea level (particularly in the Tusheti, Khevsureti, and Khevi regions), pine and birch forests dominate. In general, the forests in eastern Georgia occur between 500\u20132,000 metres (1,640\u20136,562 ft) above sea level, with the alpine zone extending from 2,000\u20132,300 to 3,000\u20133,500 metres (6,562\u20137,546 to 9,843\u201311,483 ft). The only remaining large, low-land forests remain in the Alazani Valley of Kakheti. The eternal snow and glacier zone lies above the 3,500-metre (11,483 ft) line in most areas of eastern Georgia.[citation needed] Main article: Climate of Georgia (country) The climate of Georgia is extremely diverse, considering the nation's small size. There are two main climatic zones, roughly corresponding to the eastern and western parts of the country. The Greater Caucasus Mountain Range plays an important role in moderating Georgia's climate and protects the nation from the penetration of colder air masses from the north. The Lesser Caucasus Mountains partially protect the region from the influence of dry and hot air masses from the south.[citation needed] The Black Sea coast of Batumi, western Georgia Much of western Georgia lies within the northern periphery of the humid subtropical zone with annual precipitation ranging from 1,000\u20134,000 mm (39.4\u2013157.5 in). The precipitation tends to be uniformly distributed throughout the year, although the rainfall can be particularly heavy during the Autumn months. The climate of the region varies significantly with elevation and while much of the lowland areas of western Georgia are relatively warm throughout the year, the foothills and mountainous areas (including both the Greater and Lesser Caucasus Mountains) experience cool, wet summers and snowy winters (snow cover often exceeds 2 meters in many regions). Ajaria is the wettest region of the Caucasus, where the Mt. Mtirala rainforest, east of Kobuleti, receives around 4,500 mm (177.2 in) of precipitation per year.[citation needed] Eastern Georgia has a transitional climate from humid subtropical to continental. The region's weather patterns are influenced both by dry Caspian air masses from the east and humid Black Sea air masses from the west. The penetration of humid air masses from the Black Sea is often blocked by mountain ranges (Likhi and Meskheti) that separate the eastern and western parts of the nation. Annual precipitation is considerably less than that of western Georgia and ranges from 400\u20131,600 mm (15.7\u201363.0 in).[citation needed] The wettest periods generally occur during spring and autumn, while winter and summer months tend to be the driest. Much of eastern Georgia experiences hot summers (especially in the low-lying areas) and relatively cold winters. As in the western parts of the nation, elevation plays an important role in eastern Georgia where climatic conditions above 1,500 metres (4,921 ft) are considerably colder than in the low-lying areas. The regions that lie above 2,000 metres (6,562 ft) frequently experience frost even during the summer months.[citation needed] See also: List of non-marine molluscs of Georgia (country) and List of fish of the Black Sea Because of its high landscape diversity and low latitude, Georgia is home to about 5,601 species of animals, including 648 species of vertebrates (more than 1% of the species found worldwide) and many of these species are endemics.[163] A number of large carnivores live in the forests, namely Brown bears, wolves, lynxes and Caucasian Leopards. The common pheasant (also known as the Colchian Pheasant) is an endemic bird of Georgia which has been widely introduced throughout the rest of the world as an important game bird. The species number of invertebrates is considered to be very high but data is distributed across a high number of publications. The spider checklist of Georgia, for example, includes 501 species.[164] Slightly more than 6,500 species of fungi, including lichen-forming species, have been recorded from Georgia,[165][166] but this number is far from complete. The true total number of fungal species occurring in Georgia, including species not yet recorded, is likely to be far higher, given the generally accepted estimate that only about seven percent of all fungi worldwide have so far been discovered.[167] Although the amount of available information is still very small, a first effort has been made to estimate the number of fungal species endemic to Georgia, and 2,595 species have been tentatively identified as possible endemics of the country.[168] 1,729 species of plants have been recorded from Georgia in association with fungi.[166] The true number of plant species occurring in Georgia is likely to be substantially higher.[citation needed] Main articles: Economy of Georgia (country) and Agriculture in Georgia (country) The Georgian Railways represent a vital artery linking the Black Sea and Caspian Sea \u2013 the shortest route between Europe and Central Asia. Archaeological research demonstrates that Georgia has been involved in commerce with many lands and empires since ancient times, largely due its location on the Black Sea and later on the historical Silk Road. Gold, silver, copper and iron have been mined in the Caucasus Mountains. Georgian wine making is a very old tradition and a key"} +{"id":"RedPajamaCommonCrawl.0026","text":"You are here: Home \/ Hinduism-Home Blog Page \/ Stories with spiritual message \/ Stories told by Amma \/ Amma's stories on Guru, Role of Guru, Guru-disciple Relationship... Amma's stories on Guru, Role of Guru, Guru-disciple Relationship \u2013 Part 2 (15 more stories) April 13, 2019 \/0 Comments\/in Stories told by Amma \/by C.V.Rajan 1. There is no point in carrying [Amma: \"The past is like a cancelled cheque. It has no value. It is futile to keep brooding over the past worries, hurts and pains and making the present miserable.\"] Once a disciple went to his spiritual master and cried, \"Guruji, I have so much of difficulties and pains in my heart that I have been carrying from the past and I could not get rid of them. Please help me to attain mental peace.\" The guru gave him various spiritual advices but the disciple could not grasp them well and put them into practice; he continued to suffer from the thoughts of the past and he kept complaining to the Guru again and again. Then, the Guru gave him a sack load of vegetables weighing about 15 kilos and said to the disciple, \"You carry this on your shoulders all the time; even when you are lying down for resting or sleeping, you should hold it on your chest. Do this till I give further instructions\". The disciple obeyed the guru and carried the sack load of vegetables all the time on his shoulders or on his head. It was very painful and tiring for him. During nights, he kept the sack on his chest and slept. He could not sleep well. He kept on doing this for the next few days. The vegetables started decaying and soon afoul smell started emanating from the sack. As they decayed further, liquid started dripping from the sack he felt it irritating and itchy. Unable to bear the pain and discomfort any longer, he ran to the guru and sought his permission to throw away the burden. The Guru gave his permission and said, \"This is precisely what I was advising you with regard to your carrying the mental burden of the past too! That too was heavy, painful, irritating and itching in your mind! If only you could throw them away like the sack that you did now, you will be relieved!\" (Beach Satsang 2\/1\/2017) 2. The enlightened disciple [Amma: \"Amid spiritual aspirants living with a Sadguru, there are some whose nature is more feminine. They have no desire for lecturing; they care the least for fame or respect. They may not even aspire for self-realization. They are just content to be with the satguru and do His service. That's their austerity. They don't know any higher level of spirituality. They have nothing greater to aspire than the company of their sadguru. This devotion cannot be explained intellectually or logically. Their condition can be equated to the devotion of Gopi's of Vrindavan on Lord Krishna.\"] One of the disciples of Lord Buddha was suddenly missing. Over a week, everybody was searching for him but he could not be located, nor his whereabouts known. One day Lord Buddha located him. He was hiding himself by sitting in the roof of an Ashram shed. Buddha however knew that he was hiding there; he also knew that the disciple had obtained self-realization and was hiding himself after attaining it. He made the disciple come down. Holding his hands, Buddha said, \"I know you have attained your goal\". The disciple said, \"My lord, Even before you told me this, I knew that I have realized the goal of my life. In fact I was hiding from your view only because I feared that you will declare that truth. I was afraid that you would then say, 'Now that you have attained it, go out of this ashram and teach the world.' But, my dear master, I would be happy only to remain unrealized and just be in your joyous company for ever. I don't want to leave you. I don't want to go out and teach the world as a person of self-realization\". (From Arul Mozhigal-7 Tamil) 3. The essence of true knowledge [Amma: \"Explanations and interpretations (of scriptures or spiritual knowledge) actually become a hurdle in turning the mind inward and experience the Truth. In fact, our mind and thoughts become hindrance to real experience. If one has to experience the beauty of flower, all thoughts related to explaining the flower must stop. Likewise, only when the mind becomes silent, one can grasp the true meaning of scriptures. Do read scriptures; but never assume that you don't have to do anything else over and above it. Only when one attains a childlike mind that says, \"I don't know\", one can really progress in spirituality. Once a young man went to a saint and became his disciple. The saint said to him: \"You write down whatever you have known and learned about religion and spirituality. It will benefit you. Then come and show it to me\". The disciple, heeding fully to the Guru's command, started writing in a big notebook whatever he knew so far in life about religion and spirituality. It took one year for him to complete it. He brought the notebook and handed over to the Guru. The saint opened the notebook and glanced over several pages for a while. Then he said, \"This is indeed written with clarity and mental focus. It can really give the reader the needed spiritual phillip to tread the path of spirituality. Your one year of hard work is reflected in the contents. However, it is rather too long. Can you please do a precis writing and reduce the length?\" The disciple agreed and went back. It took five years for him to condense his ideas and reduce it to half of its original length. He brought it to his Guru. The guru leafed through it and said, \"Well done! Ideas are very clear and the writing style is excellent! However, I want you to make it considerably more brief\". The disciple was disappointed when he heard this. However, bowing to the Guru's wish, he started rewriting it. It took 10 years for him to finish the task of condensing all his ideas to just 5 pages. He submitted it to the Guru saying, \"Master, I have condensed all that I have understood on spirituality in these 5 pages. I am thankful to you for making me fit for grasping this truth\". The guru went through the five pages fully and thoroughly. Then he said, \"Extremely well written! YOu have achieved it purely through your concentration and spiritual austerities. Yet, there is a little shortcoming in this. Try to rectify it\". Years went by. The guru was getting old. He became bed ridden. The time had almost come for the guru to leave his mortal body. The disciple came to the guru and prostrated before him. He handed over a piece of paper to the guru. The guru glanced it. There was nothing written in it. Immediately, the guru placed his hand on the disciple's hed and blessed him, saying, \"Now you have grasped the truth fully. Let the truth henceforth be revealed to you and shine in you\". In that very moment, the disciple attained enlightenment. He sat silently at the feet of the guru. The guru left his mortal body and merged with the infinite. [Amma: \"Children! If you attain a mind that says, \"I don't know anything; I am nothing\", you will attain your goal. Only when you get that mindset, God's grace will flow into you\"] 4. Relinquishing is not easy [Amma: \"Spiritual journey, in fact, is not a journey forward; it is rather travelling backward i.e. we travel back to reach our real source. In this process we have to drop off our attachments and vasanas (inborn tendencies) and it is painful. A person desirous of climbing a mountain and reach its top has necessarily leave behind his possessions down below. Else, the upward travel would be too taxing and difficult. If one does not relinquish attachments whole-heartedly, pain cannot be avoided. Amma will now share a story she had heard:\"]\\ Once a rich man, though possessing all objects of enjoyments that his money could buy, found his life empty and meaningless. He wanted to get rid of his worldly attachments and desires and lead a stress-free and peaceful life. He decided to seek counsel from a Sadguru. Having known about a famous saint living in a village a few miles away, the rich man started to meet him. As he was about to depart, he thought, \"What is the use of all the money that I have kept hoarded in my vault? Let me take all my gold coins, place them at the guru's feet and forget about them\". He put all the gold coins in a bag and carried the bag with him. After travelling the whole day, he reached the village where the guru was living. He found the guru sitting under a tree at the outskirts of the village.He rushed to the Guru, placed his bag at the guru's feet and prostrated before him. When he rose up, he was shocked to see the Guru picking up the bag and running away! For a moment, he was confused and shaken by the weird act of the guru. Instinctively he felt he should get back his bag containing the gold coins at all costs. He started chasing the Guru. The guru ran pretty fast; he ran across paddy fields, crossed streams, passed through thick bushes, climbed up and down a small hill and wound his way through the narrow lanes and bylanes of the village. With lot of difficulty, the rich man too ran behind the guru in order to catch him. As the guru was very familiar with the local terrain, he could run through all nooks and corners of the village even in the dim twilight. Soon, the rich man lost track of the Guru. Dejected, he slowly walked back to the tree where he originally met the guru. A surprise was waiting for him there. His bag was lying at the foot of the tree! The guru was not visible anywhere around. In fact, the guru was hiding himself behind the tree and watching what the rich man was doing. The rich man jumped forward to pick his bag and opened it eagerly to see whether the gold coins had been stolen. He felt very relieved and overwhelmed with joy to see that all the coins were intact. From behind the tree, the Guru asked: \"How are you feeling now, my son?\" Impulsively, the rich man replied, \"Oh! I am extremely happy. This is one of the happiest moments of my life!\" The guru said, \"My son, in order to gain real happiness, one has to undergo real pain!\" [Amma: \"Children! You may run around behind worldly enjoyments. But unless you return to your starting point, you will never get true happiness. That is another important message from this story\".] (From Ammavin Anbu Ullatthilirunthu \u2013 Tamil) 5. Wider vision [Amma: \"When man thinks of himself and his desires alone, he becomes narrow minded. He becomes blind to things other than his self-interest\".] Some youngsters went to a sage and expressed their desire to become disciples to him. The sage took them to a well nearby.He asked each of them to look into the well and tell him what they saw inside. One youngster looked inside and said that he saw his own reflection in the well water. The sage asked \"Did you notice anything else?\". The youngman said, \"No\". Almost everyone else, after looking into the well said the same thing. The last younster said, \"Swami, I see my reflection and also the reflections of trees and creepers that have grown tall all around me reflected in the well water\". The sage accepted the last person alone as his disciple. He said to others, \"You were all able to see just your reflection only. It indicates that each of you think about yourself only. Only this person saw trees and creepers too. It means he is not a person who thinks of himself alone. His outlook is clearer and wider than yours. Hence I am taking him as my disciple\". (From Amutha Mozhigal-6 Tamil) 6. Who is the right person to take charge? Once a guru had two disciples. He used to give the responsibility for most of the important activities of the Ashram to one of these two disciples; the other one was unhappy about it. The reason for his displeasure was that he was the senior among the two in joining the ashram. Hence he got angry with the other disciple who got more prominence than him. One day, he went to the guru and asked, \"Master, why are you not giving ashram responsibilities to me? I can do them better than your other disciple\". After listening to his complaint, the Guru called both the disciples together and gave them an assignment: they have to visit an adjacent village and assess the nature of people living there. The first disciple, on his way close the village, noticed a man pacifying a crying child by offering a chocolate to him. As he inquired, he came to know that the person offering the chocolate was a murderer. The disciple was impressed to see the good attitude of the person who was keen on pacifying a crying child, despite being a murderer. As he walked further, on the way, he noticed another person attending to an old man suffering from hunger due to utter poverty. The man was helping the old man to drink some water. Upon inquiry, he came to know that the person helping the old man was a robber; the disciple felt glad to see compassion in the heart of the robber. Next, on his way, he noticed a woman wiping the tears of another woman and offering her solace. That woman, he came to know, was a prostitute. He was so glad to notice the good heart of the prostitute in offering emotional comfort to a distressed woman. The disciple came back to Guru and explained what he saw. He was full of praise about the goodness in the people despite being anti-social. The senior disciple too returned from the village by that time. When the guru asked him what he saw, he said, \"I saw a man beating an young boy; I saw another person shouting at a poor beggar; I also noticed a nurse severely scolding a patient. I could only hate such people, who have no compassion in their heart.\" The guru arranged to investigate the cases reported by the senior disciple and then explained the real background to those incidences. The man who beat the boy was a good samaritan; he was providing food and clothing to several destitute children. The boy who got beaten by him had a habit of stealing. No amount of good counseling could help to correct his behavior. As a last resort, the man, purely with the intention of correcting the erring boy, gave physical punishment. Hearing this, the disciple said, \"I can't accept such a behavior. However good the man be, what right has he got to beat a young boy?\" In the second case too, it turned out that the person who scolded the beggar was a one who donates generously for humanitarian activities. He was scolding the beggar because the latter was hale and healthy who could earn his living by working, instead of idling and living by alms. Even this was not acceptable to the second disciple. He quipped. \"However generous the man may be, why should he scold a beggar? If he could give some alms, let him, else let him say 'I can't give you anything'. He has no right to scold the poor person\". In the third case, the nurse was known for her dedicated service to patients day and night. She used to treat the man for a severe wound and she dressed it up with bandage. But the man had the bad habit of removing the bandage and it delayed the process of curing of the wound. The nurse censured the patient for his foolish behavior. When the guru explained this, the second disciple said, \"The nurse might have made the bandage too tightly; she might have hurt him and caused pain and irritation to him while doing the bandage. That could be the reason for the man to remove it. Just because she was a nurse who attended to him, she has no right to scold her patient\". The guru called both the disciples together and said, \"None in this world is totally bad or evil. However evil a person may be, he would still have some good qualities in him. The first disciple could see only the good qualities in a murderer, thief and a prostitute. If we possess good qualities in us, we will only see goodness in others. We are all in need of only such eyes that see only goodness in others\". Looking at the second disciple, he said, \"My son, you only noticed your own mental tendencies in others too. You could only 'find' some evil even in good people. Only when your attitude changes, you will be able to see goodness in others and then you will naturally become eligible for taking up ashram responsibilities\". [Amma: \"Most of us nowadays have the attitude of the second disciple only. Even if someone possesses thousand good qualities, we don't notice them. If we find one mistake, we would notice only that. But God sees only good qualities in others.\"] (Source: Upadesamritam-1 Tamil) 7. Camel is my right guru! [Amma: \"Some people say that your Guru is within you and your own mind can guide you as a Guru. They ask, \"what is the need to surrender to a third person as a Guru?\" Of course it is true that there is an inner guru; but right now, it is like a guru enslaved by our own unbridled and evil tendencies. Our own mind is not within our control. It is totally at the grip of vasanas. If we go as per the whims of such a mind, it will only lead us to danger.\"] Once a man went in search of a guru. He went to several masters one after the other. Each one advised him about the need for humility and faith. It was not to his liking. He believed that he cannot be a slave to another person. Thinking so, he rested at the side of a road. He thought, 'None of these gurus are fit enough to guide me through the right path'. As such a thought passed in his mind, he saw a Camel which was grazing in front of him nodding its head. He was surprised to notice it. 'Oh! This camel is capable of reading my thoughts! That's why he nodded his head in approval! This must be the right guru I was searching all along!' he thought. He went close to the camel and asked, \"Are you willing to be my guru?\" The camel nodded his head. The man felt extremely happy. Afterward, he made it a habit to take the camel's permission for all his plans and actions. Whatever he asked, the camel would nod its head which he would take as his guru's approval. One day he asked the camel, \"Today I saw a beautiful woman. May I start loving her?\" The camel nodded. A few months passed. He came and asked, \"May I now marry that woman?\" The camel nodded. A few days passed. He came and asked the camel, \"May I start consuming a little liquor?\" Again the camel nodded. Then gradually drinking became a habit. His wife started severely criticizing him for it. He came to the camel and asked, \"Shall I fight with my wife?\" Again the camel nodded. He went and started fighting with his wife. He rushed back to the camel and asked, \"I just cannot tolerate her arguing and fighting with me like this, as she is bent upon stopping me from drinking. Shall I stab and kill her?\" The camel nodded as usual. He ran back to his wife and stabbed her. She died on the spot. Soon the news spread; the policemen came and arrested him. After trials, he ended up in jail with a life imprisonment. [Amma: \"Our mind is exactly like this Camel guru! It has no issue with right or wrong. Whatever we desire, the mind will give its total concurrence forgetting future consequences. Thus, if we surrender to our mind which is a slave to vasanas, we will become slaves to our attachments.\"] 8. Obedient Disciple [Amma: \"A tree is no doubt contained in a seed; but only when the seed goes into the soil, it can sprout and grow into a tree. Even an elephant can be tied to a tree once it is grown up. But if the seed is not cared, it will become food for bird. The truth of advaita is indeed inside us. But only when we develop humility and simplicity, read and contemplate deeply on the what we read, it could become our true experience.\"] Once an youngster went to meet a Guru and requested him to take him as his disciple. There were already many disciples in the ashram. \"Living in an ashram is not easy for everyone; please go back now and come later\" said the guru. The young man felt very disappointed. Noticing it, the guru said, \"Well, are you good at any job?\" He then proceeded to mention the various activities in the ashram to know whether he could fit into any of them. The youngster was clueless about all of them. Then the guru asked, \"We have several horses in the ashram; will you be able to take care of them?\" \"Yes, Sir, if you wish so\" said the young man. The guru sent him straight away to the ashram stable to take care of the horses. The new disciple engaged himself wholeheartedly in feeding the horses, bathing them cleaning the stable and so on. Soon, on account of his sincere and abundant care, the horses grew fat and healthy. The guru hardly ever gave any teaching to the students. Every morning he would call them and tell them a sloka (verse). He would ask them to keep contemplating on the meaning of the sloka the whole day to grasp its inner purport and put it into practice in their life. That was his mode of teaching. One day, the guru came earlier than normal, gave the sloka to the disciples and departed somewhere on a horse. The new disciple who was immersed in the job of attending to the horses came running. He did not get his sloka for the day from the guru. \"Master, what is my sloka?\" He asked the guru, running behind his horse. \"Didn't you notice? I am going out. Is it the time to ask?\" chiding him so, the guru went away. The disciple started memorising these words of the guru again and again: 'Didn't you notice? I am going out. Is it the time to ask?' The guru returned in the evening. All the disciples were there to receive him except the new one. \"Where is he?\" asked the guru. The other disciples said in a mocking voice, \"That fool is is mumbling something like 'Didn't you notice? I am going out. Is it the time to ask?' the whole day!\" The guru understood. He called the disciple and asked him, \"What are you doing?\" He said, \"I am repeating and contemplating on the sloka that you uttered this morning while leaving\". The guru's eyes filled with tears. He called the disciple close to him, placed both his hands on his head and blessed him. The other disciple got very displeased with what the guru did. \"Master, we are with you in this ashram for so many years and yet you are showering your blessing to that foolish newcomer! It is unfair\" they said. The guru said, \"Go, buy some narcotics and bring it here\". They did. He mixed the narcotic drug in water, poured a mouthful in each disciple with a strict instruction that they should not swallow it, but spit it out. They obeyed. \"Do you feel intoxicated?\" asked the guru. \"No master! How can we? We never drank it!\" The guru explained: \"You too were only receiving my words in a similar way. You listened to them and immediately forgot about them. But look at him. He did not do so. Without trying to find fault in my words, he simply accepted it. He has such a guileless heart. It is not just that. I had given the job of taking care of the horses to you people earlier; none of you took care of them properly; you never fed them in time nor bathed them properly; they were looking lean and impoverished during your days. They were also behaving very restless and unruly. But, after he took charge, the horses became hale and healthy. They not only received good feeding but also his love and care; hence they lost their aggressiveness and became friendly with people. He worked wholeheartedly; he did karma for the sake of karma. Above all, he could take my words totally as I uttered without questioning. That's how he became eligible for my blessing\". [Amma: \"Children! We should also strive to be like that disciple. One should not find fault with the words of the guru. He should accept them as such, take to heart and practice what he preached. Then none including the guru himself cannot stop the grace of the guru from flowing to him.\"] 9. Guru's tests could be toughest [Amma: \"Children! There is no difference between a brahmachari or a householder in the holy presence of God or Guru. A disciple should always keep his mind on God and do his duties. What is important is the total, unwavering surrender to the will of God or Guru.\"] Once a guru went to a village accompanied by his disciples for conducting a series of discourses. A householder came regularly with his family to attend the discourses daily; he was highly impressed by the Guru and his teachings. He wished to join the ashram along with his family. After the discourse program was over, he went to Guru's ashram with his wife and children and prostrated at the feet of the guru. He expressed his desire to join the ashram permanently and serve the guru. The guru explained to him the hardships involved in living in the ashram in order to dissuade him from his desire. However, the householder was quite firm in his resolve. The guru permitted him to stay in the ashram with his family. Soon, the man shifted his residence there. He engaged himself earnestly in all ashram activities and was very dedicated in his work. However, the brahmacharis in the Ashram were not happy to have a householder amid them. They found all sorts of faults with him and complained to the Guru. The guru knew well that the householder was extremely dedicated and sincere. He decided to demonstrate it to the brahmacharis and make them understand. He called the householder in the presence of other brahmacharis and said, \"You have relinquished your home, hearth and job and come here to stay with us permanently. The ashram has very limited resources and somehow we have been managing things with only brahmacharis here. If you are a single person, we could manage, but we are now burdened with the expenses of your wife and children too. Hence you should go out, work and earn money to meet the expenses of your wife and children\". The man started going out from the very next day to an adjacent town, did some labor work from morning to evening, collected his daily wages and gave it to the ashram for meeting their expenses. A few days passed. The other bachelor disciples started finding new problems with the man and complained to the guru again. The guru called the man and said, \"The money you are giving hardly can meet your expenses. All these days, only ashram has been spending for your family. Consider it as an accumulated debt; you have to compensate it; work hard, earn double the amount and pay to the Ashram. Only afterward you can take food from the Ashram\". The man explained the matter to his family and said, \"You should not eat hereafter from the Ashram kitchen. Wait till I comeback from my work; I will buy and bring food for you when I arrive at night. Only then you should eat\". His family members agreed. The man started working from early morning till late in the evening. He collected the wages and gave it to the Ashram. Whatever little money he was left with, he would buy some food and bring for his family. There were days when his earnings were inadequate and they would go hungry on such days. Even after subjected to such hardships, the householder did not venture to move out of the ashram. The brahmacharis were very much surprised to see this. Yet they were unhappy. They created new reasons to complain. They said to the guru, \"He is working from day to night in his own business and earning quite a lot of money; he is giving only a portion of it to the ashram and living comfortably otherwise, leaving the family inside the ashram\". The guru called the man and chided him:\"You are a cheat. You have left your family here in the ashram, earning big money outside, but giving only a little to the Ashram. You are a liar; a fraud\". The disciple did not even a speak a word against his guru. He hung his head and went silently back to his room. That night the guru called his disciples and said, \"Tomorrow there is going to be a big feast in the ashram. We don't have enough stock of firewood with us. Some of you should go to the forest right away and bring dry firewood; make sure that it is finished before dawn\". He went to sleep after giving this instruction. The disciples were too unwilling to go to the forest at night to bring firewood. They went to the householder's room and woke him up. They said, \"There is going to be a big feast in the ashram tomorrow and our guru wants you to get enough dry firewood urgently, right now\". The man felt happy that guru had given him such an urgent task. He immediately left for the forest and the other disciples went to sleep. Even after dawn the next day, the guru could not see his householder disciple in the ashram. He inquired where he was. The disciples said, \"Last night, he went to the forest for bringing firewood\". The guru immediately started walking towards the forest and his disciples followed him. The went through the forest in search of the man. They shouted his name aloud again and again. After a long search, they could finally hear his feeble voice calling them back from somewhere. Searching in the direction from where his voice came, they finally located a dilapidated well from where the sound was coming. It was a shallow well with a little water inside it. While the man was tracing his way through the forest the previous night, he had fallen into the well. It was still dark inside the well. The guru wanted other disciples to pull the man out immediately. Some of them lied down on the ground and extended their hand inside the well. What they felt first with their hand was a bunch of wood. They asked the man to extend his hand so that they could hold it and pull him out. The man shouted from the well. \"You see, I am carrying the bunch of firewood on my head and holding it firmly with my hand; if I remove my hand, the firewood will fall into water and get wet. Please lift up the firewood first, which is essential for cooking the feast; please deliver it first to the Guru and you can come later and pick me up from the well\". The Guru's eyes became wet to hear his words reflecting the man's total faith and surrender to the guru. Only after the firewood was picked up, the man extended his hand for getting lifted up from the well. As the man came out, his wet body was shaking in cold. The guru embraced the man lovingly, placed his hand on his head and gave him self-realization at that very instance, as the other disciples watched it with their faces dark in shame. (Source: Upadesamritam-1) 10. Spiritual life is no cakewalk [Amma: \"A life dedicated to spirituality is meant for people with power and tenacity. It is the path of the bold and not the weak-kneed. If some people get disappointed with life suddenly jump into a life of renunciation wearing a saffron cloth without weighing the pros and cons, life would become very disappointing for them. It is enough if a house-holder takes care of his wife and a couple of children; but a true renunciate will have to bear the burden of the entire world. He could never be fickle minded, sensitive to criticism or emotionally weak. Without discrimination and dispassion, none can live a life of spirituality\".] Once there lived a husband and wife in a village. However much the husband worked hard and brought more and more money, his wife would keep on complaining, saying \"This is not sufficient\". Because of her nature, the husband felt miserable in life. Since he had no courage to commit suicide, he decided to take up sanyas and left home. He travelled long and finally ended up at the place of a guru. He requested the guru to give sanyas to him and take him as his disciple. The guru asked. \"Are you seeking sanyas just because you left your home and hearth out of dejection in your family life or have you really got dispassion?\" The man replied, \"I have a strong desire to become a sanyasi. That's why I left my home\". \"Don't you have any desire for material things?\" \"No; I have no desire at all\" \"Don't you want name, fame and wealth?\" \"No; I don't want any of them. I have no liking or attraction on them\". \"Are you sure you want to become a total renunciate?\" \"Yes; I want to renounce everything\". After interviewing him like this, the guru accepted him as his disciple and gave him a kamadal (water pot) and yoga dhanda (wooden staff). Days passed. They set forth for visiting many holy places by walk. On the first day, after walking for long, they felt tired and rested at the bank of a river. The disciple wanted to take bath. He left the kamandal and yoga dhanda at the river bank and went to take bath in the river. When he returned, he was shocked to find the kamandal missing. He searched here and there but could not find it. He got very disturbed and angry. The guru said to him smilingly, \"You said you have no attachment for material things, but you seem to be very agitated for losing the kamandal! Let it go. Let us move on\". The disciple retorted, \"How will I have drinking water without a kamandal? We don't have any other vessel with us\". The guru said, \"You are a man without desires and why are you carrying this small attachment to your drinking pot? Accept that it is by God's wish that the kamandal has been lost\". But the disciple continued to me in a dejected mood. It was time for lunch. The disciple was feeling very hungry. But the guru did not offer anything to him to eat. The disciple started murmuring. Hearing it, the guru said, \"Persons choosing a life of spirituality must have patience and forbearance. Should you not learn to be active even if a whole day passes without food to eat? If you become so weak due to hunger even at twelve noon, what can be done? A spiritual aspirant must learn to renounce attachment towards food as the first discipline. You have to shrink your stomach first in spiritual life\". However, after some time, the guru gave a little nutritional flour for the disciple to eat. But it was not at all tasty. The disciple could not eat it. As it was bitter too, he started vomiting after eating a little. That was the last straw! The disciple was ready to relinquish the life of sanyas! He somehow wanted to return to his old family life. He sought permission from the guru to leave. \"What was your idea of sanyas when you came to me with that request?\" asked the guru. The disciple said, \"I never thought a life of sanyas will be so tough. I was thinking that if I take bath, smear my forehead with ash and kumkum and sit at a place with closed eyes, people would come and fall at my feet; they would offer food to me with reverence. I thought I will be fed on time thrice a day by devotees and I can lead a life of comfort without doing any work! Now I understand this sort of life by following you is worse than the scolding of my wife. Enough is enough\". So saying, the disciple left the guru in a hurry. 11. The final test Once in an ashram a few disciples learned scriptures and spiritual practices under the guidance of the Guru. Once their learning was over, the Guru wanted to send them out to the world so as to guide people on scriptures and lead a worldly life if they so wish. He called the disciples and said, \"As a last test to gage how far you you have acquired the required disciplines, I want you to climb up the nearby hill and fetch me the fruits from the sacred tree at the top. You must not return without bringing the fruits\". The disciples climbed up the hill and reached the top. There the tree was there, but it was well fortified by tall compound walls all around it. They could locate only one entrance in the wall but it was covered with a massive rock. The disciples, tried to push the rock away, but it was too huge. They inspected the wall all around and found no way to climb over it and jump inside. All the disciples except one, decided to return empty handed since it was practically futile to attempt any entry into the compound and reach the tree. But the solitary disciple said, \"Our guru has given specific instruction to fetch fruits from this tree. It is my duty to keep trying and put my best efforts to somehow gain an entry into this place. I will keep trying; you people can go if you like\". So saying, he resumed his efforts to push the rock away from the gate. He was straining every limb but could not even shake the rock by an inch. But he did not slacken his effort. The other disciples laughed at his foolishness; they came back to the ashram and reported the matter to the guru. The guru noticed that one of the disciples had not returned. \"Where is he?\" he asked. They said, \"We all tried to roll the rock away from the gate, but we could not succeed in our joint effort; yet, like a fool, he is trying all alone to accomplish the task\" said they. \"Come, let us go up and bring the fellow back\". Along with the guru, all of them climbed up the hill once again. When they reached the top, the noticed that the disciple was sweating profusely and still attempting to move the rock by some means or other. \"Why are you still attempting to do the impossible, my son?\" asked the guru. \"Master, you had instructed that we should not return without fetching the fruit from the tree. I have put all my efforts and now you are here already; will not the impossible become possible with your grace?\" Pleased, the guru placed his hand on top of the rock. Instantly, the rock split into two and gave way. Opening the gate, all of them went inside. Under the tree, there was a box containing gold coins and jewels. The guru took them and gave it to the disciple. He said, \"You are the person who has fully grasped the core teaching in spirituality \u2014 that one should obey his guru with unwavering faith and surrender, in order to become eligible for receiving the abundant grace of the guru. Take this wealth and go to the world; Lead a happy life and serve the world with the wealth as well as your spiritual teachings\". (From Amma's Gurupurnima message 16\/7\/2019) 12. Not ripe yet Once the king of a country came and surrendered to Saint Kabir. He wanted to relinquish his kingdom and take up a life in quest of spirituality. After warning the king about the extent of sacrifices he had to make and extent of surrender he has to possess in order to reach his goal, Kabir however took him as his disciple. He assigned the former king all sorts of sundry and unpleasant works and the king did them all without murmur. Several years passed. Kabir's wife was observing the former king's behavior and she felt very happy about his humility and dedication. She said to her husband, \"That ex-king disciple is a gem amid your disciples; it is high time you bless him with self-enlightenment\". Kabir said, \"No. He is not ready, yet\". But his wife was adamant. She felt sure of her judgement. Kabir said, \"Okay! Let us do a test on him. Tomorrow, when he enters into the ashram, you throw a bucketful of rubbish on his head from the terrace\". Guru's wife did so. The moment the rubbish fell over him, the king looked up angrily, noticed his Guru's wife and said, \"If this had happened in my kingdom, I would have shown who I am\". The wife reported the matter to Kabir. Kabir said, \"Did I not tell you? He is not yet ripe\". A few more years passed. Again, the guru's wife had a strong urge to give her recommendation once again. \"Okay. this time, you pour more filth, cow dung etc on his head and see what happens\". Guru's wife did the same. This time the ex-king looked up, smiled at the lady and said, \"Thank you, Mother! This is the what I deserve. My ugly ego does require such a treatment indeed!\". When the wife reported the incidence to Kabir, he said, \"Yes! Now he is ripe. Call him in and I will bless him\". When the king came, Kabir placed his palm on the head of the ex-king. Instantly, the king experienced self-realization. 13. Sakshi bhavam (Attitude as a witness) Once a disciple went to the master and said, \"Master, you are always emphasizing the need to have the attitude of a witness in handling all our emotions. But I find it extremely difficult to practice it. How do I practice it?\" The guru did not give a reply immediately. In the meanwhile, the disciple committed a few mistakes in his actions and behavior inside the ashram. The guru called him and naming some other disciple, he explained him that such and such mistakes were committed by that particular disciple which were objectionable. The disciple heard them smilingly as it was meant to be about some other disciple. Suddenly the Guru said in a stern voice, \"Now I tell you, those mistakes were not done by that person, but were indeed committed by YOU\". The disciples face turned very grim. He hung his head. He felt very agitated inside. The guru said, \"When I said that the mistakes were committed by you, you are feeling sad and disturbed. But earlier, when I said that they were done by some other disciple, you were able to receive them with an attitude of a witness! It means you do possess the capacity to remain as a witness. But when this subject \"I\" comes into picture, the trouble comes! If you consider this \"I\" in you as not your true Self, you can remain a true witness. We do possess the capacity to control our own thoughts and actions; if only we nurture and strengthen this capacity, then it is really possible to maintain the attitude of a witness in all circumstances and accept things with a smile. The mind will not get weakened under all circumstances.\" 14. Guru's teaching Once a disciple went to the master at night with the intention of asking his guru's spiritual advice specific for him. When he went there, the guru was busy writing a letter in candle light. The disciple prostrated before the guru and asked, \"Sir, I have come to you to seek your spiritual advice for me\". The guru did not reply. He was steadfast in continuing to write the letter. After waiting for a while, the disciple asked the guru once again. No reply. After a while, the guru finished writing the letter and instantly the flame in the candle too went out as it had burnt its full. Now the disciple reminded his guru once again. The guru said, \"I have already given you the instruction\". The disciple was shocked. \"Swamiji, I have been asking you a few times and you did not utter a word!\" The guru said, \"Didn't you notice what I was doing? The candle was burning almost close to its end; I had to finish writing this letter before the flame went out and that is what I did; that is precisely the instruction for you to comprehend too \u2014 The life is short and fickle. It might end at any time; you have to make the best use of it and attain your goal before your death.\" (Amma's satsang 28\/2\/2020) 15. Guru's only advice Once there lived a Mahatma, who had many disciples and devotees. A constant stream of devotees would come and meet him and keep on pouring their many woes \u2014 need for money, health problems, family problems and so on. Hardly anyone would seek his advice on spirituality. But the Guru would always give a single advice to them all: \"You wake up\". That's all. A disciple who was always nearby the Guru asked him, \"Maharaj, why are you giving the same advice to all these people? Won't it be better if you give different advices to different problems?\" The guru said, \"Suppose many people are sleeping in a hall; all of them are having different nightmares in their dreams and were tossing and turning in their beds troubled by their dreams. What will you do to help them?\" The disciple said, \"I will shout 'wake up, wake up' and goad them to wake up from their dreams\". \"That's precisely what I am doing\" said the guru! Tags: Amma's stories, Attitude as a witness, becoming a sanyasi, caring for others, dispassion, forbearance, Guru, guru & disciple, Guru tests disciple, Life is short, patience, sacrifice, Sadguru, Sakshi bhavam, sanyasi, sharing, surrender, unselfishness https:\/\/hinduismwayoflife.com\/wp-content\/uploads\/2019\/04\/Amma-Darshan.jpg 300 497 C.V.Rajan https:\/\/hinduismwayoflife.com\/wp-content\/uploads\/2018\/06\/Hinduism-Site-Logo5-transparent-4.6.18.png C.V.Rajan2019-04-13 19:29:482020-04-29 11:48:50Amma's stories on Guru, Role of Guru, Guru-disciple Relationship - Part 2 (15 more stories) Amma's stories on Guru, Role of Guru, Guru-disciple Relationship - Part 3 (15 more stories) How can one become a devoted Vaishnava, Shaiva, or Shakta at the same time? How does a seeker get his right guru? How to seek him? How to approach him? How\u2026 Humorous stories from Amma - Part 6 (15 more stories) Amma's stories on Nature of the World \/ People - Part 2 (15 more stories) Amma's stories on Nature of the World \/ People - Part 1 (15 stories) Hinduism \u2013 Stories told by Amma having spiritual message Cute Krishna Stories told by Amma (6 Onam festival stories) Gopi's selfless love on Krishna (8 stories) Stories told from Itihasas and Puranas Part 1 (15 stories) Humorous Stories told by Amma Stories on Nature of world & people Part 5 ( 9 stories) On Guru-Disciple relationship Part 2 (4 stories) On faith, Surrender & Divine grace Part 1 (15 stories) Part 2 ( stories) On compassion and sacrifice Part 1 (15 stories) On Discrimination & Dispassion On Nature of Gods, Avatars & Mahatmas On Sadhana for Sadhakas On self-confidence and determination On managing anger"} +{"id":"RedPajamaCommonCrawl.0027","text":"854 F. 2d 916 - Newman-Green Inc v. Alfonzo-Larrain R 854 F2d 916 Newman-Green Inc v. Alfonzo-Larrain R 57 USLW 2162, 11 Fed.R.Serv.3d 1511 NEWMAN-GREEN, INC., Plaintiff-Appellant, Alejandro ALFONZO-LARRAIN R., et al., Defendants-Appellees. Seventh Circuit. Reargued En Banc May 26, 1988. Decided Aug. 11, 1988. Rowe W. Snider, Lord, Bissell & Brook, Chicago, Ill., for plaintiff-appellant. Charles G. Albert, Bell, Boyd & Lloyd, Chicago, Ill., for defendants-appellees. Before BAUER, Chief Judge, and CUMMINGS, WOOD, Jr., CUDAHY, POSNER, COFFEY, FLAUM, EASTERBROOK, RIPPLE, MANION and KANNE, Circuit Judges. POSNER, Circuit Judge. We vacated the panel decision, and took the case en banc to decide whether a court of appeals is empowered to dismiss a party in order to retain federal jurisdiction. Previous decisions by this court had answered the question \"no,\" but the panel disagreed and held that we may do this, 832 F.2d 417, 419-20 (7th Cir.1987), and it went on to reverse the district court on the merits. The full court adheres to our previous decisions. \"Where the record reveals no jurisdiction, we are powerless to do anything but recognize the defect.\" Alderman v. Elgin, Joliet & Eastern Ry., 125 F.2d 971, 973 (7th Cir.1942); see also Carson v. Allied News Co., 511 F.2d 22 (7th Cir.1975). The record reveals no jurisdiction, so we remand the case to the district court--of course without expressing any view on the merits--for such further proceedings as may be consistent with our jurisdictional ruling. The suit began in 1982 when the plaintiff, Newman-Green, Inc., filed a complaint in the federal district court against five individuals who had guaranteed a debt owed to the plaintiff. The district court had no jurisdiction over the case. The naming of Bettison--a citizen of the U.S. but not of any state--as a defendant had destroyed complete diversity, Sadat v. Mertes, 615 F.2d 1176, 1180 (7th Cir.1980) (per curiam); see 28 U.S.C. Sec. 1332(a); Strawbridge v. Curtiss, 7 U.S. (3 Cranch) 267 (1806); Fidelity & Deposit Co. v. City of Sheboygan Falls, 713 F.2d 1261, 1264 (7th Cir.1983); 13B Wright, Miller & Cooper, Federal Practice and Procedure Sec. 3621 (2d ed. 1984); cf. Currie, The Federal Courts and the American Law Institute, 36 U.Chi.L.Rev. 1, 9-10 (1968), and there was no possible basis of federal jurisdiction except diversity, since the complaint was based exclusively on state law. Years passed. Extensive discovery, virtually all of it directed against Bettison, was conducted, and the district judge made numerous rulings, climaxed by the grant of summary judgment for the defendants--all this in a suit over which the court had no jurisdiction. Still acting without jurisdiction, the district court entered a final judgment for the defendants under Rule 54(b) of the Federal Rules of Civil Procedure. On October 28, 1987, almost five years after the complaint had been filed, the panel before which the plaintiff's appeal had been argued--having itself raised the jurisdictional issue at oral argument, and having invited supplemental memoranda in which the plaintiff asked the panel to order Bettison dismissed and the defendants asked the panel to order the case dismissed--dismissed Bettison and proceeded to the merits. Protracted proceedings have unfolded in a case over which the district court never acquired jurisdiction. For us now to confer jurisdiction on the district court retroactively to the date of the complaint--to pretend that Bettison was never a party--would violate the principle that the existence of federal jurisdiction depends on the facts when the complaint is filed, not on later facts. See, e.g., New Orleans & Bayou Sara Mail Co. v. Fernandez, 79 U.S. (12 Wall.) 130, 134, 20 L.Ed. 249 (1870); St. Paul Mercury Indemnity Co. v. Red Cab Co., 303 U.S. 283, 289-90, 58 S.Ct. 586, 590-91, 82 L.Ed. 845 (1938); Fidelity & Deposit Co. v. City of Sheboygan Falls, supra, 713 F.2d at 1266; Field v. Volkswagenwerk AG, 626 F.2d 293, 304-05 (3d Cir.1980). \"Jurisdiction cannot be obtained retroactively.\" Denberg v. United States Railroad Retirement Bd., 696 F.2d 1193, 1197 (7th Cir.1983). To the same effect see Mansfield, Coldwater & Lake Michigan Ry. v. Swan, 111 U.S. 379, 381-82, 4 S.Ct. 510, 511-12, 28 L.Ed. 462 (1884) (a case, like the present one, in which complete diversity was lacking when the case was brought); American Nat'l Bank & Trust Co. v. Bailey, 750 F.2d 577, 585 (7th Cir.1984); Illinois v. General Electric Co., 683 F.2d 206, 209 (7th Cir.1982). To the principle that federal courts cannot obtain jurisdiction retroactively, as to virtually every legal generalization, there are exceptions. One is where a court of appeals assumes jurisdiction over a partial final judgment entered under Fed.R.Civ.P. 54(b) after the notice of appeal had been filed. See, e.g., Sutter v. Groen, 687 F.2d 197, 199 (7th Cir.1982); Local P-171, Amalgamated Meat Cutters & Butcher Workmen v. Thompson Farms Co., 642 F.2d 1065, 1068 (7th Cir.1981). That exception, however, involves form rather than substance, and in any event is within the specific curative provision of Rule 4(a)(2) of the Federal Rules of Appellate Procedure: \"a notice of appeal filed after the announcement of a decision or order but before the entry of the judgment or order shall be treated as filed after such entry and on the day thereof.\" Where the exercise of jurisdiction is discretionary (as with pendent jurisdiction), events occurring after the filing of the suit may result in or even compel a decision to relinquish that jurisdiction. See United Mine Workers v. Gibbs, 383 U.S. 715, 726, 86 S.Ct. 1130, 1139, 16 L.Ed.2d 218 (1966). But that is not a case of obtaining jurisdiction retroactively. More important, a decision not to exercise jurisdiction presupposes the presence of jurisdiction, not its absence. \"The question of power will ordinarily be resolved on the pleadings. But the issue whether pendent jurisdiction has been properly assumed is one which remains open throughout the litigation.\" Id. at 727, 86 S.Ct. at 1139. And when pendent jurisdiction is relinquished, the district court need not dismiss the case (as it would have to do if it lacked jurisdiction); it may in appropriate cases remand it to a state court. Carnegie-Mellon University v. Cohill, --- U.S. ----, 108 S.Ct. 614, 619, 98 L.Ed.2d 720 (1988). A genuine and significant exception to the principle that jurisdiction cannot be conferred retroactively is discussed later in this opinion. We can find no source for a power in a court of appeals to preserve diversity jurisdiction by dismissing a nondiverse party retroactively to the date the suit was filed. The source cannot be 28 U.S.C. Sec. 1653, which authorizes us merely to amend \"defective allegations of jurisdiction.\" (Emphasis added.) The predecessor statute (enacted in 1915) expressly limited such amendments to cases in which diversity jurisdiction \"in fact existed at the time the suit was brought or removed, though defectively alleged.\" Act of March 3, 1915, ch. 90, 38 Stat. 956, 28 U.S.C. Sec. 399 (1940 ed.); see Dollar S.S. Lines, Inc. v. Merz, 68 F.2d 594, 595 and n. 1 (9th Cir.1934); Carson v. Allied News Co., supra, 511 F.2d at 24 n. 6; Thomas v. Anderson, 223 Fed. 41, 43 (8th Cir.1915). The Revision Note to section 1653 says that, besides the extension of the power to amend from diversity cases to all cases, \"changes were made in phraseology.\" A change from permitting a defective allegation to be amended in order to reflect more accurately the facts that create federal jurisdiction to permitting federal jurisdiction to be conferred retroactively would be more than a change in phraseology. There is a difference between a case in which the complaint alleges that a defendant is a \"resident\" of a state different from the plaintiff's, thus leaving open the possibility that he is a \"citizen\" of the plaintiff's state--but in fact the defendant is a citizen of a state other than the plaintiff's--and a case in which the defendant is a citizen of the plaintiff's state. In the first case section 1653 allows us to correct the complaint in order to show that the case is, in fact though not in pleading, within the diversity jurisdiction. (For a collection of such cases see 13B Wright, Miller & Cooper, supra, Sec. 3611, at p. 518 n. 30.) In the second case the defect is not in the allegations--the \"defect\" is that the case is not within federal jurisdiction--and section 1653 is inapplicable. Like any other piece of legislative history, a reviser's note is not conclusive. If the language of section 1653, or the events that led to its passage, showed that Congress wanted to empower the courts of appeals to preserve jurisdiction by adding or dropping parties, the Revision Note would have to give way. But the contrary is true. The language of the statute suggests that its only purpose was to extend the power to cure defective allegations from diversity cases to all cases. The previous statute had distinguished between the existence of jurisdiction and its being \"defectively alleged,\" and the reference to allegations was carried forward into section 1653. There is no hint that the authors of the new statute (who were also, of course, the authors of the Revision Note) wanted to authorize courts of appeals to create jurisdiction in district courts retroactively. The 1915 statute, the predecessor of section 1653, had, as its wording shows, been intended to overrule cases like Denny v. Pironi & Slatri, 141 U.S. 121, 124, 11 S.Ct. 966, 967, 35 L.Ed. 657 (1891), a case of defective allegation of jurisdiction where the Court had held that \"a case cannot be amended here so as to show [show, not create ] jurisdiction, but the court below, in its discretion, may allow it to be done,\" and Continental Life Ins. Co. v. Rhoads, 119 U.S. 237, 7 S.Ct. 193, 30 L.Ed. 380 (1886), a similar case. The statute had not been intended to erase the distinction between \"an existing diversity of citizenship defectively alleged,\" Thomas v. Anderson, supra, 223 Fed. at 43, and an absence of diversity jurisdiction. The original statute had made a remand to the district court to correct a defective jurisdictional allegation no longer necessary in diversity cases. Now, thanks to the amended statute, the court of appeals can correct such allegations in other types of cases as well. But that is as far as section 1653 goes; to interpret it as going further would be to give an innocuous \"change ... in phraseology\" far-reaching substantive effect. The mistake in the present case was not in the allegation; it was in the assertion of federal jurisdiction over a case not within that jurisdiction. So clear is the inapplicability of section 1653--from its language and history, from the Revision Note, and from the background principle that jurisdiction cannot attach retroactively--that all seven circuits to have discussed the scope of section 1653 have said that it is intended only to enable the courts of appeals to remedy inadequate jurisdictional allegations, not defective jurisdiction itself. Besides Carson, and our later decision in Sarnoff v. American Home Products Corp., 798 F.2d 1075, 1079 (7th Cir.1986) (\"section 1653 of the Judicial Code, which allows defective allegations of jurisdiction to be corrected even on appeal, can thus be of no help to Fletcher [a plaintiff who had failed to demonstrate that his diversity claim had been worth more than $10,000 when filed]. His problem is not just pleading but also proof; we simply do not know whether his claim met the statutory minimum at the relevant time\"), see Laborers Local 938 Joint Health & Welfare Trust Fund v. B.R. Starnes Co., 827 F.2d 1454, 1457 n. 1 (11th Cir.1987); Rockwell International Credit Corp. v. United States Aircraft Ins. Group, 823 F.2d 302, 304 (9th Cir.1987); Boelens v. Redman Homes, Inc., 759 F.2d 504, 512 (5th Cir.1985); Aetna Casualty & Surety Co. v. Hillman, 796 F.2d 770, 775-76 (5th Cir.1986); Pressroom Unions, Etc. v. Continental Assurance Co., 700 F.2d 889, 893 (2d Cir.1983); Brennan v. University of Kansas, 451 F.2d 1287, 1289 (10th Cir.1971); Field v. Volkswagenwerk AG, supra, 626 F.2d at 306. No statute or rule authorizes us, by the expedient of dropping--retroactively to the date the complaint was filed--an inconvenient party whose presence destroyed jurisdiction, to enter a judgment on the merits in a case that has never been within the jurisdiction of the federal courts. If the party is a nominal party, whose presence or absence does not affect jurisdiction, Wormley v. Wormley, 21 U.S. (8 Wheat.) 421, 451, 5 L.Ed. 651 (1823); Wood v. Davis, 59 U.S. (18 How.) 467, 15 L.Ed. 460 (1856); Bacon v. Rives, 106 U.S. (16 Otto) 99, 27 L.Ed. 69 (1882); Navarro Savings Ass'n v. Lee, 446 U.S. 458, 461, 100 S.Ct. 1779, 1782, 64 L.Ed.2d 425 (1980); Matchett v. Wold, 818 F.2d 574, 576 (7th Cir.1987); Iowa Public Service Co. v. Medicine Bow Coal Co., 556 F.2d 400, 404 (8th Cir.1977), there is no harm in dismissing him, though no point either, cf. Chathas v. Smith, 848 F.2d 93 (7th Cir.1988). The dismissal of such a party is a mere gesture, and the issue of power does not arise. \"[I]f the 'nondiverse' plaintiff is not a real party in interest, and is purely a formal or nominal party, his or its presence in the case may be ignored in determining jurisdiction. And such a party may be dropped from the case.\" Iowa Public Service Co. v. Medicine Bow Coal Co., supra, 556 F.2d at 404 (citations omitted). A similar type of case is where the real party in interest is substituted for a nominal party. Mullaney v. Anderson, 342 U.S. 415, 72 S.Ct. 428, 96 L.Ed. 458 (1952), was a suit by a fishermen's union and its secretary-treasurer on behalf of nonresident union members, challenging the constitutionality of a statute that imposed a higher tax on nonresident fishermen than on local fishermen. In the Supreme Court the defendant for the first time questioned the plaintiffs' standing to maintain the suit on behalf of the nonresident union members. (It is now plain that the union did have standing. See Sierra Club v. Morton, 405 U.S. 727, 739, 92 S.Ct. 1361, 1368, 31 L.Ed.2d 636 (1972).) In response the union moved to add two of those members as plaintiffs, and the Supreme Court granted the motion. \"The original plaintiffs alleged without contradiction that they were authorized by the nonresident union members to bring this action in their behalf. This claim of authority is now confirmed in the petition supporting the motion to add the member-fishermen as plaintiffs. To grant the motion merely puts the principal, the real party in interest, in the position of his avowed agent.\" Id. 342 U.S. at 417, 72 S.Ct. at 430. It was as if the complaint had mistakenly named the lawyer rather than the client as the plaintiff. Mistakes of a clerical or otherwise purely nominal character can generally be corrected at any time, cf. Fed.R.Civ.P. 60(a); but cf. Torres v. Oakland Scavenger Co., --- U.S. ----, 108 S.Ct. 2405, 101 L.Ed.2d 285 (1988), but no one suggests that bringing Bettison into this suit as a defendant was a mistake of that character. Willingham v. Morgan, 395 U.S. 402, 407 n. 3, 89 S.Ct. 1813, 1816 n. 3, 23 L.Ed.2d 396 (1969), and Rogers v. Paul, 382 U.S. 198, 86 S.Ct. 358, 15 L.Ed.2d 265 (1965), likewise involved the correction of purely technical deficiencies. Carneal v. Banks, 23 U.S. (10 Wheat.) 181, 188, 6 L.Ed. 297 (1825), may or may not have been such a case. In one place the Court described the joinder of the nondiverse parties as a \"mistake\" (id.), but in another (on the same page) the Court treated the suit as if it were two suits, one satisfying the requirement of complete diversity, the other dismissable and dismissed. In any event, Carneal involved the power of a district court, not of an appellate court, to save jurisdiction by dismissing a party; and that is an important distinction, as we shall see. Horn v. Lockhart, 84 U.S. (17 Wall.) 570, 579, 21 L.Ed. 657 (1873), likewise involved dismissal of the nondiverse parties by the trial court. The distinction is express in some cases, such as Levering & Garrigues Co. v. Morrin, 61 F.2d 115, 121 (2d Cir.1932), aff'd, 289 U.S. 103, 53 S.Ct. 549, 77 L.Ed. 1062 (1933), and there is nothing in either Carneal or Horn (decisions whose authority we accept absolutely) to suggest that the Court was opining on the powers of appellate courts. Parenthetically, we note that in Horn there had in fact been complete diversity from the start. The heirs of John Horn had sued the executor of his estate. One of the heirs was a citizen of the same state as the executor. For reasons entirely unclear--for there appears to have been no dispute among the heirs--the remaining heirs wanted to make this heir (Mrs. McPhail) and her husband defendants, even though the suit was on her behalf as well as theirs and even though they were seeking no relief against the McPhails. To this end the plaintiffs asked \"that McPhail and his wife be made defendants, if they come within the jurisdiction of the court.\" The McPhails answered the complaint, admitting the truth of all of its allegations. The Court held that the district court's eventual dismissal of these two nondiverse defendants had restored complete diversity. Actually they had been joined in the suit only conditionally, and they were real parties plaintiff, not defendant, and should have been deemed realigned as such. See City of Dawson v. Columbia Avenue Saving Fund, Etc., 197 U.S. 178, 180, 25 S.Ct. 420, 421, 49 L.Ed. 713 (1905); Fidelity & Deposit Co. v. City of Sheboygan Falls, supra, 713 F.2d at 1266-68. Although section 1653 does not apply to this case, our inquiry is not ended. Federal courts possess not only the powers conferred on them by statute but also inherent powers, powers necessary to the courts' effective functioning as courts--for example, the power to punish for contempt, the power to sanction persons who file frivolous pleadings, the power to determine whether there is jurisdiction, the power, in short, to preserve the integrity of the judicial process. See, e.g., United States v. Hastings, 461 U.S. 499, 505-06, 103 S.Ct. 1974, 1978-79, 76 L.Ed.2d 96 (1983); In re Martin-Trigona, 737 F.2d 1254, 1261 (2nd Cir.1984); Dunn v. United States Dept. of Agriculture, 654 F.2d 64, 68 (Ct.Cl.1981); United States v. Reagan, 453 F.2d 165, 172 (6th Cir.1971). But \" 'inherent authority' is not a substitute for a good reason,\" Soo Line R.R. v. Escanaba & Lake Superior R.R., 840 F.2d 546, 551 (7th Cir.1988), and the fact that courts have inherent authority to do some things does not empower them to disregard the limitations on their jurisdiction. Since judges are sometimes careless about jurisdiction (and sometimes make mistakes about jurisdiction without being careless), and naturally are reluctant to set at naught what may have been protracted and expensive proceedings (as in this case), one can find cases in which courts, straining at their jurisdictional leashes, have acted in excess of their jurisdiction and have tried to cure the usurpation by amending the pleadings. See, e.g., Long v. District of Columbia, 820 F.2d 409, 416-17 (D.C.Cir.1987); Continental Airlines, Inc. v. Goodyear Tire & Rubber Co., 819 F.2d 1519, 1523 n. 3 (9th Cir.1987); Othman v. Globe Indemnity Co., 759 F.2d 1458, 1463 (9th Cir.1985); Caspary v. Louisiana Land & Exploration Co., 725 F.2d 189 (2d Cir.1984) (per curiam). (There are other cases, but all from the Ninth Circuit; Long and Caspary are the only cases from other circuits.) Judge Sneed spoke with refreshing candor about these cases when he said in Continental Airlines that \"conferring jurisdiction retroactively is a curious idea,\" and \"knowledgeable judges have said it cannot be done,\" but \"they underestimated, it appears, judicial--or at least appellate--resolve.\" 819 F.2d at 1523-24 n. 3. None of the cases in this line relies on section 1653. No court has ever held that the statute empowers an appellate court to add or drop parties. The cases that have exercised an \"inherent\" power to preserve diversity jurisdiction by dropping a nondiverse party appear to have proceeded on the theory that courts should do what they think needs doing without inquiring too closely into their authority to do it. The temptation to seize for reasons of trivial expediency a jurisdiction that has not been granted should be resisted, as it was by another panel of the Ninth Circuit in Rockwell International Credit Group v. United States Aircraft Ins. Group, supra, decided shortly after Continental Airlines : \"the proposed amendment is not merely technical like the dismissal of a nonessential nondiverse party. The proposed amendment seeks more than the correction of 'defective allegations of jurisdiction,' a correction permissible under 28 U.S.C. Sec. 1653. The proposed amendment attempts to create jurisdiction where none existed. The proposed amendment is not acceptable.\" 823 F.2d at 304. The word \"nonessential\" makes interpretation of this passage difficult. If the word is intended to be synonymous with \"nominal,\" the opinion is consistent with our approach; if it means \"nonindispensable,\" it is inconsistent but makes the passage we have quoted internally contradictory--so the former reading is preferable, though either way the reference to \"dismissal of a nonessential nondiverse party\" is dictum, for that was not what was being sought. The importance of resisting temptation is especially great in cases that are within federal jurisdiction if at all only because the parties are of diverse citizenship. This is a jurisdiction that the Supreme Court has told us should be construed strictly, see City of Indianapolis v. Chase National Bank, 314 U.S. 63, 76-77, 62 S.Ct. 15, 20-21, 86 L.Ed. 47 (1941), in recognition of the sensitive issues of comity and federalism that its exercise involves. The Court has also told us that \"the age-old rule that a court may not in any case, even in the interest of justice, extend its jurisdiction where none exists has always worked injustice in particular cases. Parties often spend years litigating claims only to learn that their efforts and expense were wasted in a court that lacked jurisdiction.\" Christianson v. Colt Industries Operating Corp., --- U.S. ----, 108 S.Ct. 2166, 2178, 100 L.Ed.2d 811 (1988). It would be remarkable if the federal courts of appeals had a comprehensive power, somehow inherent in their being courts, to confer jurisdiction on district courts retroactively. Suppose an Illinois citizen sues five other Illinois citizens and one Iowan. Could we five years later, after a trial on the merits, grant the plaintiff's motion to dismiss the five nondiverse defendants, in order to preserve its victory on the merits? If during the district court proceedings in this case Mr. Bettison had become a citizen of Texas, could we have backdated his change of address to the date of the complaint, to preserve jurisdiction? If the suit had been for $1,000 but judgment had been entered for $12,000, would the plaintiff have been heard to argue that if it had thought harder when it filed its complaint it would have realized that its claim satisfied the amount in controversy requirement? The members of this court have tried to impress on each other and on the district judges of this circuit the importance of scrupulous adherence to the jurisdictional limitations of the federal courts. See, e.g., Kanzelberger v. Kanzelberger, 782 F.2d 774 (7th Cir.1986). If we attempt to patch up the jurisdictional deficiencies in a case when the case comes up to us on appeal, the district courts will have less incentive to police their jurisdiction themselves. They are busy courts, and if they know we will clean up jurisdictional messes, we will see little attention to detail by them on questions of jurisdiction. It will seem to them easier to get on with other pressing matters and leave the esoteric jurisdictional points to the court of appeals. That would not be the disciplined regard for the limits of authority that we want to encourage in the courts of this circuit; and by subjecting litigants to proceedings before a judicial body that had no authority to act, it would impose a heavy expense on the public. It is not our office to create a (federal) lawsuit where none exists and in the process create our own authority by overruling our previous decisions. It may seem, however, that the course of this litigation could not have been affected by the jurisdictional flaw first discovered when the case was appealed. If the plaintiff had known that Bettison's presence as a defendant precluded federal jurisdiction, would it not have refrained from naming him as a defendant? But this is uncertain. The plaintiff's pretrial discovery was directed primarily at Bettison, and it is easier to get certain forms of discovery from a party than from a nonparty. See Fed.R.Civ.P. 33-35. This is not a purely theoretical distinction in the present case. Bettison, and only Bettison, responded to interrogatories and to requests for production of documents--forms of discovery available only against parties. See Fed.R.Civ.P. 33(a), 34(a). Forced to choose between a state court suit with Bettison as a defendant and a federal court suit without Bettison, the plaintiff might have chosen the state court--and who knows what view a state court would have taken of the merits of the case? But all this is beside the point, since the issue is not how severely (if at all) we should punish the plaintiff for having filed a suit that was not within the jurisdiction of the district court, but whether we have the power to determine the appropriate sanction. Having determined that the district court lacked jurisdiction of this case and that we are powerless to cure this lack, we must decide whether to vacate the judgment with instructions to dismiss the suit or vacate the judgment and remand the case to the district court. We choose the latter course even though neither party has explicitly asked us to. The defendants asked us to dismiss the case; the plaintiff asked us to retain the case by dismissing Bettison. But the plaintiff also said that it would \"present a similar motion as necessary in the District Court,\" and implicit in this wording is a request that if this court should decide not to drop Bettison the district court should be given a shot at the question. There was not even an implicit request in Kanzelberger v. Kanzelberger, supra, where, rather than remand to the district court, we directed that court to dismiss the case. Rule 21 of the Federal Rules of Civil Procedure provides that \"parties may be dropped or added by order of the court ... at any stage of the action and on such terms as are just.\" The principle expressed in this rule is a response to the harsh common law rule that required automatic dismissal in the event of misjoinder. See Clark, Handbook of the Law of Code Pleading 352-68 (2d ed. 1947). The relevance of the principle to the question whether a misjoinder affecting jurisdiction is ever curable is apparent, and together with the broad wording of the rule may explain the large number of decisions which hold that Rule 21 (or its predecessors) empowers a district court to dismiss, at any stage of the proceedings, a party whose presence destroys complete diversity, if such dismissal is necessary to preserve diversity jurisdiction and would not harm other parties. Horn v. Lockhart, as noted, was one such case (and Carneal v. Banks may have been another). Other cases in this line include--and this is a small sample--Conolly v. Taylor, 27 U.S. (2 Pet.) 556, 565, 7 L.Ed. 518 (1829); American Fire & Casualty Co. v. Finn, 341 U.S. 6, 19 n. 18, 71 S.Ct. 534, 542 n. 18, 95 L.Ed. 702 (1951); Fritz v. American Home Shield Corp., 751 F.2d 1152, 1155 (11th Cir.1985); Park v. Didden, 695 F.2d 626, 631 (D.C.Cir.1982); Publicker Industries, Inc. v. Roman Ceramics Corp., 603 F.2d 1065, 1069 (3d Cir.1979); Caperton v. Beatrice Pocahontas Coal Co., 585 F.2d 683, 692 (4th Cir.1978); Dollar S.S. Lines, Inc. v. Merz, supra. This court first embraced the principle in 1897, see Mason v. Dullagham, 82 Fed. 689 (7th Cir.1897), and it is mentioned with approval in both Alderman v. Elgin, Joliet & Eastern Ry., supra, 125 F.2d at 973, and Carson v. Allied News Co., supra, 511 F.2d at 24. Judge Mack, whose opinion in Dollar S.S. Lines remains the fullest statement of the principle, pointed out that where a case is remanded to enable the district court to exercise its powers under Rule 21, the court of appeals should not express a view of the merits. See 68 F.2d at 597. For by doing so it may be handing the plaintiff an unearned tactical advantage when the plaintiff comes to decide whether to refile the case in a state court or to ask the district court to retain the case. This point provides a practical reason for the lodging of the power in question in the district courts rather than in the courts of appeals: we are spared the temptation that would be created if we had to decide whether to exercise our discretion to retain a case in the knowledge that if we did so this would allow us to decide the merits, ordinarily with finality. Most important, the district court is better placed than the court of appeals to determine whether any party was harmed by the presence of the party that destroyed jurisdiction. In their petition for rehearing the defendants took sharp issue with the confident observation in the panel opinion that Bettison's presence in the district court had not affected the conduct of the litigation. They said that Bettison had \"had a substantial impact on the posture of the case,\" that \"virtually the sole basis for the district court's determination of liability was from the testimony of Mr. Bettison and from documents that Mr. Bettison produced,\" and that \"none of the other guarantors had access to such materials and no other person was deposed in this litigation. In short, without Bettison, NGI [the plaintiff] had little prospect of proving its case. Guarantors were therefore clearly affected to their detriment by Mr. Bettison's presence and NGI profited enormously.\" These allegations may or may not be true, a question on which we express no opinion; the district court is in a better position than this court to evaluate them--indeed, that is our point. It could be argued that the principle which allows the district court to preserve jurisdiction by dropping a party at any stage in the lawsuit is in tension with the principle that the existence of federal jurisdiction depends on the facts as they exist when the complaint is filed, and not on later events. And it could be pointed out that Rule 21 must be read in light of Rule 82 (\"These rules shall not be construed to extend or limit the jurisdiction of the United States district courts\"). See Kerr v. Compagnie de Ultramar, 250 F.2d 860, 864 (2d Cir.1958); Hill v. Western Electric Co., 672 F.2d 381, 398 n. 10 (4th Cir.1982) (dissenting opinion); cf. Audi Vision Inc. v. RCA Mfg. Co., 136 F.2d 621, 624 (2d Cir.1943). But as law is an instrument of governance rather than a hymn to intellectual beauty, some consideration must be given to practicalities. If an easily curable jurisdictional defect is discovered shortly after a case is filed, the district court should have the power to decide whether the plaintiff must be put to the bother of filing a fresh suit rather than allowed simply to amend the complaint. See Hackner v. Guaranty Trust Co., 117 F.2d 95, 98 (2d Cir.1941) (Clark, J.); cf. American Law Institute, Study of the Division of Jurisdiction Between State and Federal Courts 366 (1969). And if this point is conceded it becomes a matter of judgment when the curative power of the district court runs out. Rule 21 specifies no deadline. None of the parties has asked us to reconsider the interpretation of Rule 21 under which the district court could have done--and, more to the point, still can do--what the plaintiff has asked us to do. This is not surprising. So many cases have adopted that interpretation that a court at our level probably can no longer reexamine it. Stare decisis has its claims, as much in interpreting Rule 21 as in interpreting section 1653. Stability is an important value in law, and is promoted by declining to revisit issues that have long been settled. Modesty alone would counsel hesitation in setting one's personal view against a view that had over a period of many years commanded the unanimous support of judges of diverse background. And certainly this appeal is not the right time and place in which to reconsider the scope of Rule 21. The district court has not yet been asked to retain jurisdiction by dismissing Bettison, and if upon being asked the district court decides in a proper exercise of its discretion to do nothing the question of its power will be moot. We would need a crystal ball to forecast the fate of this litigation on remand to the district court. It may turn out that, rather than do without Bettison as a defendant, the plaintiff would prefer to start over in state court, as it can do without encountering the bar of the statute of limitations. See Ill.Rev.Stat. ch. 110, p 13-217. If the plaintiff decides that it would prefer to stay in federal court (its current preference), it may ask the district court to dismiss Bettison, but the district court may decide that six years of federal litigation in a suit outside its jurisdiction are enough. Conversely, that court may decide that the plaintiff's jurisdictional error was forgivable; that the plaintiff has been sufficiently punished already (for it has seen the victory it won before the panel snatched from its jaws); that when one considers that the plaintiff's error involves both an esoteric and nonintuitive point of federal jurisdiction and was an oversight by the defendants as well as by the plaintiff, it is not so grave an error as to warrant the sanction of dismissal. Excessive sanctions are as inappropriate as inadequate ones. See, e.g., Brown v. Federation of State Medical Bds., 830 F.2d 1429, 1437 (7th Cir.1987). So the district court may decide to dismiss Bettison after all, though perhaps on terms different from those proposed in the panel opinion. We express no view on these questions; they are for the district court in the first instance. Long v. District of Columbia, supra, 820 F.2d at 417, holds that if the district court has the power under Rule 21 to preserve diversity jurisdiction by dropping a nondiverse party, we should have the same power. Long gave no reason for this conclusion, however, but merely cited two cases. One, Reed v. Robilio, 376 F.2d 392, 394 (6th Cir.1967), makes no reference to Rule 21, and was in any event a case, like Mullaney v. Anderson, supra, that involved identifying the real parties in interest--not dropping a real party in interest. The other case cited in Long was Mullaney itself, which as have noted involved the joining of the real party in interest as an additional named plaintiff. Mullaney cited Rule 21 but without discussion of its application at the appellate level, beyond the mysterious statement (342 U.S. at 417, 72 S.Ct. at 430) that \"Rule 21 will rarely come into play at this [i.e., the Supreme Court] stage of litigation\"--mysterious because \"the Federal Rules of Civil Procedure, of course, apply only in the federal district courts.\" International Union, UAW, Local 283 v. Scofield, 382 U.S. 205, 217 n. 10, 86 S.Ct. 373, 381 n. 10, 15 L.Ed.2d 272 (1965). To this generalization, too, there are exceptions, not only where appellate courts adopt the civil rules to govern proceedings in the appellate court (see, e.g., 9th Cir.R. 1-1), but also where one of those rules clearly constrains appellate action, notably in the case of Rule 52(a), which provides that findings of fact by the district court shall not be set aside unless clearly erroneous. These exceptions have no application to this case. Rule 21 has not been incorporated by reference or otherwise in the Federal Rules of Appellate Procedure or in our circuit rules. Cf. Hill v. Norfolk & Western Ry., 814 F.2d 1192, 1200 (7th Cir.1987) (\"this court has not incorporated Rule 11 into its own rules, and therefore the rule does not apply directly to proceedings in this court\"); Hays v. Sony Corp., 847 F.2d 412, 429 (7th Cir.1988) (same). The result may be an irksome gap in our authority, but there it is. The principle underlying a particular rule may apply to the appellate court independently of the rule itself. The principle behind Fed.R.Civ.P. 12(h)(3)--\"Whenever it appears by suggestion of the parties or otherwise that the court lacks jurisdiction of the subject matter, the court shall dismiss the case\"--requires this court, subject to the district court's curative powers under Rule 21, to order a case dismissed when it notices a lack of subject-matter jurisdiction. See, e.g., Rice v. Rice Foundation, 610 F.2d 471, 474 (7th Cir.1979). Rule 12(h)(3) is an instance of the fundamental principle, which is as applicable to appellate as to trial courts, that objections to subject-matter jurisdiction cannot be waived. See, e.g., Mansfield, Coldwater & Lake Michigan Ry. v. Swan, supra. There is no similar overarching principle applicable alike to trial and to appellate courts that authorizes courts to repair jurisdictional defects by changing parties. Appellate courts are not automatically invested with all the powers of district courts, as the Supreme Court has been at pains to emphasize in discussing factfinding. See Anderson v. City of Bessemer City, 470 U.S. 564, 573-75, 105 S.Ct. 1504, 1511-12, 84 L.Ed.2d 518 (1985). For us to assume the powers conferred by Rule 21 would be to cross the line that separates our authority from that of the district courts. Our power to act in this suit--to decide the merits, to mete out sanctions, and so forth--depends on a valid final judgment in the district court. If that court was without jurisdiction, it is not for us to create a federal case upon which to exercise our powers. The line that the Supreme Court has with the consent of Congress drawn in Rule 21 between the powers of the trial and appellate courts of the federal system is not an irrational one. Jurisdictional problems in the district court should be resolved in the first instance by that court, rather than by this court's speculating on how that court might respond to a motion to add or drop parties. Since, moreover, that court has the power, there is no urgent need for this court to confer the same power on itself (even if we could do such a thing), however convenient this might be in a case in which we were utterly confident that a party should be added or dropped to preserve jurisdiction and enable us to reach the merits without waiting for the district court to decide a motion under Rule 21. And there is such a thing as overconfidence. Federal judges spend lots of time telling other officials to stay within constitutional and statutory bounds, however those bounds may chafe in particular cases. If we exceed the limits of our own jurisdiction we shall be setting a bad example for litigants in the federal courts and for other persons subject to federal law. We shall be enforcing the lesson that rules on jurisdiction are inconveniences that can be got round by interpreting statutes such as 28 U.S.C. Sec. 1653 expansively and by stretching the elastic concept of inherent judicial authority to the breaking point. We shall also be ignoring the precept (repeated just the other day, in Kennedy v. Wright, 851 F.2d 963, 967 (7th Cir.1988)) that \"jurisdictional rules should be as simple as possible.\" Cote v. Wadel, 796 F.2d 981, 983 (7th Cir.1986). \"The first characteristic of a good jurisdictional rule is predictability and uniform application.\" Exchange National Bank of Chicago v. Daniels, 763 F.2d 286, 292, modified on other grounds, 768 F.2d 140 (7th Cir.1985). Cf. Budinich v. Becton Dickinson & Co., --- U.S. ----, 108 S.Ct. 1717, 1722, 100 L.Ed.2d 178 (1988). The simple rule, which is also the sensible rule and the one established by the weight of precedent, is that, subject to well-defined exceptions that do not include a free-floating discretionary power in this court to cure defects in the jurisdiction of the district courts, jurisdiction is determined on the pleadings as originally filed. If the jurisdictional allegations are defective but there was jurisdiction when the complaint was filed, we can cure the defect under section 1653. But if there was no jurisdiction when the complaint was filed the case must be dismissed, subject to the curative powers of the district court under Fed.R.Civ.P. 21. The judgment is vacated and the case returned to the district court (where it will remain with Judge Shadur pursuant to Circuit Rule 36) for further consideration consistent with this opinion. No costs in this court. CUDAHY, Circuit Judge, concurring: I agree with the result and with the lion's share of the reasons the majority so ably propounds in reaching it. I also agree, or at least sympathize, with much of the dissent, particularly the outlook of its opening paragraphs decrying the profligate waste of resources involved in jurisdictional errors and their rectification. Both the majority and the dissent urge the prompt repair of jurisdictional mistakes where feasible and where appropriate, by the court authorized to pursue such measures. If the dismissal of a \"spoiler\" is necessary to retain jurisdiction, clearly a district court may undertake this remedial task. A court of appeals, however, may not. Section 1653 seems to me to allow appellate courts to permit correction of mistaken pleadings, not to change the configuration of a lawsuit by dropping or adding parties or changing the amount in controversy. This interpretation of section 1653 leaves us without any plausible device for empowering appellate courts to perform the necessary surgery. I also believe that vesting these powers in the first instance in the district courts is sound policy. Here, for example, the issue is whether Bettison can be dropped without unfair prejudice to the remaining defendants. The district court is inherently better qualified to address this concern--acquainted as it is with all the practical baggage of the ongoing case--than we who must view matters from afar. Further, the district court, in deciding whether, and if so how, to remedy a jurisdictional problem, acts (hopefully) with less of an eye to the merits than we who, by restoring jurisdiction, become entitled to reverse. I am not overly troubled by the metaphysics of retroactivity in performing jurisdictional surgery. This is particularly true when we are faced with the kind of obscure deficiencies found in the instant case. But I think these operations should be undertaken by the court clearly authorized in the premises and best informed about the practical realities of the case. EASTERBROOK, Circuit Judge, with whom FLAUM and KANNE, Circuit Judges, join, dissenting. It takes an average of 12 months to get a case from filing through summary judgment in the Northern District of Illinois. It took this particular case more than four years to yield the partial summary judgment that is the subject of the appeal under Fed.R.Civ.P. 54(b); more remains to be done. It takes another 11.3 months, on average, to resolve an appeal in the Seventh Circuit.1 During these months lawyers are doing chores and sending bills; clients are stewing, their disputes festering. Part of the time is attributable to factual and legal complexity, rules that send counsel droning through files in search of something that may turn out to be useful. Part of the time is attributable to procedural entitlements (such as 45 days to file a brief), present even if there were no other cases on the docket. Part of the time is attributable to unnecessary steps (\"Your honor, I would like to file a Motion for Delay\"). Much of the remaining time is attributable to congestion. The judge cannot turn to one case until done with another--and he does not spend as much time as the case deserves because he knows that there are others in the queue. Delay and the quality of justice are inversely related. We can do something about these sources of delay, expense, and diminution in the quality of justice. Or we can make the problem worse. Today we make the problem worse. A substantial portion of this complex case has been resolved on the merits by the district court--which wrote four lengthy opinions--and by a panel of this court; the rest has been remanded so that it may be wrapped up at long last. Instead of calling it a day, so that judges can move on to fresh business (or spend more time with cases that need it), we order proceedings that will delay the case by another year or so without altering its outcome. * The technical question is whether an appellate court may grant a motion dismissing a party in order to produce complete diversity of citizenship among the remaining litigants. NGI filed, and the panel granted, such a motion. See 832 F.2d 417, 419-20 (7th Cir.1987). Every court that has considered the question in the last two score years has held that an appellate court may grant such a motion. E.g., Long v. District of Columbia, 820 F.2d 409, 416-17 (D.C.Cir.1987); Continental Airlines, Inc. v. Goodyear Tire & Rubber Co., 819 F.2d 1519, 1523 n. 3 (9th Cir.1987); Othman v. Globe Indemnity Co., 759 F.2d 1458, 1463 (9th Cir.1985); Caspary v. Louisiana Land & Exploration Co., 725 F.2d 189, 191-92 (2d Cir.1984); Ross v. Electrical Workers, 634 F.2d 453, 456-57 (9th Cir.1980); Fidelity & Casualty Co. v. Reserve Insurance Co., 596 F.2d 914, 918 (9th Cir.1979). Cf. Reed v. Robilio, 376 F.2d 392, 394 (6th Cir.1967) (directing the district court to dismiss a non-diverse party that was not indispensable to the suit, and reaching the merits on the assumption this would be done). See J. Wm. Moore & Jo Desha Lucas, 3A Moore's Federal Practice p 21.03 at 21-10 to 21-13 (1986 rev.); Charles Alan Wright, Arthur R. Miller & Mary Kay Kane, 7 Federal Practice and Procedure Sec. 1688; Wright, Miller & Edward Cooper, 13B id. at Sec. 3605 pp. 400-03 & Sec. 3611 pp. 518-20 (2d ed. 1984), approving the practice. Not one case since 1942 has held that an appellate court is forbidden to do this. Our decision in Alderman v. Elgin, J. & E. Ry., 125 F.2d 971 (7th Cir.1942), does not give a reason for its contrary conclusion. We are convened en banc and must decide for ourselves whether Alderman is right. But a discussion of appellate practice is the wrong place to start. We cannot decide what powers appellate courts possess without appreciating the authority district courts wield to dismiss parties whose presence prevents diversity jurisdiction from arising. There are three distinct questions. (A) May a district court dismiss a party whose presence spoils jurisdiction?; (B) May an appellate court do what a district court may?; (C) If dismissal is an option, is its exercise prudent? I examine these in turn. * Complaints that do not invoke the district courts' subject-matter jurisdiction are regrettably common. A district court may deal with the problem in two principal ways: it may dismiss the case for want of jurisdiction and permit the plaintiff to file a new and sufficient complaint, or it may cure the defect by dismissing the party whose presence spoils jurisdiction. Rule 21 of the Federal Rules of Civil Procedure suggests the latter course, providing: Misjoinder of parties is not ground for dismissal of an action. Parties may be dropped or added by order of the court on motion of any party or of its own initiative at any stage of the action and on such terms as are just. Any claim against a party may be severed and proceeded with separately. District courts frequently use their authority under Rule 21 to get rid of jurisdictional \"spoilers\", a procedure that has the unanimous approval of students of the subject. E.g., Publicker Industries, Inc. v. Roman Ceramics Corp., 603 F.2d 1065, 1069 (3d Cir.1979) (a court \"may dismiss a nondiverse party in order to achieve diversity even after judgment has been entered\"); Caperton v. Beatrice Pocahontas Coal Co., 585 F.2d 683, 691-92 (4th Cir.1978); Dollar S.S. Lines, Inc. v. Merz, 68 F.2d 594 (9th Cir.1934); Wright, Miller & Kane at Sec. 1685 (collecting cases); Moore & Lucas at p 21.03 pp. 21-10 to 21-13 (more cases); cf. ALI, Study of the Division of Jurisdiction Between State and Federal Courts 366 (1969) (calling dismissal of a case because of belated discovery of jurisdictional problems a \"fetish of federal jurisdiction ... wholly inconsistent with sound judicial administration [that] can only serve to diminish respect for a system that tolerates it.\"). If the court sees"} +{"id":"RedPajamaCommonCrawl.0028","text":"13 April 2019 9 April 2020 Sekretaris bpm LAPORAN AUDIT MUTU INTERNAL TA 2018\/2019 Hasil Capaian Kinerja Program Studi di lingkungan Unmuha TA 2018\/2019 [visualizer id=\"2278\u2033] Grafik hasil Capaian Kinerja Program Studi di lingkungan Unmuha TA 2018\/2019 Nomor : 078\/BPM-UNMUHA\/2019 Lampiran : 1 (Satu) berkas Perihal : Laporan Hasil Audit Mutu Internal (AMI) TA 2018\/2020 Kepada Yth, Semoga Bapak\/Ibu beserta jajarannya selalu dalam lindungan Allah Subhanahu wata'ala Sehubungan telah dilaksanakannya pekan Audit Mutu Internal (AMI) TA 2018\/2019, maka bersama ini kami sampaikan bahwa hasil AMI sebagaimana kami kirimkan ini (terlampir) merupakan hasil dari pembahasan dalam rapat internal BPM bersama para auditor internal di Universitas Muhammadiyah Aceh pada hari Sabtu tanggal 01 April 2019. Sebagai laporan dan kepentingan tindak lanjut dari para pihak, maka bersama ini kami kirimkan Hasil Audit mutu Internal dimaksud dalam rangka pengembangan dan penguatan akreditasi prodi maupun Institusi pada masa yang akan datang. Demikian hasil AMI ini disampaikan, atas perhatian dan kerjasamanya dihaturkan terima kasih. Banda Aceh, 30 Rajab 1440 H\/ 05 April 2019 M Ketua Badan Penjaminan Mutu, Dr. Sri Suyanta, M.Ag Tembusan; 1 . Rektor Laporan Unduh disini : Instrumen Evaluasi Layanan Akademik 836 Thoughts on \"Laporan AMI 2018\/2019\" I'll put him on dbol gh15 Codemasters have released a new trailer which shows the iconic 1976 Ferrari 312 T2 in action, legendary drivers, including Nigel Mansell, Alain Prost and Michael Schumacher, racing cars that defined their eras, and contemporary content from the 2013 season. I'm a partner in how long does manforce tablet works Claims of serious earthquakes, water shortages and pollution by harmful chemicals had all been debunked, he will say, citing an essay by ex-Northern Rock boss and science author Viscount Ridley. I'd like to send this to wilson cell phone booster amazon \"I'll never forget how, many years ago, after another approach had failed to give relief, Matthew said, 'Dad, I know I'm going to heaven. Why can't I just die and end this pain?'\" Warren wrote. \"But he kept going for another decade.\" Alphonso says: International directory enquiries arnold schwarzenegger series iron cuts Coppola began work on Megalopolis, for which he wrote a labyrinthine 212-page screenplay, around 1984, and nurtured it for nearly two decades: to get it off the ground, he took mainstream directing jobs. Hello good day atorvastatin 10 mg price in bangladesh The U.S. video game industry has shrunk for years as gamers have spent more time with free-to-play software on tablets and smartphones. The industry is counting on the November release of Sony's PlayStation 4 and Microsoft's Xbox One to re-ignite interest in big-label games. In tens, please (ten pound notes) store.centerforholisticmedicine.com Iran's new President, Hasan Rouhani, said that his country is not looking to build a nuclear bomb and is open to resuming a dialogue about the controversial program with the West \u2014 an announcement the White House appeared to cautiously embrace Thursday as a possible first step in the loosening of diplomatic relations with the isolated country. Will I have to work shifts? kamagra super prodaja Grohe, which has an estimated global market share of about 8 percent, posted sales of 1.4 billion euros and adjusted earnings before interest, taxes, depreciation and amortization (EBITDA) of 273 million euros last year. It has not provided specific 2013 earnings guidance, which is usually used as a starting point to compare the enterprise value of companies. Where's the nearest cash machine? european roulette free online games There was clear improvement on the practice field later in the preseason though that hasn't transferred to the games that count thus far How much notice do you have to give? lamictal 25 fiyat Yes, there may be a lot of wannabe 'terrorists;' who may or may not be stupid \u2013 using the 'regular' Internet. The same is true of ordinary criminals; of all kinds. That breed also uses snail-mail, public roads, bus & trains systems. I'd like to tell you about a change of address brain power basics review Alstom, which makes trains, wind turbines and turbines forpower stations, generates about a quarter of its revenue in therecession-hit euro zone, with slightly less coming from growthmarkets in Asia-Pacific. I'm about to run out of credit previnex reviews The Gunners have traditionally had by far the best financial backing from their parent club, but they have been overtaken in cash terms this year by Liverpool, whose investment is close to the \u00a31 million mark, and Chelsea. Next season Manchester City, set to replace Doncaster Rovers Belles in the WSL, will up the ante still further. How much notice do you have to give? cefixime tablets usp monograph \"They tried to keep us quiet. They told us not to speak with the media. They told us not to disclose anything and we were fine with that. The reason why we are talking about the weight today is because they called us idiots and said we wanted the catch-weight, they are lying,\" said Canelo, who weighs around 153 to 154-pounds as of Tuesday. I'd like some euros can i take ibuprofen with alka seltzer cold medicine Animosities between Taiwan and China have remained since Chiang's Nationalist Party was defeated in China's civil war and ferreted out many of the country's national treasures which are now housed in Taiwan. The Taiwanese argue that Mao's followers would have destroyed the artifacts during the Cultural Revolution. China's new government, however, has recently come to embrace its pre-Maoist past. Antoine says: I've got a very weak signal finasteride overdose Officials in San Juan have embarked on economic reformsintended to show that the Caribbean territory will pay itsdebts, Bhatia said, citing pension reform, changes to tax lawsand a reduced government work force. I saw your advert in the paper itraconazole yahoo answers An NCI initiative is attempting to recover tumor samplesfrom exceptional responders in up to 200 U.S. drug trials it hassupported. It will sequence them to find \"actionable mutations\"that can be targeted for improved treatment. An estate agents pharma-institute.com Celine, the French fashion house, is known for it's uber luxurious clothes and accessories. The label's bags have hit cult status now, with the likes of Kourntey Kardashian, Nicole Richie, Jessica Simpson and even Jessie J all carrying them. Grady says: I'm self-employed supple drink for arthritis \"Because the attitude of the day is 5, the 5 represents celebration, but the dark side of 5 is drama,\" she says. \"If someone wants to make a problem, don't let them. It's about celebration, but don't overdo.\" Have you read any good books lately? andy pandy diapers newborn At least 80 percent Iowa's cyclospora patients had consumed the prepackaged salad mix, according to an investigation by the state's health department. But officials did not name the salad's manufacturer, emphasizing that the greens were no longer on store shelves. real beauty page securemedsrx.oneminutesite.it \u2026 emissions from the 120bhp diesel (82 g\/km CO2) sounds good to me. The equipment that the entry level Access offers is another class leading and makes cars from a class below like the new Skoda Rapid as well as the Octavia appear some right rip-offs. Can I take your number? coq10 walmart canada PepsiCo Global Investment Holdings Ltd, which provides financing to other companies in the drinks group and is one of 14 Irish subsidiaries, made a profit of almost $6 million in 2011 and paid tax of $215 to Curacao, giving it a rate of 0.004 percent, Irish company records show. Issac says: I quite like cooking aztec treasure online slots An analysis of Manchester's extraordinary modern economic development in the Financial Times at the weekend cited the 1bn Abu Dhabi investment in Manchester City and Beijing's 20 per cent stake in the local airport's development as indicative of overseas investors' love of the metropolis and its economic individualism. I'm from England phenergan drug class Ware, who received support from across the world after his injury was viewed on national television, is expected to return to basketball activities next month, according to team spokesman Kenny Klein. Free medical insurance roaccutane nhs cost This continuing decline has led to a surge in remittances by Indians based in the UAE and across the Gulf, with UAE Exchange, one of the largest remittance houses in the world, estimating the surge at 6 per cent just in the past two months. I'm from England amitriptyline for nerve pain reviews \"Given all the uncertainty and anxiety about what couldhappen with the debt ceiling, investors want to take profits,and these are the ones that have seen some of the biggest gainsthis year,\" said Donald Selkin, chief market strategist atNational Securities in New York, which has about $3 billion inassets under management. A staff restaurant costco allegra generic Mary van den Heuvel, policy and assembly officer for Leonard Cheshire Disability Cymru, said she wants the Social Services and Well-being (Wales) Bill going before the Assembly this week to clamp down on 15-minute visits. I'm only getting an answering machine abilify shorten qtc \"Banks play an essential role in assuring the smoothfunctioning of the commodity markets which underpin the $16.6trillion U.S. economy, and on which consumers ultimately rely,\"said the report by IHS, a major global research,analysis and specialist information group that in recent yearshas bought some of the world's foremost energy consultancies. Will I have to work shifts? duo decadron bula Here's the problem they're trying to solve: colossal amounts of real estate loans \u2013 totaling more than $1.7 trillion \u2013 are due to mature from now to 2018. Commercial mortgages are not like your average home mortgage. They aren't fixed at a rate for 30 years. The standard commercial loan must be refinanced, paid down or sold after 10 years. What's coming now is a huge wave of commercial debt that originated in the bubble years between 2003-2008. What's your number? provera and clomid reviews The film was shot mostly in Haifa and Jerusalem's Old City. It looks at religion from the perspective of the old and new generations, represented by the film-maker and his son, who often squabble over the role of religion. Do you like it here? fame and fortune free slots Local officials have yet to account for another 190 passengers they believe came on the same boat as Miae and Islam from Bangladesh via the Bay of Bengal I'm afraid that number's ex-directory finaflex px ultra pro xanthine But the tide is turning; new data from Aston Business School for 'total early stage' start up activity among young people has uncovered a dramatically improving picture. Figures for 2012 show that new business formation amongst 16-29 year-olds has leapt forward to 9.5% compared to 4.9% in 2010. I don't know what I want to do after university roberta castleton (Reporting By Mohammed Ghobari; Writing By Maha El Dahan;editing by Ralph Boulton) Go travelling panax ginseng peru Jessica Swale tells the story with both wit and a hint of righteous indignation \u2013 and the final reveal of the date when women finally were awarded degrees at Cambridge took me completely by surprise. But though John Dove directs a fluent and entertaining production, this strikes me as a piece that needed another couple of drafts before it reached the stage. There is surprisingly little detail in the characterisation of even the leading characters, with two of the four female students seeming no more than ciphers. The love interest never quite sparks either. I can't get through at the moment alcohol with paracetamol The research \u2013 the first to analyze a very large population across multiple airports \u2013 found that, on average, zip codes with 10 decibel (dB) higher aircraft noise had a 3.5 percent higher cardiovascular hospital admission rate. Cecil says: Photography clearpores skin cleansing system On one hand, analysts say it is expected to benefit fromAirAsia Bhd's network and high brand recognition, as well as a\"low-cost upstart DNA\" that rivals Singapore Airlines' Scoot and Qantas Airways' Jetstar may not have. Porfirio says: How do you know each other? voltaren gel use while pregnant \"A poorly-managed exercise would undermine the ECB's credibility as supervisor from day one, with potentially adverse consequences also for its credibility in the field of monetary policy,\" said Unicredit's chief euro zone economist Marco Valli. Willian says: I'm afraid that number's ex-directory prozac sale uk \"And we had two freshmen that have been with us I think just over three weeks make two stupid decisions that were dealt with very firmly. One's been sent home. One lost his scholarship. And one of them was a 17-year-old using a fake ID. I saw your advert in the paper can i take albuterol nebulizer while pregnant The 'review' the Business Secretary has established into zero hours contracts is clearly inadequate given the seriousness of this issue and the mounting evidence of the abuse of zero hours contracts. Nothing less than a proper consultation with a formal call for evidence will do. Incorrect PIN cost of differin cream The Jets could follow the 49ers' example from last season when Colin Kaepernick was used as a read-option changeup early on. Kaepernick gouged the Jets in the red zone during a 34-0 rout in Week 4 with five rushes for 50 yards and a touchdown. I've been cut off fame and fortune free slots Well, to call them terrorists is, of all strange things under the sun, to pay them a compliment i'm fine good work adapalene lotion on acne Points awarded by a panel of judges decided the championship match for the Bupati Cup, or Regent Cup. The losing boxer's supporters threw chairs at the judges and the winner's supporters responded by throwing bottles and broken chairs, panicking people in the stadium, Jaya said. I'd like to open a business account perfect pairs game Overall, Thomas Cook, which has been struggling to compete with the rise of internet travel agents, made a statutory pre-tax loss of 114m for the year to the end of September I came here to study gnc total lean cla powder Pena Nieto's new standardized system of test-based hiring and promotion is expected to give the government the tools to break teachers unions' near-total control of school staffing. That control includes the corrupt sale and inheritance of teaching jobs, and it has been widely blamed for much of the poor performance of Mexican schools, which have higher relative costs and worse results than any other country in the 34-member Organization for Economic Cooperation and Development. There's a three month trial period buy flonase His government's survival hangs in the balance. Rusnok saidon Czech Television on Sunday he thought he could count on 96 or97 votes in the 200-seat house, expressing the hope that thiswould be enough to achieve a majority among members present. What university do you go to? can flagyl cause yeast infection Republicans uniformly want to repeal Obamacare. But many see that as a political impossibility in the face of Democratic opposition and do not want to trigger a government shutdown in a battle that even Cruz has acknowledged is futile. How do I get an outside line? paris beauty free They monitored almost 9,000 children aged between two and 11 years between 2003 and 2010 Will I be paid weekly or monthly? livagra uk His burgeoning fame among the grass roots of his party has not translated into anything resembling success inside the tradition-bound and clubby Senate, where even in today's highly partisan atmosphere lawmakers usually begin their rejoinders by referring to a political enemy as the \"distinguished gentleman.\" How many weeks' holiday a year are there? seroquel insomnia dose Assad, whose family has ruled Syria for more than four decades, has relied on Alawite-led army units and security forces from the start, but has turned increasingly to loyalist militia armed and funded by Damascus to fight the rebels. Hershel says: I'm afraid that number's ex-directory if i ovulate normally should i take clomid He went 19-5-5 record with three shutouts, a 1.94 goals-against average and a .926 save percentage in 30 regular-season appearances. He ranked third in the NHL in goals-against average, fifth in save percentage and 11th in wins and shutouts. How many more years do you have to go? lasix tablets used for \"BIDMC is committed to delivering the appropriate level of care to patients in need and ensuring that the hospital is in full compliance with all applicable rules and regulations,\" the statement said. Go travelling alliance for advanced health free book Apple's iOS has Siri and Google's Android has Google Now, but what about Microsoft's Windows Phone? According to new reports, Redmond is pursuing its own digital assistant, which will be based on a character from the Halo video game series. A book of First Class stamps can i use amoxicillin trihydrate for uti One of the NSA's tactics has been to persuade leading technology companies, such as Microsoft and Google, to co-operate with the security services in providing access to user data. Privacy rights campaigners have been concerned over how far this co-operation may extend. Bonser says: I'd like to pay this in, please oxymetholone buy uk Tony Blair's visit to the Highland Games in 2003 was notable for the lack of enthusiasm exhibited by his wife, Cherie. She wrote, controversially, in her memoirs about the couple's visits to the Highlands. The manager effet viagra duree There was a whirl of media attention that brought him to New York City right after the PGA for a flurry of TV appearances, but now the glamorous metropolis serves as backdrop for the high-powered golf to come this week. Cool site goodluck \ud83d\ude42 isotretinoin buy online australia Western powers accuse Iran of seeking to develop nuclear weapons. Tehran says its nuclear program is for generating electricity and other peaceful purposes. Iran says U.N. sanctions imposed over its nuclear and ballistic missile programs are illegal and refuses to comply with them. Jeffry says: I'd like to open a personal account viagra cialis prescription online Approval would have brought long-term federal recovery programs to Yavapai County to help survivors and businesses that didn't have adequate insurance. It also would have allowed a federal team to do flood prevention work. I'll put her on animal stak 2 \"Guys, these will be available for your use during the months of October and November. Prior to December 1, please plan to have all ballistic and satellite-guided explosive projectiles returned to Germany in their original packaging and condition.\" I never went to university what is priligy 30mg \"We are excited about the partnership and believe that astrong capital partner will help EAH achieve the growth,innovation and value needed to become the premier builder inAtlanta,\" Paul Corley, the owner of Atlanta-based homebuilder,said in a statement. Free medical insurance hydraxil In what Judge Rhodes termed an \"extraordinary\" and wide-ranging hearing, 45 people addressed the court Thursday from among 109 individuals who had filed objections to the bankruptcy before a deadline set by Rhodes. I'm in my first year at university chlorpromazine hydrochloride solubility This time, however, the Odisha government said it was betterprepared. Half a million people are expected to shelter inschools and other strong buildings when the storm hits,officials said. At least 60,000 people left their homes in neighbouring Andhra Pradesh on Friday. Would you like to leave a message? \u062f\u0627\u0646\u0644\u0648\u062f \u0641\u06cc\u0644\u0645 deuces wild 2002 He was then promoted to the county's chief recreational services officer until his retirement in 1994. Osvaldo says: Best Site Good Work where can i buy vitacup coffee pods \"One in 10 hospitals is already operating without enough staff as the Government wastes billions on a damaging back office re-organisation. Six months after the Francis Report, it is simply unacceptable that the Government has failed to take any action on minimum staffing levels. This is further proof you can't trust David Cameron with the NHS.\" How many days will it take for the cheque to clear? pantoprazole vidal posologie Verizon has updated the multi-platform FiOS Mobile app, allowing FiOS TV customers to watch up to 9 select live TV channels while away from home. The Version 2.0 app update also gives subscribers in New York, New Jersey, Philadelphia and Washington, D.C. markets access to local live local network programming from ABC, NBC, CBS, Fox, UniMas and Univision. How much is a First Class stamp? chlorpromazine dosage medscape It's mindblowing to me how or why anyone ever ASSUMED that this girl was anything but a victim. I wonder if it's because television media are the devil. I get all of my news from the internet, primarily in written form, so perhaps I missed a bunch of stupid speculation (except from trolls) that indicted her? I don't care if she did call him thirteen times in 30 minutes. She's 16, he was 40, end of discussion. In what wild femme-fatale scenario could she be complicit in this tragedy? By law, she's a CHILD, she has every right to be naive & trusting. She would even have the right to be manipulative and seductive (I'm not implying she is), without any expectation that a grown man she thinks of as an uncle would act on his animal instincts. I have no idea what their relationship was, but the responsibility would be entirely his in any imaginable scenario not crafted by some adolescent, fantastical screenwriter. I'd like to pay this in, please caravans ebay scotland The short and stocky Pakistani, who identified himself using only his first name for fear of being targeted by authorities, is one of an increasing number of militants who have left Pakistan for Syria in recent months. The fighters have contributed to a growing presence of Islamic extremists and complicated U.S. efforts to help the rebels. I never went to university muscletech pro clinical hydroxycut review Back in 1980, Walesa called off his initial strike after the shipyard director agreed to its demands. However, the action had inspired workers at other factories to plan their own strikes. When Walesa changed course and announced a general strike to unite them, he established himself as the co-founder and leader of the largest trade-union movement in history. Whereabouts are you from? mometasone cvs This is probably the most ridiculous of Pelosi's statements implying that the Tea Party is somehow a dangerous, bigoted mob. The reference to the late 70's in San Francisco is a reference to the murder of gay San Francisco Mayor Harvey Milk, who, as it turns out, was murdered by an unstable and politically incompetent liberal, Dan White, who had donated money to stopping antigay initiatives in San Francisco. As historian Daniel Flynn points out,\"Harvey Milk's homosexuality played about as much of a role in his murder as San Francisco mayor George Moscone's heterosexuality played in his\u2026White wasn't driven to murder by Milk's vision of gay rights but rather by something more pedestrian: the petty politics of City Hall. What makes for good history doesn't always lend itself to good theater.\" Still, Pelosi might have something on that \"Late 70's\" reference, since we all know how well Jimmy Carter fared as President during that time\u2026 Where's the postbox? pulmicort plm dosis \"The potential book was always intended to be a respectful observation of the trial from my and my husband's perspectives solely and it was to be an observation that our 'system' of justice can get so complicated that it creates a conflict with our 'spirit' of justice.\" Where do you come from? generic viagra overnite no perscription \"We see Knorr-Bremse RailServices' operations developing and expanding in the future in what we view as a dynamic area of rail operations with much potential, says Mr Paul Goodhand, managing director of Knorr-Bremse UK. \"Railcare has many skilled and experienced individuals working at both its sites, in vehicle overhaul and repair but also in specialist incident repair and logistics. We believe that with the support of Knorr-Bremse, both in terms of solid financial investment and in process and management experience and support, we will, together with the existing team, be able to create a strong, new company.\" magic story very thanks iqos 3 duo holder reset \"[DiMaio's] testimony was very helpful for the defense,\" said Los Angeles criminal-defense attorney Alison Triessl, who runs a website called wildabouttrial.com. \"He injects science behind Zimmerman's account of what happened and gives it credibility. It's critically important and it really does a lot of damage to the prosecution's theory that George Zimmerman was on top of Trayvon Martin.\" A book of First Class stamps an american roulette wheel has 38 slots But Michael Jordan should have been able to make $50 million in a season if somebody was willing to pay that Could you send me an application form? precio de ciprofloxacino inyectable Then there's the \"no pre-set limit\" which really means that when you need to make a large purchase, you have no idea if your Amex will be accepted. Company I worked for needed to make payment arrangements for a hotel event in New York that cost around $10,000. We knew we rarely used the card and gave Amex 3 days warning. They said they'd need a week to review our financial statements. Said they weren't interested in contacting our bank, which could have told them that our bank balance never dropped below $3MM and was often closer to $10MM. We'd also just celebrate our 100th year in business. Excellent work, Nice Design how many days after taking duphaston will i get my period \"The cost of running an election less than a year after thelast and the risk of a repeat of fiscal loosening seen in 2012(would be a concern),\" she said, referring to a spike in thebudget deficit to 12.1 percent of GDP last year. Fermin says: Get a job buy ciprofloxacin 500mg online uk With his steady play on the court and calm demeanor off it, Billups helped the Pistons win a title and come within a victory of repeating while reaching at least the Eastern Conference finals in each of his six full seasons with them. The Magic Johnson-led Los Angeles Lakers are the only other franchise to play in six straight conference finals since 1970-71, when teams had to win two series to advance that far. Diva says: What university do you go to? vitamin c infusion preis \"I can understand as well as anyone the challenges of continuing to breastfeed once a mom goes back to work,\" said Belfort, who is a mother of three. \"I think our findings definitely support an investment in helping moms breastfeed their babies.\" I don't like pubs smokin hot dice slot machine RadioShack has a deal with liquidation firm Hilco to shutter as many as 2,100 underperforming stores and said it has already begun discussions with other potential buyers to acquire the rest of its assets. International directory enquiries zerect tab uk Argentine bonds were expected to rise after Massa easily won his primary against a candidate hand-picked by left-wing nationalist Fernandez. Nationwide, her coalition clinched only 25 percent of the vote. Wall Street analysts had said anything less than 40 percent would boost Argentine asset prices. Florencio says: How long have you lived here? alendronate 70 mg tab auro Said Reuland: \"It would have been great to have Geno and all of the quarterbacks out here. However, I don't think it's a make-it-or-break-it type of thing. . . . No one's going to win a spot based on what they do out here.\" How long are you planning to stay here? neuro clear review Separately, an executive with Sweden's Autoliv Inc , Takayoshi Matsunaga, agreed to plead guilty inconnection with a conspiracy to fix the prices of seat beltssold to Toyota Motor Corp, the Justice Department said.In return, he will serve one year and a day and pay $20,000 infines. It's OK alternating tylenol and motrin in adults But Obama administration officials offered assurances to acongressional committee that they were on track. Acting InternalRevenue Service chief Danny Werfel told the committee the taxagency was \"on target.\" Separately, Mark Iwry, a health policysenior adviser at the Treasury Department, also told lawmakersthe administration's healthcare work was proceeding on time. Are you a student? buy email link viagra \"Do we really need this scheme? There's a real risk of overegging the recovery in the housing market,\" he said. \"By sticking with just the newbuild element, you are supporting the economy in a more targeted fashion because of all the knock-on benefits of house building to other sectors. I'm on work experience aztec millions online For a film like this, which is not a commercial project with songs etc, which is easier for people to put money in I need to charge up my phone can i take metformin and synthroid together First, get your angle right. It's all-important with a classic hat like a trilby or a fedora. Go for the Vegas crooner look and wear the brow low down over your eyes, at 45 degrees; or stick it on the back of your head with a halo of hair for a bit of bebop attitude, like Chet Baker without the trumpet. US dollars precio de cialis en farmacias benavides Despite recent progress on the constitution, Brahmi's killing is likely to reactivate the mass protests and strikes across multiple sectors that followed Belaid's assassination, wrote Anna Boyd, senior Middle East analyst at IHS Country Risk. I live here red dog slots Much of what Mr Key does is informed by polling and focus groups, says Prof Vowles Have you got any qualifications? lopid 600 mg 30 tablet Modi says he is tackling these issues. He has proposed spending 42 percent of his 2013\/2014 state budget on education, nutrition, healthcare and other social welfare programs \u2013 the Planning Commission says it would like him to spend even more \u2013 but complains that efforts to redress the imbalances are hampered by a lack of reliable data. How many more years do you have to go? atrovent inhaler wikipedia * Salary packaging firm McMillan Shakespeare Ltd slumped as much as 56 percent to $A6.75, its lowest in nearlythree years, after a one-week suspension following proposed taxchanges for novated vehicle leases. Where do you study? weddings online clomid Peyton is 1-1 in the Super Bowl. Eli is 2-0 with two last-minute game-winning drives. Peyton threw an interception returned 74 yards for a TD with 3:12 left when the Colts were driving for the tying score against the Saints in the Super Bowl four years ago, although receiver Reggie Wayne was more at fault than Peyton. I've been made redundant going off lipitor effects TEPCO said the water then spilled out of a concrete barrier surrounding the tank and believed that most of it reached the sea via a ditch next to the river. The company later said, however, radiation levels in sea water samples taken just off the plant's coast remained below detectable levels. Randell says: I'm self-employed imitrex nasal rxlist The most expensive neighborhood in Queens is now Long Island City, a former industrial zone where luxury towers continue to rise on the manicured waterfront. Median rents for a one-bedroom there are $2,500. Sorry, you must have the wrong number hotel allegra zurich airport shuttle British Prime Minister David Cameron criticized the decision. \"It's irresponsible of Facebook to post beheading videos, especially without a warning. They must explain their actions to worried parents,\" he tweeted. Harrison says: How many more years do you have to go? sinequan urticaria \"Being gay is something I am and I can't escape,\" Mohammad says. \"I know some people who decided to try the alternative, to live as a heterosexual, but they weren't successful. It doesn't work.\" Donte says: An envelope walmart $4 list finasteride Besides that, the fact that the U.S. government didn't know or, depending on your point of view, claimed not to know what the object was simply fueled the speculation. Obviously, whatever was that big and high up in the sky was not put there by a hobbyist, and if no one at the Air Force or Pentagon truly knew what it was, perhaps a private company, or maybe even a foreign power, was behind it. The reports and news faded away, but the mysterious object hung like a question mark in the sky. I'd like to cancel this standing order ciprofloxacin hcl 500 para q sirve Minion characters pose on the yellow carpet arrivals area at the American premiere of the animated film \"Despicable Me 2\" at Universal CityWalk and Gibson Amphitheatre in Universal City, California June 22, 2013. I'd like to send this parcel to collection;prescriptiondrugs toprol interactions In 2010, he connected his laptop to a gold bulliondispensing machine at a casino in Abu Dhabi, according to fellowhacker Tiffany Strauchs Rad. She said Jack had permission from ahotel manager to hack the machine but security intervened. I like watching TV paroxetine 20 mg shqip Poachers from countries neighboring South Africa are hunting the rhinos for their horns, which are sold to crime syndicates that operate in South Asia, where the horns are believed to cure cancer and hangovers. I'd like to withdraw $100, please perfect pairs game sesame But the current controversy comes at a time of steadily warming ties between Washington and Hanoi, especially in security, given shared concerns about China's growing power and assertiveness in the Asia-Pacific region. I work for a publishers amoxicillin 500 milligram capsules While many of the town's 6,000 residents are incensed thattrains carrying such flammable cargo could pass through an areawith bars, restaurants and other local businesses, they also saythe rail is their economic lifeline. Is it convenient to talk at the moment? what is a medrol dose pack \"The initial recommendation for rest and observation issued on Saturday \u2026 was modified,\" said a statement from the Fundacion Favaloro hospital. \"Considering these symptoms, the president's medical team is suggesting surgery.\" Ellsworth says: Can you put it on the scales, please? bonus deuces wild video poker strategy \"Unfortunately, this is sending out a really bad signal to women who've been sexually assaulted or inappropriately touched that the DA's office won't support them or prosecute the individual who did it, especially in cases where the alleged perpetrator is a high-profile or wealthy individual,\" said civil rights lawyer Douglas Wigdor. Very Good Site clotrimazole betamethasone cream for athlete's foot The exhibition features around 250 small-scale paintings from the Prado museum's collections, ranging from 14th-century altarpieces to 16th-century landscapes, 17th-century portraits and cabinet painting from the 18th century. Artists include Murillo, Rubens and Goya. Directory enquiries desvenlafaxine brand name india New York City Council member Margaret Chin, a Democrat representing lower Manhattan, wants to frighten the fashion anarchists who purchase fake designer bags away from the tempting offers of clever street vendors. Cool site goodluck \ud83d\ude42 paydirt slots play for fun Forty years later, the population\u2014around 80 whales\u2014is losing one or two members a year Where are you calling from? propecia costco price Late on Thursday, Nasdaq's parent Nasdaq OMX Group Inc said it halted trading after learning that theSecurities Information Processor, or SIP, which consolidatesstock prices, was not disseminating price quotations. Do you need a work permit? when will a doctor prescribe clomid uk Net revenues in investment management were $1.33bn, essentially unchanged compared with the second quarter of 2012 and the first quarter of 2013. Net revenues in investing and lending were $1.42bn for the second quarter of 2013. What do you do for a living? treasure chamber of sky nessus Attacking IS in Syria is considered more complicated, partly because of the strength of the country's air defence system and because foreign air strikes do not have the approval of President Assad. Can you hear me OK? can taking prozac cause hair loss But prosecutor Mark Williams said it's impossible to watch the video without realizing that Spooner knew exactly what he was doing. He pointed out that Spooner confronted Darius, aimed the gun at his heart and pulled the trigger twice. Humberto says: Is it convenient to talk at the moment? true health healthy vision complete reviews Brokerage Piper Jaffray on Tuesday initiated coverage on thenetwork-equipment maker's stock with an \"overweight\" rating,saying the company was well-positioned to gain share within thewireless local area netowrk (WLAN) market. Zachery says: A book of First Class stamps lamisil prescription online Despite what anyone may say, we are going to be going downthe budget impasse road yet again sometime soon. That not onlyincreases the risk of default, it raises and extends the pausein consumption and investment the budget morass has alreadycaused. All of this makes it possible that Fitch Ratings, whichput the U.S. on ratings watch for a possible downgrade of itsAAA-rating, will actually pull the trigger. I like watching TV regen hair vitalizer ingredients The proposed fine comes as Boeing has faced a spate of bad press related to its new long-haul jetliner, the 787. The overheating of lithium-ion batteries in January caused the jet to be grounded for three and a half months. And regulators in the U.S. and Europe have instructed airline operators of 787 Dreamliners to remove or inspect the aircraft's emergency locator transmitters after a fire inside an Ethiopian Airlines 787 this month. I'd like to send this letter by terbinafine and alcohol 2018 The new Hostess Brands, which bought the rights and recipe to make Twinkies and other Hostess snacks out of bankruptcy court earlier this year, says that when Twinkies return they'll have a 45-day shelf life. That's significantly longer than the 26-day shelf life they previously had. Aurelio says: I'm in a band how to play keno and win According to the IPO prospectus filed with the stock market regulator, Phytotech plans to grow medicinal grade marijuana in Israel, the only country that allows exports of the drug, for sale in the United States, Canada and Europe. I'd like to pay this in, please wiki jj abrams \"It seems like the Fed is raising the bar on a future ratehike. For the moment, the dollar is likely to trade in itsrecent range until there is a clear signal from the Fed,\" saidKatsunori Kitakura, associate general manager of market makingunit at Sumitomo Mitsui Trust Bank. Excellent work, Nice Design levofloxacina dosis perros \"We hope that with him and his team we will end up at a just, equitable and definitive solution that will allow Azawadians to make decisions that will be suitable for their development,\" said Moussa Ag Assarid, an NMLA representative based in Europe. I love this site order obagi tretinoin MILAN, July 25 (Reuters) \u2013 Italy's Luxottica isconfident profits will continue to increase in 2013 in line withsales which rose to over 2 billion euros ($2.65 billion) in thesecond quarter, boosted by growth in all markets, includingrecession-hit Europe. Jarvis says: Could you ask him to call me? agen foredi kota tangerang selatan banten The Government Accountability Office, the investigative armof Congress, looked at rules intended to restrict subsidies toactive farmers. To count as a farmer, applicants must providecapital, equipment or land and labor or management of a farm. Can you put it on the scales, please? user reviews on paxil Some residents have suggested that the train disaster is comparable in its impact on their town to how the Sept. 11, 2001, terrorist attacks affected New York City. And indeed there are similarities \u2014 sudden, deadly conflagrations; victims whose virtually vaporized remains defied easy identification; the circulation of photos of the missing, posted by relatives clinging to faint hopes that somehow their loved ones might be seen alive somewhere. How much notice do you have to give? outta this world slot review It happens in Indiana this time with a governor named Mike Pence, who tries to make bigotry toward gays sound like God's will, and uses his own cockeyed version of religion to justify discrimination, the way politicians like him always have in this country. Milford says: Where did you go to university? neo hormoviton pasak bumi manfaat But the longer term impact of the latest good news from the House of Windsor is deemed more significant, with the rising popularity of the royals helping underpin the image of Britain abroad while brightening consumer sentiment in a tough economy. Go travelling kruidvat aleve \"We continue to be very pleased about China, the [young] luxury consumer engages with us,\" said Burberry's chief financial officer Carol Fairweather, pointing in particular to \"a real success story\" in men's fashion. Her comments differ dramatically from the tone the company set in September last year, when it posted a shock profit warning due to slowing demand in the region. Special Delivery apo trazodone ingredients A separate bug involves exploiting the advanced functionality offered by Siri, the phone's personal assistant, by the software update. Users can access Siri from screenlock and instruct it to turn on Airplane mode \u2013 disabling the phone's location tracking services. What's your number? perricone md omega 3 dietary supplement review It's when this process fails to happen that PTSD can set in, she said in a telephone interview. PTSD is more than ordinary stress. It's associated with severe or unusual trauma. Those experiencing it may suffer from violent, intrusive thoughts. They have trouble sleeping. Once innocuous things, like a particular smell or sensation, can bring back terrible memories. In the community of Newton, Conn., for instance, signs ask people to close doors softly because loud bangs still bring on flashbacks, nearly a year after a gunman opened fire inside the Sandy Hook Elementary School. Laverne says: I've got a very weak signal play pai gow poker online Federal Reserve Chair Janet Yellen spoke, too, but didn't provide hints on the timing of any interest rate hikes, contributing to a modest equity market decline on Friday. Agustin says: A book of First Class stamps missed dose of effexor xr \"I have now had clients ask me: 'Is this a Hannam sort of case?' when considering whether they are allowed to take someone over the wall, and to that extent, the publicity will have helped FCA's broader agenda,\" Moulton adds. I study here prednisone mail order \"I think people are really waiting to get into the meat ofthe earnings season,\" said Douglas DePietro, managing directorat Evercore Partners in New York. \"We got past the Fed minuteslast week, so I think people are really just looking for whatcompanies can deliver.\" I'm a housewife isosorbide dinitrate 10 mg obat apa The news was announced just as the Saudi deputy health minister, Dr. Ziad Memish, was speaking to a gathering of experts hosted by the University of Pittsburgh Medical Center's Center for Health Security in Washington. Duane says: I'd like to withdraw $100, please oscillococcinum prospect romana The report states that there was a failure on the part of Savita's clinical team to recognise that she was at risk of clinical deterioration and developing sepsis. There were also deficiencies in the documentation of the case, HIQA found. I've got a full-time job maria deitch pharmacy Judge Debra Nelson rejected the prosecution's request to include other charges for the jury to consider that included aggravated assault and felony murder in which the underlying felony would be child abuse for shooting Martin, who was 17. I'd like to apply for this job face up 21 free The GE board's management development and compensationcommittee \"believes that Mr Rosendo says: Could you please repeat that? infant tylenol msds Shares of J.C.Penney fell 13.1 percent to USD 9.05 and was the worst percentage decliner on the S&P 500 after it said its public offering of 84 million common shares was priced at USD 9.65 per share. Another service? youtube body groove full workout As she helped kick off a nationwide campaign last week to encourage people to drink more plain water, Mrs. Obama said she would keep reaching out to new people and organizations and keep making the case for healthier choices like water and fruits and vegetables. I'm interested in where to find preseed in canada Carl Haber, a physicist at the UC-run Lawrence Berkeley National Laboratory, applies high-tech methods to extract sound from very old and fragile audio recordings on wax cylinders and even tinfoil. Among his team's noted projects was restoring an 1885 recording of the voice of Alexander Graham Bell, inventor of the telephone. Excellent work, Nice Design orlistat 120mg online In China, where Tesco makes around 2 percent of sales, thehypermarket industry is likely to grow to 863.8 billion yuan($141 billion) by 2015, from an estimated 659.6 billion yuan in2013, according to Euromonitor. Cedrick says: How many days will it take for the cheque to clear? deuces wild poker payout Last month, Bush put the emails he said were related to his work in state government on a website, a move he and his aides said was designed to show his administration was open and in touch with constituents. We used to work together does flagyl cure urinary tract infections \"We are thinking about entering the promising market in theAsia-Pacific region. We should find our niche here; we haveevery chance of doing that,\" Putin told journalists on Wednesdayin the far eastern town of Chita. Have you got a telephone directory? nexium generic name esomeprazole \"I gave a little blood on that bridge in Selma, Ala. for that right to vote. I am not going to stand by and let the Supreme Court take the right to vote away from us!\" he said to applause and cheers. \"You cannot stand by, you cannot sit down, you've got to stand up! \u2026 The vote is precious. It is almost sacred. It is the most powerful non-violent tool we have in a democratic society and we got to use it.\" How do you do? graminex flower pollen The scorecard looks at how each state's health care system is working for low-income families, meaning those earning less than $47,000 a year for a family of four. Low-income individuals comprise 39 percent of the U.S. population, and in the states with the lowest health care access and quality nearly half of their residents live in poverty. The report compares their health care experiences to families with higher incomes, or those making more than $94,000 for a family of four, and finds disparities by income within each state. I'm doing a phd in chemistry is cipro for sinus infections Such harsh treatment was \"the unavoidable fate\" of the New Citizens' Movement, Mr Chen added. \"Our system is one in which the government gives orders to the people and the people listen to the government.\" Prof Pils, who has observed several of the movement's informal gatherings, said the recent wave of detentions was \"potentially a signal to others not to get involved\". Floyd says: In a meeting outta this world slots \"The prevalence figures in Ireland are startling, with much higher rates of dementia among women Have you read any good books lately? betnovate for acne scars Wall Street's focus on Alibaba rather than on Yahoo was reflected in the slew of analyst notes published following Yahoo's earnings, including Stifel Nicolaus' Jordan Rohan whose note to investors was titled: \"Alibaba triples profit; Yahoo reported too.\" Lawerence says: Jonny was here field of green slot Master's degree holders can expect to earn $2.7 million over a lifetime while professional degree holders can expect $3.6 million. This is the job description buy antabuse without prescription Inflation has averaged 3.5 per cent since 2010, with wages growing at just 1.8 per cent. Younger households have been hardest hit because they spend more on transport and their mortgage. The CEBR says inflation is likely to continue to average 2.5 per cent until 2018. I'm interested in rizatriptan tab 5 mg odt South Africa's gold and platinum producers are stillrecovering from a wave of wildcat strikes in 2012 rooted in aturf war between NUM and AMCU. This cost billions of dollars inlost output and triggered damaging sovereign credit downgrades. Garfield says: How many are there in a book? texas hold em bonus For whatever reasons, and no matter who was initially responsible, the contretemps had become one of practical effects on property and the economy as well as of symbolic import. We'll need to take up references dapoxetine priligy australia The infection is called molluscum contagiousum and in the past, it was only associated with children. It is passed easily between them, for example through sharing towels or clothes. However among adults, it can also be passed through sex. Nickolas says: Please wait yasmin anticonceptivo efectos secundarios House Republicans might unveil their debt limit increase proposal by the middle of next week. It is likely to include approval of the controversial Keystone oil pipeline from Canada to the U.S. Gulf of Mexico and tax and energy initiatives. Kaden says: When can you start? cephalexin 250 mg for bladder infection His remarks echoed criticism by the International MonetaryFund, which said last week that despite its huge oil wealth,Kuwait needed to rein in public spending, especially on wages,and find new sources of income to protect its budgetposition. Can you hear me OK? qualia pharma revert Claiming there is economic boom in Africa citing countries like Ethiopia is nothing less than lazy journalism. One has to look at the drivers for the GDP figures. In case of Ethiopia, it's aid"} +{"id":"RedPajamaCommonCrawl.0029","text":"Justice Dept.: FBI misused Patriot Act By LARA JAKES JORDAN, Associated Press Writer The FBI improperly and, in some cases, illegally used the USA Patriot Act to secretly obtain personal information about people in the United States, a Justice Department audit concluded Friday. And for three years the FBI underreported to Congress how often it forced businesses to turn over the customer data, the audit found. FBI Director Robert Mueller said he was to blame for not putting more safeguards into place. \"I am to be held accountable,\" Mueller said. He told reporters he would correct the problems and did not plan to resign. \"The inspector general went and did the audit that I should have put in place many years ago,\" Mueller said. The audit by Justice Department Inspector General Glenn A. Fine found that FBI agents sometimes demanded personal data on individuals without proper authorization. The 126-page audit also found the FBI improperly obtained telephone records in non-emergency circumstances. The audit blames agent error and shoddy record-keeping for the bulk of the problems and did not find any indication of criminal misconduct. Still, \"we believe the improper or illegal uses we found involve serious misuses of national security letter authorities,\" the audit concludes. Attorney General Alberto Gonzales, who oversees the FBI, said the problems outlined in the report involved no intentional wrongdoing. In remarks prepared for delivery to privacy officials late Friday, Gonzales said: \"There is no excuse for the mistakes that have been made, and we are going to make things right as quickly as possible.\" At issue are the security letters, a power outlined in the Patriot Act that the Bush administration pushed through Congress after the Sept. 11, 2001, terror attacks. The letters, or administrative subpoenas, are used in suspected terrorism and espionage cases. They allow the FBI to require telephone companies, Internet service providers, banks, credit bureaus and other businesses to produce highly personal records about their customers or subscribers \u2014 without a judge's approval. About three-fourths of the national security letters were issued for counterterror cases, and the other fourth for spy investigations. Fine's annual review is required by Congress, over the objections of the Bush administration. The audit released Friday found that the number of national security letters issued by the FBI skyrocketed in the years after the Patriot Act became law. In 2000, for example, the FBI issued an estimated 8,500 letters. By 2003, however, that number jumped to 39,000. It rose again the next year, to about 56,000 letters in 2004, and dropped to approximately 47,000 in 2005. Over the entire three-year period, the FBI reported issuing 143,074 national security letters requesting customer data from businesses, the audit found. But that did not include an additional 8,850 requests that were never recorded in the FBI's database, the audit found. Also, Fine's audit noted, a 2006 report to Congress showing that the FBI delivered only 9,254 national security letters during the previous year \u2014 on 3,501 U.S. citizens and legal residents \u2014 was only required to report certain types of requests for information. That report did not outline the full scope of the national security letter requests in 2005, nor was it required to, Fine's office said. Additionally, the audit found, the FBI identified 26 possible violations in its use of the national security letters, including failing to get proper authorization, making improper requests under the law and unauthorized collection of telephone or Internet e-mail records. Of the violations, 22 were caused by FBI errors, while the other four were the result of mistakes made by the firms that received the letters. The FBI also used so-called \"exigent letters,\" signed by officials at FBI headquarters who were not authorized to sign national security letters, to obtain information. In at least 700 cases, these exigent letters were sent to three telephone companies to get toll billing records and subscriber information. \"In many cases, there was no pending investigation associated with the request at the time the exigent letters were sent,\" the audit concluded. In a letter to Fine, Gonzales asked the inspector general to issue a follow-up audit in July on whether the FBI had followed recommendations to fix the problems. \"To say that I am concerned about what has been revealed in this report would be an enormous understatement,\" Gonzales said in remarks prepared for delivery to the privacy officials. \"Failure to adequately protect information privacy is a failure to do our jobs.\" Senators outraged over the conclusions signaled they would provide tougher oversight of the FBI \u2014 and perhaps limit its power. \"The report indicates abuse of the authority\" Congress gave the FBI, said Senate Judiciary Committee Chairman Patrick Leahy (news, bio, voting record), D-Vt. \"You cannot have people act as free agents on something where they're going to be delving into your privacy.\" The committee's top Republican, Pennsylvania Sen. Arlen Specter (news, bio, voting record), said the FBI appears to have \"badly misused national security letters.\" The senator said, \"This is, regrettably, part of an ongoing process where the federal authorities are not really sensitive to privacy and go far beyond what we have authorized.\" Sen. Russ Feingold (news, bio, voting record), D-Wis., another member on the panel that oversees the FBI, said the report \"proves that 'trust us' doesn't cut it.\" The American Civil Liberties Union said the audit proves Congress must amend the Patriot Act to require judicial approval anytime the FBI wants access to sensitive personal information. \"The Attorney General and the FBI are part of the problem and they cannot be trusted to be part of the solution,\" said Anthony D. Romero, the ACLU's executive director. The report is at: http:\/\/www.usdoj.gov\/oig\/reports\/FBI\/index.htm Justice Department: http:\/\/www.usdoj.gov FBI: http:\/\/www.fbi.gov\/ Fewest New Jobs in Two Years; big losses of construction and factory jobs Unemployment rate drops to 4.5 percent By JEANNINE AVERSA, AP Economics Writer The nation's unemployment rate dipped to 4.5 percent in February even as big losses of construction and factory jobs restrained overall payroll growth. Wages grew briskly. The latest snapshot, released by the Labor Department on Friday, offered a picture of an employment climate that remains in fundamentally good shape despite slower job growth in part due to bad winter weather in parts of the country, economists said. The slight decline in the politically prominent jobless rate, from 4.6 percent in January, came as hundreds of thousand of people left the work force, a development that economists also believe was related to the bad weather in February that made it difficult to get out and look for jobs. Employers, meanwhile, added 97,000 new jobs to their payrolls in February, the fewest in two years, as bad winter weather forced construction companies to slash 62,000 jobs, the most since 1991. Factories, feeling the strain of the troubled housing and auto industries, also continued to cut jobs. They eliminated 14,000 positions last month. On a more encouraging note, job gains in the previous two months turned out to be stronger than previously estimated. Employers added 226,000 new jobs in December, versus the 206,000 last estimated. Payrolls grew by 146,000 in January, up from a previous estimate of 111,000. The new tally of jobs added to the economy in February was close to economists' forecast for a gain of around 100,000. They had predicted the unemployment rate would hold steady at 4.6 percent. \"While we may not be creating as many jobs as we would like to see, the labor market is still in good shape,\" said Joel Naroff, president of Naroff Economics Advisors. \"The job market is still tight enough to drive up workers' wages.\" Wall Street investors also liked the latest employment news and gave stocks a lift. The Dow Jones industrials were up 12 points in morning trading. Workers' wages grew quickly last month. Average hourly earnings rose to $17.16, a 0.4 percent increase from January. That was slightly faster than the 0.3 percent gain economists were expecting. Over the 12 months ending in February, wages grew by 4.1 percent. Strong wage growth is welcome by workers and supports consumer spending, a key ingredient to the country's economic health. But a rapid pickup \u2014 if sustained and not blunted by other economic forces \u2014 can raise fears about inflation. Spiraling inflation would whittle away any wage gains, hurting workers' wallets, and isn't good for the overall economy, either. The Federal Reserve, which had steadily boosted interest rates for two years to fend off inflation, has left rates alone since August. The Fed \u2014 which said it will keep a close eye on inflation \u2014 meets later this month to consider interest rate policy. Economists said Friday's employment report didn't change their view that the Fed will probably continue to hold interest rates steady. In other economic news, the Commerce Department reported that the trade deficit narrowed to $59.1 billion in January as U.S. exports climbed to an all-time high. The latest batch of economic reports come as President Bush continues to get lukewarm ratings for his economic stewardship. Just 41 percent of the public approves of the president's handling of the economy, compared with 57 percent who disapprove, according to an AP-Ipsos poll. Democrats, who accuse Bush of not doing enough to close the gap on economic inequality, say a top priority is getting final agreement in Congress on legislation to boost the federal minimum wage from $5.15 an hour to $7.25 an hour. The wage hasn't budged for nearly 10 years. Democrats also are pushing legislation making it easier for workers to start unions against company wishes. Although construction companies and factories eliminated jobs last month, other employers, including health care providers, financial firms and retailers boosted hiring. February's jobless rate was the lowest since December, when the unemployment rate also stood at 4.5 percent. Analysts expect the unemployment rate, which dropped to a six-year low of 4.6 percent last year, will creep up this year as economic growth slows. Some believe the jobless rate could climb to close to 5 percent by the end of this year. The economy expanded by 3.3 percent last year, the best showing in two years. Growth, however, is expected to ebb to around 2.7 percent for all of 2007. The Glass is Half Full. Unfortunately, the Levee is Overflowing. Robert J. Elisberg On Tuesday, my father sent me an email after he noticed the juxtaposition of two stories on the news page of his web provider, Comcast. The headlines were -- 2 Suicide Bombers Kill 93 in Iraq Bush: U.S., Iraqi Forces Making Progress \"That's sure some fine way of making progress!\" he noted. Well, personally, I thought he was being terribly cynical, and I told him so, explaining that the President didn't say they were making \"fast\" progress. Or good progress. Or what kind of progress. So, in fact, the President was correct, and it was good news after all. And it hit me that that's quite an impressive ability, to be able to turn 93 deaths into positive news. And that's when it hit me again that this is an rare, impressive talent the White House has used over and over. I was absolutely floored. What a truly remarkable, valuable skill to have: at the moment when any bad news rams into you (indeed, not just \"bad news,\" but truly mindnumbingly horrible news), that you're not only not run over by it, but that you can repeatedly turn it into Actual Good News without skipping a beat. The Iraq War is going well. There's no global warming. Heck of a job, Brownie Harry Whittington apologizes for getting in the way of Dick Cheney's buckshot. George Tennant is given the Presidential Medal of Freedom. Conservative Democrats helping win the House and Senate is a victory for Republicans. The President has earned political capital. Lewis Libby's conviction doesn't impact on the White House It's all like the famous scene from the movie, \"Jumbo.\" Jimmy Durante is sneaking a massive elephant out of the circus, when a guard stops him and demands, \"Where are you going with that elephant?!\" As the gigantic creature looms up inches behind him, Durante replies, his face the picture of innocence, \"What elephant?\" There has been a giant elephant looming behind the Bush Administration for six years, and the best they can come up with is the same answer - \"What elephant?\" - not ever realizing that pleading ignorance doesn't make the elephant disappear. (That the G.O.P mascot is an elephant only shows that God has a sense of whimsy.) Actually, it's even more than this. Because when I read all the gumfummery coming from right-wing pseudo-experts trying to explain away the Libby conviction as A Good Thing, it hit me once more what it was. (Side note: I've been getting hit so often lately that I'm beginning to understand how Harry Whittington felt. But - no apologies!!) Here's what I realized: The Bush Administration is Chicken Little in Reverse. The worst imaginable disasters can crush them, and they'll run around yelling how good it is to be caught in the middle of a tsunami that's surrounded by fire as an earthquake collapses the ground underneath a village wiping it out. (\"Natural disasters are part of nature, and nature is good and important to life, so we are pleased that our environmental policies have helped life progress.\") The sky could actually be falling, and George Bush and his troupe of Administration Apologists would race around crying out, \"The sky isn't falling! The sky isn't falling!\" As water rushes over the top of the levees, \"The sky isn't falling,\" as bombs destroy villages and lives, \"The sky isn't falling,\" as polar icecaps melt and polar bears drown, \"The sky isn't falling,\" as the assistant to the Vice President of the United States is convicted of obstructing justice, \"The sky isn't falling.\" The problem with being Chicken Little in reverse is the exact same problem as being Chicken Little period, except that you're going backwards - after a while, people catch on and stop believing anything you say. Anything. The President, Administration, Republicans in Congress, right-wing pundits can all explain how the conviction of Lewis Libby, who worked more closely with Vice President Dick Cheney than anyone in America and received handwritten memos from him on Valerie Plame, doesn't mean anything bad for the Vice President or the Administration, that it's even good because it supposedly shows no one else was involved, and it was a bad jury anyway, and...and...and - and even if they somehow can convince themselves of this hallucination, that's as far as it will go. Because people get it. People have more common sense than that. Rocks have more common sense than that. People can actually grasp basic concepts.. And this is just one more basic concept about this Administration that people grasp. When you have 70 percent of the American public saying this war is bad - and the President says \"U.S. and Iraqi forces are making progress\" - people have long since grasped the truth. Two suicide bombers killing 93 people is not good. And the tragedy (okay, one of the tragedies) of being Chicken Little in Reverse is that when the next real, serious, important event comes along, and the President opens his mouth, no one will believe him. Because when he squeaked through in 2004, winning by the smallest margin in history for a President up for re-election during a war, he spent all that vaunted political capital. Eighteen cents just doesn't go as far these days as it used to. The \"Surge\" Farce Barry Lando Those congressmen who accepted the \"surge\" and the media who supported it were sold a bill of goods. One of the top U.S. commanders in Iraq admits it. According to the New York Times, Lt. Gen Raymond Odierno, \"the day-to-day commander of U.S. forces in Iraq has recommended that the heightened American troop levels there be maintained through February 2008.\" That's if the \"surge\" is to have any chance of success: bring material benefits to the people of Baghdad, give them a sense of calm and security, put a damper on the civil war and allow Iraqi political leaders a chance to somehow patch thier country together. Otherwise, the Times article makes clear, the consensus in the Pentagon is that the buildup will fail. Indeed, the surge to date is \"little more than a trickle\" and will only reach its goal of an additional 28,000 troops on the ground by June. Yet, under previously-announced plans, troops were supposed to be withdrawing from Iraq already by September 2007. According to many experts, even maintaining troop levels through next February is far from enough. An unclassified version of the latest National Intelligence Estimate states that \"the Iraqi Security Forces, particularly the Iraqi police, will be hard pressed in the next 12 to 18 months to execute significantly increased security responsibilities, and particularly to operate independently against Shia militias with success.\" So--the question which has to be asked--and answered. 1. Are we really to believe that General Odierno and his bosses-General David Petraeus, Secretary of Defense Robert Gates and the gang in the White House--that they just discovered that the surge, as sold to congress and the media, would not work? That the build up by a U.S. military already stretched to the breaking point would have to continue many months longer than indicated? The answer to that question is a no-winner. If the generals didn't realize just a few months ago that the concept of a limited surge as presented to the public was a farce, they were woefully ignorant of the situation in Iraq and should have never been given command. If they did lie--for that's what we're talking about--then they should lose their jobs. The obvious White House strategy was this: Let's at least get this surge thing rolling. Once underway, we simply oblige our weak-kneed congress to up the ante. If not, we accuse them of refusing to support our boys on the ground. We win the 2008 elections with that. ( As Tom Englehardt among others has so clearly pointed out) Indeed, the administration has already been able to increase the build up from 21,000 to 28,000. 2. The administration has never been obliged to specify how long the buildup would continue. When recently asked that question, for instance, General Peter Pace, chairman of the Joint Chiefs blandly told Pentagon reporters: \"We're looking, as we should, at each of the three possibilities: hold what you have, come down, or plus up if you need to,\" C'mon guys. Your generals on the ground have already told you the current policy is doomed. It's truth time. It's also time for everyone trying to avoid that issue--in congress and the median not to mention most of the herd running for president--to pull their heads out of the sand. Do the folks in the Pentagon or anyone really believe that the U.S. public and Congress will support higher troop levels well into an election year? So what's the point of the whole exercise? Sending more American troops, not to mention thousands of Iraqis, to death and dismemberment, pouring hundreds of billions more dollars down the Iraqi drain. And to what end? To maintain a charade that will ultimately allow George W. Bush and the Republicans to blame a lilly-livered Democratic congress and\/or the next occupant of the White House for America's \"defeat\" in Iraq. The Weekly Worst In McCain Pandering Cliff Schecter Another week, more McCain flip-floppery. We the folks at The Real McCain are once again happy to bring it to you: * Apparently many McCain staffers up and quit when he flip-flopped on his own presidential announcement plans. Did I mention he didn't thell them? What a straight-shooter! * McCain also was for using the word \"wasted\" when referring to lives lost in Iraq before he was against it. Now he's for \"sacrificed.\" As in, how many more lives do you intend to sacrifice in this failed, trumped up war, senator? *\"I will take responsibility for being a member of the Armed Services Committee and not knowing about it and not doing anything about it,\" the Republican 2008 contender told a group of county officials from across the country today. \"I apologize for my failure\" to act, the Arizona Republican added. \"I should be held accountable.\" This is the current McCain on Walter Reed. Here is McCain during the 2006 election cycle when campaigning against Tammy Duckworth (yes, he campaigned against a vet who lost both legs in combat--nice way to show you're for the troops first and party second): \"Mr. McCain demanded the apology while electioneering for a Republican congressional candidate in Illinois...He was speaking of how often he had been to Walter Reed Hospital to see the wounded Iraq veterans, of how many of them have lost limbs. \" No senator, the residents of Walter Reed should be demanding much more than just an apology from you. If you were there numerous times, and did NOTHING about the situation there, how about we hear from you as to why you did NOTHING. Thanks as always, and hope you enjoyed this week's edition. Obama pays 17-year-old parking tickets BOSTON (Reuters) - As he prepared to announce his campaign for the White House, Democratic Sen. Barack Obama took care of some unfinished business at Harvard University -- paying about $400 in parking fines dating back to his days as a law student. Two weeks before the Illinois senator officially entered the presidential race on February 10, he paid parking fines he received while attending Harvard Law School in Cambridge, Massachusetts, a Cambridge city official said on Thursday. \"I think it's great, we always like to collect,\" said Susan Clippinger, director of Cambridge's Traffic, Parking and Transportation Department. Obama paid Cambridge $375 on January 26 for 17 parking tickets received between 1988 and 1990, she said. He paid neighboring Somerville another $45 for late fees on two parking tickets from the early 1990s, a Somerville official added. Obama also paid a $73 auto excise tax he owed Somerville, said city spokesman Tom Champion. The Boston Globe reported in January that he owed Somerville the money. A spokesman for Obama was not immediately available to comment but the Globe quoted Jen Psaki of the Obama campaign as saying the senator had paid for the tickets out of a personal account. The difference between and idiot and a jackass: The politics of Kate O'Beirne. Michael Seitzman Innocent until proven guilty is no longer good enough for Kate O'Beirne. It's now, innocent until you confess. On Hardball last night, Chris Matthews was as incredulous as the rest of us who watched the same conservatives pounding their fists about perjury and obstruction of justice during their attacks on Bill Clinton, only now it's not a real offense. Now it's \"the criminalization of politics\" as Kate-O described it last night. When Chris correctly asked her what the difference is between the Clinton situation and the Libby one, Kate-O's response (numerous times) was that the difference is \"Clinton admitted his guilt and Libby maintains his innocence.\" Really? Is that how it works now? You're only guilty if you admit it? Chris pointed out to her that the prisons are full of convicted felons who maintain their innocence, so she naturally responded that some of them really are innocent. What's her point, you ask? She has none - at least none outside of the notion that Libby should be pardoned because he's a nice guy and sits on her side of the political spectrum. And therein lies the essential problem - there is no longer a shared truth in our culture. There are two truths and they have nothing to do with facts and everything to do with ideology and politics. And that, ladies and gentlemen, is why we have an independent judiciary, so that decisions about \"truth\" can be made by people who don't have a political stake in the outcome. Kate O'Beirne is not an idiot. She knows the difference between right and wrong, she just can't say it out loud. Why? Because she's a jackass. What's the difference between an idiot and a jackass? An idiot might admit to their own stupidity. A jackass can't. California to move presidential primary to February SACRAMENTO, California (Reuters) - Seeking to give voters in the nation's most populous state a greater voice in choosing the next U.S. president, California's state assembly agreed on Tuesday to move its presidential primary to February 2008. In recent years, California has had little impact in choosing presidential nominees for the Republican and Democratic parties as smaller states such as New Hampshire and Iowa with much earlier contests have taken a leading role. This year, more than a dozen U.S. states are considering moving their primaries to February 5, 2008, including big states like New Jersey, Florida, Missouri, Michigan and Texas. The national election to decide who will succeed George W. Bush as president takes place in November 2008. California's Democratic-dominated assembly voted along party lines by 46 to 28 to move the state's primary from June, a move already backed by the state senate last month. Gov. Arnold Schwarzenegger, a Republican, has said he would sign the legislation, which Republican legislators said they opposed because of the cost to counties. \"We want to let the presidential candidates know: don't come out here just fund-raising,\" Schwarzenegger told Reuters in an interview last week. \"We're going to move the primary up to February and you've got to go answer those questions from the California people and to me.\" With expectations rising of an early California primary, prominent candidates including Democrats Hillary Clinton and Barack Obama and Republicans Rudolph Giuliani and John McCain have made visits to the state in recent weeks. If other states also move up their primaries, candidates with lots of money and high visibility may have an advantage. In past years, once little-known candidates such as Jimmy Carter gained the world's most powerful job after years of shaking hands and retail campaigning across the towns of smaller states with early primaries. \"We deserve it because of our size,\" California Assembly Speaker Fabian Nunez told a news conference. \"California, as you know, has 16 million voters who ought to get a first bite at that apple, not simply being the recipient of other states' legislative and electoral leftovers.\" The earliest primary and caucus contests are to be held in Iowa, Nevada, New Hampshire and South Carolina prior to February 5. (With reporting by Jenny O'Mara) Senators to shine light on credit card practices By John Poirier WASHINGTON (Reuters) - Legislation may be needed to stop overzealous credit card companies from piling on interest rates and fees that have plunged millions of American families deeply into debt, a senior Democratic senator said on Tuesday. On the eve of a hearing on the industry's practices, Carl Levin of Michigan, who chairs the Senate permanent subcommittee on investigations, said too many consumers are suffering from what he called predatory practices and murky fees. \"Millions of families... are kept in debt and are in over their heads not just because of their own purchases... but because of the abusive practices and the excesses of the credit card companies,\" Levin told reporters. Testifying before Levin's panel on Wednesday will be executives from Bank of America Card Services, JPMorgan Chase's Chase Bank and Citigroup's Citi Card. The three companies did not immediately respond to messages asking to comment on the hearing. Last week, Citigroup, the third-largest U.S. credit card issuer, said it will no longer automatically raise interest rates for cardholders who fail to make payments on other bills. Known as \"universal default,\" the practice has long been criticized by consumer advocates who argue that it victimizes poorer borrowers. Norm Coleman of Minnesota, the top Republican on the subcommittee, said Citigroup's recent move was encouraging. \"But we need to do more and take a closer look at certain practices and create a more consumer-friendly lending environment,\" Coleman said. INTEREST CALCULATIONS Levin said the hearing will illustrate how credit card companies calculate interest rates to extract the largest possible payments from consumers. For example, if a credit card holder has a monthly bill of $5,020 and repays $5,000 on time, the customer could owe $55.21 in the next billing cycle, based on an interest rate of 17.99 percent, Levin said. That new balance includes 43 cents of interest from the $20 balance. But it also includes another $34.78 in interest that was based on the original amount of $5,020 even though $5,000 was paid on time, Levin said. Another industry practice the senators called \"trailing interest\" would add an extra interest charge of 38 cents even if a customer pays off the $55.21 balance on time, Coleman said. \"I also believe (these practices) are predatory and confusing,\" Coleman said. Consumer advocates estimate based on Federal Reserve figures that outstanding credit card debt amounted to between $750 billion and $800 billion in November 2006. The industry has more than 640 million credit cards in circulation. Levin said he hoped credit card issuers would voluntarily halt the practice of charging interest on the money paid on time. But legislation may be needed to force the industry to change its ways and to pressure banking regulators to tighten consumer laws about disclosure of fees. \"I'm not naive. I don't think they are going to do all that is needed,\" Levin said, referring to the credit card industry. \"Eleanor Roosevelt surely must be turning over in her grave today\" U.S. won't seek seat on U.N. rights council By Sue Pleming WASHINGTON (Reuters) - The United States said on Tuesday it would not seek a seat on the new U.N. Human Rights Council, saying it was not a \"credible body,\" a decision that immediately drew harsh criticism from a veteran Congressman. State Department spokesman Sean McCormack said the United States would retain its observer status on the 47-member council, created last year over objections from the United States that rules were not strong enough to prevent rights violators from getting a seat. \"We believe that the Human Rights Council has thus far not proved itself to be a credible body in the mission that it has been charged with,\" McCormack told reporters. \"Our decision is that we do not plan to run (for a seat).\" The announcement came on the day that the State Department issued its 2006 report on human rights worldwide. McCormack said Washington supported the promotion of human rights globally and would \"remain a forceful advocate in the promotion of human rights.\" He complained there had been a \"nearly singular focus\" by the council on issues related to Israel to the exclusion of other areas, such as rights abuses in Myanmar or North Korea. \"We hope over time this body will expand its focus and become a more credible institution,\" said McCormack. Last November, outgoing U.N. Secretary-General Kofi Annan also criticized the council for focusing too much on Israel and neglecting other parts of the world such as Sudan's war-torn Darfur region, which had what he termed \"graver\" crises. But he as well as human rights groups have lobbied to have the United States join the council. On Tuesday, Congressman Tom Lantos, a California Democrat, called the decision \"an act of unparalleled defeatism\" by letting \"a cabal of military juntas, single-party states and tin-pot dictators retain their death grip on the world's human rights machinery.\" \"This is the worst possible time for a U.S. retreat from its rightful role as the world's champion of human rights,\" Lantos said in a statement. \"At a time when we are attempting to marshal the civilized world to stand up to extremism and terror, a retreat from Geneva sends exactly the wrong signal to those who are trying to defeat us,\" Lantos said. \"It is particularly appalling that the administration would select the day it is releasing the Country Reports on Human Rights Practices to announce this decision.\" \"Eleanor Roosevelt surely must be turning over in her grave today,\" he said. Eleanor Roosevelt, wife of former U.S. President Franklin D. Roosevelt, was the body's first chair and the main author of the 1948 U.N. Universal Declaration of Human Rights. Bombers massacre Iraq Shiite pilgrims By BRIAN MURPHY, Associated Press Writer Two suicide bombers turned a procession of Shiite pilgrims into a blood-drenched stampede Tuesday, killing scores with a first blast and then claiming more lives among fleeing crowds. At least 106 were killed amid a wave of deadly strikes against Shiites heading for a solemn religious ritual. Hours after the attack in Hillah \u2014 in the Shiite heartland south of Baghdad \u2014 boys used long-handled squeegees to push pools of blood off the road. The victims' shoes and sandals were gathered in haphazard piles. \"In an instant, bodies were set ablaze, people were running and the ground was mixed with teapots, kettles and other supplies for pilgrims,\" said Mahdi Kadim, one of the survivors. But there was also a louder message in the carnage that left at least 130 pilgrims dead throughout Iraq: U.S.-backed authorities remain virtually powerless to stop suspected Sunni insurgents trying to push Iraq toward a sectarian civil war. U.S. forces, too, continue to tally losses at the hands of extremists despite signs of more successful raids against bases and weapon stockpiles. The military said nine soldiers were killed Monday in two separate roadside bombings north of Baghdad, making it the deadliest day for U.S. troops in Iraq in nearly a month. \"A brutal massacre against people who are only practicing their faith\" was how Shiite lawmaker Sami al-Askari described the Hillah attacks, which wounded at least 151 people. Dr. Mohammed al-Temimi, at Hillah's main hospital, said some of the injuries were critical and the death toll of 106 could rise. The Hillah strike came after gunmen and bombers hit group after group of Shiite pilgrims elsewhere \u2014 some in buses and others making the traditional trek on foot to the shrine city of Karbala, about 50 miles south of Baghdad. At least 24 were killed in those attacks, including four relatives of a prominent Shiite lawmaker, Mohammed Mahdi al-Bayati. This weekend, huge crowds of Shiite worshippers will gather for rites marking the end of a 40-day mourning period for the death of Imam Hussein, the grandson of the Prophet Muhammad. Hussein died near Karbala in a 7th-century battle. In Hillah, southeast of Karbala, a long line of pilgrims marched toward a bridge checkpoint on the edge of the city. Food and cool drinks were distributed at nearby tents. The first suicide bomber killed dozens and touched off a mad dash away from the bridge, said witness Salim Mohammed Ali Abbas. As the fleeing crowd grew thicker, another suicide bomber among them blew himself apart. An Associated Press cameraman at the scene said ambulances and Iraqi police swarmed the area. A police commander, Brig. Gen. Othman al-Ghanemi, said the attackers joined the procession outside Hillah and waited until it reached the checkpoint bottleneck to try to maximize the damage. \"The government bears some responsibility for this,\" complained a Shiite parliament member, Bahaa al-Araji. \"It has not provided enough security to protect the pilgrims.\" In the past two years, the powerful Mahdi Army militia watched over pilgrimages to Karbala. But the group agreed to put down its arms under intense pressure from the government, which wanted to avoid any confrontations with U.S.-led forces during a Baghdad security crackdown launched last month. \"This year, things are sadly different,\" said al-Araji. But the Mahdi Army has been unable to protect other religious pilgrimages. In February 2005, a suicide car bomber hit mostly Shiite police recruits in Hillah, killing 125 people. U.S. forces, meanwhile, suffered their deadliest day since Feb. 7, when 11 troops were killed \u2014 seven when their helicopter was shot down north of Fallujah and four others in combat operations. The military said six soldiers of the 82nd Airborne Division were killed Monday in a bombing in Salahuddin province. It was the single largest loss of life in the past three years of combat for the Fort Bragg, N.C.-based unit, said division spokesman Maj. Tom Earnhardt. Three other soldiers died the same day in a roadside bomb attack in Diyala province northeast of Baghdad. Both provinces are Sunni-dominated and have seen a rise in violence since additional U.S. forces moved into Baghdad as part of security sweeps. The Pentagon has pledged 17,500 additional combat troops for the capital. The latest phase brought U.S. and Iraqi troops into the Mahdi Army stronghold of Sadr City. Its militias have so far stuck to their agreement with the government to keep their weapons stowed away. U.S. forces also kept to their bargain of low-key patrols. Some 600 American soldiers searched the neighborhood, knocking on doors and searching homes, according to an Associated Press reporter traveling with them. The U.S. forces are seeking a \"reconciliatory approach\" to avoid sparking a backlash on the streets, said Col. Richard Kim. One small gesture seemed to show appreciation: a child offered soldiers ice cream bars. In a speech to the American Legion in Washington, President Bush said it was \"too early to judge the success\" of the Baghdad crackdown. \"But even at this early hour there are some encouraging signs,\" Bush said. Still, he added: \"There are no shortcuts in Iraq.\" Near the northern city of Mosul, gunmen stormed the Badoosh prison and freed about 140 inmates, but most were recaptured soon afterward, said Brig. Gen. Mohammed al-Wakaa. All but 47 fugitives were seized within hours. Local security officials said the attackers were insurgents, but the prison has a poor security record. Saddam Hussein's nephew, Ayman Sabaawi, escaped from the same prison in December. He was serving a life sentence for financing insurgents and possessing bombs. He remains at large. In Baghdad, parliament failed to reconvene as scheduled after only about two dozen of the 275 lawmakers showed up. Political leaders claim that talks between various parties kept the deputies away. But it was seen as another sign of political stagnation when key issues are facing the parliament, including a proposed law to divide Iraq's oil revenue among its three main groups: Sunnis, Shiites and the northern Kurds. Associated Press Writer Ryan Lenz with U.S. troops in Baghdad contributed to this report. Hot Off The Presses: Libby found guilty in CIA leak trial Libby found guilty in CIA leak trial By MICHAEL J. SNIFFEN and MATT APUZZO, Associated Press Writers Once the closest adviser to Vice President Dick Cheney, I. Lewis \"Scooter\" Libby was convicted Tuesday of lying and obstructing a leak investigation that shook the top levels of the Bush administration. He is the highest-ranking White House official convicted in a government scandal since National Security Adviser John Poindexter in the Iran-Contra affair two decades ago. In the end, jurors said they did not believe Libby's main defense: that he hadn't lied but merely had a bad memory. The CIA leak case focused new attention on the Bush administration's much-criticized handling of intelligence reports about weapons of mass destruction in the run-up to the Iraq war. The case cost Cheney his most trusted adviser, and the trial revealed Cheney's personal obsession with criticism of the war's justification. Trial testimony made clear that President Bush secretly declassified a portion of the prewar intelligence estimate that Cheney quietly sent Libby to leak to Judith Miller of The New York Times in 2003 to rebut criticism by ex-ambassador Joseph Wilson. Bush, Cheney and Libby were the only three people in the government aware of the effort. More top reporters were ordered into court \u2014 including Miller after 85 days of resistance in jail \u2014 to testify about their confidential sources among the nation's highest-ranking officials than in any other trial in recent memory. Special Prosecutor Patrick Fitzgerald said the verdict closed the nearly four-year investigation into how the name of Wilson's wife, Valerie Plame, and her classified job at the CIA were leaked to reporters in 2003 \u2014 just days after Wilson publicly accused the administration of doctoring prewar intelligence. No one will be charged with the leak itself, which the trial confirmed came first from then-Deputy Secretary of State Richard Armitage. \"The results are actually sad,\" Fitzgerald told reporters after the verdict. \"It's sad that we had a situation where a high-level official person who worked in the office of the vice president obstructed justice and lied under oath. We wish that it had not happened, but it did.\" One juror, former Washington Post reporter Denis Collins, said the jury did not believe Libby's main defense: that he never lied but just had a faulty memory. Juror Jeff Comer agreed. Collins said the jurors spent a week charting the testimony and evidence on 34 poster-size pages. \"There were good managerial type people on this jury who took everything apart and put it in the right place,\" Collins said. \"After that, it wasn't a matter of opinion. It was just there.\" Libby, not only Cheney's chief of staff but also an assistant to Bush, was expressionless as the verdict was announced on the 10th day of deliberations. In the front row, his wife, Harriet Grant, choked out a sob and her head sank. Libby could face up to 25 years in prison when sentenced June 5, but federal sentencing guidelines will probably prescribe far less, perhaps one to three years. Defense attorneys said they would ask for a retrial and if that fails, appeal the conviction. \"We have every confidence Mr. Libby ultimately will be vindicated,\" defense attorney Theodore Wells told reporters. He said that Libby was \"totally innocent and that he did not do anything wrong.\" Libby did not speak to reporters. The president watched news of the verdict on television at the White House. Deputy press secretary Dana Perino said Bush respected the jury's verdict but \"was saddened for Scooter Libby and his family.\" In a written statement, Cheney called the verdict disappointing and said he was saddened for Libby and his family, too. \"As I have said before, Scooter has served our nation tirelessly and with great distinction through many years of public service.\" Wilson, whose wife left the CIA after she was exposed, said, \"Convicting him of perjury was like convicting Al Capone of tax evasion or Alger Hiss of perjury. It doesn't mean they were not guilty of other crimes.\" Libby was convicted of one count of obstruction of justice, two counts of perjury to the grand jury and one count of lying to the FBI about how he learned Plame's identity and whom he told. Libby learned about Plame from Cheney in June 2003 about a month after Wilson's allegations were first published, without his name, by New York Times columnist Nicholas Kristof. Prosecutors said Libby relayed the Plame information to other government officials and told reporters, Miller of the Times and Matt Cooper of Time magazine, that she worked at the CIA. On July 6, 2003, Wilson publicly wrote that he had gone to Niger in 2002 and debunked a report that Iraq was seeking uranium there for nuclear weapons and that Cheney, who had asked about the report, should have known his findings long before Bush cited the report in 2003 as a justification for the war. On July 14, columnist Robert Novak reported that Wilson's wife worked at the CIA and she, not Cheney, had suggested he go on the trip. When an investigation of the leak began, prosecutors said, Libby feared prosecution for disclosing classified information so he lied to investigators to make his discussions appear innocent. Libby swore that he was so busy he forgot Cheney had told him about Plame, and was surprised to learn it a month later from NBC reporter Tim Russert. He swore he told reporters only that he learned it from other reporters and could not confirm it. Russert, however, testified he and Libby never even discussed Plame. Libby blamed any misstatements in his account on flaws in his memory. He was acquitted of one count of lying to the FBI about his conversation with Cooper. Collins said jurors agreed that on nine occasions during a short period of 2003, Libby was either told about Plame or told others about her. \"If I'm told something once, I'm likely to forget it,\" Collins recalled one juror saying. \"If I'm told it many times, I'm less likely to forget it. If I myself tell it to someone else, I'm even less likely to forget it.\" Libby is free pending sentencing. His lawyers will ask that he remain so through any appeal. Associated Press writer Natasha T. Metzler contributed to this report. Fox News Buries Walter Reed Coverage Huffington Plst Walter Reed? That's News To Them! Rachel Sklar TVNewser, always on top of this sort of thing, points out an interesting and telling statistic reagarding cable coverage of the widening and deepening Walter Reed scandal: CNN & MSNBC are covering the story more than TWICE as much as Fox News: Between Feb. 18 and March 5, FNC has mentioned \"Walter Reed\" 93 times -- about six mentions per day. CNN has covered the story 224 times, and MSNBC has covered it 257 times. These numbers were obtained by a TVNewser source searching cable transcripts using TVEyes. Also on TVNewser: Walter Reed also loses out next to Anna Nicole Smith, who enjoys a robust popularity on both FNC & MSNBC as compared to the beleaguered veteran's hospital. This is made apparent courtesy of ThinkProgress which has a highlight reel comparing the two has compiled a highlight reel of Anna Nicole vs. Walter Reed coverage. They ran the numbers on Friday, March 2nd, and here's what they got: FOX NEWS: Anna Nicole - 121 Walter Reed - 10 MSNBC: Anna Nicole - 96 Walter Reed - 84 CNN: Anna Nicole - 40 Walter Reed - 53 Per ThinkProgress: \"The most lop-sided coverage by far was aired by Fox News, which featured only 10 references to Walter Reed compared to 121 of Anna Nicole \u2014 roughly 12 times the coverage...\" Bush Picks Top Manufacturing Lobbyist to Guard Product Safety; Many Fear Nominee Would Undercut Agency's Mission and Endanger the Public Bush Picks Top Manufacturing Lobbyist to Guard Product Safety Many Fear Nominee Would Undercut Agency's Mission and Endanger the Public By BRIAN HARTMAN WASHINGTON, March 3, 2007 \u2014 - President Bush has picked the manufacturing industry's top lobbyist to lead the agency that guards consumers from defective baby cribs and exploding laptop batteries. The Consumer Product Safety Commission, which regulates the safety standards of more than 15,000 consumer products, has been without a leader since last July. If the White House has its way, Michael Baroody, executive vice president of the National Association of Manufacturers, will fill that void. But the nomination felt like a slap in the face to Ann Brown, who held the same job under President Clinton. \"I just think it shows in what low esteem the Bush administration holds health and safety in this country,\" Brown said. \"The National Association of Manufacturers has been the most active \u2026 in trying to undermine any of the powers of CPSC.\" Brown said that during her tenure, NAM \"was always trying to undercut the powers of CPSC.\" \"We knew when I was at CPSC that anything that NAM offered us was nothing that would enhance our performance, which would enhance our structure. It was always something that would undercut CPSC.\" Rachel Weintraub, assistant general counsel at the Consumer Federation of America, said Baroody appears above board ethically, but his nomination raises serious concerns because he represents \"positions that are in contradiction with what's in the consumers' interest. \"The issue is whether someone who has represented manufacturers can uphold the mission of the agency without a bias, without a predisposition to always think in terms of what's good for manufacturers,\" Weintraub said. \"There's a conflict between manufacturers and consumers. It's really hard to imagine that he would be able to come to this position without a bias.\" In defending the nomination, which is subject to Senate confirmation, White House spokesman Tony Fratto said it's unfair to presume Baroody would be biased just because of his current role. \"Where is the presumption that Mike Baroody does not have sympathy for the Consumer Product Safety Commission,\" Fratto said. \"I mean, having an understanding of business and the work of manufacturers should not be an indictment of a candidate for this position. I mean that's just \u2026 absurd.\" The nomination comes at a tough time for the agency. The acting head of the CPSC, Nancy Nord, faced a grilling about her agency's shrinking staff at a House subcommittee hearing. The agency will cut 19 positions this year, in what Consumers Union says is the third consecutive year of cuts at the agency. The dwindling staff size prompted Consumer Reports to report on its Web site that the agency no longer includes childhood drowning as a top strategic priority, though it is the No.2 accidental killer of children in"} +{"id":"RedPajamaCommonCrawl.0030","text":"Save A Child from Sexual Abuse by 3:15 PM So far in the 21st century nearly a third of a billion children have been sexually abused, most of them multiple times, some thousands of times. 6 out of 7 are girls. Anything you can do to get this message to as many people as possible will help save abused children all over the world, and maybe even some of the abusers. Please read \"Save A Child from Sexual Abuse by 3:15 PM\" under \"First Time Visitor?\" May God bless you and anoint this ministry. Everyday thousands of children are being sexually abused. You can stop the abuse of at least one child by simply praying. You can possibly stop the abuse of thousands of children by forwarding the link in First Time Visitor? by email, Twitter or Facebook to every Christian you know. Save a child or lots of children!!!! Do Something, please! 3:15 PM prayer in brief: Pray for God to stop 1 child from being molested today. Pray for God to stop 1 child molestation happening now. Pray for God to rescue 1 child from sexual slavery. Pray for God to save 1 girl from genital circumcision. Pray for God to stop 1 girl from becoming a child-bride. If you have the faith pray for 100 children rather than one. Give Thanks. There is more to this prayer here Please note: All my writings and comments appear in bold italics in this colour 12 Child Sex Abuse Stories, Most Are Very Disturbing, on Today's Global PnP List Seven men found guilty of child sex abuse in Rotherham One young victim raped by 100 men By skynews Seven men have been found guilty of child sex abuse in the largest trial so far following the Rotherham abuse inquiry. One underage victim was passed around and raped by 100 men by the time she was 16 years old, Sheffield Crown Court heard. Another young victim became pregnant and had to have an abortion. The case is the first major prosecution arising out of Operation Stovewood \u2013 the National Crime Agency's massive inquiry into historical child sexual exploitation in the South Yorkshire town. The defendants were found guilty following a trial lasting eight weeks. The charges against them included rape, indecent assault and false imprisonment. Those convicted of rape were Mohammed Imran Akhtar, 37, Tanweer Ali 37, Salah Ahmed El-Hakam, Nabeel Kurshid, 34, and Iqlak Yousaf, 34. Another man found guilty of rape cannot be named for legal reasons. Another defendant who was charged with offences of indecent assault and false imprisonment was acquitted. So far, more than 1,500 victims of the Rotherham abuse scandal have been identified. In a town of about 110,000 people. That's astonishing! The girls, who are now women in their 30s, were lured by the excitement of friendship with older Asian youths but then sexually assaulted and passed between men, the jury in the trial was told. One of the victims told police she felt as though her childhood had been snatched away. Another said she had been plied with drugs and alcohol, taken to a location miles away from home and threatened with being abandoned alone if she did not have sex. The court heard that after becoming pregnant the girl had an abortion because her parents were unsupportive. Prosecuting barrister Michelle Colborne said: She suffered a great deal of psychological trauma as a result. As a result of the abuse or the abortion? I suspect both would be extremely traumatic, each compounding the effect of the other. Ms Colborne also said that the five complainants in the trial were easy to target because they needed to be loved. She said: When they were in their teens, they were targeted, sexualised and, in some instances, subjected to acts of a degrading and violent nature at the hands of these men who sit in the dock. None of them had the maturity to understand that they were being groomed and exploited. Ms Colborne added that the girls believed sex of some kind or other was a necessary price for friendship. This investigation was set up in the wake of the 2014 Jay Report which revealed the shocking scale of exploitation in Rotherham between 1997 and 2013 and failure of police and social services to intervene. Researcher Angie Heal previously described it as the biggest child protection scandal in UK history. Evidence of the abuse was first noted in the early 1990s and the first group conviction took place in 2010, when five British-Pakistani men were convicted of sexual offences against girls aged 12-16. And, I would bet money that all seven found guilty today are also Pakistani, and Muslim. It is from the Quran that they get the moral authority to abuse young British girls. Sentencing of the seven men who were convicted on Monday will take place on 16 November. Britain's youngest female paedophile, a nursery worker, admits abusing toddlers as young as two A judge remanded Sophie Elms, 18, from Swindon, into custody ahead of her sentencing over 'fears for her own safety' By Sarah Lumley A nursery worker has become Britain's youngest female convicted paedophile after admitting sexually assaulting and taking indecent images of toddlers. Sophie Elms, 18, pleaded guilty to 16 charges against two young children, aged three and two. The charges - which include penetration, sexual assault and taking and distributing indecent photographs of children - make her the country's youngest named female paedophile. The teen, of Swindon, Wiltshire, was 17 when she committed the offences. She worked at a local nursery but police have previously confirmed that none of the alleged offences are said to have happened at the childcare facility. Elms pleaded guilty to penetrating the two-year-old orally, and the three-year-old with her fingers, between December 1, 2016, and March 11, 2018. Sophie Elms, right, arrives at court (Image: Tom Wren SWNS.com) During the same dates, Elms also pleaded guilty to two counts of sexual assault \u2013 one against each of the youngsters \u2013 in which she intentionally indecently touched them. Also between December 1, 2016 and March 11, 2018, it was heard that Elms committed four offences of taking indecent photographs of children. These included two category A photographs, four category B photographs, and one category C photograph. And between January 1, 2016, and March 11, 2018, Elms committed six offences of distributing indecent photographs of children. These included three category A photographs, four category B photographs, and three category C photographs. Elms also pleaded guilty to two counts of possessing extreme pornographic images showing a person performing active intercourse or oral sex with an animal, between January 1, 2016, and March 11, 2018. Defending Elms, Mr Chris Smyth described the case as \"highly unusual\", saying: \"Miss Elms was only 17 herself at the time when the offences occurred.\" Miss Elms was remanded in custody until her sentencing hearing. Judge Robert Pawson said: \"You have pleaded guilty to what I suspect you fully understand are extremely serious charges. \"I remand you into custody on the basis of fears for your own safety. Your sentencing will take place on January 4. Until that time, my strongest advice to you is that you avoid using social media for some time to come. \"You are very unlikely to make things better for your victims and their families by posting on social media, and you are very unlikely to make things better for yourself.\" Why would someone in her position even have the right to use social media? That's bizarre! 'Why I had to see the man who abused me when I was just three, face justice' One Survivor's Story A woman sexually abused as a young child by a family friend has waived her legal right to anonymity in a bid to encourage other victims to come forward. Jackie Evans, 30, was just three-years-old when she was first assaulted in her own home by sex offender Jason Hughes, who was around 18 at the time. The 44-year-old from Caeathro, Gwynedd, who regularly visited her parents' house to fix their computer, went on to abuse Jackie again before he was finally convicted of his offences decades later. On June 5, Hughes was sentenced to three and a half years in prison after he was convicted of indecent assault and indecency with a child. He was ordered to register with the police as a sex offender for life. Now, following his sentence, the mother of two has told her story in a bid to encourage other victims of sexual abuse to speak out. Daughters accuse Hughes of Incest It comes just three months after Hughes' two daughters, Elliw, 19 and Awel, 17 waived their legal right to anonymity to claim they too were victims of their sex offender dad after reading of his conviction for abusing Jackie. Jackie and Elliw - whose accounts concern periods 10 years apart - both independently recalled how at three years old he had terrified them into staying quiet by telling them a fairy lived on their shoulder. Were they to tell anyone of what had happened, they would be in serious trouble. State fails victims horrifically Despite Hughes being arrested and charged with sex assaults against both daughters in 2001, the CPS has never gone ahead with their case, saying that the evidential test set out in the code for prosecutors had not been met. No, No, No! That is just not acceptable. The courage it took for those girls to accuse their father of incest, and the state is just not that interested. Someone deserves to be fired!!! Now, speaking publicly of her ordeal, Jackie said: \"There's only parts I can remember, but I remember he used to visit regularly. Up until I was about 7, he would visit probably about once a week. Jackie Evans, aged three (Image: Jackie Evans) \"He was a family friend - he used to come and fix our computer for my parents. My mum and dad quite liked him, so he started coming round more and more. \"I was about three-years-old at the time and we had this static caravan outside our house which was my playhouse if you like. \"He was coming round regularly so he would take me there to play. There were no queries about it because we knew him. \"And that's where the first incident happened.\" Despite being able to vividly recall what happened on that day, Jackie felt unable to talk about the incident. 27 years later and it is still hard to talk about. That is not uncommon among survivors. \"He told me there was a fairy on my shoulder and I had to keep what had happened a secret,\" she added. He said I would get into a lot of trouble if anybody found out. He used to bring sweets and toys to bribe me. \"It didn't happen every time he came round, it only happened on a couple of occasions. I thought he was my friend. I was innocent and I didn't understand what had happened.\" The second assault, which took place in her parents' living room, happened about four years later, when Jackie was seven-years-old. \"He was doing work on the computer - I was in the living room and my mum and dad were in the kitchen,\" she recalled. \"I remember clearly he was on a spinning computer chair. He swung round to me and exposed himself and asked me to do things with him. \"The first incident was a lot worse, but I feel more comfortable talking about this one. After that, he still used to come round all the time. As soon as I heard his car turning up, I would hide away in my room. I remember he would still try and talk to me as if nothing had happened, even when I was older.\" Growing up, Jackie said she was \"scared\" of boys and would get regular flashbacks of what had happened. Fearing she would not be believed if she spoke out, she bottled her emotions throughout her childhood and teenage years. It was not until after she had children of her own that it all got too much and two years ago, she finally found the courage to go to the police. \"As I got older, it got harder because I reached a point where I realised it was wrong,\" she added. \"I was a teenager when I broke down about it for the first time. I remember pulling a friend of mine into a toilet and telling her all about it. She was the first person I ever opened up to. \"I tried to put it to the back of my mind after that. But it started to come back to me a lot about two years ago. It was causing a massive problem for me. \"It was going from thinking about it about once in a while to thinking about it once a day. It was completely taking over my life, I was breaking down in tears all the time.\" 'I used to question whether I had done anything wrong, I used to ask, 'why me'?' Despite suffering vivid flashbacks regularly, Jackie who has been diagnosed with PTSD and depression as a result of the abuse is now receiving the help she needs at a sexual assault referral centre. She added: \"It was very hard to speak about it, I had tried to put a mental block on it for a long time, but I'm so glad I opened up. \"The biggest and scariest thing was that I thought nobody would believe me and I think that's why it took me so long to talk about it. It's a hard subject to discuss anyway, but bringing it up after so long was even harder. \"But it's never too late to talk about it, despite how long ago it happened. \"Going to court is a horrible experience, it was awful. But you have got to go through it to get justice. \"I hope by speaking out that more people come forward so he gets an even longer sentence. Three-and-a-half years is nowhere near long enough. \"I just want to move forward with my life now. I'm a completely different person now to what I was this time last year.\" Child sex abuser fails in legal challenge against convictions He was jailed for 22 years last April A member of Salford's Charedi community, who was jailed for the rape and abuse of children, has failed in a legal challenge to his convictions. David Glausiusz, 48, used significant violence against his victims, who were subjected to degrading attacks. Glausiusz, of Leicester Road, Broughton Park, was convicted of three rapes and six sexual assaults at Manchester Crown Court after a seven-week trial last year. Glausiusz was jailed for 16 years, with another six years to be served consecutively for other crimes against children. On Tuesday, Glausiusz launched appeals against his sex offence convictions, claiming a series of mistakes during his trial meant the jury's guilty verdicts were \"unsafe\". The trial judge had not properly warned the jury about how to consider some of the evidence, his lawyers claimed. Potentially critical evidence had also been included in the trial in order to \"bolster an inherently weak\" case against him, they said. It consisted of images of naked teenage women which were found on his laptop and which his lawyers claimed had prejudiced the jury against him. There was also \"fresh evidence\" from a new witness which suggested that one of Glausiusz's victims had admitted he was lying, it was claimed. After a 90-minute hearing at the Court of Appeal in London on Tuesday, appeal judge Mr Justice Holgate rejected Glausiusz's case. \"Overall, there is no arguable basis for contending that any of the convictions were unsafe,\" he said. \"Therefore, the renewed application for leave to appeal is refused.\" British sex abuse imam Mohammed Ghani's jail term increased I love Britain's Unduly Lenient Sentence policy. In this case it reduced the effect of political correctness on the Imam's sentence. An imam who sexually assaulted a girl over a period of seven years at her home has had his jail term increased. Mohammed Ghani, who had been a respected figure in West Yorkshire, had been jailed in August for two years, by a judge at Leeds Crown Court. But the term was increased to five years earlier after the case was referred to the Court of Appeal. Ghani, 65 and from Wakefield, abused the girl during \"professional visits\" to her home between 1997 and 2006. This resulted in lasting emotional repercussions for the victim, who was aged under 14 at the time, the court was told. Ghani's case was referred to the appeal court by Solicitor General Robert Buckland QC MP, under the Unduly Lenient Sentence scheme. Speaking after the hearing, Mr Buckland said: \"Ghani abused his position of authority and subjected a vulnerable child to a campaign of sexual assaults. \"I hope the decision brings the victim and their family some comfort.\" Canadian man gets 7 years for making child porn, sexually abusing 7-year-old in Craigslist case 'Too horrible for words:' Case marks sentencing for last of five adults charged Adam Carter \u00b7 CBC News A Hamilton man has been sentenced to seven years for sexual interference and making child pornography, linked to a case the Crown called \"too horrible for words\" (7th story on link) where a seven-year-old girl was advertised for abuse on Craigslist. Justice Joe Fiorucci said the 38-year-old man, who cannot be named because of a publication ban put in place to protect the victim, helped make the young girl a \"prop\" in a \"perverted show.\" \"It is at this point when the unimaginable intersects with reality,\" Fiorucci said in his decision. With credit for time served, the man will serve an additional three years and four months in a penitentiary. The Crown was seeking an eight-year sentence, while the defence was seeking five-and-a-half years. Unfortunately, the child will still be a child when the pervert gets out. That is just not fair to the child. But Canadian justice is not known for being fair to victims, only to criminals. The man is the last of five adults who have been tried in a sweeping sexual abuse case that shocked Hamilton. Court has heard the young girl was offered up for abuse online by her mother's then-boyfriend back in 2016. Along with abusing the girl, the boyfriend also took thousands of illicit photos and videos of her over an 18-month period, court has heard. That man, who Fiorucci called \"deviant and antisocial,\" is currently serving 13 years in prison. Court has heard the man who was sentenced Tuesday was high and drunk when he went to the other man's house in April of 2016. He watched homemade child porn with him, looked on as the then-boyfriend sexually assaulted her, and finally abused the girl himself while his friend recorded it. The man previously pleaded guilty to sexual interference, but denied knowing his friend was recording the assault. He was found guilty of making child pornography back in August. Crown prosecutor Janet Booy called it a \"horrible, despicable case. It's probably the worst I've ever seen,\" she said. \"No sentence can ever bring back the innocence of the young victim.\" Nor can it relieve her nightmares knowing that he will be on the streets again while she is barely into her teens. The girl's aunt, who has attended court to stand witness for the family, said the girl is now getting professional help and trying to work through the trauma. \"I can only hope my niece is able to have a normal life,\" she said. \"It's crazy that grown adults could do this. Now that it's over, it's time to start healing.\" As the man was led into court wearing a striped green and black shirt and glasses, the girl's aunt became visibly redder. She deeply exhaled as the horrific details of what happened to her niece were read aloud, before holding her head in her hands. Court heard that the man who was sentenced Tuesday had a problem with drinking, and has also abused pot, cocaine and methamphetamine. Psychological testing showed the man, who has three children himself, has \"low intellectual functioning,\" the judge said. Fiorucci said that despite the man's limitations, testing showed his judgment and decision making abilities to be in the average range. The man was also sexually abused when he was a child, court heard, as well as physically and emotionally abused by his stepfather. Court also heard the man has \"expressed remorse that appears to be sincere\" and shows \"positive prospects for rehabilitation,\" but the judge said that deterrence and separation from society takes precedence over rehabilitation in a case like this. \"The well-being of our children must take precedence,\" Fiorucci said. Wouldn't that be nice! Now how about someone going after Craigslist for facilitating this girl's horror story? Aussie woman sentenced to 9 years in prison for killing rapist The rapist demanded she submit to him again and threatened her daughter. Does she deserve 9 years in prison, or a gold medal? By Felix Allen, The Sun A mom who stabbed her rapist to death, then tied a rope around his neck and dragged him behind her car for a mile has been jailed for nine years. Roxanne Eka Peters, 35, slashed Grant Cassar, 51, with a kitchen knife after he threatened to harm her daughter unless she submitted to more sex, a court heard. She knifed the rapist in the heart at her home in Brisbane, Australia, then towed his corpse past a police station to a ditch, where she hid it in December 2015. A judge said she was \"enraged\" at Cassar's previous rape and sick threats, but that did not excuse her lack of respect for his \"human dignity.\" Seriously, judge! He raped her and threatened her daughter if she didn't submit to more rapes! What kind of dignity do you see in that man? Peters was sentenced to nine years for manslaughter plus another 18 months after she pleaded guilty to interfering with a corpse. With time already served, she will be eligible for parole in June 2020. She's been locked up since 2015? OMG! Was that to protect any other men who might have raped her? What the Hell? Justice David Boddice said the humiliating rape followed by Cassar's threats to harm her child had been a \"significant provocation.\" He told the Brisbane supreme court: \"I accept the stabbing occurred in circumstances when you were enraged by what the deceased had done to you and was threatening to do to you again.\" And what he was threatening to do to her daughter! But she should have immediately sought help after the stabbing, he said. The judge told her: \"Instead you set about the process of callously disposing of the deceased body.\" \"No doubt your rage continued to affect your attitude to him.\" Boddice said Peters' upbringing around drug users, where she was subjected to sexual abuse, had exacerbated the rage she felt when Cassar came to her home on the day he died. However, Cassar's killing had been devastating for his family, the judge said, adding: \"They will never recover from his death.\" He was a rapist! Will you recover from that? Because Peters won't. Cassar's body was found with 61 injuries including stab wounds to the chest and penis. It seems pretty obvious that Peters completely lost it. Isn't that grounds for a temporary insanity plea? I can't help but wonder that if the police and courts had done their job of protecting innocent people from predators like Cassar, this horror story would never have happened. That was, perhaps, the statement she was making when she dragged Cassar's body past the police station. I think you need a better lawyer, Roxanne. And a better judge. Neither you nor your daughter have been well-served by either, in my humble, if not angry, opinion. School principal in Pakistan handed 105 years in prison for child abuse, rape A sessions court in Peshawar on Tuesday handed a total of 105 years in prison to a private school's principal on charges of child abuse, pornography, rape, blackmail and maintaining illicit relations. The convict, Attaullah Marwat, was also fined Rs1.4 million (about 17,000 Euros) in addition to the jail terms. The sentences were handed down by Sessions Judge Younis Khan. The accused, who is the private school's owner, was arrested after the Hayatabad police station registered a case against him on July 14, 2017, on the complaint of a boy student, who had accused him of sexually exploiting schoolchildren, including girls, and filming them with secret cameras installed on campus. Marwat was convicted and sentenced to rigorous life imprisonment under Sections 354-A (stripping a woman of her clothes), 365-B (kidnapping or inducing a woman to compel her into marriage) and 377 (unnatural offence\/sodomy) of the Pakistan Penal Code (PPC). He was also awarded two years and 20 years rigorous imprisonment under Sections 354 (assault or criminal force to woman with intent to outrage her modesty) and 376 (punishment for rape), respectively, of the PPC. As many as 25 direct and indirect victims of Marwat had their statements recorded before police against the convict; however, it is believed that a majority of his victims had not come forward. One of the charges against the convict was that he had forced, persuaded, coerced and enticed female students under the age of 18 to engage in sexual activities and exposed their bodies, and was involved in explicit sexual conduct and abuse of minor schoolgirls. Marwat was also charged with forcing, coercing and persuading female students of his school to engage in sexual activities and capturing those acts on his mobile phones and secret cameras installed in different parts of the school and storing them in USBs. The convict had allegedly \"on multiple occasions and habitually\" enticed and compelled multiple women of different ages to have illicit relations with him inside the school. He was also charged with sexually assaulting multiple women after coercing them with death threats. Following his arrest last year, the accused had recorded his confessional statement before a judicial magistrate on July 19, 2017, wherein he had admitted only that he used to bring women from outside to the school for the purpose of adultery. He had said it was his \"hobby\" to make videos of his sexual activities. He had also admitted that 26 such videos, which he had recorded, were stored in his personal computer. The issue had surfaced after a student of the said school (name withheld) had told the police that the accused was involved in sexual exploitation of students and teachers. He had alleged that Marwat had sexually exploited students, teachers and some women from outside the school but nobody had the courage to disclose or report the matter. The complainant had alleged that the principal had also showed him several objectionable videos, which he had recorded secretly through cameras, and also invited him to get involved in such acts. In the first information report of the case, the police had said that when they raided the school, the accused tried to conceal his two cell phones, which allegedly had several objectionable videos involving schoolboys. It added that the accused used three rooms of his school for the illegal activities. The police had recovered memory cards and USBs and saw several videos showing the principal sexually exploiting students, including girls, in different parts of his school. UK man jailed for child sex offences Norfolk Constabulary A 36-year-old man has today (Tuesday 30 October 2018) been jailed after being found guilty of child sex offences. Jonathan Franks, of Bridewell Alley in Norwich, was found guilty at Norwich Crown Court at an earlier hearing, after a jury convicted him of causing a girl under 13 to engage in sexual activity and possession of extreme indecent images. The sexual activity charge relates to abuse, which took place in April 2017 against one female victim. Detective Sergeant Mark Joyce of the Child Abuse Investigation Unit (CAIU), said: \"Hearing a victim's account of the abuse they were subjected to is always distressing and this sentence highlights that we are committed to carrying out a full and thorough investigation to ensure those responsible are brought to justice. \"We have dedicated officers who are specially trained to undertake difficult and emotive investigations on a daily basis. We would urge anyone who has been abused or sexually assaulted to come forward, safe in the knowledge that Norfolk Constabulary, together with our partners within child protection, will provide help and support, and do all we can to identify, charge and bring those responsible before the courts.\" Franks was sentenced to a total of nine years imprisonment, to serve a minimum of six before being considered for parole, with an extended licence period of five years. He was also placed on the Sex Offender's Register indefinitely and handed a Sexual Harm Prevention Order (SHPO). Ex-Celtic Boys' Club coach Jim Torbett tells jury he is asexual at child sex abuse trial When asked what he meant by 'asexual' Torbett replied 'I don't participate in it'. By Ashlie McAnally The founder of Celtic Boys' club Jim Torbett denied having an 'ulterior motive' by taking players for group activities. He began giving evidence at his trial at the High Court in Glasgow today where he denies abusing three boys between August 1986 and August 1994. The 71-year-old told the court he founded the club in 1966 when he was around 18-years-old. Torbett said they used Celtic's name and played in Celtic strips, but are not connected to the football club. He told the court that he took football kits home to wash them and he would have three or four volunteers from the team at his flat to help sort them out again. Defence QC Tony Graham asked: \"The three or four boys involving themselves in kit preparation, would you do anything together after the kit work had been done?\" Torbett said that they would maybe go ten pin bowling beforehand. Asked why he would do that he said he was \"a great believer in community\" and said it was \"good fun\". Graham said the court heard from a psychologist who talked about grooming. He asked Torbett: \"Was there any ulterior motive on your part to do these things as a group?\" Torbett replied: \"Absolutely not.\" The jury heard Torbett does and has always lived alone and described himself asexual. Graham asked: \"What do you mean by that?\" He replied: \"I don't participate in it.\" He said that in the 80s he \"performed in some sex\" with women. Torbett denies the charges and the trial before Judge Lord Beckett continues. UK woman charged with sexual assault of a young girl Two men from Norfolk have also been charged and will appear in Cambridge Magistrates' Court A woman and two men were arrested yesterday (October 29) and charged with a number of offences including sexual abuse of a child under 13. The trio were arrested after police raided four properties in Cambridgeshire and Norfolk early yesterday morning. The woman, Lee Calder, 30, of Whittlesey near Peterborough, Cambridgeshire, has been charged with sexually assaulting a girl under 13. Calder has also been charged with two counts of causing or inciting the sexual exploitation of a child. Two men, both from Norfolk have also been charged. The first, Guy Delph, 26, of Downham Market, Norfolk, has been charged with the rape of a girl under 13, two counts of sexually assaulting a girl under 13, three counts of causing or inciting the sexual exploitation of a child under 13 and six counts of making indecent images of a child. The second, Kieran Burton, 27, of Kings Lynn, Norfolk, was charged with eight counts of making indecent images of a child, distributing indecent images of a child, possessing prohibited images of a child and causing or inciting the sexual exploitation of a child under 13. All three have been remanded to appear at Cambridge Magistrates' Court today (October 30). Carer charged over alleged 'persistent' sexual abuse of foster child in Sydney by Shanee Dobeson A MAN who allegedly sexually abused a young boy in his care persistently over a four year period has been arrested and charged. The 31-year-old was taken into custody at Burwood Police Station just before 10.30am yesterday, following an ongoing investigation. Detectives from the Child Abuse and Sex Crimes Squad began making inquiries into the man earlier this year after receiving reports a 15-year-old boy had been sexually assaulted by his carer. The man was charged with persistent sexual abuse of a child, three counts of aggravated sexual intercourse person aged 10-14, aggravated sexual intercourse person aged 14-16, and indecent assault person under 16 years of age. Police will allege in court that the man sexually assaulted the boy on numerous occasions while he was in his care in Sydney's west between 2014 and 2018. The man was refused bail to appear at Burwood Local Court today. Posted by Gary Wm Myers at 19:05 No comments: Labels: child porn, child rape, child sex abuse, child sex exploitation, CSA, destruction of innocence, global, One Survivor's Story, paedophiles, pedophiles, PnP List, police, prison, Rotherham, sentence, voiceless 8 More Stories of Child Sex Abuse on Today's USA PnP List U.S. Marshals search for upstate NY father of 4 y\/o, accused of sexually abusing the child WKBW Staff BUFFALO, N.Y. - The U.S. Marshals Service is now joining the search for a child sex abuse suspect from Grand Island. The Erie County Sheriff's Office announced Tuesday 24-year-old Jacob Beach is on the run while his live-in girlfriend, 28-year-old Courtney McDonell, is under arrest. McDonell's arrest comes after a grand jury indictment against the couple for Predatory Sexual Assault Against a Child and other charges. In January 2018, deputies say they collected evidence of abuse against the four-year-old's father, Jacob Beach, and his girlfriend, Courtney McDonell. The Sheriff's Office says Beach never appeared at his arraignment and is now considered a fugitive. The District Attorney's Office has authorized a nationwide extradition order for beach's return. Anyone with information on beach is asked to call 858-2903 and should refer to CL 18-001449. South Carolina man arrested, accused of sexual conduct with 7 y\/o girl By: WBTW CONWAY, SC - A Loris man has been arrested and is accused of sexual conduct with a child. According to an incident report from the Horry County Police Department, a worker with the South Carolina Department of Social Services reported a case of possible sexual abuse of a minor on October 3. The complainant said she was working a case in which minor children were taken from a home. The reported victim is \"a minor child that was brought to the Children's Recovery Center for a forensic interview,\" the report says. During the interview, the 7-year-old female victim said the suspect had performed sexual acts on her. These acts were \"reportedly done on more than one occasion,\" possibly \"between the first of this year and until September.\" The suspect is identified in the report as 28-year-old Lander Soles of Mt. Zion Road in the Loris area. According to J. Reuben Long Detention Center booking records, Soles was booked around 10:15 a.m. on Tuesday and remains incarcerated as of 1:15 p.m. on Tuesday. He is charged with criminal sexual conduct with a minor under 11 in the first degree. No bail has been set. Two charged in connection with sexual abuse of children in Montana MTN News A man and woman have been charged in connection with the sexual abuse of a 12-year-old girl. Joshua Rowland, 29, has been charged with one count of sexual intercourse without consent. Kimberly Cooke, 42, has been charged with three counts of sexual abuse of children. Additional charges are expected to be filed. This is the 3rd story I've done in two days involving a couple being charged with CSA. In all 3 stories, the woman charged was older than the man. Curious, eh? According to court documents, the Great Falls Police Department responded to reports of a 12-year-old girl who had engaged in sexual acts with an approximately 20-year-old man. A man and woman noticed the girl using a cell phone they did not recognize and found inappropriate Snapchat messages between the girl and Cooke. When confronted about the phone, the girl admitted to the man and woman that she and Rowland had several sexual encounters. During the investigation, police found several videos of the encounters on Rowland's phone. Cooke can be heard encouraging the victim in some of the videos. Both Cooke and Rowland's bonds are set at $150,000. NOTE: \"Sexual intercourse without consent\" is the legal term in Montana for what is commonly referred to as rape, according to Montana Code. Man arrested in Wisconsin sentenced to 15 years in prison for sexual exploitation of a minor Trent Tetzlaff, Appleton Post-Crescent GREEN BAY - A 41-year-old Cudahy man was sentenced to 15 years in federal prison Monday on a charge of sexual exploitation of a minor. It stemmed from an arrest made in April in Neenah. Additional charges of distribution of child pornography and child enticement were dismissed as a part of a plea agreement, according to a press release from the United States Department of Justice. In March, a Winnebago County investigator began an online conversation with Adam J. Westphal, who thought he was chatting with a 34-year-old mother who had a 14-year-old daughter and was interested in child pornography. Westphal sent the investigator multiple images and videos of child pornography and started conversations about the molestation of children, according to the release. He also referenced plans to sexually abuse specific minor relatives. In April, Westphal asked the investigator to meet in Neenah so that he could meet the 14-year-old for sexual intercourse and produce a video for sharing online. On April 5, Westphal arrived at the Neenah location and was taken into custody, according to the DOJ. In addition to his 15-year prison sentence, Westphal will spend 15 additional years on supervised release and have to register as a sex offender. The case was handled as part of Project Safe Childhood, a nationwide initiative to combat the growing epidemic of child sexual exploitation and abuse. Alabama man to be deported after serving sentence for sex abuse of a child By Cliff Williams Judge Tom Young Jr. sentenced Maximino Dejesus Hernandez to 10 years in prison after Hernandez was found guilty of two counts of sexual abuse of child under the age of 12. \"I took into consideration three things,\" Young told Hernandez from the bench Monday. \"I do find the remarks of the child advocate in this case troubling. I am going to tell you that you cannot be in this country illegally. When you are released (from prison) you will be deported. If you come back, you will serve the remainder of the 10-year sentence.\" Young spilt the sentence allowing Hernandez to serve two years with four years of probation. Hernandez has been in jail since his arrest 18 months ago. In six months he will be released. Hernandez was also notified ICE has a hold on him when he is released. If Hernandez is caught returning to the United States after he is deported, he will have to serve the remainder of the 10-year prison sentence. Hernandez has been deported once before for using for having a forged Social Security card. The Social Security number had been used by numerous people. Hernandez's attorney Jason Jackson asked for the court's mercy in sentencing. \"He has lived here for an extended period of time,\" Jackson told the court. \"He has a wife and child and has been employed here for several years. He used the Social Security card to gain employment.\" Earlier this month, a jury found Hernandez guilty of two of three counts of sexual abuse of a child under 12. The child victim known to Hernandez testified she went to a home to play with her best friend and explained a blind food challenge with her best friend. The game involved the children being blindfolded when it was their turn to try to figure out what candy they were tasting. She said Hernandez took part in the game. \"He put something weird in my mouth,\" she said. \"It felt like a ball with honey in it.\" She went on to describe it as \"soft and squishy.\" The state called to the stand forensic interviewer Sarah Flint who works with the Tri-County Child Advocacy Center. Flint testified how the interviews are done in such a way to let the child tell the story in his or her words with open-ended questions. Flint testified her job is not to determine the truth. \"I am not a lie detector,\" Flint said from the stand. Flint said the victim told a story like the one she told from the stand of being blindfolded while playing a game with her best friend and the abuse possibly happened while playing the game. Flint also interviewed the friend who made no abuse disclosers to her. Hernandez took the stand in his defense testifying it was just a game.\" 2nd Alex City man's sentencing continued Tony L. Dates, 53, of Alexander City was scheduled to be sentenced Monday after pleading guilty to willful abuse of a child in September, but attorney Robert Walls was not present to represent Dates. Young continued to the case to November. Dates is also being held on a $75,000 bond at the Tallapoosa County Jail after being arrested two weeks (10th story on link) ago on sexual abuse charges. The warrant for the new charge was issued Dec. 18, 2017. \"It involves a 12-year-old girl,\" Alexander City Police Department deputy chief James Easterwood said. \"It doesn't appear to be rape.\" Easterwood explained the delay between the issuance of the warrant and the arrest was because the report was made through a family member in the Montgomery area causing more agencies to be involved in the matter. 10 months!!! It sat on someone's desk much too long! Accused Pennsylvania child molester captured in Florida by Joseph A. Gambardello, Philly.com An accused child molester who fled after failing to appear in court in Bucks County last week has been captured in Florida, officials said. U.S. marshals took Shannon Westmoreland, 48, into custody Monday afternoon after stopping a van in Daytona Beach, the Bucks County District Attorney's Office said. Westmoreland, a former youth football coach from West Chester, had been sought since Oct. 22, when he failed to appear in court to answer charges of child sexual abuse and rape. \"In finding and arresting this defendant, the U.S. Marshals Service has shown again why they're the best in the business when it comes to finding people who don't want to be found,\" District Attorney Matthew D. Weintraub said in a statement. It was not immediately known if Westmoreland would fight extradition to Pennsylvania. Texas man arrested, charged with continuous child sex abuse Advocate staff report A 47-year-old Victoria man charged with continual child sex abuse remained in jail Tuesday in lieu of a $350,000 bond. Joaquin Martinez Espinoza was held in the Victoria County Jail on warrants charging him with two counts of aggravated sexual assault of a child, two counts of indecency with a child and two counts of continuous sexual abuse of a child younger than 14, according to a Victoria Police Department news release issued Tuesday. Victoria police officers with the help of the U.S. Marshals Service arrested Espinoza on Thursday at a home in the 3300 block of Houston Highway. According to Victoria County court records, Espinoza has convictions for driving while intoxicated with a blood-alcohol level greater than 0.15 percent, theft, burglary and possession of prohibited weapons. Labels: child porn, child rape, child sex abuse, child sex exploitation, couples, CSA, destruction of innocence, paedophiles, pedophiles, PnP List, police, prison, sentence, sexual assault, USA, voiceless Esteemed Doctor, Teacher, Nurses on Today's USA PnP List Pennsylvania man who admitted raping a child seeks to withdraw guilty plea By Carl Hessler Jr. MontcoCourtNews NORRISTOWN \u2014 Just days before his sentencing hearing, a Worcester man filed court documents indicating he wants to withdraw his guilty plea to charges he sexually assaulted an underage girl on multiple occasions while she was in his company at various locations in Philadelphia and Montgomery County, including Plymouth, Elkins Park and Whitemarsh. Abram Cornell Johnson, 34, of the 1400 block of North Wales Road, through his lawyers, filed a motion to withdraw his guilty plea in Montgomery County Court on Monday. Johnson was scheduled to be sentenced on Nov. 2 after he pleaded guilty earlier this year to charges of rape of a child, statutory sexual assault, involuntary deviate sexual intercourse of a child and sexual assault in connection with incidents that occurred between 1998 and 2016 when the victim was between the ages of 4 and 22. Good grief! 18 years starting from age 4! \"The defendant now seeks to withdraw his guilty plea and have the matter scheduled for trial. The defendant maintains, as he has since his arrest, that he should be found not guilty of some or all of these charges,\" defense lawyer Matthew Sedacca wrote in court papers. It's unclear if Judge Leonard N. Zito, a senior judge from Northampton County, will hold a hearing on the request. An out-of-county judge was assigned to preside over the case because Johnson is known by a member of the Montgomery County bench. Under state law, judges have the discretion to permit defendants to withdraw a guilty plea at any time before the imposition of a sentence, Sedacca argued. Previously, Zito allowed Johnson to remain free on bail pending the sentencing hearing. Johnson had to surrender his passport as a condition of bail. Zito also ordered Johnson to have no contact with the victim or her family. Johnson potentially faces decades in prison on the charges. Is this just a way to delay the inevitable? Is he assuming that he will continue to remain free on bail until the trial is concluded? After Johnson's guilty plea, Assistant District Attorney Erika Lyn Wevodau indicated she'd seek at least a 10-year mandatory prison term that is available under law to prosecutors for the charge of rape of a child. Wevodau argued the multiple incidences of abuse and the longevity of the abuse warranted a lengthy prison sentence. Is she serious? 10 years for 18 years of rape starting as a toddler? Maybe 10 years for each year of rape would be more appropriate. An investigation began in December 2016, when a woman reported to the Plymouth Township Police Department that she had been sexually assaulted by Johnson over the course of several years at various times while she was in his company. The woman told detectives that at the age of 4 she resided in Philadelphia and that Johnson, who knew her family, sexually assaulted her and raped her on at least one occasion while he was at her home, according to the criminal complaint filed by Plymouth Detective Joseph LaPenta III. The victim reported that between the ages of 6 and 14 she resided at another Philadelphia residence and that Johnson sexually assaulted her \"over a hundred times\" when he visited that residence during those years, court papers indicate. The victim told detectives that when she was between the ages of 14 and 16 her family lived in Elkins Park and she said Johnson \"would figure out when no one would be home\" and visit her. The victim claimed Johnson also occasionally took her to his Blue Bell residence at that time and sexually assaulted her there, according to the arrest affidavit. Other sexual assaults occurred while the victim was living at a Plymouth residence when she was between 16- and 18-years of age and later at her Whitemarsh residence, detectives alleged. During the December 2016 investigation, the victim consented to an intercepted phone call with Johnson and prosecutors approved the wiretap after determining the victim's consent was given freely and voluntarily, according to court documents. That recorded call between the victim and Johnson occurred on Dec. 15, 2016, court documents indicate. \"During the conversation, Johnson admits to having sexual relations with (the victim) while she was a teenager, but later said the sexual assaults began when she was seven years of age,\" LaPenta alleged. \"Johnson repeatedly apologizes for his actions during the entire conversation. Johnson goes on to state his past actions have done damage and admits to starting something and not stopping it,\" LaPenta alleged in the arrest affidavit. Tennessee man sentenced for possessing child porn in federal prison CAMDEN, N.J. (AP) \u2014 A federal prison inmate from Knoxville, Tennessee, already serving time for trafficking in child pornography has received another lengthy term for possessing child sex abuse images and videos inside the prison. Federal prosecutors in New Jersey say Charles Wesley Bush"} +{"id":"RedPajamaCommonCrawl.0031","text":"Which Pixar Plot Twist is the Best? (And Worst) Pixar movies aren't really known for having great plot twists. But there are still a few good ones here and there that we can appreciate. So which Pixar \"plot twist\" is the best? This isn't an easy question to answer, and obviously Pixar fans will spar and disagree over the top 5, let alone the very best. That said, I've devised my own rating system for each of Pixar's most relevant plot twists, and to answer this question for myself, I'm breaking down the Pixar filmography movie by movie to assign these ratings and form my own conclusion accordingly. But first, let's define what a plot twist really is as best we can. To keep things simple, I consider a plot twist to be a radical shift in the expected outcome of the plot. Normally, we would only consider these to be plot twists if they happen closer to the end of the story, but I think a great plot twist can be revealed as early as the second act. (Warning, this post contains spoilers for every single Pixar movie!) Let's begin with Pixar's first feature-length film: Toy Story. Go on\u2026Which Pixar Plot Twist is the Best? (And Worst) Comic: Boo and Randall, Meet Lilo and Stitch \"Lizard of Badness\" comic made by DeviantArtist coffeebandit, who has made a few other humorous mashups of Pixar characters, many of them centered around the Monsters Inc. antagonist. For example, \"what if\" Randall was at one point Violet's monster? One invisibility powered hero meets an invisibility powered villain. You can view the artist's full collection here. I definitely recommend. Snarcasm: Disney Ruined Pixar Because Why Not? Snark + Sarcasm = what you're about to read Did Pixar lose its way, or did we lose our way with Pixar? There's no real answer to the latter part of that question because it makes no sense. But the article we're snarcasming this week actually does make a lot of sense and deserves to be approached thoughtfully. Even though it's basically wrong for the most part. Writing for The Atlantic, Christopher Orr titles his piece \"How Pixar Lost Its Way,\" because at this point, Orr is confident there's no other conclusion to reach. For 15 years, the animation studio was the best on the planet. Studio Ghibli would like a word. Then Disney bought it. And the Fire Nation attacked. Orr begins his piece with a line from Ed Catmull, Pixar's own president who at one point claimed that sequels can represent \"creative bankruptcy.\" He was discussing Pixar, the legendary animation studio, and its avowed distaste for cheap spin-offs. Good thing Pixar doesn't make cheap spin-offs! Hold on, we'll get to Cars 2. More pointedly, he argued that if Pixar were only to make sequels, it would \"wither and die.\" Good thing Pixar doesn't only make sequels! Yet here comes Cars 3, rolling into a theater near you this month. Ah yes, it wouldn't be a hot take on Pixar without car-related puns. You may recall that the original Cars, released back in 2006, was widely judged to be the studio's worst film to date. \"Worst,\" however, is a misleading phrase. It wasn't the strongest of the Pixar films, but most critics believed the film was good mainly on the strengths of its production value and a decent story. The problem was that Cars was the first Pixar movie made mostly for children. Cars 2 was made for merchandising to said children and was the studio's first flop, coincidentally. if Cars 3 isn't disheartening enough, two of the three Pixar films in line after it are also sequels: The Incredibles 2 and (say it isn't so!) Toy Story 4. Of course, Pixar has made great sequels as well, including two for that last movie you mention. And they just made Finding Dory, which audiences loved\u2014 The golden era of Pixar is over. Yeah, ok, here we go. It was a 15-year run of unmatched commercial and creative excellence, Filled with sequels and large gaps in between movies. Since then, other animation studios have made consistently better films. This is somewhat true, but not necessarily fair. The only studio that's been making those better films is Disney, which has been creatively led by Pixar's John Lasseter since the studio's purchase. Orr also mentions two Laika films, but one came out the same year as Up and the other came out the same year as Finding Dory. To Orr's point, Disney has made Wreck-It Ralph, Frozen, Big Hero 6, Moana, and Zootopia, all of which are widely regarded as better than Brave, Cars 2, Monsters University (arguably), The Good Dinosaur (arguably), and Finding Dory. But Pixar has also made Inside Out, which most critics consider the superior film out of every single one of those Disney and Laika films. Now, I get Orr's point. That's just one Pixar movie while Disney has had an aggressive output of great films that have managed to catch up to Pixar's level of quality. If that were Orr's only argument here, it would be a noteworthy one, but the jump to concluding that this means Pixar has lost its way ignores plenty of other important information, including Pixar's excellent short animated films, which are consistently better than Disney's, and the fact that they've still made good movies in the last seven years. One need only look at this year's Oscars: Two Disney movies, Zootopia and Moana, were nominated for Best Animated Feature, and Zootopia won. Pixar's Finding Dory was shut out altogether. First of all, Pixar won an Oscar just a year ago. Second, Finding Dory isn't any less of a good film simply because it didn't win a certain award. It just wasn't as original and compelling as Zootopia and Moana, which is fine, and the Academy has a persistent stigma against sequels, anyway. Orr's standard of Pixar being on the right path is too restricting, apparently arguing that movies are best when they manage to best other movies, ignoring, for example, Kubo and the Two Strings, which numerous critics argue was better than both Zootopia and Moana. Even if they're right, all three movies are pretty good. Simply put, a film being great doesn't make another film any less great. This is only relevant if the value you hold in a movie is tied into how it compares with the reception of its competition. Orr goes on, however, to expand on his own standard for what makes Pixar great, citing its technical achievements (which none of the sequels have erred on) and how it has provided great cinema for kids and adults (which hasn't changed at all since Toy Story 3). Even as others gradually caught up with Pixar's visual artistry, the studio continued to tell stories of unparalleled depth and sophistication. Some Pixar movies, however, weren't so brilliantly received by critics at the time they came out. Films like Ratatouille and Wall-E, for example, were criticized plenty for trifles that no one even considers now. Monsters Inc. wasn't exactly critic-proof either (it didn't even win an Oscar?!), and that goes even more for A Bug's Life. Two films that unquestionably cemented Pixar's eventual reputation beyond Toy Story were The Incredibles and Finding Nemo. Several other Pixar movies have managed to match them, in my opinion, but only Inside Out has truly reached the standard Orr sets here, which isn't one that has been consistently met by Pixar with every film they've put out. Good Dinosaur is a good example, in that it's a film directly trying to be far more bizarre and experimental than what's worked for Pixar in the past. Orr goes on to talk about Pixar's achievement with crossover storytelling, raising some great points about how and why their movies are so consistently well-received. And then, after Toy Story 3, the Pixar magic began to fade. The sequels that followed\u2014Cars 2 (a spy spoof) in 2011 and Monsters University (a college farce) in 2013\u2014lacked any thematic or emotional connection to the movies that spawned them. I truly take issue with Orr essentially lumping these two movies together, because Monsters University in no way lacks thematic connection to Monsters Inc. If anything, it adds flourish to the Mike Wazowski character and tells a poignant story about how we deal with our limitations. It's far from merely being a \"college farce.\" Though better than either of those two, Brave, Pixar's 2012 foray into princessdom, was a disappointment as well. I'm not sure which movie is better\u2014Monsters University or Brave. Orr isn't wrong in saying that Brave was a bit of a disappointment, but it's about as serviceable as Cars and hey! It won an Oscar. The studio rallied with Inside Out in 2015. If by rallied, you mean they put out one of their best films in 20 years, sure. They \"rallied.\" But the inferior The Good Dinosaur (also in 2015) and last year's mediocre Finding Dory only confirmed the overall decline, Here's where Orr and I differ the most. To him, Pixar has lost its way because it's made a few movies that aren't as good as its very best ones. For me, Pixar has been unable to top themselves year after year, same as Disney wasn't able to do in the 90s, well before that, and in the near future. But in reality, they never really did that in the first place. Is Pixar experiencing an overall decline? Sure, no one really disputes that. But does an overall decline mean that the studio has lost its way? Not necessarily. It might just mean we're witnessing a studio in transition, swinging for the fences with some movies and biding time with sequels as they prepare for a new era that may be entirely different. Even Orr points out that at the time of the merger, Pixar was already facing huge problems as a studio. And these are the shifts that have led to the Pixar we know today, which has produced occasional masterpieces like Inside Out and artful experiments like The Good Dinosaur. Orr doesn't even mention Coco, which comes out later this year, but laments Toy Story 4 and Incredibles 2, the latter of which is a sequel to one of Pixar's best films ever and could very well be the first Pixar sequel since Toy Story 3 to actually be better than the original. The Disney merger seems to have brought with it new imperatives. Pixar has always been very good at making money, but historically it did so largely on its own terms. I agree. Merging with Disney is a big reason for the sequels, but that's likely because Pixar knew they couldn't survive much longer without them. Pixar movies take years to make, and their standards are too high to make new worlds from scratch at a quick enough speed to pay the bills. Sequels take much less time and can make even more money when done correctly. That's not an excuse, of course, but it is indicative of what could happen next. Merger or no, there's plenty reason to believe Pixar would have kept making sequels anyway in order to support their simultaneous need for great original films to also fill the pipeline. That's not Pixar losing its way. It's Pixar changing course in a more sustainable direction, consolidating their talent and taking steps toward a future where they may not have to rely on sequels so badly. And this has led to some good results over the years, along with some unfortunate branding ones, admittedly. Then Orr makes his worst argument. There are a dozen Disney theme parks scattered across the globe in need of, well, themes for their rides. Don't do it, Orr. Please. Think of the children. the overlap between the Pixar movies that beget sequels and the movies that inspire rides at Disney amusement parks is all but total. Seriously? You're trying to argue that Pixar is basing its creative decisions around theme-parks? Theme-park rides are premised on an awareness of the theme in question, and young parkgoers are less likely to be familiar with movies that are more than a decade old. That explains why Disneyland is filled with movie themes from over 50 years ago. This idea that kids are going to forget what Toy Story is without a Toy Story 4 is almost enough for me to dismiss all of Orr's previous arguments out of spite. I won't because clearly he's not entirely wrong about a lot of this, but\u2026really? Theme-park rides? Look, there's a point to be made about how sequels can be properly timed with theme-park attractions in order to maximize exposure. But to suggest that a legendary storyteller like Lasseter is guiding one of the best animated studios of all time (with Catmull's approval) around what will look good on a brochure is nothing more than a brainless conspiracy theory. They're not making Toy Story 4 because of a theme-park ride. At best, and if we take Pixar at their word, they're making it because they truly believe in the story and it would be easier and more profitable than a new IP. Pixar has promised that after the upcoming glut of sequels, the studio will focus on original features. And honestly, I believe them. Pixar has built up decades of credibility with its fans, but Orr would dismiss all of it because the studio has only put out one masterpiece in seven years, assuming Coco isn't as good as it looks, while other studios like Disney haven't really made any masterpieces of their own in the same amount of time. I'm not sure I dare to expect much more of what used to make Pixar Pixar: the idiosyncratic stories, the deep emotional resonance, the subtle themes that don't easily translate into amusement-park rides. Seriously, it's been two years since Inside Out. Two. And the people who made it still work at Pixar, and for the last time, they're still making good films. What makes Pixar Pixar hasn't changed, just the frequency of its best material, and impatience (while understandable) is a poor excuse for trying to accuse an animation studio of being enslaved to theme-park rides. Orr finishes by rounding off examples of what he loves in Ratatouille, Wall-E, and Up, finally stating: Would Pixar even bother making those pictures anymore? So the implication is that because these movies supposedly wouldn't translate well to a theme-park ride (though they actually would, considering the Axiom is begging to be in Tomorrowland and Ratatouille has its own part in Disneyland Paris, which Orr even admits), he questions Pixar's willingness to make great movies. You know, despite the fact that Coco comes out in November and virtually nothing about Pixar tells us that they're disinterested in making great movies. As I've pointed out numerous times here, Orr makes a lot of accurate observations, and I don't blame anyone for believing Pixar really has lost their way. But it really depends on what you look to Pixar for. Even their worst films still contain a level of quality that far surpass the worst of the Disney movies and DreamWorks movies for that matter. It's definitely true that they're not putting out a slew of original breakthroughs almost every year like they once did, and yes, that is a shame. But we also can't discount that their competitors really have caught up to them in a lot of ways. And there are a ton of learning curves to managing a bigger studio that is no longer as unique and creatively compact as it once was. From what I can tell, Pixar has embraced this decade with a new caution, desperate to preserve its best material by investing in more conventional ways of making money. I'm not saying this is necessarily the best choice they could've made, and I don't agree with all of their decisions since Toy Story 3. But all of this does mean that Pixar can still make the masterpieces we want to see from them. In other words, I very much doubt a movie like Inside Out, heralded as one of the greatest animated movies of all time, would have been able to come out if it weren't for Cars 2 and Monsters University. These are movies that came out instead of failed concepts like Newt, and Pixar would have been in a tailspin if not for the box office they made off of Toy Story 3. You don't have to like it, and hopefully this isn't a new norm for Pixar, but it is the reality of a studio that has reached maturing age. It's a different time for Pixar, but not necessarily a bad one. Thanks for reading this. To get updates on my theories, books, and giveaways, join my mailing list. Or just say hey on Twitter: @JonNegroni Which is Better? 'Monsters Inc.' VS 'Shrek' On the latest Pixar Detectives, Kayla Savage and I tried to somehow choose between Monsters Inc. and Shrek in the most unbiased as possible way. To help, our live audience supplied some awesome arguments and counterarguments in this week's edition of Which is Better? Of course, we're not content to rest on the laurels of the debate in this video. Let us know in the comments below which movie you think deserves the acclaim and why. We spent the entirety of the episode on this topic, so we unfortunately didn't have any time to cover the latest going on in the world of Pixar. But tune in next week and we'll do our best to catch up. If you want to enter our weekly giveaways, be sure to tune in live every Wednesday at 7:00 p.m. (Pacific). Follow the link below or just click the video above. We give away Pixar-related goodies like shirts, books, blu-rays, and tons more. And we're always open to new suggestions for prizes you all might be interested in! Hope you enjoy the show, and don't forget to like Super News on Facebook, so you can check out all kinds of awesome shows and giveaways coming out daily. That includes vide game live streams, other Disney talk shows, superhero news, and plenty more. See you all next week! Thanks for reading this. Seriously. You can subscribe to my posts by clicking \"Follow\" in the right sidebar. Or just say hello on Twitter: @JonNegroni The Pixar Theory: How The Good Dinosaur Fits In Pixar's Universe The Storm provides. In 2013, I wrote the first draft of The Pixar Theory, an essay that makes the case for how and why every Pixar movie takes place within a shared universe. Just this past year, I published a book that finalized this draft into a more convincing and fleshed out read that you can check out here, but you can get a decent idea of what we're talking about by reading the original article. Just keep in mind that much of what I wrote in that first blog post has been changed and improved on over the years. Also this year, I posted how Inside Out (Pixar's other 2015 movie) fits into the Pixar Theory, which you can check out here for even more context. Yeah, I know it's a lot of reading. As we talk about The Good Dinosaur below, I'll do my best to add refreshers from past articles, so you don't have to keep clicking around. Needless to say, this post contains a lot of spoilers for The Good Dinosaur, so if you haven't watched it yet and don't want it spoiled for you, then check back later after you've had a chance to see the movie. You've been warned. That said, it's time to address a question I've been getting for over two years now\u2026 Does The Good Dinosaur take place in the same universe as ever other Pixar movie? Including Toy Story, Finding Nemo, and even Cars? We're going to address that question and then some. But first, let's talk about something possibly more important. Let's talk about what The Good Dinosaur contributes to the shared Pixar universe, beyond how it potentially \"fits in.\" In other words, we're going to talk about how The Good Dinosaur makes the Pixar Universe Theory better. For one thing, it actually answers some major questions I've been asking since day one of putting this theory together. And I know plenty of people have wondered this too: WHERE DOES \"MAGIC\" COME FROM? If you're at all familiar with this theory, then you're plenty aware of how magic plays a mysterious role in the shared universe of Pixar. But one thing I've never fully understood is where it's supposed to come from in a world where animals can cook and toys can talk. I've claimed in the past that the wisps of Brave are where this magic originated, or at least point to magic tying in with nature somehow. I've also posited that wood is a source of magic, which is certainly evident given how doors have dimension-defying capabilities in multiple Pixar movies, including Monsters Inc, and Brave. Humans can use magic from what we've seen, or at least some type of it. In my book, I argue that the supers from The Incredibles received their powers through government experiments in order to be spies (at first), which would explain why they seem to have military experience and backgrounds in espionage. But it's unclear how technology could make a person fly. It's unclear how Boo from Monsters Inc., could harness the magic of a door and travel through time. It's unclear how humans of the distant future could find a magic tree with fruit that could transform them into animalistic monsters (a tidbit from the Monsters Inc., DVD). But with The Good Dinosaur, we finally have a suitable theory for where this magic comes from, as well as a proper starting point for the Pixar Universe. THE SET UP The film opens 65 millions years in the past, when dinosaurs still roamed the Earth. The opening scene clearly shows us a world like the real one you and I live in, where animals eat from the ground and have primitive senses. In reality, it's believed by many that an extinction-level event is what caused the disappearance of the dinosaurs as we know them today. A predominant theory is that an asteroid wiped all of these creatures out, long before mammals like humans ever came to be. Pixar accepts this premise and turns it on its head by proposing a world where there is no extinction of the dinosaurs because the asteroid misses Earth entirely. Millions of years later, dinosaurs are still the dominant species on a very different-looking planet, while humans are just now arriving on the scene. One thing I love about The Good Dinosaur, by the way, is how the film doesn't rely on any exposition to illustrate what's taken place since the asteroid missed Earth. We just see an apatosaurus family tending to their farm. Right off the bat, we learn that dinosaurs have become the most intelligent creatures in this world, able to provide shelter, fences, and resources for themselves and other creatures. They're smart. They use their appendages in unique ways to ensure their survival. It's a simple reimagining, but it's effective. And it parallels nicely with what we've come to expect from future animals in the Pixar Universe, notably Remy from Ratatouille, an animal who manages to become a better chef than any other human (in Paris, at least). So right away, The Good Dinosaur hammers the point that when left to their own devices, animals can become just as intelligent as humans, as we also see in A Bug's Life with Flik's inventions and ingenuity ensuring the survival of his entire community. In the same way, the apatosaurus family of The Good Dinosaur relies on the harvesting of food to get them through a harsh winter. Arlo, the main character, is the youngest of three siblings to the apatosaurus parents who run the farm. To \"earn his mark,\" Arlo is given the responsibility of catching a feral critter who keeps stealing their food. We eventually learn that this critter is what we know as a human. He's a small, wolf-like boy who doesn't appear to have his own language beyond grunts, and Arlo adopts him has his pet after the two get washed away by the river, far from home. From there, the movie shows us their long journey home, and a lot happens over the course of these few weeks. We learn quickly that this part of the world suffers from frequent storms, some of them looking like typhoons. Later, it's evident that very few dinosaurs are around, despite the fact that they're the most intelligent species around. We see a few dinosaurs along the way, but only in small groups, rather than herds. Towns and settlements are apparently scarce, but still alluded to. And every dino is obsessed with survival. Forrest, the Styracosaurs, chooses to live in the wilderness under the protection of the creatures he carries around with him. This is played off as a joke, mostly, but it shows just how harsh life is in this world for reasons that are left to the imagination. It's also telling that Forrest is just as fearful as Arlo, and with good reason. There's not much food around, and though these dinosaurs are smart, some are being born with an innate (possibly learned) sense of fear. We certainly get a feel for how scarce resources are by the time we meet the hybrid Nyctosaurus gang, led by Thunderclap. I say hybrid because like the other dinosaurs in this film, they have many traits that have evolved from the fossils we have on these creatures. In fact, every creature in Thunderclap's gang is a different species. These flying creatures are a \"search and rescue\" team who scavenge the helpless creatures traumatized by the frequent storms. \"The 'Storm' provides\" is not just a weird catchphrase for these beasts\u2014it's their religion. They worship the storm for giving them much-needed food. Isn't it strange that Arlo got sick from eating plants that weren't fruits like berries and corn? Millions of years earlier, we saw dinosaurs eating grass just fine, so what changed? Before we get to that, it's important to point out how the T-Rex family manages to survive. They have to raise and take care of a bison herd by themselves in order to have enough food, often fighting off vicious raptors desperate for their food. And the T-Rexes are constantly on the move, which probably has something to do with how the environment is too volatile for them to settle down anywhere, as well as the fact that they have to find enough food to feed their food. If dinosaurs have been evolving for millions of years, then why are they having such a hard time, now? In the opening scene, there are many dinosaurs all eating together without a care in the world, so something big had to happen between those good times and the bleak world we're introduced to countless years later. Well, I think it's pretty simple. These dinosaurs are living in a \"post-apocalypse\" of their own civilization. At one point, they probably had plentiful resources to sustain a massive population, much like you'd expect. But what we see is a shifted environment. The lush jungles filled with edible plants that we know existed millions of years ago have vanished by the time we meet Arlo, just as they would have if the asteroid had hit Earth. Simply put, the world slowly became less optimal for the dinosaurs to roam, which the movie goes out of its way to illustrate. Arlo's family is on the brink of running out of food because rival creatures like the mammals (AKA humans) are stealing their food and thriving in this new environment. These storms are a product of this change, as the world gradually corrects the imbalance of reptiles and mammals caused by the lack of an extinction-level event. And many years later, the same \"correction\" will happen between man and another new species: machine. In other words, Pixar loves cycles. And the Pixar Universe is as cyclical as they come. It's actually pretty amazing how a simple movie like The Good Dinosaur offers such a close parallel to stories they've already told, Pixar Theory or no. WHAT ABOUT THE OTHER PIXAR MOVIES? If The Good Dinosaur exists in the same timeline as movies like The Incredibles and Finding Nemo, then where's the evidence of those movies being a result of this alternate universe where dinosaurs ruled the Earth much longer than planned? What about fossils? Certainly, the Pixar movies would exist in a world where the fossil record is drastically different. What about these strange creatures in The Good Dinosaur that don't look like any animals we're aware of, like the dreaded cluckers? Well, that's where Up comes in. Early on in Up, we see that the famous explorer Charles Muntz has found a place in South America filled with plants and animals \"undiscovered by science.\" That place is Paradise Falls (or, \"The Lost World\" as the narrator puts it). And what is the prize creature that Muntz discovers? It's no dinosaur. It's a bird (Kevin). And this is a bird that bears resemblance to the bizarre makeup of the \"prehistoric\" birds and raptor-hybrids we see in The Good Dinosaur, who have originated from this alternate universe where evolution was never halted. And that's not where the weirdness ends. Cut from Up is the explanation for why Charles Muntz is still spry and healthy, despite being much older than 80-year-old Carl Fredericksen. According to Pixar, Muntz found Kevin's eggs, which somehow have the ability to slow down the aging process (my book covers this in more detail, but that's the gist). So Kevin's existence, as well as this rare, superhuman ability, finally has an explanation. Somehow, the longer evolution of these strange creatures brought about magic \u2014 or at least something that resembles magic \u2014 that can eventually be harnessed by humans in various ways. After all, what is it really that makes those dogs in Up talk? And is it any surprise that Muntz comes across Kevin's existence in the 1930s, not long before the sudden rise of supers with strange abilities? Remember: The Incredibles takes place in an alternate version of the 1950s and 60s. Mr. Incredible was very young or even born around the same time Charles Muntz was uncovering what could be \"magic\" properties. This could even serve as an explanation for why academia suddenly turned on Muntz, shaming him for what we know weren't fraudulent discoveries. Perhaps this was a ploy to keep his research hidden from the world, explaining why only Americans are shown to have powers in The Incredibles. Sometimes I get goosebumps when these things fit together a little too nicely. OK, what about the strange animals mentioned earlier? Well, when we explore the dirigible in Up, Muntz shows off his collection of these strange creatures that are so rare, Muntz doesn't expect Carl to know what they are. They range from giant turtles and other aquatic life to hybrid mammal\/dinosaurs that are reminiscent of Forrest from The Good Dinosaur. And we can now deduce that in the Pixar Universe, many of these creatures existed closer together in time, explaining why they're displayed as a group. Side note: One of the reasons I've waited to add all of this to the Pixar Theory is because I'm still researching how these creatures connect to other movies, including the angler fish that looks just like the one we see in Finding Nemo. So the exotic creatures from The Good Dinosaur apparently exist across multiple Pixar movies, and the absence of an extinction-level event seemingly provides an explanation for why animals have become so intelligent by the time we get to movies like Ratatouille. And the movie even provides some hints as to why magic exists in the Pixar Universe, and we now know why said universe is alternate to our own. Is that it? Ha, no. FOSSILS AND FUELS. Oil. It's something that Axelrod from Cars 2 addresses as the very thing we get from fossils, which he specifically defines as \"dead dinosaurs.\" But for whatever reason, the world runs out of oil in the Pixar Universe much sooner than we would by today's standards. Drilling the way we are today, there's probably 50-100 years of oil left, which obviously excludes methods that dig much deeper. So really, we're just running low on cheap oil. In Cars 2, the sentient cars are running out of oil, entirely. And this makes sense for two major reasons: Mankind has a 200 billion population by 2105 (according to WALL-E) There's less oil on Earth because (whoops!) dinosaurs died out more gradually. Fossil fuels bring life to us from dead organisms, and we get a lot of it from extinction-events that compact them for easier extraction through drilling (for the record, my knowledge on this topic goes about as far as Armageddon). Without the asteroid, fossil fuels are a bust. In The Incredibles, technology has progressed more rapidly by the 1950s, likely because scientists are seeking solutions to this energy crisis. Syndrome finds a way to harness zero-point energy, and \"human\" energy will be extracted by toys and eventually monsters indefinitely. The absence of other energy options like fossil fuels might provide an explanation for why human energy is so important in the Pixar Universe. Yet in WALL-E, mankind lives in a loop for hundreds of years aboard starliners like the Axiom. They harness solar energy with advanced technology that allows them to avoid the laws of entropy (and you can argue that the machines are also kept alive by the humans themselves). All this points to a world that figured out (much faster) that it needs an alternative to fossil fuels, which is why humanity is still around hundreds of years after the cars die out. THE LEGACY OF DINOCO. So in the Pixar Universe, dinosaurs eventually die out because the world changes without them. But they're remembered, nonetheless, mostly because humans have passed down their memories of the once predominant species. By the time we get to \"modern Pixar,\" there are companies like Dinoco that use these forerunners as their logo. Toys like Rex and Trixie get played with, just as they would in our world. There are even statues in Inside Out that look like dinosaurs we see in the movie. The major difference is that in The Good Dinosaur, there's a specific \"passing of the torch\" moment between Arlo and Spot. The symbolism is actually tragic in a way, as we see Arlo giving Spot over to a human family willing to adopt him. Unlike Spot, these humans wear furs instead of leaves and alternate between walking on all fours and standing upright, even teaching Spot how to do it by guiding him. This moment crystalizes the rise of mankind in contrast to the dinosaurs, who are quite literally on their last legs. After all, Arlo will return to his farm and eke out a pretty humble existence as a herbivore. His family will barely survive, as his mother tells him bluntly early in the movie. Meanwhile, humans are already hunting and living off of the newer resources tailor-made for mammals. Pixar could have easily left these implications out, but instead they shine a light on the important role mankind will take up as the world continues to change. That said, I suspect there are more mysteries to solve here. We have millions of years of history between The Good Dinosaur and Brave, so you can expect brand new narratives to rise out of those films as the studio continues to deliver excellent movies more than worthy of our time. WRAPPING UP. That's the long version of how The Good Dinosaur fits within the narrative of The Pixar Theory. But I hope you've also gotten some insight into why it's so important to the theory, in a way that not even Inside Out was able to accomplish, though it also was quite enlightening. With The Good Dinosaur, we have firm answers for some of the biggest questions many have come across when digging into this theory. It gives us a reason why everything in Pixar movies is so different and set apart from reality. It alludes to the mysteries of magic with a little help from Up, further providing connections I didn't think we'd ever get. And we even got Dreamcrusher. I hope you enjoyed the movie itself as much as I did. My full review is also available in case you're not already tired of reading, which you can check out here. You've probably noticed by now that I'm absolutely in love with The Good Dinosaur, and the review expands more on all of that. As for the easter eggs, this movie has proven to be quite the challenge when it comes to finding the elusive Pizza Planet Truck and A113. Peter Sohn (director of the movie) confirmed they're in there somewhere, albeit in clever ways similar to how Brave managed it. I haven't caught them yet, but I've heard the truck shows up as either a rock formation or an optical illusion from the positioning of several rocks and debris. Be sure to share your findings. Let me know your thoughts, ideas, and rebuttals in the comments, and I'll do my best to clear anything up! The conspiring doesn't end here. Check out my other Pixar Theory posts from infinity to beyond: The Pixar Theory \u2013 the full book available on paperback and ebook via Kindle, Barnes and Noble, iBooks, or just a PDF. This will cover the entire theory and every movie in the Pixar universe, updated from what you just read. The Pixar Theory \u2013 Part 2: Inside Out The Pixar Theory \u2013 Part 4: Finding Dory The Pixar Theory \u2013 What about Planes? The Pixar Detective \u2013 an expanded universe novel that explains the theory as a full narrative. Were There Self-Aware Toys in 'Monsters Inc,' All Along? Since the release of my new book, The Pixar Theory, I honestly haven't given much thought to expanding these Pixar-related connections because\u2026vacation. So, I'm back and here's something potentially interesting for you to seek your teeth into. A few weeks ago, a regular visitor to the site (cheers, @ThomastheBrainEngine), brought me some interesting evidence of toys being \"self-aware\" in Monsters Inc, a la Toy Story. In Toy Story, we learn that toys are sentient. They move around on their own when we're not watching, and their entire lives revolve around the children who love them. One of the main tenets of my theory, which tries to unite the Pixar movies, is that toys are alive because in the Pixar universe, human imagination is like a battery, and it gives life to ordinary things (maybe even cars). I argue that this is the same concept as monsters powering their society with the energy of children in Monsters Inc. But despite a few cameos (like Jessie and the Luxo ball), there's nothing tangible linking Toy Story and Monsters Inc, especially if you consider Jessie's appearance in Monsters Inc., to only be an easter egg, not a hint to something more. But ThomastheBrainEngine presented a fascinating thought that I had not yet considered: what if we do see evidence that the world of Monsters Inc. has sentient toys? So I looked into this, and the evidence is solid, believe it or not. And it all hinges on the movie's first scene. Mr. Bile, can you tell me what you did wrong? This opening sequence introduces us to the basic mechanics of how monsters scare children. The monster, Mr. Bile (Phlegm), sneaks into a child's room and attempts to scare him, but the kid wakes up and sees him. We see that Mr. Bile is actually more scared of the child than vice versa, and he trips and falls for comedic effect. This, of course, is a simulation. A demonstration of how not to scare a child, so that the movie can cut to Sulley, our main character, who is the best scarer at Monsters Incorporated. The simulation we just watched was at the factory, and it's our set up for everything that happens next in the movie (notably, that the worst thing you can do is let in a child by leaving the door open). Something that has bugged a lot of people, including myself, is a major goof (or series of goofs) that transpires during the simulation. When Mr. Bile walks in, we get a clear shot of the room's layout and where everything is located. The soccer ball is under the bed, the toy train and its tracks are at the foot of the bed, and one of the books near the window hangs over the edge. But as the scene changes, everything moves around. The soccer ball inexplicably moves to the side of the bed. It's in a totally different location, and it eventually shows up again at the foot of the bed, where the train tracks have disappeared. Instead, there's a bunch of jax in its place. Mr. Bile steps back on the soccer ball and falls on the jax (see above) like we're watching a better version of Home Alone 3. We even see that the books on the toy box have moved a little bit, but they return to their original spot toward the end of the scene. The soccer ball is now under the bed again. It's nitpicking, but I've always been annoyed by how overtly obvious these goofs are. I've sat through a dailies session at Pixar, where the director and a group of animators will scrutinize every single aspect of what's on the screen. Even for a movie that was made in Pixar's early days, it's strange to think that they could make so many continuity errors in just a couple of minutes, and the movie's first few minutes at that. Granted, these goofs happen all the time, and some are caught too late in the game to be considered worth the effort of fixing them. But they're usually separated and scarce, not gathered in a cluster. So, what if this entire scene wasn't a goof at all? What if we were meant to see them? They're certainly hard to miss, after all. The idea is that the toys moved on their own because the rules of Toy Story bleed into Monsters Inc. Part of any good simulation would be to make sure monsters are prepared for anything that could happen. If toys are able to come alive and possibly protect their sleeping owner from an invader, then it makes perfect sense for these simulations to include these variables. Without those toys interfering, Mr. Bile probably would have been able to successfully leave the room and escape before the child could get up and go through that door. So part of the simulation could be to move the toys around, like they would in a real situation, in a way that conspires against the monster pulling off a scare. In this case, that meant moving the ball to where he would fall on a bunch of conveniently placed jacks that weren't there in the first place. It's definitely possible, at least. The monsters controlling the simulation are creating atmospheric effects (the curtain moving like wind is blowing it, the child moving around in reaction to realtime events). If toys could move, too, then the monsters could simulate that experience. Would toys really do this, though? I don't think it's a stretch based on what we've seen in Toy Story. Woody breaks the rules and unites Sid's toys against him just to get back to Andy. He goes to incredible lengths to make Andy happy, so I'm pretty sure he'd also go pretty far to protect Andy from a terrifying monster. It might not happen every time with every kid who has toys, but it could happen enough to warrant a response from Monsters Inc. When you watch Monsters University, you see that the higher ups are teaching the monsters tons of useful tips and facts about this profession, ranging from how the doors work to how monsters can adapt to any given situation. They have to prepare the monsters to be so stealthy, not even the toys know they're there (which is possible, since we see that the toys do sleep when Woody has that nightmare in the first movie). This also solves another major inconsistency that was brought on by Monsters University. If monsters have to go to college to get jobs as professional scarers, then why is Mr. Bile having such a hard time? And why is he doing this, anyway, if he has experience and a college education? Well, if you watch Monsters University again, you probably won't notice any of these instances of toys getting in the way. And that's probably because introducing them as a variable is when you get into the expert mode of scaring. This would make scaring so hard for monsters that it wouldn't be a critical point of the simulator until you actually got the job, explaining why Mr. Bile is sort of talented, but he ends up falling on his face, despite the rigorous standards of professional scaring established by Dean Hardscrabble in MU. Weirdly, Phlegm was good enough to hide this with a sweater. To sum up, I think this evidence is pretty strong, mostly because those goofs I pointed out just seem overwhelmingly obvious. It is possible that the monsters controlling the simulation could be moving the toys around from the control room just to make things harder for Mr. Bile, not because toys are expected to come alive. But that just seems sort of harsh. Mr. Bile walked into that room and surveyed everything as he was trained. Mixing things up for no good reason in a scenario that wouldn't possible happen just to make things harder undermines how the monsters are trained in Monsters University. It's like testing high school students on a different subject with information you never taught them\u2014OK, wait, that happens all the time. Let me know if you're convinced or unconvinced and we can hash it out in the comments. If you're interested in the Pixar Theory (that is, how all the movies may be connected and why) enough to read an entire book about it with all of the clues and arguments I've collected over the past few years, don't forget to check out my book, which is available now in print and as an e-book on Amazon, Barnes and Noble, etc. I'm Jon and thanks for reading this. You can subscribe to my posts by clicking \"Follow\" in the right sidebar. Or just say hey on Twitter! @JonNegroni The Pixar Theory: How 'Inside Out' Fits In The Pixar Universe Take her to the moon for me. Okay? The Pixar Theory, or \"Grand Unifying Theory of Pixar movies\" if you want to be more intense, is a fan theory I wrote in 2013 about how every single feature film made by Pixar Animation Studios is intentionally set in the same universe. Or unintentionally, if you believe in miracles. Dan O'Brien I was inspired by an episode of the Web Series, \"After Hours,\" on Cracked.com. In the episode written by Dan O'Brien, the After Hours crew discusses, at length, how a few of the Pixar movies may secretly be about the apocalypse. They address Toy Story, WALL-E, and Cars before giving up because they can't find a way to connect the films any further. So I took that as a challenge. Over the following year, I developed my own theory on how all the movies connect, and the results have been surprisingly epic. People from all over the world have read the theory, and many of you have been having ongoing discussions in the comments that go way beyond anything I first imagined (trust me, I read all of them). Now, two years later, it's time to see where we're at as we welcome a new Pixar movie to the world: Inside Out. First, it's important to point out that the theory itself has changed dramatically over the years. A lot of people have called out flaws and underdeveloped points of the theory that make it fall apart for them. I've read the feedback and spent the last two years writing a book that fully fleshes out my original theory. It addresses pretty much every major complaint and issue that \"debunkers\" have thrown at it. And it does this in about ten chapters. Every chapter follows a specific movie (some are lumped in together, like the Cars franchise). I talk about the context of the movie as it relates to this theory, where it fits in the grand timeline, and how each movie contributes to the idea that these"} +{"id":"RedPajamaCommonCrawl.0032","text":"WomenWritersBlock A place for women to post their writing and to encourage the work of others. Writer's Aide Submission Rules and Guidelines Conspiracy (by BettyHT) BettyHT Bonanza November 3, 2018 Summary: It's a dastardly plot involving trickery, attempted murder, false accusations, and more, but the Cartwrights will work together even letting Joe help with the planning to defeat the villains. Category: Bonanza Genre: Western Leaning back in the hard seat, Adam Cartwright wrote in his journal. It was a letter, but one that was never going to be mailed. He was headed home to a sad event, and hoped to be there in time for the services. He had done everything he could to travel as fast as he could but doubted it would be in time. Now he was on that last leg of the trip and would arrive in Virginia City in about two hours. He penned the saddest words he could ever remember writing. Dear Hoss My dear big brother, I know you can't read this letter but I'll have to read it to you when I get home. I never meant for so many years to pass before I returned, and now it seems it's too late. I'll never feel that big reassuring hand on my shoulder or on my back. I'll never get to look into those pure blue eyes so full of sincere trust and love when we talked. You told me to promise to return, and I did promise, but you should have made me give a deadline. You know how I am when it comes to following the rules. I would have been back when I said I would. Now perhaps I'll only see a cold stone reminder of what you once were, and I know that will hit me as hard as your fist did once or twice. You taught me an important lesson that night you were so angry about Regan albeit a painful one in so many ways. You taught me a lot over the years in how to be kind to strangers and look for the best in them. It didn't always work out the best for you or for me, but that was their fault, not ours, wasn't it. So, I'm coming home, big brother, and if there's any justice in the world, the report of your demise has been a cruel falsehood. I pray that is true, and when I arrive, Pa and Joe will say you have been found and never drowned in that damn river. It is a thin hope, but without it, I could not make this journey without strangers staring at me for the tears would never cease. Your older, sadder, but wiser now brother, Ps: If you are in heaven already, save a spot for me as I'm sure you and Pa can convince them to let me in when the time comes. Once the three of us are there, I'm sure we can find a way to sneak Joe in too. With the relationship he had with Hoss, he had to put that last part in. They always had a way of speaking with each other that ended up making both of them feel better by the end. He couldn't stop on such a maudlin note so that last bit helped. The rest of the trip home, he sat by the window staring at the passing scenery but not seeing anything as his mind rolled memory after memory for him. Guilt assailed him for he knew he should have come home sooner than this, but it seemed business issues had always gotten in the way. Now years had gone, and he was finally fulfilling that promise. On the Ponderosa, Joe was standing with his hands on his hips watching his brother toss things around looking for something and obviously quite frustrated at not finding it. When he stopped for a moment and stood in the middle of the stable looking around apparently for something more to toss, Joe had to ask. \"What the heck are you looking for and who's going to clean up this mess when you're done?\" \"I lost that knife Adam sent me for Christmas. You know, that one with the special whalebone handle on it with the whale carved into it. He sent one to Pa with the ship on it, and you got one with the eagle on it. I cain't find it nowhere. You know I always carry it on my belt and it's gone.\" \"Well, where did you have it last?\" Hoss stopped then and thought. \"I was whittling with it on the porch yesterday before we went to town so I had it then. I don't remember using it after that. When I took my belt off last night, it was gone. I looked all over the house then and couldn't find it. Pa said it was probably in the wagon we used or in the stable and I'd likely find it in the daylight, but it ain't here.\" \"Maybe it fell while we were driving to town or back. We could go again and look for it.\" \"I dunno if Pa wants us goin' ta town two days in a row.\" \"We didn't get into any trouble yesterday and got all the supplies just like he asked. Besides, today is Saturday. We can ask to go early because we'd likely be going in later anyway, wouldn't we?\" \"Ya, we probably would. Let's go see what he says.\" It almost worked the way they wanted, but Ben wanted Joe's help so he told Hoss to go with Candy. He said Joe could join them in an hour or two. Within an hour, the two friends were cleaned up and headed to town. It took them twice as long to get there as they rode slowly looking for the bone handled knife along the way and never saw anything. In town, they stopped at the livery stable and headed to the saloon. They were almost there when they were intercepted by a boy who had a message for them. \"Man paid me two bits to tell ya that he wants to talk to ya 'bout something but he can't be seen talking to ya. He said he'd meet ya behind the livery stable real soon.\" \"What'd this man look like?\" \"I dunno. Like a regular man. You know, he had a coat on and a hat and he had a beard.\" Hoss looked at Candy wondering what it could be about and then shrugged. \"Oh well, guess we could go see what he's got to say.\" They waited behind the livery stable and no one came. They heard the whistle of the train arriving and wondered who might be coming into town speculating on whether any pretty women had arrived. While they were doing that, Adam had taken his small valise and was headed toward that same livery stable intending to rent a horse and ride to the Ponderosa. He never got that far. Cutting through an alley, he wasn't careful as he would have been in the city. He should have been because men blocked his exit and as he turned, men were behind him. One rushed him from behind but he heard him coming and twisted slightly before he got there to meet his attack. It was lucky that he did because the blade of the knife entered his side instead of his back as intended. He was seriously wounded but not fatally or at least not yet even though the knife was buried to the hilt and the force of the man's blow with it also pushed it downward. He had strapped on his pistol earlier before leaving the train and now reached for it causing the men to flee. Weakened by the knife in his side, he was slow to draw and fire hitting only the side of a building but drawing attention. When men got there to help, they pulled the knife from his side. He saw it and uttered only one word. \"Hoss.\" Adam's eyes closed then and stayed that way. Men picked him up to take him to the doctor's office as Sheriff Clem Foster arrived to ask what had happened. The men there handed over the knife, explained what they knew, and repeated what Adam had said. Shocked, Clem headed to the doctor's office too with the knife in his hand. He saw Hoss and Candy then walking to the saloon after they had given up waiting for the unknown stranger behind the livery stable. They had heard a gunshot and nothing more so assumed there had been no real trouble they needed to check out. Clem switched directions and headed toward them. When he got next to them, they greeted him warmly until he held up Hoss' knife with wet blood still staining the blade and the handle. \"Damn, Clem, that's my knife. Candy and me been looking for it. Looks like somebody done used it to hurt somebody.\" \"Hoss, the one who was hurt said your name and no one else.\" \"Clem, Hoss was with me. He didn't do anything.\" \"Where were you?\" \"We were behind the livery stable.\" \"Doing what?\" \"A boy brought us a message and said we were to meet a stranger there who had something important to tell us.\" \"That's not far from where the stabbing took place.\" \"Listen, Clem, I didn't stab nobody. Who says I did?\" \"Your brother, Adam.\" Stunned, the two were speechless. About that time, Joe rode into town and seeing them talking with Clem, he rode up to them and dismounted. He saw Clem holding Hoss' bloody knife. \"What the heck happened? Hoss, you aren't hurt, are you?\" \"Hoss, you need to come with me. I need to get this figured out.\" Clem addressed Hoss making Joe wonder what was going on. Both Hoss and Candy started to explain and it took some time to get the story out so that Joe understood what it was. Up in the hotel, two men and a woman looked out a window at the three men in the street. They had gotten the report only a moment earlier of the botched attempt to kill Adam Cartwright. Granted, he might still die, but they were going to have to work on a plan to make sure that happened. Meanwhile, having Hoss and Joe Cartwright in town had worked out perfectly. When they had seen them ride in, they had quickly amended their plan to fit that development into what they wanted to do. Having Hoss in town the day before had helped them because one of their men had easily slipped the knife from its sheath on his belt as he sat in the saloon enjoying a beer after loading supplies into a buckboard. He hadn't even noticed it was gone. They had chuckled over how complicated it was going to make things for law enforcement to have the murder weapon belong to Adam's brother, and now that brother was in town too. Anything that caused confusion like that was perfect for them because it meant that no one was looking in their direction. Plans were going ahead as they had set them up. They had to make sure that Adam died, and then they could move on to step two of their plan. Getting over the initial shock, Joe got his voice back and began peppering Clem with questions making him stop and evaluate the three men. \"Adam's back? Where the heck is that old Yankee granite head? I've got a few words to say to him about how long it took him to get back here. Pa's been worried sick about him.\" \"Yeah, and why would Adam say I done stabbed somebody? I ain't stabbed nobody. Heck, I ain't even got my knife. Candy and me been looking for it. I figured I lost it yesterday someplace between here and home.\" \"I've been with Hoss and he didn't stab anyone. I don't know his brother, but he must be mistaken.\" \"You don't know, do you?\" Clem was getting the clear impression that the men didn't even know what had happened. \"Know? Of course we don't know. If we knew where he was, we wouldn't be asking you.\" Joe rolled his eyes and looked at Hoss as if to say they were dealing with an ignorant man who couldn't understand the simplest questions. \"I have to tell you some bad news then. Adam is at the doctor's office. He's the one who was stabbed. The only word he said was Hoss' name when they pulled the knife from him. He passed out then, and they took him to the doc's office.\" Hoss had a very sick feeling then. \"What'd this knife look like?\" \"It was a bone-handled knife with a big whale carved into the handle with about a six inch blade on it. The one I have in my hand.\" Hoss dropped his head into his hands, and Joe put a hand on Hoss' shoulder. They both knew then that Adam had been stabbed with Hoss' knife. Clem guessed the same. He spoke gently to the two brothers. \"Let's go to the doc's office and see what we can find out.\" The four turned then to walk to the doctor's office. Up in the hotel room, the three didn't know what to make of that, but it didn't matter too much as long as Adam died. That was the key to the whole plan. They sat down and began looking over the documents with his forged signatures and other documents that would give them control of one third of the Ponderosa as soon as his death was formally recorded and his will went to probate. Adam had made a mistake with this woman many years earlier when she had tried to blackmail him into supporting her claiming her son was his son. He disputed it and proved her wrong, but he felt sympathy for the boy who had no father and had to live with such a manipulative and conniving mother. He sent her a small stipend each year so that she could live more comfortably and therefore so could her son. Over the years, she devised a plan using that as the foundation. She had partners who would make her effort very profitable for very little effort on her part. They had hired men to kill Adam and now would apparently have to make a second attempt. At least Doctor Martin was doing his best to make sure they would have to try again. He had hoped to one day see Adam again, but had never wanted to see him on his surgery table with a gaping wound in his side. Bleeding was the major problem and Paul worked as hard and fast as he could to stem that flow. Once he managed that, he explored a bit but only enough to satisfy himself that there seemed to be no serious internal damage. Apparently Adam had twisted enough to the side that the knife had entered to the hilt but tore through muscle primarily doing significant and painful damage there and causing serious bleeding, but no internal injuries that were life threatening. Infection would be his next worry if Adam survived the blood loss that would make him very weak and unable to fight well against an infection. He cleaned the wound as thoroughly as he possibly could and then bandaged it tightly after all the stitches were in place. It took him nearly two hours to complete the procedure. Adam nearly awoke several times but the pain and weakness caused him to pass back into unconsciousness each time. Paul did not want to have to anesthetize him in his condition fearing he might not wake. Paul's wife, Lucille, and his nurse, Winifred Warner, were assisting him. They had not even undressed Adam when he arrived only draping sheets over him exposing the wound only by cutting away the shirt and letting the doctor get to work. Once the surgery was complete though, they pulled the sheets aside and began the task of undressing Adam while trying not to disturb him too much. Getting his boots and pants off wasn't too difficult, but he was a big man so getting his coat off was going to be far more difficult. When Paul heard the sound of men's voices in the outer office, he asked Lucille to see if there were some men there who might help them get Adam more upright so they could get his coat off and get him into a bed. He was but probably shouldn't have been surprised when it was Hoss and Joe who came through that door first. Their worry was evident, but they were quiet as they took his directions and carefully lifted Adam so his coat could be removed. Then the remnants of his shirt were cut away. With the doctor and Clem helping too, they lifted Adam, who began to groan softly at that point, and carried him to a bed. Once Adam was in the bed, Paul laid a sheet over him and turned to his brothers to give them the information they clearly wanted. However, he was interrupted by Adam, who in a weak voice, said the only thing that mattered to him at that moment. Hoss immediately moved to Adam's side leaning down and grasping Adam's hand as the older brother attempted to raise his hand to touch the middle brother he thought he had lost forever. \"You're alive.\" It was a strain to talk but he was so amazed to see Hoss alive he had to be sure. He used the strength he had to try to verify what his eyes were telling him. \"Course I am, older brother. It's you we're worried about. We didn't even know you was coming home, and then you end up here scaring us plumb half ta death.\" \"Read my journal.\" Adam closed his eyes then clearly too weak to say more. Clem had hoped to ask him a question or two, but Paul shook his head. Adam needed sleep and rest, and Paul wasn't going to let them question him at all. \"He's extremely weak. You can't question him now. Maybe in six or eight hours, he may be strong enough. I'm surprised he was able to say what he did. It must have been terribly important to him for some reason.\" \"Yeah, what did he mean by saying Hoss was alive. He seemed surprised by that.\" Joe looked at Hoss wondering what Adam had been thinking. Then he remembered what he said next. \"Where do you suppose his journal is?\" \"He had a small piece of luggage with him when he was attacked. Maybe it's in there.\" \"Please, if you're going to talk, could you leave and do that elsewhere. Adam needs to sleep, and he needs quiet to do so.\" \"I'll stay here with 'im. Joe, you let Pa know. And find that journal ifn ya kin.\" Hoss kept Adam's hand grasped in his unwilling to let go. Paul moved a chair near the bed and Hoss sank down on it gratefully. Agreeing to Hoss' requests, Joe left with Clem as the two decided to find that piece of luggage and the journal they apparently needed to read. The luggage was in the outer office so that was easy to find. The journal wasn't in there though. Frowning, Joe thought about that before snapping his fingers and heading back into the surgery returning in a couple of minutes with a small journal. \"It was in his coat pocket. I remember him doing that when he traveled. He would have a book to read in one pocket usually some poetry or something little like that and a small journal like this and a pencil in the other.\" Paging through the journal looking at sketches and small notes and entries, Joe got to the letter Adam had written to Hoss. Marking that page, he found a folded telegram informing Adam that Hoss had been lost in an accident and presumed drowned in the river. The telegram supposedly had come from him. He looked at Clem and handed over the items for the sheriff to read. \"I never sent that telegram!\" Clem was thoughtful for a moment as he evaluated all that he had learned. \"Someone wanted Adam to come back here and in a hurry. They didn't want him to check on anything. They wanted to catch him off guard. They did. Joe, can you think of anything that would make Adam rush back here faster than thinking Hoss had died and he needed to be here for your father and for you?\" Putting his head down for a time, Joe thought about what Clem had said and had to admit to himself that he was probably correct. \"Yeah, if Pa had died, I would have had Hoss to lean on. If I died, Pa would have leaned on Hoss. He's the anchor we both need sometimes. He always has been there like that. But if Hoss died, then Pa and I would need somebody. Adam would know that. He'd likely need somebody too. We would all have to help each other if we lost Hoss.\" \"So whoever did this knows your family very well. This plot, whatever it is, was hatched right here in Virginia City. At first, I was thinking this had something to do with Adam's job, but this makes it a whole different story.\" Candy had been listening to the two of them talk and had heard the rest of the story too. He had an important question to ask. \"If they did all of this to kill him, then what are they going to do when they find out he's still alive?\" \"Joe, you better let your father know, and we'll have to put our heads together on that one.\" \"Clem, for now, let's not tell anyone that Adam is doing all right. Let's keep that among us. I'll let Paul and the ladies know too.\" \"You working on a plan, Joe?\" \"I've got an idea. I need to talk to Pa first though. Be back here later when you see Pa get here. I'll find somebody to go tell him. I want to check on a few things first. Candy, will you go tell Pa and stay with him until he gets here? He may not handle this very well.\" \"Joe, you stay away from that telegraph office. I know you think you can find something out, but that temper of yours is only going to get you in trouble. Let me handle the investigating. From the way things look from my side, you should stay here and make sure no one makes another try on your brother. I'll send over a deputy, but maybe you can find someone else to help with that. You and Hoss can't cover the front, back, and sides of this building even with one deputy to help. By all accounts, there may have been four men who attacked Adam. That many were seen leaving that alley after the gunshot.\" What Clem said made sense so Joe reluctantly agreed at least for the time being. He went into the room where Hoss sat beside Adam and whispered to him what they had learned. Paul and the ladies were interested too so they came out to the office where Joe filled them in on what he and Clem had discussed. Paul was concerned about the safety of the two ladies, but Joe assured him that he would get enough protection for the place. Then he headed out to see if he could find one or two Ponderosa hands to help him out in defending the doctor's office should there be another attempt on Adam's life. On his way to town to have dinner with friends, Ben was enjoying a leisurely carriage ride when he was intercepted by Candy riding up to him. After he got the news about Adam, he was glad he wasn't riding Buck because he wasn't certain he would have been able to stay in the saddle. Adam was back but wounded terribly in an attempt on his life. It was all such a shock that his hands shook as he held the reins and drove the horse hard to get him to town as fast as possible. Luckily he was almost three-fourths of the way there when he got the news so the poor horse didn't suffer much. Candy went with him and volunteered to take care of the carriage horse, but Ben hardly heard him as he rushed to the doctor's office entering and looking for anyone who could tell him about his son. Paul intercepted him before he rushed directly into the surgery. \"Whoa, wait here a moment, Ben, and I'll tell you what's going on.\" \"I need to see my son!\" \"I know you do, but for your health, you need to calm down, and for Adam's benefit, you need to be calm and quiet when you see him.\" Ready to explode at the doctor's first statement, Ben had to acknowledge that the second part was important. He accepted Paul's words and stood waiting for what he would hear next. \"Sit down. I have a few things to say, and you should sit. Now, Adam doesn't have any life-threatening wound. The knife blow was with a lot of force and went deep and then was pushed downward some. What he did suffer as a result was a tremendous loss of blood. Now that can be as serious as anything else. He is very weak. An infection or any other problem could be too much for him to fight off at this point. We have to be careful what we put him through. He needs a lot of rest and quiet.\" \"I'll be as calm and quiet as need be.\" Putting his hand on Ben's arm as he sat beside his chair, Paul talked calmly and quietly. \"Good. Hoss has been sitting with him, and Adam has been sleeping. He's not likely to wake for a while. He's exhausted. Now, you have time so I'm going to tell you the rest of the story as I learned it from Joe. By the way, your youngest son is coordinating the protection of this place, and what I'm going to tell you will explain why that is necessary.\" So Paul told him what he had found out from Joe. \"Someone lured my son here to kill him?\" \"It appears that way, and for some reason, they wanted to confuse things by doing it with Hoss' knife. It would have worked too except that Adam didn't die so he was able to tell us to read his journal. That set Joe and Clem on the right track.\" \"Clem would know that Hoss wouldn't hurt Adam.\" \"Yes, but a lawman has to follow the evidence.\" \"So, it would have wasted time and confused everything.\" \"Yes, it seems a rather diabolical mind is behind this. Now that you're calm, let's go see your son. You can take Hoss' place.\" Although difficult, Ben avoided rolling his eyes or even raising his eyebrows much at his old friend's comment. He was too anxious to see his first-born son to do anything to delay that. When he walked in the dimly lit room, it took a moment to adjust his vision to the low light conditions. When he did, he saw Hoss holding Adam's hand and sitting beside him. Adam seemed to be resting comfortably or as much as one could under such circumstances. Paul whispered to him that as long as Adam remained quiet and didn't move much, he probably wouldn't feel too much pain. Hoss moved to let his father take the chair beside the bed. Ben took Adam's hand in his noting that the hand was warm probably from being held by Hoss. It didn't matter. He had his oldest son back and was going to sit by his side until he awakened so he could welcome him home. Hoss said something to him but he didn't even hear the words. His middle son smiled indulgently and left with the doctor. Joe was waiting in the office for them. \"How did he take it?\" Paul answered. \"I was a bit worried when he first arrived, but he calmed quickly and I held his arm to take his pulse. I don't think he even noticed. He's fine. Even when I told him the story that you told me, he did all right.\" \"I'm glad I was able to find Candy to go get Pa. I don't think I could have trusted anyone else to do it and get him here safely. He must have been almost in town though to get here so fast.\" Candy stepped into the office to hear that last part. \"Yeah, he was. He drove that carriage like a wild man though after I told him. I was afraid he was going to overturn it a couple of times, but he still has some good hands on the reins and kept the rig on the road. Scared a few people as we came through town though. So you still need my help?\" \"Yes, we shur could. We gotta protect this place cuz we think whoever tried to kill Adam is likely to try again and ifn they do, we aim to make shur they don't.\" \"I've got an idea about that.\" Joe explained what he wanted to do. Paul said that part of the plan wouldn't work so they amended that part and then talked about the other parts until they guessed they had a workable solution. Candy went outside to help the other two men guard the place. When Clem arrived later, Joe and Hoss talked to him about their idea. He agreed it might work better than trying to guard Adam around the clock when they didn't know whom the enemy was. They would have to convince Ben to go along with the plan though because he was the key to making it work, and he wasn't going to be available until Adam woke up so they waited. Over many cups of coffee, Hoss and Joe talked. Joe wondered openly why Adam had not come home sooner. He had promised to come back home, but without a timetable, that promise had remained unfulfilled. \"I think maybe he had to make some things happen in his life and some memories here had to fade away more.\" \"But doesn't Adam have good memories of living here on the Ponderosa?\" \"Shur he does, but funny thing is, memories work both ways. Some help and some hurt.\" \"Yeah, and that last year or so wasn't so good for him, was it?\" \"No, and it wasn't only what happened with Laura. I mean when you plan to get married and the woman goes behind your back with your own cousin, well that's pretty hard to take, but there were other things that didn't go well neither.\" \"But he knows we're there for him and we would have supported him no matter what.\" \"Shur he does, but you see, he wanted something he couldn't get here. He wanted to be able to run some things and do things on his own. He never could do that here.\" \"Pa put Adam in charge of lots of things.\" \"Ya, but listen to how ya jist said that. Pa put him in charge. He reported back to Pa. And you gotta remember how Pa was when a job he gave ya didn't go the way he wanted it to go. Then he'd talk about how he hadda do things himself to get 'em done right. He always talked about this as his ranch, and how he built this ranch, and how he ran this ranch, and nobody was gonna take this ranch away from him.\" \"That's just the way Pa talks. It doesn't mean he isn't including us.\" \"In a way, it does. But you see, it don't bother me none. I don't want to be in charge. That was never the job I wanted. You like being the second in command to Pa. That job suits you jist fine. Well, you see, that ain't what Adam wanted. He was raised up to be jist like Pa.\" \"But he works for other people now. He takes orders like he did here.\" \"I don't think it's the same. He's got a whole big part of the Department of the Interior that he has to handle. He reports to people higher up, but he has a lot of decisions to make and work to do and people to boss around.\" \"Yeah, he did like to do that kind of thing.\" \"In Washington, he's an important man. I don't think the people who tried to kill him know that. I think they knew he works there but didn't know all that he does. It kinda shows that it's somebody that knows him and us but not that well.\" \"You've been thinking about this too.\" \"Not much else to do when you're sitting by a sleeping man and have to be quiet.\" \"You know, if Adam knows a lot of important people, maybe we ought to tell them what happened, and maybe they'll send some help.\" \"Now that's another good idea, but you think we can send a telegram from here?\" \"Oh, yeah, that could be a problem.\" Joe twisted his mouth to the side as he did whenever he was thinking hard and then looked at Hoss with a confidence that said he had another scheme he was sure would work. \"We'll send someone to Carson City to send it.\" \"Who can we trust enough to do that?\" \"Only one man I know: Roy will do it for us.\" Hoss grinned because he knew that Joe was correct about that. \"You gonna ask him or you want me ta do it?\" \"You can go. I'll stay here.\" It took quite a while because Hoss had to explain everything that had happened. With Roy's background, he had a lot of questions. As the retired sheriff who helped out sometimes, he still had an interest in what happened in his town. He didn't like what he was hearing at all and agreed to Hoss' request. Hoss handed over some money knowing that Roy didn't have a lot since he had retired. \"This should pay your expenses. You take a room there and come back tomorrow.\" \"Hoss, I can't take your money. We're friends.\" \"We may be friends, Roy, but I asked you to do a job for us. We pay our friends when they work for us. Far as I can see, you're hired from now until this is over ifn you're agreeable to that.\" \"Well, I'd help you out, paid or not, but if you want me to be on the payroll, I'll accept that. Now, you know I won't do anything that goes against Sheriff Foster though.\" \"I know that, Roy. One of the reasons I want to hire ya on is to help keep my little brother in line. Ya know how he can get all riled up. I figure, between the two of us, we can keep him headed in the right direction on this.\" \"Now that's a good plan too. That boy has good ideas but he goes too full steam ahead some times.\" \"He does. Now, I want ta get back ta see ifn Adam's woke up yet.\" When Hoss got back, Adam was in a semi-conscious state. He was awake enough to take some water but not enough to communicate or see who was around him. He seemed warm, so Doctor Martin had the sheet pulled back, and he and Ben used cool damp cloths to wipe him down. That seemed to make him more comfortable, and he fell asleep again. Paul only pulled the sheet up to Adam's waist leaving his upper body exposed. It was warm enough in the room. \"Shouldn't we put a nightshirt on him?\" \"Ben, at this stage, it is much easier to care for a patient without that and less painful for him. Otherwise we would have to move the nightshirt up every time we wanted to look at his bandage or change the dressing. We would have to do the same to empty the urinal or sponge him down as we just did.\" \"I guess modesty isn't an issue at this stage.\" \"No, in a day or two, it will be, but at this point, he doesn't care and it is more efficient to care for him without one. The good news is that he seems to be rallying already. I hope that in a few hours, he'll wake, and you can say hello to your son. Right now though, he's sleeping soundly. It would be a good time for you to take a break, get something to eat, and do whatever you have to do. I'd say you have at least two to three hours before he's likely to wake again.\" Reluctant to do as the doctor advised, Ben was convinced by Hoss' gentle pressure on his arm to come with him as well as his whispered comment that he had things they needed to discuss about protecting Adam, and they could only do it outside the room. That got his attention and he left with Hoss. Paul sat down in the rocking chair in the room and relaxed closing his eyes to rest while Adam slept. There wasn't much of a chance for any of the family to visit with Adam because he was weak, and if they were going to implement their plan, they had to do it soon. It was an elaborate ruse, and the family began playing it out the next day. First up were Hoss and Joe who walked out of the doctor's office where Joe turned to Hoss and got enveloped in his big brother's arms. They stood that way for a short time until Roy walked out and put a hand on each of their shoulders. \"C'mon, boys. I know it's hard, but you gotta take care of things for your father. He ain't doing so good with all of this.\" \"I know, Roy, I know. C'mon, Joe, we gotta go get a wagon and you know, the other thing we need.\" With heads down, the two walked with Roy to the livery stable to rent a wagon and then to the undertaker's office to buy a coffin. They drove the wagon around back of Paul's office and sat there a moment before climbing down to carry the wooden coffin into the building. About a half hour later, they carried the coffin out with the help of Clem and a Ponderosa hand. Roy helped Ben down the steps as he was clearly distraught. He walked to the wagon and put a hand on the wooden coffin standing there with his head down for a long time. People had come around to the back of the building to see what had happened and word spread through the town at an amazing pace that the oldest Cartwright son had died. They heard Hoss and Joe say that their father should take the carriage back to the ranch. \"I'll ride with my son. I don't have much time left with him, so I want to take every minute I have left.\" Ben climbed into the wagon then and leaned on the coffin with his head down as his younger sons stood as if unsure what to do next. Roy moved up next to them. \"Why don't you have your man here drive the carriage back and you two stay in the wagon with your pa?\" In all the turmoil and drama, no one noticed that Candy wasn't with the group. No one had paid attention to who had come and gone except for the Cartwrights. Inside the building, Clem stood with Candy and breathed a sigh of relief. \"Looks like it went well. Now, you stay with Adam. I'll keep a deputy near by but they can't be too obvious. I got word that two men are coming from Washington to help. The attempted assassination of a federal official is serious business. They'll be able to help more because no one will know them.\" \"Ben and the boys did a heck of a job out there.\" \"They did. Now, like Joe said, whoever is behind this will likely show their hand. They wanted him dead for a reason, and I suspect we'll soon find out what that reason is.\" The funeral for Adam Cartwright was held on the shore of Lake Tahoe and a grave was dug and the coffin interred there. The family showed all the proper signs of a grieving family. As far as the conspirators could tell, their plan had been successful in achieving their first goal. They were a bit nervous that no one had seen the body, but the open grief they had witnessed from Ben Cartwright was the proof they accepted. They began to prepare to make their second move as soon as it was announced that Adam's will would be read. At Paul's office, Candy stood guard for Adam by sleeping in the same room and never leaving it. He took his meals there, and as Adam began to recover, they began to play chess and to talk. \"You know Joe thinks that maybe part of the reason you didn't come back was because of him and things he said to you.\" \"I forgave him long ago for anything he ever said to me. He should know that.\" \"I think he finally figured out that somebody can forgive you, but the scars from the wounds never go away.\" \"There were never any real scars. We skirmished but never had any real battles. It was fighting for position more than anything. He wanted what I had and being twelve years younger, it wasn't there for him. He wanted it faster than he was going to get it until I left.\" \"You think you leaving was good for him, don't you.\" \"You think ripping a hole in their hearts was good for them. You're quite a damned stupid fool for supposedly being such a smart man.\" \"I know you care about my brothers and my father, so I'll let that go, but be careful in the future what you call me. Stories about my temper and my pride aren't some tall tales anyone made up.\" Adam paused then, and even in his bed with a thick bandage across his middle, Candy had to admit that the man looked intimidating. Candy dropped his head in acknowledgement of the rebuke. \"You weren't here then. You don't know everything that went on nor do you know my personality. It didn't mesh well with the situation in which I found myself at thirty-five years old. It was a long way from any vision I had of my future when I was a younger man. I think I earned the right to make a choice of what I wanted to do next. I put a lot of years into that ranch, and I waited until my brothers were ready to handle anything that came their way. I wanted to leave years before I did, but instead I gradually made sure that my brothers knew how to do every single thing that I could do so that they could do it when I was gone. They may not have realized what was happening, but Pa did. We talked about it more than a year before I left.\" \"He saw what you were doing?\" \"It was his idea.\" That shook Candy up. \"Ben planned your leaving for you?\" \"No, he knew I wanted to leave, and came up with a plan to make it less difficult for my brothers and so that I wouldn't feel as guilty about it. You have to remember that my father left his family to come west. He walked away from them knowing he would never see them again. At least with me, he knew I could come back.\" \"That's not how the whole thing was explained to me.\" \"Joe told you.\" It was a statement not a question. \"If Hoss or Pa had told you about it, you would have a different way of looking at it. Joe sees it as doing something wrong because he wouldn't have done it. Pa and Hoss see it as doing it my way instead of their way. It's an important distinction.\" \"Are you always this way?\" \"What way?\" \"So logical and unemotional: it's kind of scary to think a man can be that cold.\" \"No, unfortunately, I have that Cartwright temper and stubbornness, and I've been known to be impulsive especially when it comes to women. I try to control myself, but inside, it's a whole different kind of story.\" Adam smiled then and chuckled to himself. \"What? Seems like there's more you were thinking just then.\" \"When I was younger, I had a Paiute friend, Young Wolf. He's dead now, killed in the First Paiute War. When we were much younger, he described the three of us as animals in the Paiute kind of tradition. He said that Joe was the coyote: the trickster, full of fun, ready to play, quick to anger, and actually quick at everything, moving from one thing to another. Hoss of course was the grizzly bear: straightforward, minds his own business, relaxed most of the time, and moves about his own territory watching out that no one messes with his family. He's got a temper though so don't try to push him around.\" \"And you, what are you?\" \"He said I was the cougar. I was always watching, thinking, planning, and waiting for the right opportunity.\" \"But the cougar is also a vicious killer and can tear a man's head off.\" Candy looked at Adam who smirked. \"Yeah, Hoss said that you can be very dangerous. I don't see it, but that cat never looks so dangerous either when it's walking through the grass.\" \"Hard to look dangerous propped up on pillows with a bandage around your middle.\" Adam rested his hand on his side then knowing if he started to laugh, it was going to hurt. \"Yeah, there is that too.\" Candy laughed then but not too much knowing it wouldn't be good for Adam to start laughing. \"You ready to lose another game of chess?\" \"If I recall, I only lost one and you have lost about ten. So I would think you need to ask yourself that question.\" \"I was only taking it easy on you because you're hurt. Now that you're getting more feisty, I can unleash my powerful game on you.\" Adam smirked again, but an hour later when he finally checkmated Candy, he had to admit it had been a far more difficult game than any of the previous ones. He had lost one of the earlier games due to his lack of concentration, and now suspected that Candy had been taking it easy on him in those first games. He was determined to prove that he could handle anything Candy could throw at him though and told him so. Two hours later, he checkmated Candy again. The two men smiled and saluted each other in recognition of a great match. It was time for dinner then and Paul brought in a tray for them. \"I got a note from Clem too. He says they plan to move the two of you out of here tomorrow night. I had told him that I thought you could tolerate the trip by then without any major problems. It will be uncomfortable, but I'll take the last of the stitches out tonight and check tomorrow to make sure that everything still looks good.\" \"How are they moving me?\" \"Aaron Kaufmann will stop by here to sell me a few things. You'll leave in the back of his wagon. Candy will wait until later, and they'll bring his horse around once you're safely out of town.\" \"Where am I going?\" \"One of the line cabins on the Ponderosa. Apparently some agents from the government are here to help and Ben fixed up the cabin for you and they fixed up the small stable too. The agents will stay there with you, and a few of the hands will be there too supposedly working there.\" \"So it won't seem odd if any member of my family stops by to check on things.\" \"Yes, that was the thought. Having you at the house opens the door to too many possibly seeing you and realizing you're alive.\" \"What hands will be working at the cabin?\" \"Candy and the two agents.\" \"The agents?\" \"Yes, they're playing the role of greenhorns and are being taught by Candy.\" \"Let me guess: Joe thought"} +{"id":"RedPajamaCommonCrawl.0033","text":"Ted Black individual coach, mentor & consultant 100 Day Action Project The phenomenal cash builders Ted Black gets back to basics with the cash-to-cash cycle and prays Cashbuild continues to do so CASHBUILD released its best results yet in September. Though relatively small in terms of market capitalisation, it is SA's leading building materials supplier. For good reason, this company has fascinated management stu \u2013 dents and analysts for more than 20 years. It has had its bad times as many firms do and that's when \"get back to basics\" always becomes the management mantra. There are only a handful, and tough-minded Pat Goldrick applied them after becoming CEO in 1997. Published results since 1986 showthere is one success imperative for any firm, irrespective of whether it is an \"old\" or \"new\" economy one. It is the velocity of the cash-tocash cycle. This is the measure: add the number of sales days of inventory you hold to the time it takes your customers to pay you. Next, subtract from that total the number of days you take to pay your suppliers. If you end up with a negative number, it means you generate cash from your dayto- day and month-to-month operating cycles. You'll have cash in the bank. Many companies find it difficult, even impossible, to achieve zero or a negative cash-to-cash cycle. It depends on their business design and operating system. Goldrick understands the measure because he has used his own cash to buy a chunk of the business and owns 10% of it. Being a genuine \"owner \", he thinks and acts like one. Moreover, unlike most \"turnaround\" managers who tend to bring some order and quickly move on, he is the company's longest-serving CEO. The cash-to-cash cycle governs a company's viability and has done since the days of the pharaohs. It has nothing to do with the fashionable distinction made between \"tangible\" and \"intangible\" assets. Nor does it drift into asset theories that treat people as \"human capital\" and \"brands \" as assets. Cashbuild will be 30 years old next year and as Arie de Geus observed 10 years ago in his book, The Living Company, few firms reach that age. In contrast, the seasons of man's life, tempered by lifestyle and disease, are programmed to take about 100 years to unfold. Yet, for companies, infant mortality is high. Few survive the t h re e \u2013 ye a r \"start-up\" phase. Those that do can still die young. Hardly any celebrate 20 but they have the potential to last for hundreds of years. The paradox is that, like people, firms are different but very much the same. They share a common reality that defines management's threefold task, which is to: Make today's business viable; Identify and unlock its hidden potential; and Turn it into tomorrow's business. EXHIBIT 1 provides a context. The universal \"S-curve\" reflects an organisation 's pattern of growth, effort and results over time. Two more underpin it. The first is the bumpy learning curve. When you launch a business, you drive for breakthrough with a superior product, technology or service that is low on the S-curve but has big potential. The model shows that a firm will not be economically productive during the start-up phase because of Murphy's Law: \"If anything can go wrong, it will.\" Learning is hard work. It consumes energy, resources and time. However, the inevitable mistakes become stepping stones to success. Once you reach a level of competence, the business is viable and can pay its bills. That's when you step onto the experience curve and take many, purposeful steps to tap into the hidden potential. You standardise ways of doing things but keep improving them. You build teams. Train people. Develop, redesign and entrench new systems and procedures that take wasteful practices out of the system. When people do the work together and share knowledge instead of competing, productivity climbs and costs per unit plummet. You make lots of money and generate cash. Your company becomes a cashcompounding machine. The Japanese call this stage Kaizen \u2013 the process of continuous improvement. After the Second World War, using knowledge of statistical process control and of experience curve effects first discovered in the US in the 1920s, they revolutionised productivity and achieved quality standards and levels of output that enabled them to capture many world markets through the 1960s, 70s and 80s. A humiliated Western world eventually caught up by using the knowledge it had gained 60 years earlier but neglected. During the 1980s, the mantra was \"total quality management\". Today, it has been rebranded as \"Six Sigma\" and converted into another fad. When competitors catch up, performance peaks. The S-curve tops out and heads south. What won you leadership is out of date. The time for radical change puts you at the bottom of a new S-curve. If you don't confront this reality, one of two things can happen: You drive the company crazy by injecting it with one-off, activity driven crash programmes; or You redouble your efforts with continuous improvement. The first change strategy never works. With the second, you discover how futile it is to revive a company through, say, Six Sigma, if what it does is out of date. At best, you improve productivity and keep products going a bit longer. However, it's a bit like putting a brain-dead person onto a life support system. You breathe new life into a company by creating and maximising opportunities. If you continue to pour your best people, resources and effort into yesterday's problems, your wheels may spin more efficiently but you sink ever deeper into a swamp of diminishing returns. The S-curve is a great theory but not easy to use. Its great value is in helping you to decide what your initiative aims for. Are you going for \"breakthrough \"? Or are you challenging the status quo \u2014 siphoning off resources to tap into the hidden potential lying dormant in the organisation? With the benefit of hindsight, Cashbuild fits the model well. Albert Koopman led the company start-up in 1979 in the Metro Cash and Carry Group and beat the long odds against success. Corporate start-ups rarely succeed because most managers lack the discipline of genuine entrepreneurs. They don't have what used to be known as Joburg's \"Newtown \" MBA. Pat Goldrick does have one. He started work as an ironmongery apprentice in Ireland aged 14. Fortunately, he lacks a \"master's degree in \"business administration\"\u2014 a qualification that would confuse and cause him permanent, bureaucratic brain damage. He knows that management is not a science. It is an art and a discipline that you can't learn in a classroom. Under Koopman, the company soon made profits and grew fast. Then in 1983, when there were nine branches, it ran out of steam. As he put it, rigor mortis set in. The fall in profits was only 11% \u2014 a bagatelle compared with the corporate collapses of recent years. However, it triggered a change process that revitalised the company. He claimed the root cause of the problem was his autocratic management style. He felt it destroyed any hope of building a company of loyal, committed people. The change that followed was so successful it became a case study for business schools. The academics argue that participative management releases people to be \"the best\". Involve everyone in making decisions and improved results will follow. With authoritarian styles of management governing most companies and institutions, the social unrest and escalating violence in the 1980s, the Cashbuild story did send an exciting message of hope. However, participation is only half of it. Effective executives concern themselves with people and numbers. For Koopman and Goldrick, \"empowerment\" is not another form of patronising, debilitating socialism that promotes dependence, not autonomy. To executives like them, it means accepting responsibility and accountability for results. EXHIBIT 2 trends some key ones. They are asset growth, the ROAM (return on assets managed) percentage and market capitalisation over the company's lifetime since listing on the Johannesburg Stock Exchange in 1986. The curves tell a story. Koopman left soon after the listing and an acquisition in 1987 hiked the number of branches from 32 to 52 and sales hit R84m. ROAM fell from 16,5% to 10,7% but recovered to peak at 16,7% in 1991. Then it started its erratic 10-year descent to zero in 2000. However, there was a short up-tick after management abandoned a misguided change in strategy during the early 1990s. To spur growth, it had decided to offer credit and created \"Creditbuild\" \u2014 a bad decision. Builders worldwide are notorious for being hugely inefficient. In SA they are no different. If you give them time to pay, you may never see your money. Meanwhile, the branch network grew at a steady clip until 1996 when it had 108 outlets and sales of R880m. During the slide down the slippery slope, Koopman's critics ignored the upward ROAM trend that followed his departure and the big acquisition. They argued his style was too soft and blamed it for the decline. The best way to get results is to \"kick ass\", they said. The fact is that Koopman did manage for results, as does Goldrick. Their styles may differ but, to paraphrase the late Peter Drucker, effective executives come in many types. Some are charismatic and ebullient. Others are shy and diffident. Some booze. Others don't touch a drop. Some are warm, charming and intuitive. Others are cold, logical, and analytical \u2014 they have the personality of a round-eyed trout on a s l a b. All differ, but share one trait. They get the right things done. Drucker described these \"right things\" \u2014 the fundamentals of management practice \u2014 in both Managing for Results and The Effective Executive, in the 1960s. No one has done it better. If there were a \"top 10\" of the best business books ever written, they would be on the list. He observed that effective executives get their organisations to concentrate and focus on opportunity \u2014the key to economic results. In the late 1970s Koopman studied the building material supplies market in SA and saw how desperately black communities in rural areas and townships needed and wanted to build or upgrade homes. Despite widespread poverty and limited personal buying power, Koopman reckoned the market size to be R4bn a year. It was attractive but none of the established chains of builders' merchants saw it that way. Only a few smaller, regional firms and many individual \"owner-managed\" businesses competed for it \u2014 thousands of them. The big companies thought it too fragmented and high risk. However, Koopman transformed what others saw as a \"problem \" into an \"opportunity\" and designed a business to capitalise on it. First, he went where the big players weren't. He chose to compete in towns with lots of black people living nearby. Locating away from big cities put it in a low-cost position. Branches cost less to build or rent and, because there were more people than jobs, salaries were lower. Second, he applied the military rule of force \u2014 concentrate re-sources on a narrow front. He targeted smaller building contractors and black traders and went for leadership in that niche. Third, he changed the game. He adapted the business to the economic and social realities of life facing the majority of South Africans by providing the building basics at lowest cost for cash. Last, with personal growth, effective managers build on their own strengths and the strengths of people around them. Under Goldrick, the management profile at branch level has moved fast to reflect the country's demographics: 50% of store managers are black and 15% of those are women. At senior level, 30% are black and 10% are women. Today, having jumped onto a new S-curve that took the company from wholesaling to retailing, Goldrick sees the market opportunity as being R120bn and climbing. Although it is still highly fragmented with more than 3 000 individual players, other bigger firms such as Spar's Buildit division, Massmart and Iliad are climbing into it. To hold their leadership position in the face of intense competition, Cashbuild has erected some competitive barriers. The first is to locate, build and revamp its stores fast to achieve the lowest capital cost per square metre of merchandising space. The stores are designed so as to erect the second barrier: to turn stock over quickly within a relatively small space. Third, Cashbuild works with suppliers to get the right stock in the store at the lowest price. These three barriers combine to create a moat that makes Cashbuild the lowest-cost supplier in SA and positions it for aggressive defence and attack. Last, although it operates with a low profit margin, it has to make enough to invest in the future \u2014 to train and develop staff and expand at a rate of 10 new stores a year. These barriers protect the business. Cashbuild concentrates on a chosen segment and dominates it with focused operations. The success of its strategy makes it attractive, sexy, and safe for investors and all who do business with it. Capital markets now rate the company as a relatively low-risk, high-return business in its sector and, as Exhibit 2 shows, reward it with a climbing share price and a market capitalisation that is bigger than the value of assets that Goldrick and his people are managing. However, despite its success, there is a \"problem-opportunity\" looming \u2014 one that faces more and more companies as they introduce share ownership schemes which form part of their economic empowerment initiatives. Giving employees precious equity through share options achieves nothing without a systematic education programme to go with it. In all companies, from boardroom level down, there is widespread ignorance about the rules of the game of business. People are just employees and kept that way. It creates a massive opportunity for productivity improvement. The prime measure of operating competence, one that few managers pay much attention to, is ROAM. As Drucker observed, if people work at it purposefully, day to day, year on year, it is the easiest and quickest way to improve the profitability of a business. The three key measures of ROAM are: Return on assets managed (ROAM) \u2014the total profit of the business. This is, Profit margin or ROS% (operating profit \u00f7 sales x 100) multiplied by Asset turnover or ATO (sales \u00f7 assets). The most important measure in this equation is asset turnover (ATO). It governs the cash-to-cash cycle. However, let's first take Cashbuild's return on sales percentage (ROS%). EXHIBIT 3 shows the close correlation between its profit margin and ROAM since first listing on the JSE. On the X-axis is the return on sales percentage (ROS%). The higher it is, the higher the ROAM. The message sent by this chart is that Cashbuild has to keep ROS around the 5% mark if it wants a respectable ROAM. That's the hurdle to keep beating. Even in a growth market, with increasing competition it is a tough ask. So where must they look to make a difference? Asset Turnover (ATO) and its submeasure \u2014 stock turnover (sales \u00f7 stock) \u2014powers the cashto- cash cycle. Take a Cashbuild branch. Say it stocks one window at a time and sells it for R100. To get it sold costs R95. The profit is R5 and the profit margin is 5%. If it turns its window stock once a year \u2014 sells a window once \u2014 that's a 5% return on the asset. If it can turn its stock twice \u2014sell two of them \u2014 then return on the asset doubles to 10%. Sell it six times and the return is 30%. To raise profit margins through increased selling prices, bigger volumes and cost-cutting in a highly competitive market is very difficult. Yet, to increase asset turnover by 10% and more a year by \"turning\" the inventory faster only means using the Cashbuilders ' brains purposefully. It needs some consistent hard work inside the business, but especially with suppliers. Goldrick took charge in 1997. Cashbuild 's ATO for the years 1997 to 2007 averages out at 3,1. That means for every rand of assets that Cashbuild manages, it generates on average R3,10 of sales each year. In 2007, with an extra week, it generated R3,40. For the previous seven years, it averaged R2,90. With the branch network growing steadily each year, Cashbuild 's key lever for lifting asset productivity is inventory. EXHIBIT 4 uses a statistical process behaviour chart \u2014 a valuable but rarely used management tool. It shows that the business model \u2014 the system designed by management \u2014 generates the numbers. The graph shows Cashbuild 's sales productivity of stock since listing in 1986. It answers this question: for every rand of stock, how many Rands of sales do we generate? The performance is typically random but relatively stable and predictable. The first plot, falling outside the upper limit in 1986, was probably due to year-end \"window dressing\" in preparation for the first year of the listing. Management most likely reduced stock as low as possible or used some accounting artifice to improve the result. The time series from 1997 when Goldrick took charge shows that R1 of stock generates an average of R5,73 in sales. The task is to get it above R6\u2014say R6,50 \u2014a 13% improvement. Goldrick would probably expect more than that to get the brains really working. To expand this \"problem\/opportunity\", the company is about to install a system from SAP. Will this help or hinder it? A recent Economist article posed a question about SAP's new product launch \u2014 a web based product code-named A1S. It asked if SAP could overcome its history of selling complicated software to big businesses. A systems consultant replied: \"People still haven't forgotten that implementing SAP is like pouring concrete into a company.\" The last thing shareholders would want is for an entrepreneurial company such as Cashbuild to be throttled by bureaucracy. It is a very real threat. A recent study by Micro Focus\u00ae of some the world's leading companies across five countries in Europe found that they ignore the size and value of the IT assets under their control. Less than half of chief financial and information officers try to quantify the value of these assets and, even more appalling, less than a third have ever tried to value their contribution to business performance. That won't surprise long-suffering operating managers but it is bad news for Cashbuild \u2014 unless they approach things differently. Effective managers perform well with or without IT systems. If high-performance IT people, not high-tech ones, supported them they could probably achieve spectacular results. IT people are among the most talented in organisations. However, they only talk the ROAM and management of change games. They don't play them. If they want to play the game of business, they must start seeing themselves as a centre for value creation, not technology. To be a \"fee-for-service\" firm is less important than attitude, self-image and mission. If they hold the view that \"you can't operate without us\", they will never deliver the way they could and should. So, that's the Kaizen's goal for the next year or so \u2014to get Cashbuild 's new IT assets to deliver a ROAM higher than today's 18%. For IT and financial people it is more of a \"breakthrough \" goal, but the company is still on the \"retailing \" experience curve. The omens for immediate improvement are not good. During the late 1990s research indicated that most enterprise resource planning implementations tend to depress ROS and ROAM for a few years before they deliver economic results. Look at BCX's results for the last two years for proof of that. By its own admission, the company whacked itself with a SAP implementation. That's hardly surprising when we learn that most financial and IT people can't be bothered to measure themselves anyway. Because Cashbuild operates with a low ROS percentage and Goldrick is a genuine \"owner \", perhaps it won't fall prey to accountants and IT \"techies\". If they don't, then we'll have a wonderful success story worth the retelling and more great lessons from them. Ted Black (jeblack@icon.- co.za) writes, coaches and conducts ROAM workshops that help managers design results driven projects. This entry was posted in Articles and tagged business, Business Day, return on assets managed, roam, Ted Black on October 22, 2007 by admin. Performance power is what counts Asset productivity drives the engine of efficient companies over the long term, writes Ted Black THE share market and the pressures it creates for top management is a significant, topical issue raised in the latest McKinsey Quarterly Review (Richard Rumelt, Strategy's Strategist). Generous share-option schemes can aggravate the problem, stimulating managers to pursue the wrong goal. As we know, prices are volatile. They respond to speculative expectations about future changes in industry and market sectors \u2014 less so to individual company performance. Top managers may think that's unfair, but what does it mean for them? They have to grit their teeth and detach themselves. They must play the ball, not the market players. They must stop pandering to analysts; ignore short-term share-pricemoves and perform their prime threefold management task, which is to: n Make today's business viable; n Identify and release its hidden reserve of potential; and n Turn it into tomorrow's business. Do these three things well, and the numbers will follow\u2014not least the share price. We know that the valuation mechanisms of professional investors and analysts can be hugely inefficient for a long time. However, in the end, performance power counts. It is the most important power of all. For a company, a key driver of it is asset productivity. High productivity buys you the time and leisure to think creatively \u2014a rare activity for most people in most organisations. Thinking people make assets work. When they work, they generate cash. Cash creates options and opportunities. Seize them and you leave competitors trailing as you take charge of your own destiny \u2014your growth and evolution. The first trait of the long-lived companies that Arie de Geus described 10 years ago in his book, The Living Company, was conservative financing. Extraordinarily successful companies do not risk money needlessly. They understand the meaning and value of cash in the bank. The three most important financial measures of operating management are: Return on assets managed (ROAM) \u2014 the total profit of the business. This is Profit margin (operating profit divided by sales multiplied by 100), multiplied by Asset productivity, or asset turnover (sales divided by assets). Using the latest year-end numbers, Exhibit 1 is a snapshot using data from more than 100 companies in 27 sectors on the Johannesburg Stock Exchange. It compares ROAM performance to a measure of value creation. It shows clearly a strong, positive correlation between ROAM performance and the ratio of market capitalisation to assets managed. As ROAM rises, so does the perceived value of the sector. However, as Boston Consulting Group pointed out as recently as 2003 in its Value Creators Report, Back to Fundamentals, the measure in ROAM that is most significant from a competitive viewpoint is asset productivity (asset turnover, or ATO in accounting jargon). It drives ROAM and, fundamentally, the value of a firm. Its findings showed that the days of relying on \"expectation premiums\" to fuel total shareholder returns are over. They argue that these premiums eventually decline to their long-term market average of zero. Only firms with strong fundamentals can achieve superior returns. Moreover, the top performers rely on asset productivity more heavily than cash-flow margins to lift profitability. To back that view, a momentous but predictable event occurred this year. Toyota passed General Motors (GM) to become the biggest, most profitable car manufacturer in the world. However, a warning light flashed on more than 25 years ago. Toyota landed a car from Japan outside GM's HQ in Detroit at better quality and a lower delivered cost than GM could achieve in the US. Ironically, that's when Tom Peters launched his career as a management guru and hyped GM as an excellent company in his, and Robert Waterman's, blockbusting In Search of Excellence. Exhibit 2 shows a major reason why Toyota is the leader today. The latest results (car-making only) illustrate the relative, competitive ATO effect. Toyota's asset productivity, with Tata close on its heels, is about 60% higher than the rest. It has been way ahead of GM for years. Firms worldwide are now applying its manufacturing principles, not only in production plants, but also in service industries wherever managers are determined to drive waste out of business systems and change the way their people work together. We applaud management heroes who rescue companies. However, few of them build sustainable businesses. They bring some order, then move on. In contrast, the truly successful companies have no heroes. Very few of us can name the man who runs Toyota. As Jim Womack, coauthor of Lean Thinking puts it, its success comes through the work of lots of \"farmers\", not heroes. These farmers are people who plough straight furrows, fix fences and keep a beady eye on the weather. Moving back to SA, there were many heroes in the information technology sector a few years ago. Most IT companies are not highly valued today. Overall, the sector's market capitalisation to assets managed ratio is 0.7, despite a booming market. Exhibit 3 displays its performance. Again, the ATO effect is clear. Datatec, Didata and Business Connexion account for 85% of the assets managed. Their combined ROAM is 6% \u2014 a very mediocre result. The top performer is Paracon, but its core business is to find and place IT people \u2014 not sell software, implement systems or \"drop boxes\". As to Didata, the boys from Roosevelt High have learned the truth of Virgil's maxim from the Aeneid (Book 6): \"Facilis discensus averim\u2026 Sed revocare gradum \u2026Hoc opus, hic labor est\" \u2014 the descent (to hell) is easy \u2026but to recover one's steps \u2026 that's the task and effort. Once you're on the slippery slope, it's all hell to get back again. It is easy to be carried away with hubris, but ego can stop top management from doing much needed weeding and pruning in the garden even though the numbers tell them to do it. Half of Didata's asset base generates 37% of sales, but 74% of the operating profit. The rest of the assets generate 63% of sales and only 26% of the profit. To make matters worse, the poor performers probably attract more than 80% of the central costs of $34,5m that wipe out their contribution anyway. And the final message from this sector? A recent Financial Mail article about Business Connexion says it all: \"The move to a business management software system from SAP had a material adverse impact on the collection of trade debtors.\" So much for asset productivity. One can only wonder about the number of companies that have been whacked by SAP-wielding IT people who do not seem to understand what productivity is or know how to use their technology to make a measurable impact on it. Their systems seem to tighten, instead of prising off the throttling grip of bureaucracy 's dead hand. Then we move into the retailers. Exhibit 4 compares the relative asset productivity and ROAM of the big three food retailers in SA. Until its latest results, Shoprite trailed Spar and Pick 'n Pay with both measures. Its sales margin has lifted ROAM, but not enough to catch up. There is a lot we can learn about business design and supply-chain management from these big retailers \u2014some of it not always good. There are suppliers who would prefer to deal with terrorists \u2014 at least you can negotiate with them, they say. However, in contrast to the traditional, confrontational buying approach of most firms, Wal-Mart in the US raced ahead of Kmart during the early 1990s by paying its suppliers sooner and working closely with them. Faster inventory turn led to better instore product availability. This meant they sold more, which pushed up sales per square metre and fixed asset productivity. To achieve these improvements, management chose a measure that Wal-Mart's then 1-million employees would understand. That criterion eliminated EVA\u2122(economic value added) and CFROI (cash flow return on investment) as measures. They wanted something that everybody could grasp easily and commit to \u2014it was ROAM. The effect was dramatic. Over a three-year period, sales increased 47%, but inventories grew only 7%. Taiichi Ohno, Toyota's legendary plant manager, was the architect of the company's manufacturing system. He visited Ford Motor Company before and after the Second World War. He found no change the second time and learned nothing from his trip. However, while there, he walked into a supermarket for the first time. The experience sparked Toyota's asset productivity-driven design. He switched it from \"push\" to \"pull\" production, and knew that suppliers had to become a key part of that shift in strategy. Today, Toyota's business model is the machine that is changing the world. If retail and IT companies are asset-light, what about capitalintensive industries such as mining? The sector's market cap\/assets ratio is 2.1 and individual companies are plotted in Exhibit 5. The picture is the same. ATO drives up ROAM. Kumba and Lonmin lead the pack. Harmony and Anglo Gold bring up the rear. The writing was on the wall for Harmony in 2004. Management's strategy doubled up the asset base and halved its productivity. It has bumped along or below the line at the bottom left-hand corner of the chart ever since. As to one of SA's exemplar companies, Exhibit 6 compares SABMiller 's various business units with each other and for further comparison, includes Anheuser Busch's and Molson Coors' North American beer interests. Yet again, the asset productivity effect is clear. We can only hope that management doesn't fall prey to ego, and match weakness with opportunity as it did when buying Miller, and compound the problem by merging it with Molson Coors. Adding low-performing assets to low-performing assets \u2014 doubtless at a hefty premium \u2014will plunge it deeper in the North American swamp and guarantee failure. As to taking SABMiller on in SA with Amstel, Heineken could be careering into a swamp here. On the chart, the South African business unit includes ABI. If we could take it out and look at asset productivity of beer alone, it's a safe bet that ATO and ROAM will be right off the chart. SAB can crush anyone who tries to enter this market. However, instead of going to Sun City for a gig costing millions of rands to work its sales and marketing people up into a competitive frenzy, it might be in the company's interests (and shareholders' for that matter) to adopt a more \"statesmanlike\" approach. An \"orderly \" beer war might not be such a bad thing. They don't have to maul each other like Miller and Bud are doing. Instead, a well orchestrated arrangement (kept top secret, of course) could see all beer sales going up as consumers join in the fray \"chug-a-lugging\" their favourite brands. It won't happen though. As Joseph Bower wrote 20 years ago in When Markets Quake: \"The willingness of companies to bleed each other is awesome!\" If they do go to war, the company with the highest asset productivity will win. It can bleed for longer. Beer South Africa can bleed for a very long time if it has to. Competitive ATO is why Miller is doomed to mediocrity in the US and why Heineken is taking such a big risk here \u2014 unless it has a sinister bloodletting plot with wider implications that we don't know about. So what does all this mean for management? The second characteristic of the long-lived companies that Arie de Geus identified was that no matter how diversified they were, their people felt they belonged. Case histories showed that a \"sense of community\" is essential for long-term survival. The managers of living companies commit to people before assets because they know that people \u2014 not spreadsheets and pieces of paper\u2014make assets work. Moreover, line managers must initiate the change process, not earnest corporate staff who behave as if they own the assets. They don't. Line managers do. Effective managers who believe in growing people and building a community know that you don't do it in a classroom. You build communities of growing people most rapidly and sustainably when its members are \"forced \", so to speak, to develop it under short-term, concrete, real-life challenges that are important to them. These challenges always lie at points of overlap along the value stream of activities from supplier through to customers. That's where you find the largest performance improvement potential to lever up asset productivity and where you can design community building projects that grow members fast, furiously and measurably. The improvement in the number tells you how much they have developed and provides the building blocks for expansion of the process. The long-lived companies commit to people first and assets second. People are \"the horse\" and asset productivity is \"the cart\". All it needs is to educate your people in what it is. As we all know, very few of them do, and that's true from boardroom to the work place. It's a wonderful message of opportunity. Ted Black (jeblack@icon.co.za) writes, coaches and conducts ROAM workshops that help managers design results-driven projects that grow them and their people This entry was posted in Articles and tagged Asset Productivity, business, Business Day, return on assets managed, roam, Ted Black on September 25, 2007 by admin. ROAMing through Rainbow's prism Ted Black and Frank Durand explain why Johann Rupert should have listened to his mum TRENDY theories that treat people as \"human capital\" or \"intellectual property\" and \"brands\" as assets, argue for new business metrics to measure and value talent. They are red herrings. What is important is to harness people's brains with the numbers we already have. There are only two critical factors in business. One is to make money. The other is to generate cash. Most managers and staff don't understand that their financial rewards and long-term security depend on doing those two things. Moreover, they don't know how to do it. Imagine what could happen if they did. Without the big picture that the financial numbers give, they just have a job. Bruce Henderson, the late founder of Boston Consulting Group, cut to the heart of the matter: \"A business is a cash compounding machine or it is nothing, and sooner or later will be swept away.\" \"Get back to basics\" always becomes the management mantra when companies hit bad times. The recent Remgro offer of R16 a share to minorities of RainbowChickens presents us a timely reminder of them. The bid puts Rainbow's value-of-the-firm (VOF) measure today at R4,6bn (share price multiplied by issued shares). It hit a year-end low of R230m in 1998. Anyone who bought shares near the time, probably most of today's minorities, has done very well indeed. But what about Remgro itself? What kind of investment has it been? Furthermore, what lessons can we take from the Rainbow saga? It's a great story. The first is that no manager can act intelligently, or with integrity, unless he thinks like an owner all the time. It is a state of mind. No-one tells owners what to do. They work it out for themselves. Despite all other demands, management has one legitimate purpose. It is to maximise the VOF for its owners \u2014 the shareholders. Fundamentally, the VOF derives from the productivity of the asset base, not the workforce. Managers make a return on assets. Owners make a return on investment. That is why return on assets managed (ROAM) is still the best measure for operating management and a great lens to use to seek and pinpoint productivity opportunities for people to tackle together. You cannot be a first-class manager unless you understand finance. The ROAM model helps build that understanding. It requires no more than Grade 6 arithmetic and can be used to teach everyone the \"great game of business\". Ignorance about the rules of the game is widespread \u2014 even at the highest levels. The first responsibility of any manager is to educate his or her people in business basics to give them the big picture \u2014 never mind specific job skills. The only valid measures of management intent and results are \"resource in: result out\" ratios. The ROAM model provides many of them. If used in the right way \u2014 to develop people \u2014 it triggers innovation, collaboration, teamwork and learning. Improved, sustained productivity follows. Exhibit 1, above, shows Rainbow's ROAM performance over 25 years. It sends the message: \"All roads lead to ROAM \u2026 or ruin!\" Sadly, that message did not re a c h the owner, Johann Rupert, until it was too late. People at the top are too often the last to know when things go badly wrong. The dour people he charged to watch over his investment typified those who Adam Smith described in The Wealth of Nations in 1771: \"The directors, being the managers of other people's money, cannot be expected to watch over it with the same anxious vigilance with which owners frequently watch over their own. Like the stewards of a rich man, they are apt to consider attention to detail as beneath them. Negligence and profusion, therefore, must always prevail, more or less in the management of the affairs of such a company.\" A 15-year decline resulted in a loss of R150m in 1996 and near bankruptcy for Rainbow. Following a rights issue to rescue the company, a furious Rupert stuck in another R600m, pulled on his gumboots and trudged around his chicken farm to find out what was going on. Did he own a sh*t chicken business or was he in a chickensh*t\" business? It looked like both. Facing the truth seldom comforts us. It is why crises can be so valuable. They force us to confront reality and take action. The first truth Remgro had to face was that it had made some huge blunders. Strategic planning's great contribution, if done well, is to trigger managed change \u2014 change that exploits proven strengths and maximises opportunities. However, neither Remgro, nor a reluctant HL&H, which ended up running Rainbow, knew anything about chicken farming. Seduced into a honey trap, they matched opportunity with weakness \u2014 the first blunder \u2014 and the numbers followed the weakness. Soon after listing, the company acquired Bonny Bird\/Epol from Premier Milling \u2014 a monumental bungle. This one doubled up the asset base and created a very different company from the one built by its founder \u2014 the late, legendary Stanley Methven. The move was based on the false premise that high market share results in high ROAM \u2014 that it is a cause-effect relationship. It is not. It is a probability, but a most unlikely one when you add nonperforming assets to low-performing assets. Methven knew this. Despite many approaches from Premier \u2014 a milling company that got into chickens by default \u2014 he did not want his company to be contaminated by it. The story goes that he even celebrated the end of a short, disastrous foray into feed milling. With his team gathered round him in Hammarsdale, he raised a glass of French Champagne, and said: \"If I ever get the urge to buy a feed mill again, shoot me.\" That's another important lesson. Celebrate the mistakes, savour them, and learn from them. Over the years, Epol had performed little better than break-even and Bonny Bird made a profit once in its history. Market analysts thought it a great move both for Premier and Rainbow, whose share price doubled. The VOF went to R1,7bn in 1992. The capital market's vote of confidence confirmed the 6th Higher Law of Business: \"You can sometimes fool the fans, but you never fool the players.\" The first loss followed and the VOF dropped to R848m. However, a small profit a year later in 1994 duped the fans again. They pushed the VOF back to R1,3bn, showing that managers in charge of a sick company can produce a big rise in the share price with second-rate financial performance. The players \u2014 Rainbow's people \u2014 were not fooled. From 1996 to 1999, the company lost nearly R600m, confirming the 9th Higher Law: \"If nobody pays attention, people stop caring.\" It was a disaster, and all to get one good brand, Farmer Brown, the only Premier \"asset\" really worth having. The move also destroyed HL&H \u2014 a once proud, 150-year-old company. The social and economic costs were grave, confirming the 10th Higher Law: \"Sh*t rolls downhill.\" With acquisitions, the golden rule is: \"Don't buy a standalone company, especially if you don't know the business.\" You will pay far too much unless you can uncover and release hidden productivity opportunities. It is better to buy a parcel of companies, sell the ones you do not want and get the one you do for a knockdown price. Corporate managers nearly always pay over the odds. In contrast, successful entrepreneurs bid \"low\". Knowing how to allocate capital well, they buy at a discount; sometimes for nothing if the target company is in distress. Seldom do they pay a big premium. Macsteel, owned by Eric Samson, is a good example. Reputed to be the biggest privately owned steel trading company in the world, it has acquired many companies but Samson has never paid more than net asset value \u2014 usually less, or in the end, sometimes nothing. There are good reasons why corporations pay too much. First, top management uses other people's money. Second, professional advisers' commissions and fees are linked to the size of the deal \u2014 the bigger the better. Third, executive pay is based on size of company and responsibility, not economic productivity. This brings us to the next measure. It's a cash one. Rainbow has been profitable every year since 1999, achieving its highest ROAM since 1982 \u2014 21%. But has the turnaround been good enough to justify owning it? As Peter Drucker put it: \"Until a business returns a profit that is greater than its cost of capital, it operates at a loss. Never mind that it pays taxes as if it had a genuine profit. The enterprise still returns less to the economy than it devours in resources. Until then it does not create wealth; it destroys it.\" Economic profit is a true measure of management competence and it is a tough one. You can manipulate the share price for quite a long time before capital markets catch on, which is why corporate management prefers it to economic profit. Funding comes from owners, lenders and suppliers. The cash buys assets that operating managers have to manage. None of it comes free. Rainbow's interest charge has always been low except in the mid- 1990s when debt reached R500m. Supplier credit is interest free, but not cost free. Inventory takes up space, needs management and generates many hidden costs. Owners' cash is also not free. Until you charge for it, you do not know if the firm has made an economic profit or not. It must not be so high as to miss the creation of it, nor must it be too low or the company becomes a cash trap. If you look at other, better alternatives for investment that Rupert had to give up, it seems reasonable and defensible for him to have \"charged\" Rainbow management 25% for his money and the risk he took. If he had, then Exhibit 2, below, is an indicator of how much wealth his management destroyed from 1989. It is not a pretty sight. The calculation is based on Stern Stewart's EVA\u2122 measure (net operating profit after tax less the actual cost of capital). It took until 2003 to create an economic profit equal to or better than a 25% return on equity. From 1989 to 2003, Rainbow returned R195m to owners for average equity of about R750m. That's a 26% return in total for a 15-year investment, or only R13m a year\u2014an annual return of less than 2%. As a self-deprecating Rupert humorously admitted at a shareholder AGM in 1998, his late mother had told him not to buy it. She was right. It was, and probably still is, a disastrous investment if you look at the 20-year opportunity cost. However, it is rare indeed for a business leader to have the courage and integrity to do what he did. Facing harsh reality and taking full responsibility leads to \"breakthrough\" and another important lesson. The corollary to the 9th Higher Law that the stuff rolls downhill is: \"Change must start at the top.\" Rupert intervened, picked his own man to run the show, and the turnaround started. Most organisations have huge potential for improvement but unlike Rainbow, few achieve major breakthroughs. The successful ones have leaders who grasp what has to be achieved \u2014 the goal is clear. They also confront their people with the clear belief that it will be done and that they can do it. Finally, they know that simplicity drives productivity. If you want change you do it with one number. Most managers \"manage by the numbers\" but with too many of them. Daily, a torrent of data swamps us. Most of it means little. Moreover, the numbers are random \u2014 random within the system. Before looking at the random numbers, let's look at the system. Rainbow's latest annual report gives a clear picture of the value stream of activities. If it attached asset values to each activity it would be even more interesting and revealing (see Exhibit 3 below). The business model determines if you make money. The key to economic productivity is concentration and focus. It raises two strategic questions: \"What assets should we own?\" and \"How do we control the rest?\" The most toxic of all business designs is unfocused, vertical integration. That is when a company owns everything. Rainbow was highly integrated in 1996 and still is. To make money, you must be the lowest-cost producer or you must have something no one else has. Unless you have a unique product or service that makes you different, you have to compete on price. The first strategic decision taken was to have good genetic stock. It affects the cost and quality of the bird on the plate. Your birds must grow faster, resist disease and end up plumper after eating less. Rainbow management had neglected this issue but corrected it successfully. The ROAM model poses two marketing questions to test a business model. They lead to input:output ratios. The first is: \"For every rand of assets we have, how many rands of sales do we generate?\" (Sales divided by total assets is the measure and is called asset turnover). Asset turnover is the most important measure of operating management and the least used. For Rainbow, it determines the capital cost of every kilogram of chicken sold \u2014 the first competitive productivity barrier for any firm. The slower your asset turn, the lower your ROAM is likely to be. Exhibit 4, below, shows how management improved asset turnover steadily through to 2002. The first task was to undo much of the Bonny Bird\/EPOL acquisition. Plants were closed and farms sold. As asset turnover accelerated from 1,3 in 1996 to 2,4 in 2002, it cranked up ROAM from -10,9% in 1998 to 12,5% in 2002. Then as management started to reinvest in new plant from 2003, slowing asset turn down, the next ROAM marketing measure becomes more significant: \"For every rand in sales, how many cents profit do we make?\" This is return on sales (operating profit \u00f7 sales \u00d7 100). It improved steadily from 5,2% in 2002 to its highest level in 18 years\u2014 14,1% last year. However, there are warning signs that today's management is losing sight of the importance of asset turnover. Watch out for marketing guys. They generate excitement and growth but have an Achilles heel. Asset productivity is not their strong suit. Because their mission is to please customers, give them the smallest gap and they expand and extend product lines, fill up warehouses with stock, discount it and then shy away from collecting money. This lowers the next ROAM productivity barrier: current asset turnover. It drives the measure that governs every company's viability \u2014 the cash-to-cash cycle. You must aim to have a lower level of stock and debtors per rand of sales than your competition. In Methven's day, stock and debtors spun an average of 6,3 times a year \u2014 that is about a 58-day cycle. Under HL&H it fell to an average of 3,9 \u2014 about 94 days \u2014 but reached a low of 3,5 (104 days) in 1997. Alarmingly, it is back there. Exhibits 5 and 6, at right, use physical numbers to show what happened. The first shows sales in kilograms over a three-year period just before the"} +{"id":"RedPajamaCommonCrawl.0034","text":"Race(ing) Popular Culture: More Thoughts on the Whitewashing of \"Lincoln\" and the Fathom Sneak Preview of Star Trek: The Next Generation Season 2 on Blu-ray I just got back from watching two digitally remastered episodes of Star Trek: The Next Generation (TNG) Season Two here in Chicago. The second year of TNG is when things really get going. It introduced the Borg in the episode \"Q Who\", and also explored the nature of humanity and sentience in the classic episode \"The Measure of a Man.\" Both episodes were glorious on the big screen: the Season Two blu-ray is a must buy. As a bonus,\"The Measure of a Man\" included about 10 minutes of new footage. In all, the additions added little to the plot. But, I have to admit it was great fun to watch TNG with a hardcore audience that mocked Wesley Crusher, who laughed at the homoerotic relationship between Data and Geordi, and was titillated by all the hot Picard sexy action with his still hungry and desirous ex-lover in \"The Measure of a Man.\" This screening reminded me of how powerful Star Trek has been in terms of presenting a hopeful vision of the future that was progressive and inclusive along lines of race, gender, and sexuality. From \"The Measure of a Man's\" discussion of slavery, to Deep Space Nine's exploration of queer and lesbian identity (as well as black masculinity), and classic Trek's bold embrace of characters such as Uhura, Chekhov, and Sulu, the Star Trek franchise was well ahead of most mass culture in preparing the (white) public for a multicultural future. The presence of black and brown folks in Star Trek--and the show's honesty in dealing with questions of social justice (both through the use of metaphor and explicitly) made their presence feel natural. In watching TNG tonight in the theater, I was reminded of how popular culture is at its core about the creation of meaning across and within communities. We all \"got\" why the show was special. All present \"got\" the inside jokes. We all had a common frame of reference, even as a given individual may choose to read meaning into the show in their own way. The range of reactions to the whitewashing of the movie Lincoln is a similar phenomenon. However, there are some qualifiers and differences. We have not reached a consensus on the meaning of the film. A given person's political priors, investment in the whiteness of memory, and attachment to the hagiography mythos surrounding President Lincoln, is also a lens which colors how a given person reads the movie. Lincoln is not really about 19th century America. It is actually a mirror for post civil rights Age of Obama America. As such, I would suggest that a given viewer's upsetness regarding claims to truth-telling in art, as well as Spielberg's surrender to the white racial frame, is actually a proxy for other political attitudes. Those who defend the willful deception that reads black agency out of Lincoln, are invested in a post-racial colorblind lie of a dream where talking about race is itself racist. This is the polite racial chauvinism and new age racism of the New Right and the faux progressive multicultural Left. Moreover, the defenders of Lincoln and Spielberg's whitewashed history of the events surrounding the passage of the Thirteenth Amendment are proceeding from the status quo ante in American popular film: black and brown people are largely absent in leading dramatic roles; as such, their presence, and an acknowledgement of black and brown folks as equals with white people in the filmic gaze, automatically becomes \"controversial\" or \"problematic.\" Conservative readings of race in popular culture instinctively rebel against the inclusion of people of color (and gays and lesbians, women, and the Other, more generally) as a surrender to political correctness and multiculturalism run amok. Spielberg's choice to eliminate the agency of African-Americans in their own freedom struggle is an active one. It was a decision to work against the historical record--and to make a less interesting and fully evolved movie. Spielberg surrendered his art to the normativity of Whiteness. Spielberg should be held accountable for that decision. He did not have to invent Frederick Douglass' relationship with President Lincoln, and the former's role in influencing the President's decision about the Thirteenth Amendment. He did not have to leave out the role of black bondspeople in forcing Emancipation and freedom. He did not have to make the black characters who were abolitionists, and shown in the film, mute statue bystanders. Spielberg made these choices for the comfort of Hollywood, profitability, and the White Gaze. Apologists for Lincoln, and those who instinctively defend other racist films such as The Help or The Blindside often want to dismiss popular culture as \"just\" ephemeral and unimportant. However, they are deeply invested in responding to any suggestion that such films may be enabling white supremacy. Their responses are a function of a type of team concept and group think around white privilege--said films may be the fantasies created by millionaires and billionaires for \"our\" entertainment, but those are \"our\" films and any suggestion that they may be racially reductive or chauvinistic is an insult to all of \"us.\" Once more, politics and popular culture are deeply and intimately intertwined. In thinking through Lincoln and the varied responses to it, the film \"matters in a variety of ways.\" Two quick thoughts. As the late James Snead observed and paraphrased, \"film is ideology presenting itself to itself, taking to itself, learning about itself.\" Lincoln tells us something about our contemporary political moment. Second, the absence of black agency in Lincoln is important because it is part of a long history where, as Snead further develops, people of color are negatively coded for in popular film and other types of media: The third device is omission, or exclusion by reversal, distortion, or some other type of censorship. Omission and exclusion are perhaps the most widespread tactics of racial stereotyping but are also the most difficult to prove because their manifestation is precisely absence itself. The repetition of black absence from locations of autonomy and importance creates the presence of the idea that blacks belong in positions of obscurity and dependence. From the earliest days of film, omission was the method of choice in designing mass images of blacks. Are the defenders of Spielberg's whitewashed history proceeding from a position of bad faith, drunk on the white racial frame, well-intentioned naive and ignorant, or just deeply invested in White aesthetic priors that are indifferent to the truth, even it means a conscious decision to remove people of color and their agency from a movie such as Lincoln? What is your theory? Tags: Arts, Chauncey DeVega says, ghetto nerds nomad said... \"What is your theory?\" It's Spielberg. That's enough to tell me I'll be looking through a white racial frame and that I don't want to see the movie. Regarding the predictable and probably justifiable criticism I'm seeing here; did you really expect anything else? Reminds me of similar black disappointment with Spielberg's handling of The Color Purple. insipid said... Well... Someone REALLY needs to tell Alice Walker how terribly dissapointing his handling of her novel was. She claims to love it: http:\/\/www.blackflix.com\/interviews\/walker.alice.html Guess that's her prerogative. Some folks didn't. I have been forced to watch segments of it, its a good movie (hey, it's Speilberg) but that's neither here nor there. I simply didn't want Spielberg's imagery superimposed upon the imagery I had derived from novel. It's same reason I won't see Spike Lee's Malcolm X. I like Lee's work, but I don't want his interpretation Malcolm superimposed on the image of him I have garnered in my readings and clips of the actual person. I don't want Spike to provide my interpretation of Malcolm no more than I want Spielberg provide my imagery of Lincoln. Movies are powerful tools for terraforming people's minds. On movies like the above mentioned, I pass. Like I say, the most historical accurate interpretation of Lincoln I've seen is Abraham Lincoln Vampire Hunter. Something that just occurred to me. If Spike had done Color Purple I would have probably been standing in line to see it when it was released. One black artist interpreting the work of another black artist. That's worth seeing even if it does superimpose itself upon the images already formed in my mind from reading the novel. Spielberg's take? Not interested. Well... that makes sense if you refuse to see any other interpretations. I'm a civil war buff and Spielberg's was a pretty accurate depiction. The two problems i had in the story was 1. the depiction of him cursing. While he did tell some saucy stories on the circuit, there's no indication that he cursed while he was President and 2. There's certainly no record of him ever striking any of his children. I also would of liked it a little more if they dealt with some of Lincoln's more controversial views such as his desire to ship negroes to Liberia. Most historians believe that he changed his mind at this point in the movie. But there's many that make persuasive arguments that he didn't. However to call this movie a \"racist\" film is a gross libel. He did not include Douglas in the movie because Douglas did not meet Lincoln during this time period other than his attendance at his second inaugural. Douglas' role was more in spreading the word of emancipation in the South, helping to recruit black soldiers. Black people were not a part of the story being told which was of the 13th amendment. Unfortunately blacks did not weild power at the time. They influenced power. Blacks in the balcony would be observers, not participants. The story of the changing relationship with Douglass and Lincoln from Douglass moving from harsh critic to weary supporter would be a good story, the story of the recruitment of black soldiers would also be a good story. You can fault Spielberg for maybe telling the wrong story, but it's unfair to accuse him of racism because he accurately told this one. @Insipid. You have one hell of a statement here...I will leave it to others to correct: \"Black people were not a part of the story being told which was of the 13th amendment.\" Funny, some of the leading professional historians in the field would very much disagree. I also think you need to expand your definition of \"racism.\" Steven Augustine said... RE: Spielberg's latest white(brain)washing opus: as I posted not long ago on this very site: THE COLLECTED WORKS OF ABRAHAM LINCOLN is a Searchable Online Resource. In honor of the Spielberg Photoshop-Job on Honest Abe they're busy shoe-horning into our minds this holiday propaganda cycle, do a \"simple\" search on the word \"nigger\"... speaking of Hegemonic Power and its Foundational Media Myths. Caveat: the people who formatted the site have rendered many of Lincoln's ugliest pronouncements sort of ambiguous (in one case, he *mockingly* quotes an editorial that advocates Black and White political equality... if you don't notice the faint, important colon before Lincoln's citation of the editorial --and the fact that they don't bother to close the quotes after: accident or not?--, you'd think they were Abe's beliefs: quite the opposite!)\" The Lincoln Myth is very nearly a bigger lie than the Santa, Jesus and Gandhi myths combined... but it needs to be, being as it's pretty much the cornerstone of North America's Exceptionalist Delusion. Splitting hairs on Lincoln is only necessary if you're interested in nurturing the clever new \"limited hangout\" spin that holds that good old Abe was \"only human, after all\". In the sense that Lester Maddox was... sure. Take the time. Use the resource. Read the closeted, kaffir-flogging chickenhawk in his own words, in clear context, and let's be done with these childish, hero-worshipping legends! Abe was a racist shit when plenty of White Men and Women were risking their lives to oppose an evil Abe was more than fine with. @Insipid \"Well... Someone REALLY needs to tell Alice Walker how terribly dissapointing his handling of her novel was.\" A.) You're indulging in the \"Hyper-Proportional Negro Race-Authority\" fallacy: ie: if one Negro says it's okay... B.) It's a rare sell-out that decides to turn-around, midstream, and bite the massive hand that feeds it. Read Richard Wright's rapturous review of Gertrude Stain's cringe-inducingly racist \"Melanctha\" polemic: \"Wright says that he had even read 'Melanctha' to 'a group of semi-literate Negro stockyard workers' who 'understood every word:' 'Enthralled,' concludes Wright, 'they slapped their thighs, howled, laughed, stomped, and interrupted [him] constantly to comment upon the characters.'\" A load of pernicious horseshit. Still, a Brotha gotta eat. Speaking of Star Trek spin off series (I didn't really follow them) but I thought it was cool how they turned the Klingons of the original series in to Space Africans. I just happened to be studying Africa at the time and I distinctly remember a prof saying that the quote \"It is a good day to die\" originating in some war in African history. I wish I could remember the context. Google doesn't bear that out. I suppose two different peoples on two different continents might develop similar sentiments in the face of genocide. I liked the badassed Space Africans. http:\/\/www.counterpunch.org\/2012\/11\/30\/paternalism-and-ass-covering-in-spielbergs-lincoln\/ @Chauncydevega- James McPherson, one of the world's premiere historians on the Civil War looked at it and found it to be basically historically acurate: http:\/\/www.latimes.com\/entertainment\/movies\/moviesnow\/la-et-mn-1128-lincoln-history-20121128,0,5620831.story As I pointed out in another thread, black people were not part of the passage of the 13th amendment shown in that film. Black people in Lincoln's life were mostly servants, they were not Congressmen, they were not part of the group that Seward sent out to offer patronage and favors in return for votes. Again, I have yet to see a single historian mentioned where Spielberg has any fact of historical significance wrong. This story had a limited focus on the back-room deals and machinations that went into the 13th Amendment's eventual passage. It is of historical record that black people were not part of those machinations. I think that you've expanded the definition of racism to the point where it is meaningless. He told a limited story of a limited event, for a limited time-period that didn't involve an abundance of black people. Your faulting him for telling the wrong story, not an innacurate one. @ Steve Augustine- You're viewing history through a conspiratorial lens not as it actually happened. It's a common meme and one that gratifiangly allows those who believe it to look down upon the rest of us rubes disdainfully. There is no evidence that Lincoln was gay. True if you look at his letters you may believe that, however you would also be led to believe that of Chase, Stanton, Seward and Bates if you looked at their letters. Professions of undying love and devotion was fairly common amongst the writings of men in the 19th century. Our interpretation of these writings as homosexual is more a reflection on our attitudes then theirs. While Lincoln's views of racial equality were not as enlightened as those of Charles Sumner or Thaddeus Stevens, there is little doubt that the man was anti-slavery to his core. His view of how to end it was to not allow for its expansion and allow it to whither ont he vine. That he prioritized saving the union is without question. However calling him indifferent to slavery is just wrong. If you have time here's a nice reading of Lincoln's Cooper Union speech: http:\/\/www.youtube.com\/watch?v=aQ2De8VcSLw I think that speech, amongst other writings leaves no doubt that the man was anti-slavery. I did not cite Alice Walker because she is some random negro that is OK with Spielberg's movie. I cited her because she is the author of the book upon which the movie is based. I cited her because she met frequently with Spielberg. As such she is a good authority as to A. Whether or not Spielberg did justice to her book and B. Whether Spielberg is a racist. Your argument seems to be that the only good black authority is the condemnatory authority. I don't think you should evaluate authority based on whether the source raves or condemns but rather on their experience that leads them to claim authority. Alice Walker as the author of the book is a valid authority. Frederic Douglass, though often critical of Abraham Lincoln grew to admire him as the greatest of statemen. Neither you nor I worked knew Abraham Lincoln nor worked with him on matters of race. Douglass did. I think both Walker and Douglass are greater authorities than you or I. Insipid: \"Black people were not a part of the story being told which was of the 13th amendment. Unfortunately blacks did not weild power at the time. They influenced power. Blacks in the balcony would be observers, not participants.\" Exactly my (white) parents' objection to the \"white frame\" critique of this film. Apart from all its other problems, that argument accepts the movie as a kind of natural phenomenon, as if Spielberg and Kushner dug it fully-formed out of the earth with pick and spade. They didn't! They chose their story, they chose what historical persons to depict. Also, I am fairly certain that Daniel Day-Lewis does not naturally walk around with a halo of amber light hovering around his noble head; the dude is method, but not that method. The point being: even if it were true that blacks had nothing to do with passage of the 13th amendment, why choose a story where people of color are sidelined? Where white folks are the only heroes? 1. \"Your argument seems to be that the only good black authority is the condemnatory authority.\" My argument is that \"authority\" (in any sense I'd consider worth debating) is not a matter of mere opinion; if you insist on basing your argument on an appeal to authority, I insist on questioning your \"authority's\" credentials. Sidebar:\"shilling\" is a common practice in the field of entertainment. Further: Do I need to lampoon Walker's lower-middlebrow bodice-ripper to drive home the point that I'm not much bothered by who\/what she approves of, in any case? 2. \"While Lincoln's views of racial equality were not as enlightened as those of Charles Sumner or Thaddeus Stevens, there is little doubt that the man was anti-slavery to his core.\" I see you haven't read the man-in-question's actual words on the matter. Do so (I provided easy-enough access to them) and get back to me and *then* we can have a discussion on the matter that isn't hobbled by impressionistic, propaganda-fueled fantasias. Nb: secondary, tertiary, and Hollywood sources are less than ideal. Re: Lincoln's \"Cooper Union Speech\": you clearly haven't read all of it (few have), or, if you have read it from beginning to end, you did so very poorly... or with your brainwash-goggles on. Lincoln's grand vision for racial healing in America was simply this: *deporting* all \"Niggers\". I can find many citations (primary sources) to support that (I can also find lots of examples of Abe using the word \"nigger\", as well, in his collected texts, edited by Abe himself), but I'll start with a tidbit from the speech you cite: \"In the language of Mr. Jefferson, uttered many years ago, 'It is still in our power to direct the process of emancipation, and deportation, peaceably, and in such slow degrees, as that the evil will wear off insensibly; and their places be, pari passu, filled up by free white laborers. If, on the contrary, it is left to force itself on, human nature must shudder at the prospect held up.\" You grasp the gist of this, no? Below is a nice aggregation (saving me hours of hunting-and-pecking in a futile \"debate\" with a Believer) of Lincoln's *own words* on the matter, along with the words of his contemporaries and colleagues. The Lincoln citations can all be confirmed in his Collected Works (link provided several comments above), in the original context which makes the intent of each statement crystal-clear. Now, either Abraham Lincoln suffered from MPD, or your \"knowledge\" of his outlook and career are fatally compromised by the quasi-historical nonsense you've been fed (by teachers and Television, if that's not redundant) since Kindergarten... the latter is the most likely case, you must admit. The Abe Lincoln his own words and deeds reveals is not the hologram you admire. \"At least one observer, General James S. Wadsworth, who had been \"with the President and Stanton every day at the War Department\u2014frequently for five or six hours\u2014during several months,\" told New York Tribune correspondent Adams S. Hill that Lincoln was still committed to the Old Union and was on his way to the other place. \"He says,\" Hill told his managing editor, \"that the President is not with us; has no Anti-slavery instincts. He never heard him speak of anti-slavery men, otherwise than as 'radicals,' 'abolitionists,' and of the 'nigger question,' he frequently speaks.\" (449) Monitoring all this, and collating the information he received from Lincoln insiders, Adam Gurowski told his diary in August 1862 that the President is \"indefatigable in his efforts to\u2014save slavery.\" (453) But Lincoln had no intention of dealing with racism or even discussing it. He didn't seek the opinions of his visitors. He was simply, he said, presenting a fact: Whites didn't want Blacks in America and therefore Blacks would have to go. \"There is an unwillingness on the part of our people, harsh as it may be, for you free colored people to remain with us.\" The only solution from his standpoint, that is to say, from a White standpoint, was a Black exodus.\"It is better for us both,\" he said twice, \"to be separated.\" (458) Frederick Douglass attacked Lincoln's logic and his racism, saying that a horse thief pleading that the existence of the horse is the apology for his theft or a highway man contending that the money in the traveler's pocket is the sole first cause of his robbery are about as much entitled to respect as is the President's reasoning at this point. Lincoln's position didn't surprise Douglass. \"Illogical and unfair as Mr. Lincoln's statements are, they are nevertheless quite in keeping with his whole course from the beginning of his administration up to this day, and confirm the painful conviction that though elected as an anti-slavery man by Republican and Abolition voters, Mr. Lincoln is quite a genuine representative of American prejudice and Negro hatred and far more concerned for the preservation of slavery, and the favor of the Border Slave States, than for any sentiment of magnanimity or principle of justice and humanity.\" (460-1) Far from being an anomaly, Lincoln's ethnic cleansing plan was the cornerstone of his military and political agenda and was based on what Randall called a \"grand design\" for a new White America without slaves\u2014and without Blacks. (464-5)\" Direct Citation (from Lincoln's Debate with Stephen Douglas, August 21, 1858): \"When my friend, Judge Douglas, came to Chicago, on the 9th of July, this speech having been delivered on the 16th of June, he made an harangue there, in which he took hold of this speech of mine, showing that he had carefully read it; and while he paid no attention to this matter at all, but complimented me as being a ``kind, amiable, and intelligent gentleman,'' notwithstanding I had said this; he goes on and eliminates, or draws out, from my speech this tendency of mine to set the States at war with one another, to make all the institutions uniform, and set the niggers and white people to marrying together. [Laughter.] Then, as the Judge had complimented me with these pleasant titles, (I must confess to my weakness,) I was a little ``taken,'' [laughter] for it came from a great man. I was not very much accustomed to flattery, and it came the sweeter to me. I was rather like the Hoosier, with the gingerbread, when he said he reckoned he loved it better than any other man, and got less of it. [Roars of laughter.] As the Judge had so flattered me, I could not make up my mind that he meant to deal unfairly with me; so I went to work to show him that he misunderstood the whole scope of my speech, and that I really neverPage 21 intended to set the people at war with one another. As an illustration, the next time I met him, which was at Springfield, I used this expression, that I claimed no right under the Constitution, nor had I any inclination, to enter into the Slave States and interfere with the institutions of slavery. He says upon that: Lincoln will not enter into the Slave States, but will go to the banks of the Ohio, on this side, and shoot over! [Laughter.] He runs on, step by step, in the horse-chestnut style of argument, until in the Springfield speech, he says, ``Unless he shall be successful in firing his batteries until he shall have extinguished slavery in all the States, the Union shall be dissolved.'' Now I don't think that was exactly the way to treat a kind, amiable, intelligent gentleman. [Roars of laughter.] I know if I had asked the Judge to show when or where it was I had said that, if I didn't succeed in firing into the Slave States until slavery should be extinguished, the Union should be dissolved, he could not have shown it. I understand what he would do. He would say, ``I don't mean to quote from you, but this was the result of what you say.'' But I have the right to ask, and I do ask now, Did you not put it in such a form that an ordinary reader or listener would take it as an expression from me? [Laughter.]\" Could any reader fluent in English draw the conclusion that the cited speaker (Abe Lincoln) was \"anti-slavery to his core\"? No. Americans must, first of all, learn to *read*. Not skim and scan... read. @Insipid. Thanks for the link. Foner disagrees as do others. Your reading of the interview is also very thin and leaves out something very important. Be careful, you are sitting at the big kids tables. Some adults may show up--you never know when they are watching--so you should always be on your A game. \"Some have criticized the small, relatively passive roles of the black characters in the movie \u2014 did Lincoln know many black people personally? He didn't have a lot of personal black friends, but he had grown to admire a lot of black people he knew abstractly. One thing the movie leaves out is his relationship with Frederick Douglass. Lincoln came to know Douglass and admire him greatly, and Douglass did come to the White House.\" Your own citation suggests that Spielberg made a choice to whitewash this history. Simply accept the fact and power of choice. Re: racism. My definition is very nuanced and expansive as is racism. Don't fall for the KKK burning negroes alive Bull Connor decision rule for what racism constitutes. Sloppy thinking. I do not need the online version of Abraham Lincoln's collected works, I have them right on my bookshelf. I've read them. I've also read Doris Kearns Goodwin's team of rivals, I've read Stephen B. Oates \"With Malice Towards None\", \"Crises of the House Divided\" by Henry Jaffa, Gore Vidal's \"Lincoln\", \"Battle Cry of Freedom\" by James McPherson. I've also read the \"Narrative of the Life of Frederick Douglass: among other books on the Civil War. As I said, I'm a Civil War buff. None of which is to say that my belief is necessarily superior to your belief or that I am necessarily right or that you are wrong. What makes history fun is the fact that there is no right or wrong answers if there were there'd just be one book on Abraham Lincoln that we'd all go to instead of the over 15,000 that exist. As far as his deportation plans, there are authors that argue that he largely abandoned those plans towards the end of the war. And there are some that stated that he was advancing that politically for those who didn't like slavery but didn't want one of \"them\" to marry their sister. I'm not so sure of that. Either way I've seen no evidence that Lincoln favored FORCIBLE deportation. To use a Romney phrase he favored \"self- deportation\". If he were in favor of forcible deportation he would not of consulted Frederick Douglass and other black leaders to gain support for it. He'd just order the troops. He feared, justifiably, the lynching's and unrest that would follow emancipation. He recognized that the history of black people in America was not a happy one. He thought deportation the solution for both races. Furthermore there's little evidence to support that Lincoln felt he had the power to force blacks to leave in that he always maintain that freed blacks should have the same legal and constitutional rights as white men. He believed their natural inferiority would prevent them from advancing as far. But he maintained in a speech in his speech in Peoria \"What I do say is, that no man is good enough to govern another man, without that other's consent. I say this is the leading principle - the sheet anchor of American republicanism.\" Lincoln's use of the word \"nigger\" in that quote was done to illustrate the ignorance of Stephen Douglas. The entire passage, in fact was making fun of Douglas' fear mongering regarding his intent to wage war with the South. Lincoln's intent was to stop slavery by containing it, not through force. It was the dumb-ass South that made the forcible deportation possible by firing on Fort Sumpter. While I certainly find Lincoln's views of racial equality troubling, it's also fair to say that the times then were much more racist then today's times. A man who believed in full racial equality and suffrage would not have ever been elected to the Presidency. I also didn't like President Obama's views on gay marriage when he first ran for the Presidency, it didn't stop me from voting for him. And it was the best vote I ever cast. If you want to play a game of dueling quotes, I'll be happy to oblige: From the Cooper Union Speech: Nor can we justifiably withhold this, on any ground save our conviction that slavery is wrong. If slavery is right, all words, acts, laws, and constitutions against it, are themselves wrong, and should be silenced, and swept away. If it is right, we cannot justly object to its nationality - its universality; if it is wrong, they cannot justly insist upon its extension - its enlargement. All they ask, we could readily grant, if we thought slavery right; all we ask, they could as readily grant, if they thought it wrong. Their thinking it right, and our thinking it wrong, is the precise fact upon which depends thewhole controversy. Thinking it right, as they do, they are not to blame for desiring its full recognition, as being right; but, thinking it wrong, as we do, can we yield to them? Can we cast our votes with their view, and against our own? In view of our moral, social, and political responsibilities, can we do this? Wrong as we think slavery is, we can yet afford to let it alone where it is, because that much is due to the necessity arising from its actual presence in the nation; but can we, while our votes will prevent it, allow it to spread into the National Territories, and to overrun us here in these Free States? If our sense of duty forbids this, then let us stand by our duty, fearlessly and effectively. Let us be diverted by none of those sophistical contrivances wherewith we are so industriously plied and belabored - contrivances such as groping for some middle ground between the right and the wrong, vain as the search for a man who should be neither a living man nor a dead man - such as a policy of \"don't care\" on a question about which all true men do care - such as Union appeals beseeching true Union men to yield to Disunionists, reversing the divine rule, and calling, not the sinners, but the righteous to repentance - such as invocations to Washington, imploring men to unsay what Washington said, and undo what Washington did.. Lincoln Douglass Debates, Galeburg: \"Now, I confess myself as belonging to that class in the country who contemplate slavery as a moral, social and political evil, having due regard for its actual existence amongst us and the difficulties of getting rid of it in any satisfactory way, and to all the constitutional obligations which have been thrown about it; but, nevertheless, desire a policy that looks to the prevention of it as a wrong, and looks hopefully to the time when as a wrong it may come to an end.\" While it is true that Frederick Douglass was a critic of Lincoln, he also certainly came to admire him. From Douglass' 1876 speech Commemorating Lincoln: When, therefore, it shall be asked what we have to do with the memory of Abraham Lincoln, or what Abraham Lincoln had to do with us, the answer is ready, full, and complete. Though he loved Caesar less than Rome, though the Union was more to him than our freedom or our future, under his wise and beneficent rule we saw ourselves gradually lifted from the depths of slavery to the heights of liberty and manhood; under his wise and beneficent rule, and by measures approved and vigorously pressed by him, we saw that the handwriting of ages, in the form of prejudice and proscription, was rapidly fading away from the face of our whole country; under his rule, and in due time, about as soon after all as the country could tolerate the strange spectacle, we saw our brave sons and brothers laying off the rags of bondage, and being clothed all over in the blue uniforms of the soldiers of the United States; under his rule we saw two hundred thousand of our dark and dusky people responding to the call of Abraham Lincoln, and with muskets on their shoulders, and eagles on their buttons, timing their high footsteps to liberty and union under the national flag; under his rule we saw the independence of the black republic of Haiti, the special object of slave-holding aversion and horror, fully recognized, and her minister, a colored gentleman, duly received here in the city of Washington; under his rule we saw the internal slave-trade, which so long disgraced the nation, abolished, and slavery abolished in the District of Columbia; under his rule we saw for the first time the law enforced against the foreign slave trade, and the first slave-trader hanged like any other pirate or murderer; under his rule, assisted by the greatest captain of our age, and his inspiration, we saw the Confederate States, based upon the idea that our race must be slaves, and slaves forever, battered to pieces and scattered to the four winds; under his rule, and in the fullness of time, we saw Abraham Lincoln, after giving the slave-holders three months' grace in which to save their hateful slave system, penning the immortal paper, which, though special in its language, was general in its principles and effect, making slavery forever impossible in the United States. Though we waited long, we saw all this and more. So much of this debate reminds me of the debates I have over our current president. With President Obama I'm often accused of being a blind, hero-worshiping, brainwashed apologist of The One. I recognize flaws in both these men, I also see greatness. But that, I think is the human condition that we are not all necessarily one or the other. Though if you want to call me brainwashed, I will confess that I see a lot more great than bad in both men. Though I still disagree with you I love your passion. Life is too short and precious for equanimity. @chaunceydevega- Of course people disagree. Again, that's the fun of history. What's the fun of arguing over 2+2? I read the part of the interview in question, i also answered that criticism earlier. 1. I believe that having a 5 minute segment featuring Douglass would of paid short thrift to the man and 2. Douglass did not visit the White House during the period in which the movie took place. Plus if he had put Douglass in the movie for 5 minutes would that have satisfied you? I doubt it, his ONE battle scene featured black soldiers and you still maintain that he ignored the importance of black soldiers in emancipation. Again, it seems to me that your anger is that he didn't cover what you wanted. Since it is your blog, should I admonish you for not being adult enough to remember my previous post? Imply that you are not at the big kids table? State that you, for some reason need to bring your \"A game\"? Or just accept that you and i can both be intelligent and wrong and that the internet is mostly shits and giggles? I think there is a chasm between labeling only the KKK as racist and using that label for a director, whom you believe made some poor choices. If you're behind me and i do not open the door for you is it because i'm 1. Racist? 2. inconsiderate? 3. Absent minded? 4. Ignorant of the fact that you were there? The answer depends on my past history. I am loathe to label a director a racist for making, what is to you, poor movie choices. I think that racist is a very loaded term that sparks a lot of emotional reaction. I feel you're using it a bit too casually here. Plus, you must admit that taking on Lincoln, even today, is a powder keg that's hard to get right. ANY history of Lincoln that depicts him as anything other than craven would be derided by Steven Augustine, for instance. And I'm sure there's many that are angered because he is not made saintly enough. I'm thankful that he made the efforts, if for no other reason than it sparks conversations such as this. @Insipid. Sitting at the big kids table is one of my favorite phrases. Roll with the punches. My point was don't quote from a source that actually works against your claim. I try to hold myself to high standards, I do the same for others. I mess up sometimes, just as all of us do. The trick is to own our ignorance and errors. See the newest post about holding Spielberg responsible for his choices. Remember, this is not the first time he has been called out for his white savior complex. See his movie Amistad, and also complaints about the Empire of the Sun. Poor movie choices that further the white racial frame and the centrality of whiteness are racist. I will give you another movie that does some very problematic work in terms of whiteness and the whiteness of memory, that movie? Forrest Gump. The work that race and racial ideologies does in mass culture is not just overt in its racial invective. Reinforcing the benign nature of Whiteness and centering Whiteness as natural and normal and marginalizing, othering, or erasing black and brown folks is racist. Race and representation are complex. Check out some of Stuart Hall's videos where he tries to break down these relationships. You may find them provocative, challenging, and informative. Anyway, i'm tired of arguing about Lincoln. I have serious issues with your praise of Star Trek. Set phasers to argue! How in the world can you be so condmenatory to Lincoln and give Star Trek such a complete pass on its absence of gay characters? Even assuming you're right and that Lincoln made \"racist choices\" in excluding blacks it is STILL only one movie! Star Trek has been on the air for fourty six years resulting in 5 series, and (i think) a dozen movies and they STILL haven't had ONE gay character? And the one gay scene they did have was the result of an unfortunate transferal of a soul-slug. Not, because, heaven forbid, they should depict someone as being born that way. If we're to believe Star Trek mythos in the future not only has prejudice and apparently all bad thoughts (except lust) and flatulence been eradicated, but in the future no man likes dick nor women likes snatch. I guess they found the gay gene. @Insipid. Well if you include slash stuff Kirk and Spock are deep in love. Wrath of Khan can actually be read as a tale of gay obsession between Kirk and Khan. There was a gay character in First Contact whose sexuality was written out--that was Lt. Hawk. DS9 had many more issues exploring non-het sexuality. TNG also did the episode w. Riker and the \"gay cure\" for his lover. Classic Trek has serious issues with black men, as do the other series too--we are all crazy, depressed, insane, or pining for white women's love while wearing blue cybernetic eyes. The series ain't perfect. Also, (sorry, i'm on a roll) doesn't it bother you the whole \"White Man's burden\" idea displayed particularly in the original series and next gen? I mean was there EVER a time in the history of the show where the crew met an alien race and they got into an argument and someone from the crew said \"you know, you're right, i never thought of that\". I mean even Q the most awesomest powerful alien ever was morally inferior to John Luk. Plus if the whole idea behind the show is that the only way we could get into space is if we put all racism, sexism, bad thoughts and body odor behind us, how the fuck did all the other aliens get into space? You know the ferengi, the klingons, the cardiasians, Frank Gorshen? Why are they capable of space travel and still such rotten pieces of shit? It seems to me that much of the purpose of the series is to show that mankind can come together non-gay blacks, women, asians and hispanics to shit on every other civiliziation in the universe. This is a theme that's supposed to give us hope? @Insipid. Absolutely. There is a cool book on Race and Star Trek (raceing towards the future I think?) that talks about this. There are a few solid collections on this issue. There is a book on Trek and International Relations Theory that has a provocative chapter on the hegemonic nature of the Federation and its aggressive assimilating approach to alien species. This is a very small part of a chapter that was supposed to come out in a book but the project got shelved at the last minute. You may find it interesting: http:\/\/wearerespectablenegroes.blogspot.com\/2011\/12\/help-book-chapter-find-home-politics-of.html @chauncvega- Fine, if slash counts, in the spirit of reconciliation I shall write a scene in which Stephen Douglass meets Abe Lincoln in the oval office- and fuck. Is them depicting non-het sex supposed to be better? Producer: Let's really push the boundaries of sexuality on this show! Other producer: Two men dating? Producer: ARE YOU NUTS?!?!? I was thinking of a species being threatened by the dreaded Kondovian Cocksucker! It attaches to the genetilia rendering everyone in complete bliss- but also without the desire to procreate threatening extinction of the species! OP: Brilliant, Charlie, sorry about the gay character idea, i don't know WHAT i was thinking! Producer: Yeah, that was REALLY out there, Ted. @Insipid: \"None of which is to say that my belief is necessarily superior to your belief or that I am necessarily right or that you are wrong. What makes history fun is the fact that there is no right or wrong answers if there were there'd just be one book on Abraham Lincoln that we'd all go to instead of the over 15,000 that exist.\" There are, in fact, right and wrong answers regarding the historical record... these are called \"fictions\" and \"facts. The \"15,000 books\" figure means nothing in and of itself (and reflects, in this case, only the energy required to maintain the propaganda that helps to produce the powerful and bizarre delusion, shared by most Americans, that American politicians are nobler, somehow, than any others on Earth) compared to the man's own words and if, in his speeches, he softened his position in order to get elected (not the first time a politician did this, I'm sure you'll agree), what of it? If a man courts the feminist vote by saying some politically-correct things on the campaign trail, but is on-record telling rape jokes a dozen times the year before the election (and the years after), this is no paradox, and neither is that man's \"good\" balanced by his \"not-so-goodness\". To claim otherwise is sheer sophistry, especially in contemplating politics. \"Family values\" is so often the platform for serial-adulterers in Washington that we all now *expect* it to be so. And, please: Lincoln's use of the word \"nigger\" was not a form of satire. That's why the online version of the Collected Works is useful. Simply put \"nigger\" in the search window they supply and read the results. Lincoln's more constant arguments against the institution of slavery were A) that it kept Negroes in the country B) it hurt White labor... but he had no \"inclination\" (\"I claimed no right under the Constitution, nor had I any inclination, to enter into the Slave States and interfere with the institutions of slavery.\") to disturb it where it already existed. And his vision of Mass Negro Deportation did not soften or modify as he matured; here he is on the matter, in a speech, just three years before his death: \"Reduce the supply of black labor, by colonizing the black laborer out of the country, and, by precisely so much, you increase the demand for, and wages of, white labor.\" RE: Douglass' supposed view of Lincoln, Lerone Bennett Jr., author of Forced Into Glory, writes, in that book: \"A recent author tells us that Douglass said Lincoln was \"the first great man I talked with in the United States freely, who in no single instance reminded me of the difference of color between himself and myself, the difference of color,\" but she didn't tell us that Douglass backed away from that statement in a speech he made two years before his death. (634n)\" Totally agree with you about the Normative Message they've written into Star Trek's DNA; you've got a sharp eye for it, though not so sharp when it comes to Legacy Propaganda (Kirk vs Lincoln; laugh)... which makes me think I must have a blind spot re: some segment of the Total Propaganda Spectrum, too. @Steven Augustine I'm sorry, but the record is not \"irrifutable\" as is evidenced by the fact that I am refuting it. Furthermore, virtually everything that you have accused me of, from reading the history selectively, to being \"brainwashed\" i contend can apply far more to you. In the same way you bought into the idea of Lincoln being gay selectively reading his letters and his biography you've bought into other theories about Lincoln. You're also wrong in regards to his main arguments about slavery. His main argument was that slavery is wrong. He made that clear at Cooper union, he made that clear numerous times. I quoted whole passages from Lincolns Cooper Union, you quoted a sentence, I could also left whole passages from his debates his speeches his letters and much of his writings. There are people with doctorate degrees that have spent 20 or thirty years studying Lincoln, reading every scrap of material that he has ever wrote and reading everything that has been said about him. People such as James McPherson, Stephen B. Oates, Shelby Foote, and yes Frederick Douglass are all intelligent people that have reached different conclusions than you. You should accept the fact that they are not stupid and consider what they have to say, just as i have considered what Mr. Bennett has to say. There is not a single argument you have named that I have not heard before. I have rejected them for a reason, not because I am dumb. The quotes and the anecdotes that you have given make a case, but not a compelling one compared to the bulk of the evidence. Yes, Douglass said critical things of Lincoln not just at his death but throughout his life and even in the speech that I quoted commemorating Lincoln. The fact that he said something critical at his death is not surprising at all. However there is no evidence that he recanted his admiration at his death. Most of"} +{"id":"RedPajamaCommonCrawl.0035","text":"Research ArticleImmunologyVirology Free access | 10.1172\/JCI97229 Microglia are required for protection against lethal coronavirus encephalitis in mice D. Lori Wheeler,1 Alan Sariol,1 David K. Meyerholz,2 and Stanley Perlman1,3 1Interdisciplinary Graduate Program in Immunology, 2Department of Pathology, and 3Department of Microbiology and Immunology, University of Iowa, Iowa City, Iowa, USA. Address correspondence to Stanley Perlman, Department of Microbiology and Immunology, BSB 3-712, University of Iowa, Iowa City, Iowa 52242, USA. Phone: 319.335.8549; Email: Stanley-perlman@uiowa.edu. Find articles by Wheeler, D. in: JCI | PubMed | Google Scholar Find articles by Sariol, A. in: JCI | PubMed | Google Scholar Find articles by Meyerholz, D. in: JCI | PubMed | Google Scholar Find articles by Perlman, S. in: JCI | PubMed | Google Scholar | First published January 29, 2018 - More info First published January 29, 2018 - Version history Received: September 6, 2017; Accepted: December 12, 2017 Recent findings have highlighted the role of microglia in orchestrating normal development and refining neural network connectivity in the healthy CNS. Microglia are not only vital cells in maintaining CNS homeostasis, but also respond to injury, infection, and disease by undergoing proliferation and changes in transcription and morphology. A better understanding of the specific role of microglia in responding to viral infection is complicated by the presence of nonmicroglial myeloid cells with potentially overlapping function in the healthy brain and by the rapid infiltration of hematopoietic myeloid cells into the brain in diseased states. Here, we used an inhibitor of colony-stimulating factor 1 receptor (CSF1R) that depletes microglia to examine the specific roles of microglia in response to infection with the mouse hepatitis virus (MHV), a neurotropic coronavirus. Our results show that microglia were required during the early days after infection to limit MHV replication and subsequent morbidity and lethality. Additionally, microglia depletion resulted in ineffective T cell responses. These results reveal nonredundant, critical roles for microglia in the early innate and virus-specific T cell responses and for subsequent host protection from viral encephalitis. Microglia are CNS-resident mononuclear phagocytic cells typified by a unique ramified shape and distinctive gene expression (1, 2). Unlike blood-derived macrophages, however, most microglia are derived from a yolk sac progenitor and seed the brain early in development (3, 4). Recent work suggests that microglia serve their purpose by maintaining homeostasis in the brain. Indeed, microglia are important for neurogenesis, synapse maintenance, and neuronal function, indicating that these cells maintain a healthy brain by a multitude of functions (5\u20139). As resident cells, microglia are assumed to help orchestrate the immune response to pathogen infection of the brain. While often touted as immune sentinels, little is known about how or if microglia engage in this function (10, 11). Microglia function is compromised in human genetic diseases such as Nasu-Hakola (TREM2-DAP12 mutations) and other adult-onset dementias (12, 13) and may be functionally impaired under certain physiological conditions (14). However, genetic disorders resulting in microglia dysfunction do not result in increased susceptibility to CNS infections and instead result in neurodegeneration (12, 13). While nonparenchymal macrophages of the brain may be the logical cells to respond to a pathogen introduced into the CNS through the bloodstream, these cells would not protect the brain from viruses that enter the CNS by transport through neurons. As the only myeloid cells present within the brain parenchyma, microglia are positioned to respond to a pathogen at this location. As such, the importance of microglia in the host response to virus infections may be partially dependent on the pathogen and route of entry. Mice infected with the neuroattenuated rJ2.2 strain of the murine coronavirus, mouse hepatitis virus (MHV), develop mild acute encephalitis and acute and chronic demyelinating diseases (15). Approximately 90% of mice survive the acute infection, with demyelination occurring 14\u201321 days after infection in survivors (15, 16). Infection of the CNS with MHV results in the secretion of inflammatory cytokines and chemokines including type I IFNs (IFN-I), CCL2, TNF, and IL-6 (17\u201320). IFN-I are protective to the host, as treatment with exogenous IFN-\u03b1 or IFN-\u03b2 limits viral replication, and infection of mice genetically defective in IFN-I signaling converts a nonlethal coronavirus infection to one that is lethal (21\u201323). As a consequence of secretion of cytokines and chemokines, MHV infection of the CNS results in the recruitment of innate and adaptive immune cells to the brain. While large numbers of monocytes\/macrophages infiltrate the CNS after infection, clodronate liposome\u2013mediated depletion of these cells resulted in increased mortality but did not alter the viral load within the CNS, indicating that hematogenously derived monocytes\/macrophages were not required for efficient viral clearance (24). Virus-specific CD8+ T cells, detectable within the brain by day 6 or 7 post infection (p.i.), are critical for viral clearance (25, 26). CD8+ T cells effect clearance by both cytolytic and noncytolytic mechanisms (27\u201329). Virus-specific CD4+ T cells are also important in viral clearance and enhance immune activity in the brain by secreting IFN-\u03b3 (28, 29) and promoting upregulation of MHC II on microglia (26). In addition to affording protection, MHV-specific CD4+ T cells are also pathogenic (30). How microglia affect this multifaceted T cell immune response to MHV is unknown. The functions that microglia may use in responding to viruses are not well described. Microglia could function by initiating the IFN-I response, neutralizing virus by phagocytizing infected cells and\/or virus, providing necessary signals to initiate the innate immune response via cytokine or chemokine secretion, and presenting antigen to, or stimulating T cells within, the brain. As an immunologically relevant cell type resident in the brain, microglia may be important for limiting replication of an invading pathogen. Complicating the study of microglia during infection is that, in cases of neuroinflammation, extensive monocyte\/macrophage infiltration occurs in the brain. Studies separating the actions of microglia from those of infiltrating myeloid cells are difficult, because activated microglia undergo phenotypic changes that render them morphologically similar to infiltrating mononuclear phagocytic cells. To understand the roles that microglia play in a neurotropic viral infection, how these roles affect the immune response to viruses, and how these roles may differ from those of infiltrating monocytes\/macrophages, we used colony-stimulating factor 1 receptor (CSF1R) inhibitor\u2013mediated depletion of microglia. Microglia are dependent on CSF1R signaling for survival, as mice deficient in the CSF1R or its ligand IL-34 lack microglia (3, 31). Treatment of mice with PLX5622, a specific and powerful inhibitor of CSF1R tyrosine kinase activity, results in near-complete depletion of microglia (32\u201334), facilitating studies of the role of these cells in the host response to a neurotropic virus infection. Our results show that microglia are most crucial in the response to CNS pathogens at early time points after infection. In the absence of microglia, viral replication occurs more rapidly, allowing the virus to evade the immune response. Microglia are required between days 0 and 6 p.i., with depletion at later points having no effects on survival, suggesting that they play a role predominantly in the early stages of infection. While the absence of microglia does not affect overall inflammatory infiltration into the brain, microglia have an especially prominent role in orchestrating the virus-specific CD4+ T cell response. Microglia respond to CNS viral infection. Injury, infection, and neurodegeneration can lead to morphological and molecular changes typical of microglia activation (35, 36). However, this activation profile differs depending on the stimuli received and can result in either harmful or beneficial effects (10, 11, 37). While microglia are often touted as the first responders to a CNS viral infection and are known to respond rapidly to injury (6), there is little direct evidence to show that microglia are needed for an optimal host response to pathogens. Microglia, which express CX3CR1 and can be readily identified in CX3CR1-GFP mice, responded to MHV infection, as evidenced by morphological changes and upregulation of IBA1, an activation marker, in brain locations where viral antigen was detected (Figure 1A). By day 4 p.i., microglia in the olfactory bulb, a region of the brain prominently infected by MHV (38\u201340), showed increased expression of IBA1, and by day 7 p.i., these cells showed a dramatic increase in IBA1 expression levels and exhibited a less ramified, more macrophage-like morphology (Figure 1A). While these microscopic analyses showed that microglia did indeed respond to viral infection, the molecular mechanisms associated with this response were unknown. To address this question, we used microarray analysis to compare gene expression in microglia harvested from naive mouse brains with those from day-4 p.i. brains. These analyses showed differential expression levels of 595 genes (Figure 1B). As shown by Ingenuity Pathway Analysis, the top 4 pathways changed after infection were IFN signaling, activation of IFN-regulatory factors by cytosolic pattern recognition receptors, granulocyte adhesion and diapedesis, and communication between the innate and adaptive immune system (Figure 1C). Individual genes in these pathways that were among the most upregulated in the array are shown in Figure 1D. These included IFN-induced genes such as Mx2, Ifit1, and Oas2. Genes encoding pattern recognition receptors and chemokines and genes associated with antigen presentation were also upregulated (Figure 1D). Aif1 (encoding IBA1) expression was upregulated in our microarray data set; however, it was upregulated by 1.85-fold, below our fold-change cutoff of 2. Together, these results show that microglia were activated and responded to viral infection of the CNS by changes in morphology and inflammation-associated gene expression. Microglia respond to CNS infection. (A) Olfactory bulb sections from CX3CR1GFP\/+ mice were immunostained for IBA1 and with DAPI nuclear stain at the indicated time points relative to infection. Images are representative of 3 mice per group. Scale bars: 100 \u03bcm. (B) Microglia from naive and day-4 p.i. brains were isolated by flow cytometry and subjected to microarray analysis. Heatmap shows the 595 differentially expressed genes and log2 expression values from blue to red. (C) Pathways most altered in microglia after infection as assessed by Ingenuity Pathway Analysis. Orange bars indicate pathway upregulation; blue bars indicate downregulation of the pathway. Gray bars indicate that no direction of pathway dysregulation was detected. (D) Fold change of selected differentially expressed genes in microglia after infection. Data in B\u2013D were derived from 4 independent samples per group and were analyzed as described in Methods. dpi, days post infection. A CSF1R inhibitor, PLX5622, depletes microglia. Next, to separate the roles of microglia and infiltrating macrophages, PLX5622, a CSF1R inhibitor previously reported to deplete microglia (34), was formulated into feed that was provided to mice. Microglia were nearly completely depleted by 3 days after the start of PLX5622 treatment (Figure 2A, gating strategy is shown in Supplemental Figure 1; supplemental material available online with this article; https:\/\/doi.org\/10.1172\/JCI97229DS1). We also assessed whether PLX5622 depleted other brain-resident macrophages or myeloid cells in the peripheral lymphoid organs, because these cells express CSF1R. Most CD45+ cells isolated from the naive mouse brain are microglia; consequently, total CD45+ cell numbers isolated from the brain after PLX5622 treatment were greatly decreased (Figure 2B). Neither brain-resident macrophages (Figure 2C), CD11b\u2013 immune cells, including T cells and B cells, in the brain (Figure 2D), nor CD11b+ cells in the peripheral lymphoid organs (Figure 2E) were diminished in number by PLX5622 treatment. Additionally, no changes in the number of T cells, B cells, or neutrophils were observed in the peripheral lymphoid organs (Supplemental Figure 2). PLX5622 treatment specifically depletes microglia. After PLX5622 treatment, flow cytometry was used to analyze cells from brain (A\u2013D) and spleen (E). (A) Representative flow plot gated on CD45+ cells shows gating for microglia (CD45intCD11b+), macrophages (CD45hiCD11b+), and lymphocytes (CD45+CD11b\u2013). Graph shows a summary of the number of microglia isolated per brain at the indicated time points after initiation of PLX5622 treatment. Number of total CD45+ cells (B), macrophages (C), and lymphocytes (D) found in the brain after 7 days of PLX5622 treatment. Number of CD11b+ cells (E) within the spleen after 7 days of PLX5622 treatment. Data in B\u2013E represent combined results from 3 independent experiments, with a combined total of 8 mice per group. Statistical significance was determined using Mann-Whitney U tests. **P < 0.01, ***P < 0.001, and ****P < 0.0001. Microglia protect against MHV infection. To investigate when microglia were required for an optimal outcome, we administered PLX5622 before and during MHV infection. Mice treated with PLX5622 beginning 7 days before infection and continuing to the end of the experiment uniformly died, compared with a 10%\u201320% mortality rate in infected mice fed normal chow (Figure 3, A and B). To assess the period of microglia action after infection, we varied the timing of drug administration relative to infection (Figure 3, A and B). PLX5622 administration starting on day 0 p.i. and continuing throughout infection resulted in a 90% mortality rate. When PLX5622 was started 3 days p.i. and remained in the feed for the duration of the experiment, approximately 40% of the mice survived. PLX5622 administration, commencing on day 6 p.i., had no effect on survival. Published studies have shown that microglia depletion after treatment and repletion after PLX5622 removal occurred rapidly (34). We confirmed that this is the case by showing that microglia could be replenished within 3 days after removal of PLX5622 (Supplemental Figure 3). When PLX5622 was given 7 days before infection and removed 3 days p.i., all mice succumbed to infection, as was observed with treatment for the duration of the experiment (Figure 3, C and D). Survival rates increased to approximately 30% if the drug was removed on the day of infection, while removal of the drug 2 days before infection resulted in 60% survival. Collectively, these results indicate that microglia provide critical antiviral roles between days 0 and 6 p.i. Microglia protect mice from CNS infection. Schematic describing setup of survival experiments (A and C) assessing PLX5622 treatment in relation to intracranial infection with 700 PFU MHV (day 0). Survival curve in B corresponds to data in A; survival curve in D corresponds to data in C. Data are representative of 2 to 5 independent experiments, with 5 to 15 mice per group. P < 0.05, by log-rank test when compared with control survival curves, except when PLX5622 treatment began on day 6. (E) Mice were treated with PLX5622 or control for 7 days and then inoculated intranasally with 3 \u00d7 104 PFU rJ or N1347A. Data are combined from 2 independent experiments and represent a total of 10 mice per group. Survival curves were assessed for statistical significance by log-rank test. PLX5622-treated, rJ-infected mice had significantly shorter survival than did mice in all the other groups, while mock-treated, N1347A-infected mice survived significantly longer (P < 0.01) than did mice in the other 3 groups. To assess the effects of microglia depletion on infection with a highly neurovirulent virus, we infected PLX5622-treated mice with the JHM strain of MHV (recombinant version, referred to herein as rJ). Mice treated with PLX5622 had a decreased time-to-death after rJ infection (Figure 3E). To further assess the role of microglia in limiting viral replication, we infected PLX5622-treated mice with another neuroattenuated virus, N1347A, an rJ mutant lacking macrodomain enzymatic activity (41). Mice infected with N1347A had minimal mortality and weight loss as well as diminished viral titers compared with those infected with WT virus (41). When treated with PLX5622, the lethality of N1347A was increased to WT rJ levels (Figure 3E). Together, these results indicate that microglia are critical for limiting the lethality of neurotropic viruses. A lack of microglia leads to increased viral replication in the brain. To assess the potential role for microglia in limiting virus replication, we determined viral loads within the brain. A lack of microglia resulted in increased viral titers by day 3 p.i. compared with those in control mice (Figure 4A). Staining of sections from the olfactory bulb and brainstem with nucleocapsid (N) protein mAb was consistent with the increased titers, demonstrating a larger number of infected cells in the PLX5622-treated mice (Figure 5, A and B). There was a substantial amount of inter-mouse variability, such that the differences were not statistically significant. Peak viral replication occurred on day 5 p.i. in MHV-infected mice and then declined. However, in microglia-depleted mice, viral titers peaked on day 3 p.i. and remained elevated on day 5 p.i. Additionally, the absence of microglia diminished the kinetics of virus clearance; viral titers decreased only marginally by day 7 p.i. in PLX5622-treated mice compared with titers in untreated control mice (Figure 4A). Delayed virus clearance in microglia-depleted animals. Mice were treated with PLX5622 for 7 days prior to intracranial MHV infection. (A) Brain virus titers were determined on the indicated days p.i. by plaque assay. (B) Protein levels of IFN-\u03b11, IFN-\u03b2, and IL-6 in the brain were determined 5 days p.i. (C) Expression levels of viral genomic RNA, IFN-\u03b14, IFN-\u03b2, and IL-6 in the brains of infected mice as assessed by qPCR on the indicated days p.i. IFN-I and IL-6 levels generally correlated with those of viral genomic RNA (Table 1). Data represent the mean \u00b1 SEM. Data in A were combined from 3 independent experiments, with a combined total of 8 to 11 mice per group. Data shown in B were combined from 2 independent experiments. Data in C are representative of 3 independent experiments, with 10 mice per group. *P < 0.05 and **P < 0.01, by Mann-Whitney U test. Increased viral protein in neurons of microglia-depleted brains. Mice were treated with PLX5622 for 7 days prior to intracranial infection with MHV. (A) Viral N protein and IBA1 immunostaining of the brainstem and (B) olfactory bulb in control and PLX5622-treated mice on day 5 p.i. (C) NeuroTrace and N protein staining of the brainstem and olfactory bulb on day 5 p.i. and quantification of N protein\u2013positive neurons. (D) NeuroTrace and N protein staining of brainstem on day 5 p.i. Yellow arrow indicates an N protein\u2013positive, NeuroTrace-negative cell; white arrows indicate double-positive cells. Original magnification, \u00d720 (A\u2013C) and \u00d740 (D). Images are representative of 4 to 5 mice. Given that microglia respond to infection by upregulating pathways associated with immune activation (microarray analyses in Figure 1), we next determined protein and mRNA levels of IFN-I and IL-6. IFN-I is critical for initiating the antiviral immune response, and IL-6 is a pleiotropic, proinflammatory immune mediator. After infection, IFN-I protein levels were modestly higher in PLX5622-treated mice, but these changes were not statistically significant. Protein levels of IL-6 were unchanged in the absence of microglia (Figure 4B). Assessment of these cytokines by quantitative PCR (qPCR) showed an increase in expression of IFN-\u03b2, IFN-\u03b14, and IL-6 in PLX5622-treated animals on days 3 and 5 p.i. (Figure 4C). Together, these results indicate that the absence of microglia did not prevent the host from initiating an innate immune response and that other cell types produced these cytokines when microglia were depleted. The increase in viral load seen in Figure 4A was additionally confirmed by qPCR of genomic viral RNA (Figure 4C). Notably, the increased cytokine expression seen in PLX5622-treated mice was probably a consequence of increased viral load in the brain; statistical analysis using Spearman's correlation showed that mRNA levels of these cytokines were positively correlated with those of viral genomic RNA on days 3 and 5 p.i., except for IFN-\u03b14 on day 3 p.i. (Table 1). Correlation coefficients and P values for cytokine and viral genomic RNA levels To further investigate the consequences of microglia depletion, we next examined whether there were differences in the extent of neuronal infection, which could contribute to enhanced morbidity. Using NeuroTrace, a fluorescent Nissl stain, to identify neurons, we identified increased numbers of infected neurons in the brainstem but not the olfactory lobe of PLX5622-treated mice (Figure 5, C and D). These differences did not reach statistical significance, reflecting inter-mouse variability. Collectively, these results indicate that functional microglia are required for controlling virus replication and for minimizing disease development in the infected brain. Macrophages are affected by CSF1R inhibitor treatment. Next, to further address how microglia function to protect mice from MHV infection, we assessed the effect of their depletion on inflammatory cell infiltration into the brain. On day 3 p.i., total numbers of CD45+ cells were decreased, reflecting microglia depletion. However, by day 7 p.i., no differences were observed, indicating that blood-derived cells became predominant and that recruitment was not microglia dependent (Figure 6, A and D). Immune cells infiltrate the brain after microglia depletion. Mice were treated with PLX5622-containing or control feed for 7 days prior to intracranial infection with 700 PFU MHV. Cells from brains and DCLNs were assessed on the indicated days p.i. (A and D) Representative flow plots show CD45+ cell populations in the brain on the indicated days p.i. Graphs show a summary of flow cytometric data on cells isolated from mouse brains (A, B, D, and E) and DCLNs (C and F) on day 3 (A\u2013C) or day 7 (D\u2013F) p.i. Data represent the mean \u00b1 SEM and are from 3 independent experiments, with a combined total of 8 to 9 mice per group. Statistical significance was determined using Mann-Whitney U tests. *P < 0.05. To assess the potential role of microglia in initiating the immune response in the deep cervical lymph nodes (DCLNs), the draining LNs of the brain, we measured total cell numbers. We detected no significant differences in total cell numbers in the DCLNs after PLX5622 treatment (Figure 6, C and F), suggesting that the lack of microglia does not grossly affect the initiation of the immune response. We also measured PLX5622 effects on macrophage numbers in the brain, since, while macrophages were not depleted by PLX5622 (Figure 2), they express CSF1R and might be affected by the drug (42). We detected no differences in the number of monocytes\/macrophages on day 3 p.i. compared with numbers in control-treated mice (Figure 6B). However, by day 7 p.i., monocyte\/macrophage numbers in the infected brain were increased (Figure 6E), suggesting that microglia depletion resulted in a compensatory increase in hematogenously derived macrophages. Monocytes\/macrophages within the infected, microglia-depleted CNS, compared with those in untreated mice, had lower expression of MHC II and higher expression of Ly6C (Figure 7, A and B), indicating that they were less mature (43). To further assess changes in macrophages caused by PLX5622 treatment, we performed microarray analysis of day-4 p.i. brain-derived macrophages. Microarray analysis of monocytes\/macrophages in control and PLX5622-treated groups showed differential expression of 235 genes (Figure 7C). Among the upregulated genes were S100a8\/a9, upregulated in multiple inflammatory conditions (44), and the chemokines CCL4 (Ccl4) and CCL5 (Ccl5) (Figure 7D) (45). The changes in gene expression could be due to indirect or direct effects of PLX5622 on macrophages, or may reflect changes in macrophages that compensated for the lack of microglia. Macrophages are functionally altered by PLX5622 treatment. Mice were treated with PLX5622 for 7 days prior to intracranial MHV infection. (A and B) Decreased MHC II (A) and increased Ly6C (B) levels on microglia and macrophages from PLX5622-treated mice on day 7 p.i. Data represent the mean \u00b1 SEM. (C) Macrophages were isolated from 3 mouse brains per group on day 4 p.i. and subjected to microarray analysis. A heatmap was generated from all genes with significant differences in expression, with 235 genes differentially expressed (log2 expression values are shown from blue to red). (D) Fold change of selected differentially expressed genes in macrophages after PLX5622 treatment. Data in A and B are representative of 3 independent experiments, with 3 to 5 mice per group. *P < 0.05 and ****P < 0.0001, by Mann-Whitney U test. Microglia depletion alters the CD4+ T cell response to viral infection, especially in the brain. PLX5622 treatment decreased survival, even when treatment began as late as day 3 p.i., indicating that microglia contributed to the antiviral immune response after the innate response was initiated and suggesting an effect on the adaptive immune response. Priming of T cells occurs predominantly in the DCLNs, leading to the initial proliferation of virus-specific T cells and subsequent recruitment of virus-specific T cells to the brain (46). As such, we next examined the adaptive immune response in the DCLNs. In PLX5622-treated mice, CD8+ T cell numbers were unaltered in the DCLNs (Supplemental Figure 4A), as were the numbers of virus-specific CD8+ (Supplemental Figure 4C) and CD4+ T cells (Supplemental Figure 4D). However, total numbers of CD4+ T cells and FOXP3+ Tregs in the DCLNs were decreased (Supplemental Figure 4, B and E) in microglia-depleted mice, although the difference in Tregs did not reach statistical significance. These results suggested that, while priming of the virus-specific T cell response was not substantially altered after microglia depletion, PLX5622 treatment diminished aspects of the CD4+ T cell response. These differences between control and PLX5622-treated mice were accentuated in the brain, the site of infection. Flow cytometric analysis showed increases in the frequency and total number of CD8+ T cells in the brains of PLX5622-treated animals (Figure 8A), but these differences were not statistically significant. Strikingly, the percentage and total numbers of CD4+ T cells in the brain were decreased (Figure 8B), as were Treg frequencies and numbers (Figure 8C). We next assessed whether the virus-specific T cell response was similarly affected. There were no differences in the frequencies of brain-derived CD8+ T cells responding to the MHV-specific immunodominant S510 epitope. The total number of virus-specific CD8+ T cells showed a trending increase (Figure 8D) after microglia depletion, reflecting the increased total number of CD8+ T cells in the brain. The virus-specific CD4+ T cell response, evaluated by measuring IFN-\u03b3 expression after stimulation with M133 peptide, was greatly diminished in frequency and number (Figure 8E). While the total number of virus-specific CD4+ T cells was decreased, the remaining cells remained polyfunctional, as PLX5622 treatment did not affect the frequency or number of IFN-\u03b3\u2013expressing CD4+ or CD8+ T cells that dually expressed TNF or IL-10 (Figure 8, F\u2013I). Altered T cell response in the brains of microglia-depleted mice. Mice were treated with PLX5622 for 7 days prior to viral inoculation. In A\u2013I and L, mice were inoculated via intracranial injection with MHV. In A\u2013I, immune cells in the brain were assessed by flow cytometry on day 7 p.i. Frequency and number of CD8+ T cells (A), CD4+ T cells (B), and Tregs (C) in the brain. (D) Virus-specific CD8+ T cell frequency and number were determined by IFN-\u03b3 ICS after stimulation with S510 peptide. (E) Virus-specific CD4+ T cell frequency and number were determined by IFN-\u03b3 ICS after stimulation with M133 peptide. IL-10 (F and I) and TNF (G and H) expression in virus-specific (IFN-\u03b3+) CD4+ and CD8+ T cells, respectively. (J and K) Virus-specific CD4+ and CD8 + T cells in the spleen on day 7 after i.p. injection of rJ. (L) Survival of Rag1\u2013\/\u2013 mice. Data indicate the mean \u00b1 SEM and represent combined data from 3 to 5 independent experiments, with a combined total of 9 to 17 mice per group. Statistical significance determined using Mann-Whitney U tests. *P < 0.05, **P < 0.01, and ***P < 0.001. The significance in differences in survival curves was assessed by log-rank test. This dramatic decrease in the number of virus-specific CD4+ T cells could result from the effects of PLX5622 on microglia, or alternatively, and less likely, on macrophages. To address the latter possibility, PLX5622-treated mice were intraperitoneally injected with rJ, resulting in a subclinical infection but also in the generation of a virus-specific T cell response in the spleen (47). PLX5622 treatment did not change the number of virus-specific CD4+ or CD8+ T cells after intraperitoneal infection with rJ (Figure 8, J and K), indicating that the drug did not significantly impact antigen presentation after peripheral infection and suggesting that the lack of microglia was essential in the modified and possibly dysfunctional CD4+ T cell response after MHV infection. Together, these results support the notion that microglia are required for an optimally protective T cell response. To assess this directly, mice deficient in recombination-activating gene 1 (Rag1\u2013\/\u2013), which lack B and T cells, were given control feed or feed containing PLX5622 prior to MHV infection. Rag1\u2013\/\u2013 mice treated with PLX5622 died slightly more rapidly after infection than did mice given control feed. While these results were not statistically significant (Figure 8L), they were consistent with a role for microglia in the innate immune response. However, the results also highlight the key role that the virus-specific T cells have in protection and, together with the other results described above, demonstrate that microglia are required for the development of an optimal antiviral T cell response. Our results show that microglia play nonredundant and unique roles in host survival during infection with a neurotropic virus infection. Because of their residence in the CNS, microglia potentially serve as sentinel cells able to detect invasive pathogens. They may also contribute to host defense by phagocytosing virus or virus-infected cells, facilitating an early host response to virus replication. Using a drug that primarily depletes microglia, we showed that these cells are most important in the earliest stages of infection, consistent with the idea that they play a key role in host protection. In the absence of microglia, virus replication was poorly controlled, and infection of neurons was increased (Figure 4A). Microarray analysis demonstrated that IFN signaling was the most upregulated pathway in the data set (Figure 1C). However, in experiments in which microglia were depleted, we observed no decrease in the protein levels of IFN-I (Figure 4) within the brain, indicating that microglia were not required for IFN-I production after infection. However, this does not preclude a role for IFN-I signaling in establishing an antiviral environment, especially since microglia are among the first cells to detect and respond to viruses. Microglia function was required for many, but not all, aspects of the host response. While the numbers of infiltrating, hematogenously derived phagocytic cells such as neutrophils and macrophages were not diminished by treatment with PLX5622, infiltrating macrophages were phenotypically more immature, as evidenced by decreased MHC class II antigen and increased Ly6C expression (Figure 7, A and B). Thus, these cells, which might be expected to provide partial compensation for the absence of microglia, were phenotypically less potent antigen-presenting cells, possibly contributing to the observed suboptimal CD4+ T cell response (Figure 8E). While the results described above and elsewhere (32, 34, 48) show that PLX5622 has profound effects on microglia survival, CSF1R, the receptor affected by PLX5622, is also expressed on other myeloid cells, including brain perivascular macrophages and infiltrating hematopoietic monocytes\/macrophages. At the same time that microglia were depleted, other brain-resident myeloid cells (Figure 2C) and circulating myeloid cells (Figure 2E) were not decreased in numbers after PLX5622 treatment. Rather, after PLX5622 treatment, the number of infiltrating macrophages was increased after MHV infection (Figure 6E), perhaps as a compensatory response to the lack of microglia. To further address the effect of CSF1R inhibition on infiltrating macrophage function, we compared the transcriptional profile of macrophages entering the brain after infection, with or without PLX5622 treatment. Expression of genes associated with macrophage activation was augmented in macrophages obtained from PLX5622-treated nice compared with those from control mice. These results, together with the decreased levels of MHC II and increased levels of Ly6C on macrophages in PLX5622-treated mice (Figure 7), indicate that macrophage maturation and probably function were compromised in the absence of microglia. These results were likely a consequence of microglia depletion, but we cannot rule out the possibility of a direct effect of PLX5622 on the function of macrophages. Whereas altered macrophage function may contribute to poor outcomes in PLX5622-treated mice, this altered function is unlikely to be the primary cause of increased virus titers in the brain (Figure 4A). In a previous study, systemic treatment with mannosylated liposomes encapsulating dichloromethylene diphosphonate (Cl2MDP, clodronate) depleted peripheral monocytes\/macrophages without affecting microglia numbers or virus titers in the brain (24, 49). Additionally, we measured the potential effects of PLX5622 on macrophages by analyzing clinical disease and T cell responses after intraperitoneal injection of neurovirulent rJ (Figure 8L). We found that intraperitoneal injection of rJ resulted in a subclinical infection and observed no differences in clinical disease or virus-specific T cell responses, again demonstrating minimal direct effects of PLX5622 treatment on cells other than microglia. Microglia continued to be required for a protective immune response, even after the first few days of infection, because mice given PLX5622 beginning 3 days p.i. had decreased survival. This may reflect the absence of antigen presentation by microglia. Microglia upregulated Tap1 and Itgax, genes involved in antigen presentation (Figure 1D). Additionally, depletion of microglia not only resulted in loss of the major MHC II\u2013expressing cell type in the brain, but also resulted in decreased expression of MHC II on incoming monocytes\/macrophages. As MHC II is required for CD4 T cell restimulation and activation, this decrease in MHC II in the brain probably contributed to the diminished virus-specific CD4+ T cell response observed in the absence of microglia. Additionally, the virus-specific CD8+ T cell response in the brain was increased in PLX5622-treated mice compared with that observed in control mice (Figure 8D, P = 0.0559). This modest increase in CD8+ T cell numbers stands in contrast to results observed in suckling mice infected intracerebrally with dengue virus, in which microglia depletion using liposomes containing clodronate resulted in diminished CD8+ T cell recruitment to the brain (50). While both of these studies show effects of microglia depletion on T cell responses in the brain, the differences in effects on specific T cell subsets may reflect the virus under study, the method of microglia depletion (clodronate liposomes versus PLX5622), and\/or the age of the mice at the time of infection. Both virus-specific CD4+ and CD8+ T cells are required for efficient viral clearance in MHV-infected mice (51, 52), with CD8+ T cells effecting viral clearance (27, 28, 53) and CD4+ T cells facilitating CD8+ T cell entrance into the parenchyma (54). The frequency and number of FOXP3+ Tregs were also decreased. Tregs have multiple roles in modulating the inflammatory response including, in the MHV-infected mouse, inhibiting exuberant T cell responses in the brain (46, 55, 56). In the absence of microglia, a diminished Treg response might contribute to increased effector CD4+ and CD8+ T cell responses, which, while ineffective in clearing virus, contributed to increased host damage in our study. The MHV-specific CD4+ T cell response has both protective and pathogenic roles, and the latter is specifically modulated by virus-specific Tregs (46). The importance of the T cell response in viral clearance was further demonstrated using MHV-infected Rag1\u2013\/\u2013 mice. Microglia depletion resulted in a small increase in time to death in these mice (Figure 8L), consistent with an effect on the innate immune response. However, these differences were minimal compared with the effects of drug treatment in immunocompetent mice (Figure 3), in which virus was cleared by the antivirus T cell response. Notably, PLX5622-treated B6 and Rag1\u2013\/\u2013 mice succumbed to the infection at similar rates, highlighting the key role that microglia play in the development of a normal T cell response (compare Figure 3, B and D, with Figure 8L). Specifically, the decreased virus-specific CD4+ T cell response in the absence of microglia indicates that these cells are important for initiating the CD4+ T cell response or in restimulating CD4+ T cells that enter the brain. Microglia have multiple functions in the CNS, including surveillance of the brain for damaged neurons and neuronal synapses that require pruning (9). Microglia also play a role in autoimmune demyelination (experimental autoimmune encephalomyelitis [EAE]), with a specific role in clearing myelin debris (37). Notably, microglia differed phenotypically and in terms of gene expression from infiltrating macrophages in mice with EAE. Our results also suggest that infiltrating macrophages had functions that were nonredundant with those of microglia and were unable to compensate for their absence. The importance of microglia phagocytosis has been demonstrated in the context of prion disease, in which microglia depletion resulted in accelerated disease progression, probably due to diminished prion clearance (57). In summary, our results demonstrate a critical role for microglia in the context of viral encephalitis, affecting the initiation of the innate and adaptive immune responses and the kinetics of virus replication and clearance. Viral encephalitis tends to be a disease with sporadic incidence that occurs in only a small percentage of infected patients. Our results raise the possibility that microglia dysfunction contributes to the development of clinical encephalitis in the minority of patients who develop this disease after infection. Mice. Specific pathogen\u2013free C57Bl\/6 mice were purchased from Charles River Laboratories, and B6.129P(Cg)-Ptprca Cx3cr1tm1Litt\/LittJ (CX3CR1-GFP), and Rag1tm1Mom mice were purchased from The Jackson Laboratory. Mice were maintained in specific pathogen\u2013free facilities at The University of Iowa. Five- to six-week-old male mice were used in all experiments. PLX5622 treatment. PLX5622, formulated in an AIN-76A rodent diet at a dose of 1,200 mg\/kg standard chow, was prepared by Research Diets and provided by Plexxikon Inc. Mice were provided PLX5622 in their chow beginning 7 days before viral infection, except where indicated otherwise. Viral infection. A neuroattenuated variant of the JHMV strain of MHV, rJ2.2 (a recombinant version of the J2.2-V-1 virus, referred to herein as MHV) was propagated in mouse 17Cl-1 cells and titered on HeLa-MHVR cells (58). Five- to six-week-old mice were inoculated intracerebrally with 700 PFU rJ2.2 in 30 \u03bcl DMEM. Where specified, 2 \u00d7 104 PFU recombinant parental JHMV (rJHMV, referred to herein as rJ) was inoculated into mice intraperitoneally. In other experiments, 3 \u00d7 104 PFU rJ or N1347A, an rJ macrodomain point mutant virus (41), was inoculated into mice intranasally. After viral inoculation, mice were examined and weighed daily. Virus plaque assay. To titer virus from infected animals, mice were sacrificed and perfused with PBS. Brain tissue was homogenized into PBS using a manual homogenizer and frozen. After thawing, cellular debris was removed by centrifugation, and virus titers in the supernatant were determined on HeLa-MHVR cells as previously described (59). Isolation of immune cells from brain tissue. Brains harvested after PBS perfusion were digested with 1 mg\/ml collagenase D (Roche) and 0.1 mg\/ml DNase I (Roche) at 37\u00b0C for 30 minutes after mechanical dissociation. Dissociated, collagenase-treated brain was passed through a 70-\u03bcm cell strainer, followed by 37% Percoll gradient centrifugation. Cells were collected from the pellet, washed, and resuspended in culture medium for further analysis. Antibodies and flow cytometry. The following antibodies were used in this study: CD4\u2013eFluor 450 (clone RM4-5; eBioscience); CD8-FITC (clone 53-6.7; BD Biosciences); CD11b\u2013eFluor 450 (clone M1\/70; eBioscience); CD16\/CD32-PerCP-Cy5.5 (clone 93; BioLegend); CD45-PE-Cy7 (clone 30-F11; BioLegend); FOXP3-FITC (clone FJK-16s; eBioscience); I-A\/I-E-PerCP-Cy5.5 (clone M5\/114.15.2; BioLegend); IFN-\u03b3\u2013APC (clone XMG1.2; BioLegend); IL-10\u2013PE (clone JES5-16E3; BD Biosciences); Ly6C-PE (clone AL-21; BD Biosciences); and TNF-PE, -PE-Cy7 (clone MP6-XT22; BD Biosciences). Data were acquired with a BD FACSVerse and analyzed using FlowJo software (Tree Star). Cells were sorted using a BD FACSAria. Intracellular cytokine and transcription factor staining. To detect IFN-\u03b3, TNF, and IL-10 production by virus-specific T cells, immune cells isolated from the LNs or brain were stimulated with cognate peptides in complete RPMI 1640 medium for 6 hours at 37\u00b0C. Golgiplug (1 \u03bcl\/ml; BD) and 2 \u00d7 106 antigen-presenting cells (CHB3 cells, B cell line, H-2Db, I-Ab) were included in the culture. MHV-specific peptides encompassing residues 133\u2013147 of the transmembrane (M133) protein and residues 510\u2013518 of the surface (S510) glycoprotein (60, 61) (Bio-Synthesis Inc.) were used at final concentrations of 5 \u03bcM (M133) or 1 \u03bcM (S510). A FOXP3 Staining Buffer Set (eBioscience) was used for analysis of FOXP3 expression; otherwise, BD Cytofix\/Cytoperm and Perm\/Wash buffers (BD Biosciences) were used in intracellular cytokine staining (ICS) assays. RNA extraction, PCR, and primers. Brains were collected and manually homogenized into TRIzol (Thermo Fisher Scientific). RNA was extracted according to the manufacturer's instructions. RNA was transcribed into cDNA using Moloney murine leukemia virus reverse transcriptase (MMLV RT; Thermo Fischer Scientific), and expression levels were measured on a QuantStudio qPCR 3 system (Thermo Fisher Scientific). The primer sets used have been previously described (62), and the primer sequences are listed in Supplemental Table 1. The expression levels were normalized to hypoxanthine-guanine phosphoribosyltransferase (HPRT) by the following threshold cycle (Ct) equation: \u0394Ct = Ct of the gene of interest \u2212 Ct of HPRT. All results are shown as a ratio to HPRT calculated as 2\u2212\u0394Ct. Measurement of cytokine protein levels. Mouse brains were flash-frozen in liquid nitrogen before homogenization in T-PER Tissue Protein Extract Reagent (Thermo Fisher Scientific). Samples were centrifuged at 10,000 g for 10 minutes after homogenization. Supernatants were used in protein assays. Protein levels of IFN-\u03b1, IFN-\u03b2, and IL-6 were determined using Luminex Protein Assays (Thermo Fisher Scientific) according to the manufacturer's instructions. Brain histology and immunohistochemistry. For H&E staining, brains were removed, fixed in zinc formalin, and embedded in paraffin. Tissue sections were stained with H&E. For immunohistochemical staining, frozen sections were obtained by fixing brains in 4% paraformaldehyde solution followed by immersion in 10%, 20%, and 30% sucrose solutions for cryoprotection prior to freezing by heat displacement. Sections were immersed in PBS before treatment with 0.1% Triton-X in PBS. Sections were then rinsed in PBS. Next, samples were incubated in CAS block (Invitrogen, Thermo Fisher Scientific) followed by incubation in primary antibody diluted in 1% goat serum in PBS overnight at 4\u00b0C in a humidity chamber. Primary antibodies against IBA1 (Wako) at 1:2,000 and viral N protein (provided by Michael Buchmeier, University of California Irvine) were used at 1:10,000. Sections were rinsed before incubation with a 1:200 dilution of an appropriate A568- or A488-conjugated goat anti-mouse or anti-rabbit antibody (Thermo Fisher Scientific). After rinsing with PBS, slides were mounted with Vectashield Antifade Reagent containing DAPI (Vectashield Laboratories). NeuroTrace (Thermo Fisher Scientific) staining was performed according to the manufacturer's protocol. Images were obtained using an Olympus BX61 light microscope. Three images were taken per section, with each section representing different mice. Microscopy images were quantified using ImageJ 64 (NIH) software and manual counting. Microarray analysis. Microglia and macrophages were stained with anti-CD45 antibody after isolation from CX3CR1GFP\/+ mice as described above. Microglia were sorted on the basis of intermediate expression of CD45 and high expression of GFP. Macrophages were sorted on the basis of high expression of CD45 and intermediate expression of GFP. Transcriptome profiles of FACS-sorted microglia and macrophages were analyzed using Affymetrix Mouse Clariom S arrays. Sample processing and Affymetrix array hybridization were completed by the Genomics Division of the Iowa Institute of Human Genetics using manufacturer-recommended protocols. Briefly, 1 ng total RNA was converted to amplified ds-cDNA using the 3\u2032 IVT Pico Reagent Kit (catalog 902789; Affymetrix). Following fragmentation (fragment size, ~40\u201370 nt), the samples were labeled with biotin. Biotin-labeled ds-cDNA was then mixed with Affymetrix Eukaryotic Hybridization Buffer, placed onto the Affymetrix Mouse Clariom S Array (part no. 902918), and incubated at 45\u00b0C for 18 hours with 60 rpm rotation. The arrays were then washed, stained, and scanned using an Affymetrix Model 3000 scanner (with 7G upgrade). Data were collected using Affymetrix Command Console operating software (AGCC), version 4.1.2. Normalization and signal summarization were performed with Affymetrix Expression Console (EC) Software Build 1.4.4.46. Data were normalized and median polished using Robust Multichip Average background correction with log2-adjusted values. Significance testing was performed on log2-adjusted values comparing the 2 groups. In the microglia microarray, changes in gene expression with a fold change greater than or equal to 2 and a P value of less than 0.05 after correction for FDR were considered significant. In the macrophage microarray, changes in gene expression with a fold change greater than or equal to 2 and a P value of less than 0.05 were considered significant. Analysis of data and pathway analysis were performed using Partek GS software and Ingenuity Pathway Analysis (QIAGEN Bioinformatics). Microarray data were deposited in the NCBI's Gene Expression Omnibus (GEO) database (GEO GSE103380 [microglia] and GSE103379 [macrophages]). Statistics. Data are presented as the mean \u00b1 SEM unless otherwise indicated. Mann-Whitney U tests were used to analyze differences in means. Log-rank tests were used to determine significant differences in the survival of mice. A P value of less than 0.05 was considered significant. All statistical analysis except microarray analysis was performed using GraphPad Prism, version 7 (GraphPad Software). Study approval. All animal protocols were approved by the IACUC of the University of Iowa. DLW and SP conceived the study; DLW and SP acquired and validated the data; DLW and AS executed the experiments; DLW and DKM analyzed the data; and DLW and SP wrote the manuscript. We thank Anthony Fehr (University of Iowa, Iowa City, IA) for critical review of this manuscript. This work was supported in part by grants from the NIH (RO1 N36592) and the National Multiple Sclerosis Society (RG 5340-A-7). The authors would like to acknowledge use of the University of Iowa's Central Microscopy Research Facility, the Flow Cytometry Facility, the core resources of the Genomics Division of the Iowa Institute of Human Genetics, which are supported by the Vice President for Research and Economic Development, the Holden Comprehensive Cancer Center and the Carver College of Medicine. Butovsky O, et al. Identification of a unique TGF-\u03b2-dependent molecular and functional signature in microglia. Nat Neurosci. 2014;17(1):131\u2013143. Hickman SE, et al. The microglial sensome revealed by direct RNA sequencing. Nat Neurosci. 2013;16(12):1896\u20131905. Ginhoux F, et al. Fate mapping analysis reveals that adult microglia derive from primitive macrophages. Science. 2010;330(6005):841\u2013845. Gomez Perdiguero E, et al. Tissue-resident macrophages originate from yolk-sac-derived erythro-myeloid progenitors. Nature. 2015;518(7540):547\u2013551. Nelson LH, Lenz KM. Microglia depletion in early life programs persistent changes in social, mood-related, and locomotor behavior in male and female rats. Behav Brain Res. 2017;316:279\u2013293. Nimmerjahn A, Kirchhoff F, Helmchen F. Resting microglial cells are highly dynamic surveillants of brain parenchyma in vivo. Science. 2005;308(5726):1314\u20131318. Paolicelli RC, et al. Synaptic pruning by microglia is necessary for normal brain development. Science. 2011;333(6048):1456\u20131458. Prinz M, Priller J, Sisodia SS, Ransohoff RM. Heterogeneity of CNS myeloid cells and their roles in neurodegeneration. Nat Neurosci. 2011;14(10):1227\u20131235. Schafer DP, et al. Microglia sculpt postnatal neural circuits in an activity and complement-dependent manner. Neuron. 2012;74(4):691\u2013705. Crotti A, Ransohoff RM. Microglial Physiology and Pathophysiology: Insights from Genome-wide Transcriptional Profiling. Immunity. 2016;44(3):505\u2013515. Rock RB, et al. Role of microglia in central nervous system infections. Clin Microbiol Rev. 2004;17(4):942\u201364, table of contents. Rademakers R, et al. Mutations in the colony stimulating factor 1 receptor (CSF1R) gene cause hereditary diffuse leukoencephalopathy with spheroids. Nat Genet. 2011;44(2):200\u2013205. Paloneva J, et al. Mutations in two genes encoding different subunits of a receptor signaling complex result in an identical disease phenotype. Am J Hum Genet. 2002;71(3):656\u2013662. Erny D, et al. Host microbiota constantly control maturation and function of microglia in the CNS. Nat Neurosci. 2015;18(7):965\u2013977. Bergmann CC, Lane TE, Stohlman SA. Coronavirus infection of the central nervous system: host-virus stand-off. Nat Rev Microbiol. 2006;4(2):121\u2013132. Weiss SR, Leibowitz JL. Coronavirus pathogenesis. Adv Virus Res. 2011;81:85\u2013164. Pearce BD, Hobbs MV, McGraw TS, Buchmeier MJ. Cytokine induction during T-cell-mediated clearance of mouse hepatitis virus from neurons in vivo. J Virol. 1994;68(9):5483\u20135495. Parra B, Hinton DR, Lin MT, Cua DJ, Stohlman SA. Kinetics of cytokine mRNA expression in the central nervous system following lethal and nonlethal coronavirus-induced acute encephalomyelitis. Virology. 1997;233(2):260\u2013270. Rempel JD, Murray SJ, Meisner J, Buchmeier MJ. Differential regulation of innate and adaptive immune responses in viral encephalitis. Virology. 2004;318(1):381\u2013392. Sun N, Grzybicki D, Castro RF, Murphy S, Perlman S. Activation of astrocytes in the spinal cord of mice chronically infected with a neurotropic coronavirus. Virology. 1995;213(2):482\u2013493. Minagawa H, Takenaka A, Mohri S, Mori R. Protective effect of recombinant murine interferon beta against mouse hepatitis virus infection. Antiviral Res. 1987;8(2):85\u201395. Smith AL, Barthold SW, Beck DS. Intranasally administered alpha\/beta interferon prevents extension of mouse hepatitis virus, strain JHM, into the brains of BALB\/cByJ mice. Antiviral Res. 1987;8(5-6):239\u2013245. Cervantes-Barragan L, et al. Control of coronavirus infection through plasmacytoid dendritic-cell-derived type I interferon. Blood. 2007;109(3):1131\u20131137. Xue S, Sun N, Van Rooijen N, Perlman S. Depletion of blood-borne macrophages does not reduce demyelination in mice infected with a neurotropic coronavirus. J Virol. 1999;73(8):6327\u20136334. Marten NW, Stohlman SA, Bergmann CC. Role of viral persistence in retaining CD8(+) T cells within the central nervous system. J Virol. 2000;74(17):7903\u20137910. Bergmann CC, Parra B, Hinton DR, Chandran R, Morrison M, Stohlman SA. Perforin-mediated effector function within the central nervous system requires IFN-gamma-mediated MHC up-regulation. J Immunol. 2003;170(6):3204\u20133213. Lin MT, Stohlman SA, Hinton DR. Mouse hepatitis virus is cleared from the central nervous systems of mice lacking perforin-mediated cytolysis. J Virol. 1997;71(1):383\u2013391. Parra B, et al. IFN-gamma is required for viral clearance from central nervous system oligodendroglia. J Immunol. 1999;162(3):1641\u20131647. Gonz\u00e1lez JM, et al. Inhibition of interferon-gamma signaling in oligodendroglia delays coronavirus clearance without altering demyelination. Am J Pathol. 2006;168(3):796\u2013804. Anghelina D, Pewe L, Perlman S. Pathogenic role for virus-specific CD4 T cells in mice with coronavirus-induced acute encephalitis. Am J Pathol. 2006;169(1):209\u2013222. Wang Y, et al. IL-34 is a tissue-restricted ligand of CSF1R required for the development of Langerhans cells and microglia. Nat Immunol. 2012;13(8):753\u2013760. Elmore MR, et al. Colony-stimulating factor 1 receptor signaling is necessary for microglia viability, unmasking a microglia progenitor cell in the adult brain. Neuron. 2014;82(2):380\u2013397. Spangenberg EE, et al. Eliminating microglia in Alzheimer's mice prevents neuronal loss without modulating amyloid-\u03b2 pathology. Brain. 2016;139(Pt 4):1265\u20131281. Dagher NN, et al. Colony-stimulating factor 1 receptor inhibition prevents microglial plaque association and improves cognition in 3xTg-AD mice. J Neuroinflammation. 2015;12:139. Herz J, Filiano"} +{"id":"RedPajamaCommonCrawl.0036","text":"INTERVIEWED: ESS\u00c1Y Ess\u00e1y is 21 years old, from Heidelberg, Germany, and he makes the most beautiful emotional electronic music. He started producing music when he was around 10 years old, and this is your chance of getting to know him a little better. Who are you? How are you feeling today? My name is Simon, (Ess\u00e1y) and I am laying in my bed, ill, but other than that I feel fine. I hope you feel better! What's going on at the moment? Any upcoming projects? Yeah, even though I don't have much time for producing because of my (regular) job, I was just able to finish a new vocal collab with Ida Dillan, which is out soon. I'm also working on other sketches from time to time e.g. a collab with Shura. How long have you been producing music? I started producing when I was around 10\/11 years old. I'm 21 now, so I guess around 10 years now. What do you think of your music, and how would you best describe it? Phhew, good question.. I like my stuff and I am proud of it, especially \"Morning Mountain\"; for me it's the best track I've ever made. (cheers to Rhian Sheehan for his wonderful original) I would describe it as chilldance emotional electronic music.. Ok, honestly I don't know how to describe it. Why did you start making music? Maybe because I wanted to try to bring my emotions out of my brain and transform them into more than just words. Also just for fun, to feel better, and to give other people good feelings. Do you feel like your sound reflects your personality? Yeah, definitely! Even though most of my tunes are without vocals. What's the most fun part about being a musician? Making music. My life, other tunes, pictures, feelings.. Just everything. What was the first thing you thought about when you woke up today? I need to go to the toilet! Who are your influences? You mean artists? Oh God, too many, I could make a never ending list.. What's your favorite song at the moment? Could make a long list of that also, but I've listened to a track that Kyson showed me; it's called \"Ocean Tides\", it's still unreleased. Looking forward for the release! What have you got in your pockets today? Money, my mobile phone, earplugs and certainly some fluff. Your most prized possession? My daily growing experience of life. What's the one thing you can't live without? Music, definitely! What would we find in your refridgerator right now? Cheese, ketchup, yoghurt, meat, toast.. If you could trade places with any other person for a week, living or dead, real or fictional, who would you choose? I would like to be a character in a Mmorpg, or a bird! Which super power would you like to have and why? Being invisible would be cool, walking around naked and do pranks. What would be your ideal birthday party? A room, all my friends and nice music. What's your favorite word? \"Schickt\" \u2013 it's German and kind of a slang word for things or situations which are crazy, cool or whatever. Top three dinner guests, and why those? Spongebob, Patrick and Thaddeus, that would be fun because.. C'mon it's obvious! If Heaven excists, what would you like to hear God say when you arrive at The Pearly Gates? \"You did a good job.\" What profession would you absolutely NOT like to do? Probably being God, most of the people would pray to me more for help than gratitude. ESS\u00c1Y Warminal Records INTERVIEWED: ZYMIILY Zymiily is Daniel from Bergen, Norway. He's 15 years old and produces house\/electronic music. His biggest influences are Avicii, Zedd, Sweedish House Mafia, Porter Robinson, Deadmau5 and Nicky Romero. We've asked him a couple of questions, so that you can get to know him a little better. Hello! I feel great today, nothing out of the ordinary. I am currently working on some tracks, and I want to make an EP out of it, but I haven't really made up my mind yet, so I am not quite sure if I'll make it an EP. It depends on how time consuming it will be. For how long have you been producing music? I started producing 5 months ago, when I uploaded my first song. I played around with music before that, but I never really did anything serious. What do you think of your music? I don't think my music is too good, although I think I am improving my music every time I create something. If I listen to my first song, and my newest song, I can clearly hear a difference. I started making music because I really enjoy listening and I thought it would be really cool to create my own music, and letting out ideas I have. Do you feel like your music mirrors your personality? It kind of does. I like house because it usually has uplifting\/happy melodies, and I am a \"happy\" person so I guess it reflects my personality a bit. What's the most fun part of being a musician? The most fun part of creating music is definetly looking at the feedback and comments fans give you. Whether it's constructive critisism, or someone telling you they like your music, it's awesome, and a lot of fun to read!! I get inspired by many of things, but just listening to other peoples work, and how good it sounds, inspires me to create my own music, trying to make it sound good, and make other people like it. I look up to alot of good artists out there, like Avicii, Zedd, Sweedish House Mafia, Porter Robinson, Deadmau5 and Nicky Romero. There are alot of other people that I look up to too, but these are my biggest influences. My favorite song for the moment is \"Zedd \u2013 Spectrum\", I just can't get enough of it! I don't have pockets, I'm wearing a pajamas. I really appreciate my family. Especially my brother, assuming he had cancer two times, and survived both times. I could probably not live without internet. A while ago it was gone for a week or so, and it drove me crazy. I probably wouldn't die, but hey, we can't say anything for sure. What would we find in your refrigerator right now? Bacon. Loads of bacon. Honestly, you would probably just find lemons. My father buys a ton of lemons everytime he's at the store for no apparent reason whatsoever. It would be fun to be a famous artist for a week to get a feel of how it is, but there are so many persons I would like to be. I think I would be one of the Apollo astronauts, like Armstrong. I have always wanted to walk on the moon, that would be awesome. If I could have a super power, I would like to fly! I have always liked flying, and it would be pretty awesome to fly around, not caring a single bit about gravity. The ideal birthday party would probably be in a house with no gravity where everyone could fly around and walk on the walls! ^^ My favorite word is probably smooth. You can define everthing with this simple word 1. A house artist like Avicii would be very cool to talk to, so I could learn more about music. 2. A comedian for the lol's, and to keep us all in the mood. Maybe Jim Carrey. 3. Bobby Flay. I've heard he's a great chef, and we obvously need good food for a dinner, right? ^^ If heaven exists, what would you want to hear God say when you arrive at the pearly gates? I would be happy with just a \"Welcome\". I would not like to do medicine. I would probably not be able to dig in someone's body. Follow Zymiily so that you can witness his progression! INTERVIEWED: ANCIENT GEMSTONES ANCIENT GEMSTONES IS THE NORWEGIAN ELECTRO\/DUBSTEP PRODUCER EIRIK DJUVSLAND. EVEN THOUGH HIS 7 YEAR OLD MAC WAS ONCE STRUCK BY LIGHTNING, IT STILL TO THIS DAY MANAGES TO ASSIST HIM IN MAKING BANGIN' DUBSTEP. HE ALSO WANTS TO HEAR GUY RITCHIE GOSSIP ABOUT MADONNA. My name is Eirik Djuvsland aka Ancient Gemstones. I create dubstep\/electro. I'm all good! thank you for asking. I'm doing some work on a promo tape right now for Ancient Gemstones, planning another EP soon. Also working on my side project We Are Mystery's next EP, and I get behind some drums again this year in a new rock\/punk\/hardcore band called \"Swimming With Sharks\". I think I was like 14 or something when I was in my first band. Since then, I have played drums in a handful of punk bands, picking up guitar and keys trough the years. But in 2010 I discovered the magic of producing and programming music on computers. Producing in a DAW is a real power feel. It lets you create you. You have all the tools and instruments, and you can do what ever you want. 35 saxophones only? No problem. I don't know. I really love making it. This is what it sounds like when I produce. This is me. It's hard to explain what you feel about yourself in a way. I just do the things that come naturally, and that's the whole beauty of it to me. I like artists with a distinct sound, because you know it is straight them. I was curious on the hole programming of drums process, chopping of samples and so one. A good friend of mine, Justin Credible produces allot of underground hip hop and showed me the ropes, took me under his wing and let me loose on the keyboard. He also forced me to realize the importance of things like EQing drums, sub bass, properly cut samples and so one. I owe allot to him. Curiosity was a driving force, but also knowing the amount of work that I had to put in my tracks. you have to be a perfectionist in electro\/dubstep, and chase perfection witch you may never experience. knowing that really drove me further into it. Yeah I do. My personality is complex, like everybody else. therefore my music is as-well, because I let me and my personality shine, and not my hunger for money, or trying to please everyone. Live looping beats and stuff on just a MPD with a sampler is really fun. playing around trying new things and the freedom you have as a producer. nobody produces your music better than you, And nobody tells me what to do but myself. Skateboarding, friends, movies, tv-series, art in general, good times, life if lived right. How dumb I'm gonna look on the promo pictures after a knife shaving incident on my chin a couple of days ago. Also, I was extremely cold due to lack of window closing. In short, I was pondering the fact that I'm an idiot. This might get long; Midnight Juggernauts, Metronomy, Gorillaz, Kid koala, Mr scruff, Bonobo, Nujabes , Kill The Noise, Knife Party, Skrillex (he gets allot of undeserved hate. everybody that does sound design knows how sick his skills are) Badbadnotgood, David Holmes, Barron, Zomboy, SebAstian, Daft Punk and so on. I could name drop for a couple of days. Posij \u2013 Empty Lungs. That song really hit me and my emotions. So smooth and beautiful chords, fueled with raw power and anger, it's like really mellow and melancholy, sad but filled with hope. iPhone, Romeo y Julieta snus, (aka smokeless tobacco) my wallet and my keys. Even if it is material, I have to say my 7 year old, sturdy as hell Mac. It was hit by lightning, fixed and is still working. Sure we've had our differences, it really likes to lag when I produce. But even after a lot of \"is this it!?\" scares, it still fights trough. My friends and family. Household, normal lame things like cheese, milk, soda and so on. Straight up food business. Kratos from the God Of War game series. His insane anger and straight gangsterness (is it cool I make up words?) is something I want to experience first hand. He destroys everything. He kills Hades, ruler of the underworld and climbs the chains of Olympus to mess up Zeus. All just for revenge. The art of flight and levitation I think. Everybody wants to fly. Iron Man was the coolest avenger as well, in my opinion. A chill skatepark session with all my friends would have been cool. Maybe with Eptic playing? That would have been sick. \"Inception\". It sounds so neat and clean, and they gave the word a whole dope movie. Also \"Yes\". Larry David, because he is a comedy genius. George R.R. Martin because of his work on the Game of thrones series and he seems like a funny dude. And Guy Ritchie, because his movies are sick and I have some questions about Madonna I think only he can answer. \"I'm real motherfucker!\" Nah,but maybe something like \"You did well\". I really doubt he'd say that, but I would really appreciate it if he did. I used to work as a cashier at a grocery store, that really, seriously sucked. Returning to that still haunts me in my sleep. INTERVIEWED: SYSTRASKAP Systraskap is a Swedish electronica duo consisting of Amanda Lindgren and Sabina W\u00e4rme. They make music you can dance to at the club, at your home alone party, in the street, in your kitchen, at the gym, in the bathtub, and even inside your own brain. We are the swedish electronica duo Systraskap. We're excited! Today we're rehearsing for our next concert, which is tomorrow, were we're gonna interpret our electronic music acoustically. It will be lots of accordion, some clarinet, guitar, gitalele, glockenspiel, percussion and vocals. We're also planning our tour for the spring and the summer. We've both been making music for many years, separately, but we've been producing music together as Systraskap since january 2011, so for about a year. Our duo began playing live this fall. It represents our feelings and what we want to say. It is also a good kind of music to experience live, both playing and listening to. We met when we both studied jazz, and found quite immediately that we have kind of the same taste in music, and the same approach to music. Amanda wanted to play with Sabina, and Sabina said; lets play electro! And since Amanda had been making a lot of music on the computer, we found our selves to be the perfect match. Do you feel like your music mirrors your personalities? We write music about things that really matter for us, mostly when we're upset or disappointed, feeling that we need to create a debate about something. So we definitely think that our music mirrors parts of our personalities. What's the most fun part of being musicians? There's hardly anything we find boring with being musicians. We've chosen to do everything our selves, from sewing our handmade disc cases, recording and mixing to booking gigs and planning tours. We love to be able to be creative, to give concerts, to decide our own schedules and to have the opportunity to work with something that we really love. Injustice. What makes you happy and sad? Hugging makes us happy, war makes us sad. We thought about all the things we wanted to do today, like recording, making some calls and rehearsing. Things we hear, things that happen around the world, things that we have an opinion about. What's your favourite song at the moment? We have a really hard time choosing just one, but to mention three, we would say \"Like a pen\" by The Knife, \"My step\" by Little Dragon, and \"The battle in water\" by Wildbirds And Peacedrums. Your most prized posession? Actually, we would say our bodys \u2013 that they are healthy and functioning. Then we really value all our instruments and Amanda's computer with which we make our music. Pepsi or Coca Cola? We don't like multinational corporations in general, and what they're representing. Each other. Sabina walks away to check it out, talking out loud; milk, cheese, jam, hummus, left overs, tomato, banana\u2026 At first we had a really confusing discussion, sounding like this: \"Are we going to be that person, having the power to affect the persons choices, or are we just experiencing someone else's thoughts and actions?\" After a couple of minutes Amanda just decided that if we'd have the power to change things we wanna be the Almighty and if we'd just tag along inside of the body we wanna be Karin Dreijer. We're not sure if we would like to have a super power if we had the opportunity, but it seem stupid to miss the chance to fly. Breakfast at the bed when we wake (up), lots of cake, and no stomach ache. What's your favourite word? Systraskap. The two of us are really good dinner guests, we don't have very much spare time though, but we'd like to be your guests! Motivation: because we are really nice, and good at eating, and Sabina's table manners are not too bad. And the third person we recommend you to invite is someone that have really bad table manners to make Amanda's look better. Check out some more from SYSTRASKAP INTERVIEWED: GOLDEN GARDENS ExposeExpress presents: Golden Gardens, a Seattle dreamgaze duo consisting of Gregg Alexander Joseph Neville and Aubrey Rachel Violet Bramble, who creates Dreamscapes and Anthems for Magical Minds. It is indeed dreamy and magical, and this is your chance to get to know these two golden people better. Gregg Alexander Joseph Neville: We are doing wonderfully. Aubrey Rachel Violet Bramble: Gregg actually just moved to Seattle from Florida, so now that we are both in the same city we are focusing on playing a lot of shows and promoting our record, Between the Siren and the Amulet. We are looking into doing a West Coast tour and a European tour later this year, also. GAJN: We have been working on music together since the Summer of 2010. ARVB: I think it's very cinematic. It's sparkly, shadowy, transcendent; full of secret messages from other worlds. GAJN: We were both working on other projects and in other mediums for years. I started having ideas for music that skewed much more toward the dreamy and ambient. After looking for a while for collaborators, Aubrey and I started working together and it became apparent that we had immediate musical chemistry and her vocal and structural additions really fleshed out the music and atmosphere. ARVB: In many ways, yes, though of course we are much more complex than what our music suggests. There is definitely that dichotomy of pretty and dream-like versus dark and serious that I think characterizes Gregg and I pretty well. It's the marriage of those two moods that makes our music so dynamic. http:\/\/soundcloud.com\/wearegoldengardens\/golden-gardens-ghostwood GAJN: Creating and performing have become such integral parts of my life, I would not trade them for anything. ARVB: Sharing stories, emotions and suspended moments in time with other humans. ARVB: Gorgeous things. Magical talismans and ghost stories. Colorful landscapes. Strange films and old fairytales. GAJN: Extremes in emotion, sadness, joy, cold weather, dead things, living things, strange cinema, noise, ghosts, monsters. GAJN: Creativity makes me happy \u2013 writing music, performing, reading. Boredom makes me sad. ARVB: Adventures! GAJN: David Lynch, Angelo Badalamenti, Johnny Marr, Robert Smith, Akira Yamaoka, Peter Hook, Crispin Glover. ARVB: Harriet Wheeler, Kate Bush, Alison Shaw, Elizabeth Fraser, Daniel Ash, Lata Mangeshkar. ARVB: \"Hollywood Forever Cemetery Sings\" \u2013 Father John Misty GAJN: \"Where The Threads are the Thinnest\" \u2013 Feeding Fingers GAJN: Change, receipts and pens. ARVB: The sea. I need to be near open water, to gaze out at the vastness of it all whenever I want and imagine all the sea creatures underneath, and imagine all the magical places the water can lead you to. Inland environments are like a creative prison to me. ARVB: I'd like to trade places with a mermaid so I could live in an underwater city. GAJN: I want to trade places with Philip Marlowe and solve mysteries. GAJN: Laser eyes. For shooting people. With my eyes. ARVB: Unicorn rides, pink and lavender frosted cupcakes, Marie Antoinette costumes, glittery shoes, feathery hats, jewel-encrusted masks and all of my fancy friends in a garden of roses and wildflowers. GAJN: Scuba. ARVB: Fancy. ARVB: Hayao Miyazaki, so that he could tell me fantastical bedtime stories; David Lynch, in the hopes that he would assume his Gordon Cole character from Twin Peaks, and that he might cast me as a quirky beauty in his next film project; Courtney Love because she is a wild goddess. Find Golden Gardens over here: Their current releases include the LP \"Between the Siren and the Amulet\" (August 2011) and \"The Covers EP\" (December 2011). You can stream both of the albums over at their Bandcamp page: goldengardens.bandcamp.com. You may also find tracks\/mp3s over at our Soundcloud: http:\/\/soundcloud.com\/wearegoldengardens. INTERVIEWED: SUNKEN SEAS Dreamy, hazy, beautiful. Three carefully selected words, to describe the sound of Sunken Seas. Introducing, the interview with their guitarist Luke Kavanagh. Sunken Seas is Craig Rattray, Ryan Harte and Luke Kavanagh. We're a shoegazy post rock band from Wellington NZ. I am Luke, the guitarist in the band. Today I am angry as someone stole my iPod. I would prefer somebody took my kneecaps rather than take my iPod.. At the moment we are just putting the finishing touches on an album to be released mid year 2012. We've been working on it for about 9 months give or take. Sunken Seas as a band I would wager have been releasing\/producing music since 2011. We were in a previous band which had reached it's nadir, and three members of the old band decided to form a new band which was a little less structured and something different. Playing live without a shadow of a doubt. And the creation. It's important to retain the fun aspect of making music I think. It's just a load of fun. I think if you lose that then it always shows a little. The world around us I suppose. The cosmos, Quantum Physics, Peter Cook, Brian Cox, Brian Eno, Pseudoscience, Phrenology. Space Time. Good people, bad people.. The fact that the atoms in your body don't collapse into some kind of primordial soup is something which inspires me, just because it makes me think. Brian Eno. What sort of Pizza I was going to have for dinner. Couldn't quite decide between the meat feast or the super supreme to be honest with you. Do I go with the stuffed crust or not? Do I plump for the Optional garlic bread? These are the sort of decisions that change lives. Any ambient music, be it electronic or otherwise. Anything on the Kranky label. Flying Nun. Slowdive. Shoegaze. Krautrock, Alot of postrock. Alot of 90's 'Alt rock'. Noise. Pop. Tony Allen. Dave Turncrantz. Cool Cult \u2013 Tommorow. Also Secret Machines \u2013 You Are Chains A comically small notebook adorned with the scribblings of a small child, and an E-Bow. My son Jacob, he's almost three. Neither, both are pish. Music probably. My iPod, even though it's been half inched. And also Tottenham Hotspur from North London. Probably half eaten pizza. I ordered too much and the stuffed crust asked some harsh questions of me. To fully understand how we came to be here. If I could somehow get everybody I had ever met into one room, It would be one hell of a barndance. Show these talented people your love. ExposeExpress wishes you the best of luck, and we're looking forward to exploring your forthcoming album. Much love! INTERVIEWED: SE1DavidE Listen to this. I mean, really listen to this. This is talent, right here! These amazing beatstrumentals are perfectioned by the musically gifted SE1DavidE. We're proud to present to you, our readers, a little tour into SE1DavidE's life. Here it is, the interview. Hello, who are you and how are you feeling today? I'm SE1DavidE and I'm feeling pretty excited thank you, I've got to go to a studio in North London this afternoon and I'm looking forward to it! It was also my 19th birthday yesterday, so it's been a pretty decent week. I compose and produce HipHop music based around Soul, Jazz and Funk samples as well as HipHop based around Ambient textures and atmospheres. On the weekend I attend Millwall or Fisher FC matches with a couple of pints of beer in hand and a full singing voice. I cycle throughout London at night when the insomnia kicks in and I'm an avid film viewer. Obviously I listen to music, The Jam, The Verve and White Lies being some of my favourite bands. Describe your sound: Soulful 'boombap' HipHop with a little bit of Brian Eno fused with J Dilla on the side. I've just released a 14 track LP entitled \"BermondseyBeats Vol.1\" on Bandcamp and I'm starting to work on an EP to be released in February as well as work for my 2nd LP to be released in March. In addition, I've provided production for Chuckie Campbell from the states for his promotional mixtape entitled \"In A World Not of Our Making\" which is going to be released in the first quarter of this year. Also, I'm collaborating with an American raised rapper by the name of Knytronium. We share a special bond because he was born in South London like myself! We're going to be releasing a free EP in the next coming months. I've been learning the graft since 2007 through youth clubs and studying GCSE Music and AS\/A2 Music Technology, however, I only really started to develop my \"sound\" from July 2011. I uploaded my first few tracks on to Soundcloud and it really took off from there. I take music very seriously, it's a way of life in some respects. My Ambient HipHop compositions are inspired by my long cycling journeys, just cycling by the River Thames bank at night gives me various ideas and concepts. Photography inspires me, especially city landscapes as I pay a lot of attention to detail and it's amazing how a city looks at night. The soulful HipHop is sometimes created by just browsing through a record shop and playing some soul vinyl is enough to persuade me to purchase the record and sample it when I get back home! Being around my friends and family makes me happy, as well as music and football. Reality TV shows depress the hell out of me, and the fact a lot of people watch them as well and talk about it the day after it was shown just annoys me more than anything. Pop music depresses me, it's all you ever hear on the radio and see on the telly nowadays. So many young people just listen to the same old thing, I really think people need to broaden their music taste and experiment with listening to different genres, but, then again it's up to them. On a serious note I think people who don't like their parents makes me very sad, my Mum passed away in April 2010 and it infuriates me when I hear people say how much their parents \"drive them mad\", I feel like turning round and saying \"At least you're lucky enough to have both of your parents\". Having a bath and getting ready for today. Soundcloud has a lot of fantastic producers such as Manonwire and Handbook, their music is absolutely immense, I probably listen to their stuff more than DJ Premier and Dilla if I'm honest. History by The Verve. A fiver (Five pound note), itouch, Oyster card (bus pass) and the keys to my \u00a320 Million mansion (I wish). Who is your favourite person in the world? My Dad. Probably my catalog of Vinyls which are tucked away safely in my bedroom. If I were to pick the gems of the bunch it would be 'Loveless' by My Bloody Valentine, 'Urban Hymns' by The Verve and 'Laughing Stock' by Talk Talk. Coca Cola. With ice and a lemon of course. Music. Without music I'd just be the most boring, miserable, stone faced person you would have ever seen. Honorable shout-outs go to beer and football. Two cartons of Tropicana orange juice, a pack of ham and cheese, some wine and some salad. Ricky Gervais. Just to meet Karl Pilkington and just spend the day chatting to him about stuff. The power of speed, I'd love to be able to tour the World in a day. Lots of beer, friends and music which is happening this Friday at my local pub! Nothing too glamorous, just something humble and real. Immense. I pretty much use it everyday to describe something which is just perfect. Karl Pilkington \u2013 The funniest man on the planet Alan Partridge \u2013 Another funny man Paul Weller \u2013 I've always wanted to meet him as I'm a massive fan of The Jam. SE1DavidE INTERVIEWED : DUVCHI After hearing his song Turtleduvs, we were completely smitten. So here you go, an interview with the very cool Swedish singer\/songwriter Duvchi. Purchase Turtleduvs in iTunes (click) Hello, how are you? Who is Duvchi? I'm well, I ate avocadosandwiches with fresh lemon juice for breakfast this morning. Duvchi is two words translated into one meaning. Duv = Dove Chi = Energy, life force. I make music for people to feel too. I'll tell you what I don't do, I don't eat meat anymore. Me, a film director and an orchestra of 10 took Turtleduvs to church and recorded the whole song live while filming it. It will be aired all over the internet soon! I'm also working on my album and home decorating skills. Since somewhere around the time \"Are you that somebody\" by Aaliyah was released. My sound is built upon the understanding of opposites balance, why the music strives for a lavish but minimalist existence at the same time. In music composing and writing melodies and lyrics, I depend on the harshness of life to take me places. That in combination with arabic scales, Jim Jarmusch movies, Ren\u00e9 Magritte paintings and unusual ways of thinking\/acting really get's me good. What gets you worked up? Do you mean like, bothered\/angry worked up? In that case, the animal killing industry. It was this book that had me thinking: http:\/\/www.eatinganimals.com\/ My dentist appointment. It went well, I just need to brush a little softer. If you could speak to one type of animal, what kind of animal would that be? Come on, different animals for different topics! Like, for just kicking back in the sun I would go with a Sloth, but for a good talk on more complex things I would see a lovable dove or an elephant. Prince, Wings, The RZA, J Dilla, Tchaikovsky, Moondog, Static Major, Aaliyah, Kate Bush, Woo, The Dream and Dipset. 'Don't let it bring you down' by Wings Mastercard or Viiiisa, Keys, an iPhone and a few taxi reciepts. My Piamino, the one I wrote \"Turtleduvs\" among many on. Yeah, that's Coca. Libido. Ginger ale, avocado and feta cheese. You will always find many beverages. I love beverages. Today, that would be Ivy Blue or her father. Fly. Everything else a normal dove can do I can too, like riding the subway and all that. Not being born on Christmas Eve would be a good start. Like, to have my own day. Pass. I want Clara Rockmore, J Dilla and a translator.\" Want more Duvchi? Visit him over here: We can't wait to hear more from this guy, and wish him all the best of luck in the future. \u2764 INTERVIEWED: NICK DECAY Nick Decay \u2013 The Essentials EP http:\/\/soundcloud.com\/nickdecay\/sets\/the-essential Nick Decay is a 26 year old electronic\/dubstep producer from Las Vegas. His EP, The Essentials, is out. The tracks are crazy, and sure to bring together a wild crowd. Don't know him yet? Here's more about him: What's going on at the moment? I'm Working on a new track to add to my new EP, then going to release \"The Essentials\" EP for download, FREE! What inspires you? Life. What's your motto? It's only the truth if you want to believe in it. How did you get where you are today? Where am I? Lol! How long have you been producing? Ive been producing dubstep solo for about a year, but have recorded and produced for serveral bands and side projects. As a child, what job did you want? Rockstar. For you, a man must\u2026 Keep his word, without your word, you are nothing. What program do you use when producing? I use several, but i mostly mix and master with Ableton Live. Who are your influences? Metal\/hardcore, Gangster Rap, and Dubstep. Artists such as Dr. Dre, Skrillex, and Nero have had a huge influence on my production. What would you change about yourself? Nothing, I like me. ..And the world? The world is fucked, no change we can make has the power to reverse what we have done. What's your dream? Travel the world and to continue writing and playing my music. Your ideal woman? Women are nuts. What's the most important decision you've ever made? I'm sure it's still to come.. Your most-prized possession? My laptop. Your favourite artist? This always changes. Skrillex atm. Your vice: If I told you that, i'd have to kill you \ud83d\ude09 Describe yourself with three words: Totally fucking nuts. Your favourite noise? The sound of Stewie's (from Family Guy) feet running. Favourite word? Supercalifragilisticexpialidocious. Your favourite swearword? FUCK (it has so many wonderful uses). What's your favourite song? This changes all the time. Currently its \"Perfect Situation\" by Weezer. Is there anything that you collect? Horror Movies. What is happening in your life right now? Work, Music, thats about it! What do you dream of when you dream? I never remember, usually off the wall crazy shit. What\/who is your biggest inspiration? My Mom, she still to this day pushes me never to give up! What do you love most about being an artist? Being able to express myself through my music. What would be an ideal birthday party? Friends, Food, and Drinks! Your top five movies: Swingers, A Nightmare On Elm Street, Anchorman, Halloween, 40 Year Old Virgin. What's your favourite place in the whole world: Universal Studios in Orlando Florida. If you got do do whatever you wanted to do a whole day how would that go by? Universal Studios or Disneyland! With no waiting in line! Top three dinner guests: Sonny Moore, Adam Richmond and Dr Dre. INTERVIEWED: KAYANDGEE Kay and Gee are two fresh hot radiohosts on GuessRadio.Co.UK every friday from 8-10 PM. They play the hottest hiphop \u2013 R'n'B tracks on the planet and discuss the hottest topics. You know you want to know more about them, so let me present to you: Ms. Kay and Mr. Gee! This Is Gee Age: Forever young. What do you do? Run a music shop and present a radio show! Among other things. Tell us a little about your radioshow: K&G show is on guessradio.co.uk every friday 8-10 pm GMT. It's the hottest music in the world, crazy talk, crazy guests, battle of the beats etc. Just a fun 2 hours non stop! Part of our crew includes 'world famous' Dj Jekyl and Amanda Labelle. What's the best thing about having your own radioshow? We can play anything we want, and interruct with people from all over the world, the show has no limits (as long as it stays clean) and we can change it when we like. What inspires you? Music, traveling and my peeps. What have you got in your pockets today? My wallet (with no money in it haha) and keys. Who are your influences? I started listening to rap music from an early age. Dr dre, Snoop Dogg, Jay Z, Nas, Biggie Smalls, all the greats got me into it, also Dj Tim Westwood (BBC radio 1 rapshow). What's going on at the moment, any upcoming projects? We trying to make our show the hottest on the radio, plus we trying to get our show on TV, so look out for that, we got K&G mixtapes coming, clothing line, K&G parties and hosting, travel the world and spread the word, basically take over the world! Haha What's your motto? The world is ours! How did you get where you are today? Hustlin hard! Haha, nah our lve and passion for music got us here + the contacts we built up throughout the years. Your dream? To be recognised as two of the best in the business. Your ideal woman? My mum. Your most-prized possession? My shop (Cd-bar Stratford London) and my brain. Your vice? Music and parties (I am a wild child). Describe yourself with three words: Cool, crazy, genious. Favourite word? Yo! Is there anything you collect? Hats (baseball caps) I've got over 100. What's your favourite song at the moment? Tie between these two: As a child, what job did you want? I wanted to be a pilot Define your look: Trendsetter, casual smart street look. What are the most important decisions you've ever made? Buying my shop and starting our radio show. This is Kay Name: Kay King. Age: That would be telling. What inspires you? Music, family and friends. Who are your influences? Mummy and daddy, and Beyonce LOL! What's your motto? Carpe Diem \u2013 latin for 'seize the day'. How did you get where you are today? I used my motto. Your dream? To be successful and the best in the game. Your ideal woman\/man? Trey Songz (that's an easy one). Your most-prized possession? My jewellery. Your favourite artist? Michael jackson and Beyonce. Your vice? Party like a rockstar. Describe yourself with three words: Passionate, loyal, dramatic. Favourite word? Fabulous. What do you always have with you? My Blackberry. Is there anything you collect? Anything gold as it's my favourite colour. What's your favourite song at the moment? Right now Angel- ride out. As a child, what job did you want? To work with animals. What would you change about yourself? To have more patience and get a Kim Kardashian booty!! ..And the world? Stop the violence and negativity and spread the love. What's the most important decision you've ever made? To do the radio show as this is the beginning of important things. Follow KayandGee on Twitter and Facebook, and of course pop by Guessradio.co.uk every friday from 8-10 PM! INTERVIEWED: IVAN MUHAR Ivan Muhar is a music Producer, remixer and DJ stationed in New York. He har been producing for eight years, and we thought it would be cool to get to know him a little better by digging a little deeper into his personality, and show you some of his music. He is a little mystical, and does not want to expose himself in pictures right now. Not yet, he tells us. David Guetta + Avicii \/ Sunshine (Ivan Muhar Remix) \u2013 One of the most played songs in the clubs right now in USA. David Guetta + Avicii \/ Sunshine (Ivan Muhar Remix) DOWNLOAD (Soundcloud) Full name: Ivan Muhar What inspires you? A Good Wine \ud83d\ude09 What have you got in your pockets today? My Blackberry, My Ipod and my wallet. How do you go by when making a song? It's hard defining how I make a song. I\u00b4m an instrument of my ideas, I go to my studio and I am driven by what comes to my head and heart. What software du you use when producing? Fl Studio, Protools. Any upcoming projects? My first Ep with 5 tracks called LimeLight. How did you get where you are today? Hard work and dicipline. What's your motto? Do not feel defeated, not even when defeated. As a child, what job did you want? I wanted to be a soldier, and I did become one, I'm a Army Lieutenant retired. Who are your influences? Wolfgang Gartner, Dada Life, Afrojack. What's your dream? To win a Grammy! Kaskade \/ Raining (Ivan Muhar Remix) Your ideal woman? All\u2026 Lol! Your most-prized possession? My Dog. Your favourite artist? Describe yourself with three words: Disciplined, proud and perfectionist. Your favourite noise? Waves. Your favourite swearword? Hijueputa! What do you always have with you? My BlackBerry What's your favourite song? All Back \u2013 Chris Brown Ivan Muhar on: Onesheet INTERVIEWED: AUTOLASER Preview of two new tracks from Autolaser: Full name: Kent Tonning What do you do? Im an musician\/artist and work as a printer\/graphic designer. What inspires you? Nature, animals, ghosts, Ufo`s and weird stuff that happens on earth. What's going on at the moment? I`m working on Chapter 3 EP, which is soon done! Also I`m working on my live show package, Can`t tell you about it yet, but it`s gonna be a blast. How did you get where you are today? Basically I`ve just spent my days at work, and my nights in my room producing. (I`m still doing that, forever alone, haha!) What's your motto? Do what you want, not what others want. How long have you been producing? I`ve been producing electro for 2 years now. As a child, what job did you want? Musician and a jetpilot. (I blame Topgun). What program do you use when producing? I use Ableton Live in studio and in live performances. Who are your influences? The Prodigy, Jimi Hendrix, Y.M.O and diverse old disco. Your most embarrassing moment: I slept too long on a bus, woke up in my seat and it was dark, the busdriver was gone. Suddenly he came back, and sat down in the drivers seat. I walked up to him and asked \"where am I??\". I scared the shit out of him and he got angry. Everyone at school found out when he drove me back to school. Also I played at a festival this summer. My zipper went up, and someone twittered \"Close your zip man!!\" What would you change about yourself? Nothing really, I`m proud anyways. ..And the world? End of war, stop fucking up the rainforest and more love for the animals. Define your look: 1.76, hot, brown hair, nice ass, two nipples, blue eyes and nice hands. Your dream? Touring in Asia! Your ideal woman? Kind, hot, like to go snowboarding and skateboarding, go to rave partys, smile.. Smile more!! Your most-prized possession? My music gear. Your favourite artists? The Prodigy, Jimi Hendrix, Rolling Stones, there are so many. Describe yourself with three words: Productive, kind and creative Favourite word? WORD and YEAH! What do you always have with you? MP3-player with headphones and chewing tobacco. What's your favourite song? The Prodigy \u2013 No Good Is there anything that you collect? Old cameras and old drawings of houses, landscapes and trains. What do you dream of when you dream? Getting haunted by ghosts in my apartment. My apartment is haunted! What\/who is your biggest inspiration? Antonio Vivaldi and Carravaggio! What do you love most about being an artist? Everything, live shows, producing and all the nice people you meet. What would be an ideal birthday party? Celebrating with monkeys! Whats your favourite place in the whole world: My home. What were your favourite fairytales when you were little? The old tales about trolls and ghosts. What makes you happy? Good people, good music and freetime! Top three dinner guests: Daft Punk, Samantha Fox and you! Catch Autolaser on: Go like this guy on Facebook or so help me!!! \u2764 Preview of what`s to come. KOSTYA speaks up! Engulfed (Original Mix) Coming out on RockForce Records Oct 17th! He`s a producer from the Atlanta area, and his EP is out October 17th. We can`t wait, because this is gonna be stellar! This guy hopes to make music his carreer and quit school. Full name: Stephen Alexander Hutcheson What do you do? I produce Electro and Dubstep and I DJ. Right now I`m working on an electro house track. What inspires you? The idea of making something from nothing. What's your motto? Never give up. What got you to where you are today? A huge amount of practice. How long have you been producing? I've been messing around with the idea of it for a few years but I started getting serious 8 or 9 months ago. As a child, what job did you want? Cartoon animator. For you, a man must\u2026 Pursue happiness. What program do you use when producing? FLStudio 10. Who are your influences? Deadmau5, Skrillex, and Kaskade. What would you change about yourself? My nervousness. Your dream? To go on tour. Your ideal woman? One that I don't feel awkward around. Your most-prized possession? My accordion. Your favourite artist? Deadmau5. Your vice: Coffee. Describe yourself with three words: Persistent, Fun-Loving, and Laid back. Your favourite noise? A chord on a Rhodes organ. Is there anything that you collect? I collect many instruments. Guitars, a drum set, a piano, an accordion and much more. What is happening in your life right now? Going to school for Software Development and making music on the side. I guess it's not really on the side since I'm putting 5-10 hours a day in it. What\/who is your biggest inspiration? Andrew W.K. What do you love most about being an artist? Being able to share the ideas that were stuck in my head. What would be an ideal birthday party? At a Daft Punk concert. Your top five movies: The Big Lebowski, Any movie by Hayao Miyazaki, Clerks, Interstella 5555, and Amelie. What`s your favourite place in the whole world: My bed. What makes you happy? Just being able to give people catchy melodies and harmonies. Things that make your head bob or put a smile on your face. Overloaded (Original Mix) Coming out on RockForce Records Oct 17th! October 17th you guys. Hold the date, because you\u00b4ve got yourselves a hot date with mr. Kostya's EP! Catch Kostya on: xo IDA INTERVIEWED \/ EMILIO Philip Carlos Emilio Alvestad Larrain I work in a clothing store called Urban and make music. Life, situations and feelings. And of course good music and movies. What's going on at the moment? At the moment I am trying to push my mixtape out to as many as possible and working on some new stuff with Axxe ++ You'll see =) What's your motto? Always keep it real and do my best! How did you get where you are today? I've been doing music for a long time. Just long nights in the studio and living my life to the fullest. You can't write without living. How long have you been producing\/rapping? I am not a producer, but I've been writing and rapping since I was 11. But I wasn't that serious before I was around 17. As a child, what job did you want? I used to want to be a comic writer, then I wanted to be a basketball player and then a movie director, but in the end I loved music more than anything. For you, a man must\u2026 Be himself and not be afraid to. What program do you use when producing\/recording? I am currently using Logic Pro. It works fine :p The people that's around me everyday, they're great and they're all the input I need. (picture courtesy of akam1k3.com) Your most embarrassing moment: When I found out that my ex was cheating on me and I came to school and saw the dude. Haha. What would you change about yourself? If I could stop sleeping without loosing any energy, I would do it. ..And the world? Nothing, but giving them some new music to inspire them. Define your look: They say I look like Bruno Mars, but I'm taller. Haha! Your dream? Being successful and being able to make the music I want to. See my kids grow into strong and independent people! Your ideal woman? A woman that loves me and herself. What's the most important decision you've ever made? Dropping out of school to work and move from Norway to Spain to finish school. Your most-prized possession? Probably my Macbook or television. I really don't have one. But I like Kanye a little better than the rest of them. Your vice? Sometimes I overwork myself and hate my own work. Describe yourself with three words: Contemplative, daring and sleepless. Your favourite noise? The sound of porn. Makes everybody warm in their faces. Favourite word? Your favourite swearword? Fuck, because it can be done right. What do you always have with you? My iPhone, LV pouch and keys. What's your favourite song? No one has ever made one. But right now I'm listening to Justin Bieber \u2013 Never Say Never. Also a big fan of Drake \u2013 Uptown, instant classic just like Frank Ocean \u2013 Novacane and the list goes on. INTERVIEWED: Dan Wheeldon \u2013 Lead Singer Of Tai Chi Swayze"} +{"id":"RedPajamaCommonCrawl.0037","text":"Home Database My Lai Massacre My Lai Massacre Men, women and children lying dead on a road The M\u1ef9 Lai Massacre was the Vietnam War mass murder of between 347 and 504 unarmed civilians in South Vietnam on March 16, 1968. It was committed by the U.S. Army soldiers from the Company C of the 1st Battalion, 20th Infantry Regiment, 11th Brigade of the 23rd (Americal) Infantry Division. Victims included women, men, children, and infants. Some of the women were gang-raped and their bodies mutilated. Twenty six soldiers were charged with criminal offenses, but only Second Lieutenant William Calley Jr., a platoon leader in C Company, was convicted. Found guilty of killing 22 villagers, he was originally given a life sentence, but served only three and a half years under house arrest. The massacre, which was later called \"the most shocking episode of the Vietnam War\", took place in two hamlets of Son My village in S\u01a1n T\u1ecbnh District of Qu\u1ea3ng Ng\u00e3i Province on the South Central Coast of the South China Sea, 100 miles south of Da Nang and several miles north of Qu\u1ea3ng Ng\u00e3i city east of Highway 1. These hamlets were marked on the U.S. Army topographic maps as My Lai (4) and My Khe (4). The U.S. military codeword for the alleged Viet Cong stronghold in that area was Pinkville, and the carnage became known as the Pinkville Massacre first. Next, when the U.S. Army started its investigation, the media changed it to the Massacre at Songmy. Currently, the event is referred to as the My Lai Massacre in America and called the Son My Massacre in Vietnam. The incident prompted global outrage when it became public knowledge in November 1969. The My Lai massacre increased to some extent domestic opposition to the U.S. involvement in the Vietnam War when the scope of killing and cover-up attempts were exposed. Initially, three U.S. servicemen who had tried to halt the massacre and rescue the hiding civilians were shunned, and even denounced as traitors by several U.S. Congressmen, including Mendel Rivers, Chairman of the House Armed Services Committee. Only thirty years later they were recognized and decorated, one posthumously, by the U.S. Army for shielding noncombatants from harm in a war zone. Charlie Companyof 1st Battalion, 20th Infantry Regiment, 11th Brigade, 23rd Infantry Division, arrived in South Vietnam in December 1967. Though their first three months in Vietnam passed without any direct enemy contact, by mid-March the company had suffered 28 casualties involving mines or booby-traps, which caused numerous body injuries and five deaths. Vietnamese women and children in M\u1ef9 Lai before being killed in the massacre, March 16, 1968. According to the court testimony, they were killed seconds after this photo was taken During the Tet Offensive of January 1968, attacks were carried out in Qu\u1ea3ng Ng\u00e3i by the 48th Local Force Battalion of the National Liberation Front (NLF), commonly referred to by the U.S. Army as the Viet Cong or Victor Charlie from the initials corresponding with the NATO phonetic alphabet. U.S. military intelligence assumed that the 48th NLF Battalion, having retreated and dispersed, was taking refuge in the village of S\u01a1n M\u1ef9, in Qu\u1ea3ng Ng\u00e3i Province. A number of specific hamlets within that village\u2014designated M\u1ef9 Lai (1) through My Lai (6) \u2014 were suspected of harboring the 48th. In February and March 1968, the U.S. Military Assistance Command, Vietnam was aggressively trying to regain strategic initiative in South Vietnam after the Tet Offensive, and the search-and-destroy operation against the 48th Local Force Battalion of Viet Cong supposedly located in Son My became a small part of America's grand strategy. A Task Force (TF) BARKER, a battalion-size interim unit of the 11th Brigade, was to be employed for the job. It was formed in January 1968 and made up of three rifle companies of the 11th Brigade, including the Company C from the 20th Infantry, and led by Lieutenant Colonel Frank A. Barker. Son My village was included into the area of operations of TF BARKER codenamed Muscatine AO. (Muscatine was the name of the home county of the AMERICAL Division commander Major General Samuel W. Koster.) In February 1968, TF BARKER already tried to secure Son My, however, with limited success. After that, the village area started to be called by American soldiers from TF Barker as Pinkville. On March 16\u201318, TF Barker planned to engage and destroy the remnants of the 48th Viet Cong Local Force Battalion, allegedly hiding in the Son My village area. Before engagement, Colonel Oran K. Henderson, the 11th Brigade commander, urged his officers to \"go in there aggressively, close with the enemy and wipe them out for good\". In his turn, colonel Barker reportedly ordered the 1st Battalion commanders to burn the houses, kill the livestock, destroy food supplies, and destroy the wells. On the eve of the attack, at the Charlie Company briefing, Captain Ernest Medina told his men that nearly all the civilian residents of the hamlets in S\u01a1n M\u1ef9 village would have left for the market by 7 a.m., and any who remained would be NLF or NLF sympathizers. He was asked whether the order included the killing of women and children. Those present later gave different accounts of Medina's response. Some, including platoon leaders, testified that the orders as they understood them were to kill all guerrilla and North Vietnamese combatants and \"suspects\" (including women and children, as well as all animals), to burn the village, and pollute the wells. He was also quoted as saying, \"They're all V.C., now go and get them\", and was heard to reply to the question \"Who is my enemy?\" by saying, \"Anybody that was running from us, hiding from us, or appeared to be the enemy. If a man was running, shoot him, sometimes even if a woman with a rifle was running, shoot her.\" At Cally's trial one defense witness testified that he remembered Medina instructing to destroy everything in the village that was \"walking, crawling or growing\". The Charlie Company was to enter the village of Son My spearheaded by its 1st Platoon, engage the enemy and flush it out. The other two companies from Task Force BARKER were ordered to secure the area and provide support if needed. They were all to act in the so-called free fire zone, where American forces were allowed to execute artillery and air strikes in populated areas. In 1966, Qu\u1ea3ng Ng\u00e3i province witnessed two massacres conducted by South Korean troops \u2013 Binh Hoa massacre and Dien Nien-Phuoc Binh massacre. In February 1968, in neighboring Qu\u1ea3ng Nam province, during the similar counterinsurgency search-and-destroy operation, the Phong Nhi and Phong Nhat massacre and the Ha My Massacre were perpetrated by the South Korean Marines. As for the U.S. military, seven months prior the My Lai Massacre on Robert McNamara's order, Inspector General of the U.S. Defense Department investigated press coverage of the alleged atrocities committed in South Vietnam. In August 1967, the 200-page report \"Alleged Atrocities by U.S. Military Forces in South Vietnam\" was completed. It stated that part of the American troops did not fully understand the Geneva Conventions, however, no actions were taken. On the Saturday morning of March 16 at 07:30, around 100 enlisted men and officers from the Charlie Company led by Captain Ernest Medina, following a short artillery and helicopter gunship barrage landed on helicopters in the spreading coastal village of Son My, a patchwork of settlements, rice paddies, irrigation ditches, dikes, and dirt roads, connecting an assortment of hamlets and sub-hamlets. The largest among them were the hamlets My Lai, Co Luy, My Khe, and Tu Cung. Though the G.I.s were not fired upon after landing, they still suspected there were Vietcong guerrillas hiding underground or in the huts. Confirming their suspicions, the gunships engaged several armed enemy in a vicinity of My Lai (4); later, one weapon (a carbine) was retrieved from the site. Dead man and child According to the operational plan, the 1st Platoon led by Second Lieutenant William Calley and the 2nd Platoon led by Second Lieutenant Stephen Brooks entered the hamlet of Tu Cung in line formation at 08:00, while the 3rd Platoon commanded by Second Lieutenant Jeffrey U. Lacross and Captain Medina's command post remained outside. While approaching, both platoons were firing at people they saw in the rice fields and in the brush. The villagers, who were getting ready for a market day, at first did not panic or run away, as they were herded into the hamlet's commons. Harry Stanley, a machine gunner from the Charlie Company, said during the U.S. Army Criminal Investigation Division's (CID) inquiry that the killings started without warning. He first observed, how a member of the 1st Platoon struck a Vietnamese man with a bayonet. Then, the same individual pushed another villager into a well and threw a grenade down. Further, he saw fifteen or twenty people, mainly women and children, kneeling around a temple with burning incenses, who were praying and crying. They were all killed by shots in the head. Most of the killings occurred in the southern part of Tu Cung, a sub-hamlet Xom Lang, which was a home to 700 residents. Xom Lang was erroneously marked on the U.S. military operational maps of Quang Ngai Province as My Lai. A large group of approximately 70\u201380 villagers was rounded up by the 1st Platoon in Xom Lang, and then led to the irrigation ditch to the east of the settlement. All detainees were pushed into the ditch and then killed after repeated orders issued by Lieutenant Calley, who was also shooting. Paul Meadlo, a Private First Class, testified that he spent several M16 magazines. He recollected that women were allegedly saying \"No VC\" and were trying to shield their children. He remembered that he was shooting into women with babies in their hands since he was convinced at that time that they were all booby-trapped with grenades and were poised to attack. On another occasion during the security sweep of My Lai (4) Meadlo again fired into civilians side by side with Lieutenant Calley. PFC Mauro, PFC Carter, and SP4 Widmer (Carter shot himself in the foot with a .45 pistol during the My Lai Massacre) Private First Class Dennis Konti, a witness for the prosecution, told about one especially gruesome episode during the shooting, \"A lot of women had thrown themselves on top of the children to protect them, and the children were alive at first. Then, the children who were old enough to walk got up and Calley began to shoot the children\". Other 1st Platoon members testified that many of the deaths of individual Vietnamese men, women and children occurred inside My Lai (4) during the security sweep. Livestock was shot as well. When Private First Class Michael Bernhardt entered the subhamlet of Xom Lang, the massacre was underway, I walked up and saw these guys doing strange things\u2026Setting fire to the hootches and huts and waiting for people to come out and then shooting them\u2026going into the hootches and shooting them up\u2026gathering people in groups and shooting them\u2026 As I walked in you could see piles of people all through the village\u2026 all over. They were gathered up into large groups. I saw them shoot an M79 (grenade launcher) into a group of people who were still alive. But it was mostly done with a machine gun. They were shooting women and children just like anybody else. We met no resistance and I only saw three captured weapons. We had no casualties. It was just like any other Vietnamese village-old Papa-Sans, women and kids. As a matter of fact, I don't remember seeing one military-age male in the entire place, dead or alive. One group of 20-50 villagers was walked to the south of Xom Lang and killed on a dirt road. According to another eyewitness account of the massacre, Ronald Haeberle's, in one instance, SP4 Dustin setting fire to a dwelling There were some South Vietnamese people, may be fifteen of them, women and children included, walking on a dirt road may be 100 yards away. All of a sudden the G.I.s just opened up with M16s. Beside the M16 fire, they were shooting at the people with M79 grenade launchers\u2026 I couldn't believe what I was seeing. Lieutenant Calley testified that he heard the shooting and arrived on the scene. He observed his men firing into a ditch with Vietnamese people inside, and started shooting himself with M16 from a distance of 5 feet. Then, a helicopter landed on the other side of the ditch and a pilot asked Calley if he can provide any medical assistance to the wounded civilians in My Lai (4); Calley admitted replying that a hand grenade was the only available means that he had for their evacuation. After that, around 11:00 Captain Medina radioed to hold up the fire and the 1st Platoon took a lunch break. Members of the 2nd platoon killed at least 60\u201370 Vietnamese, as they swept through the northern half of M\u1ef9 Lai (4) and through Binh Tay, a small sub-hamlet about 400 metres (1,300 ft) north of M\u1ef9 Lai (4). The platoon suffered one dead and seven wounded by mines and booby traps. After the initial sweeps by the 1st and 2nd platoons, the 3rd Platoon was dispatched to deal with any \"remaining resistance\". The 3rd platoon, which stayed in reserve, also reportedly rounded up and killed a group of seven to twelve women and children. Since Charlie Company had not met any enemy opposition at My Lai (4) and did not request back-up, the Bravo Company of the 4th Battalion, 3rd Infantry Regiment of Task Force BARKER was transported by air between 08:15 and 08:30 two miles away. It attacked the subhamlet My Hoi of the Co Luy hamlet, which was mapped by the Army as My Khe (4). During this operation, between 60 to 155 people, including women and children, were killed. Over the next day, both companies were involved in additional burning and destruction of dwellings, as well as mistreatment of Vietnamese detainees. While a part of the Charlie Company did not participate in the crimes, they neither openly protested nor complained later to their superiors. William Thomas Allison, a professor of Military History at Georgia Southern University, commenting on the actions of Charlie Company, wrote, \"By midmorning, members of Charlie Company had killed hundreds of civilians and raped or assaulted countless women and young girls. They encountered no enemy fire and found no weapons in My Lai (4) itself\". Helicopter crew intervention Warrant Officer One Hugh Thompson, Jr., a helicopter pilot from Company B (Aero-Scouts), 123rd Aviation Battalion, AMERICAL Division, saw dead and wounded civilians as he was flying over the village of Son My providing close-air support for ground forces. The crew made several attempts to radio for help for the wounded. They landed their helicopter by a ditch, which they noted was full of bodies and in which there was movement. Thompson asked a sergeant he encountered there (David Mitchell of the 1st Platoon) if he could help get the people out of the ditch, and the sergeant replied that he would \"help them out of their misery\". Thompson, shocked and confused, then spoke with Second Lieutenant Calley, who claimed to be \"just following orders\". As the helicopter took off, they saw Mitchell firing into the ditch. Thompson and his crew witnessed an unarmed woman being kicked and shot at point-blank range by Captain Medina, who later claimed that he thought she had a hand grenade. Thompson then saw a group of civilians (again consisting of children, women, and old men) at a bunker being approached by ground personnel. Thompson landed and told his crew that if the soldiers shot at the Vietnamese while he was trying to get them out of the bunker that they were to open fire at these soldiers. Thompson later testified that he spoke with a lieutenant (identified as Stephen Brooks of the 2nd Platoon) and told him there were women and children in the bunker, and asked if the lieutenant would help get them out. According to Thompson, \"he [the lieutenant] said the only way to get them out was with a hand grenade\". Thompson testified that he then told Brooks to \"just hold your men right where they are, and I'll get the kids out\". He found 12\u201316 people in the bunker, coaxed them out and led them to the helicopter, standing with them while they were flown out in two groups. Dead woman and child at My Lai Returning to M\u1ef9 Lai, Thompson and other air crew members noticed several large groups of bodies. Spotting some survivors in the ditch, Thompson landed again. A crew member entered the ditch and returned with a bloodied but apparently unharmed child who was flown to safety. The child was thought to be a boy, but later turned out to be a four-year-old girl. Thompson then reported what he had seen to his company commander, Major Frederic W. Watke, using terms such as \"murder\" and \"needless and unnecessary killings\". Thompson's statements were confirmed by other helicopter pilots and air crew members. For the actions at My Lai (4), Thompson was awarded the Distinguished Flying Cross (DFC) and his crew members Glenn Andreotta and Lawrence Colburn were awarded Bronze Star medals. Glenn Urban Andreotta received his medal posthumously, as he was killed in Vietnam on April 8, 1968. As the DFC citation included a fabricated account of rescuing a young girl from My Lai from \"intense crossfire\" Thompson threw his medal away. He later received a Purple Heart for other services in Vietnam. In March 1998, the helicopter crew's medals were replaced by the Soldier's Medal, \"the highest the U.S. Army can award for bravery not involving direct conflict with the enemy\". The medal citations state they were \"for heroism above and beyond the call of duty while saving the lives of at least 10 Vietnamese civilians during the unlawful massacre of non-combatants by American forces at My Lai\". Thompson initially refused the medal when the US Army wanted to award it quietly. He demanded it be done publicly and that his crew also be honored in the same way. The veterans also made contact with the survivors of M\u1ef9 Lai. After returning to their base at about 11:00, Thompson reported the massacre to his superiors. His allegations of civilian killings quickly reached Lieutenant Colonel Frank Barker, the operation's overall commander. Barker radioed his executive officer to find out from Captain Medina what was happening on the ground. Medina then gave the cease-fire order to Charlie Company to \"knock off the killing\". Since Thompson made an official report of the civilian killings, he was interviewed by Colonel Oran Henderson, the commander of the 11th Infantry Brigade (the parent organization of the 20th Infantry). Concerned, senior American officers canceled similar planned operations by Task Force BARKER against other villages (My Lai 5, My Lai 1, etc.) in Qu\u1ea3ng Ng\u00e3i Province, possibly preventing the additional massacre of hundreds, if not thousands, of Vietnamese civilians. Dead bodies outside a burning dwelling Despite Thompson's revealing information, Colonel Henderson issued a Letter of Commendation to Captain Medina on March 27, 1968. On next day, March 28, 1968, Commander of the Task Force BARKER submitted a combat action report for March 16 Operation in which stated that operation in My Lai (4) was a success with 128 Viet Cong partisans killed. The AMERICAL Division commander Major General S. W. Koster sent a congratulatory message to Company C. General William C. Westmoreland, the head of Military Assistance Command, Vietnam (MACV), also congratulated Company C, 1st Battalion, 20th Infantry for \"outstanding action\", saying that they had \"dealt the enemy a heavy blow\". Later, he reversed himself by writing in his memoir that it was \"the conscious massacre of defenseless babies, children, mothers and old men in a kind of diabolical slow-motion nightmare that went on for the better part of a day, with a cold-blooded break for lunch\". Owing to the chaotic circumstances of the war and the U.S. Army's decision not to undertake a definitive body count of noncombatants in Vietnam, the number of civilians killed at M\u1ef9 Lai cannot be stated with certainty. Estimates vary from source to source, with 347 and 504 being the most commonly cited figures. The memorial at the site of the massacre lists 504 names, with ages ranging from one to 82. A later investigation by the U.S. Army arrived at a lower figure of 347 deaths, the official U.S. estimate. Nick Turse, an American historian and investigative journalist, in his book Kill Anything That Moves: The Real American War in Vietnam (2013) wrote that in South Vietnam between 195,000 and 415,000 noncombatants were killed during the war years. Reporting, cover-up and investigation The first reports claimed that \"128 Viet Cong and 22 civilians\" were killed in the village during a \"fierce fire fight\". General William Westmoreland, the Military Assistance Command, Vietnam commander, congratulated the unit on the \"outstanding job\". As related at the time by Stars and Stripes magazine, \"U.S. infantrymen had killed 128 Communists in a bloody day-long battle.\" On March 16, 1968, in or around the official press briefing known as the \"Five O'Clock Follies\", \"a mimeographed release included this passage: 'In an action today, Americal Division forces killed 128 enemy near Quang Ngai City. Helicopter gunships and artillery missions supported the ground elements throughout the day.'\" Initial investigations of the M\u1ef9 Lai operation were undertaken by the 11th Light Infantry Brigade's commanding officer, Colonel Henderson, under orders from the Americal Division's executive officer, Brigadier General George H. Young. Henderson interviewed several soldiers involved in the incident, then issued a written report in late April claiming that some 20 civilians were inadvertently killed during the operation. The Army at this time was still describing the event as a military victory that had resulted in the deaths of 128 enemy combatants. Mrs. Nguy\u1ec5n Th\u1ecb T\u1ea9u (ch\u00edn T\u1ea9u), killed by US soldiers Six months later, Tom Glen, a 21-year-old soldier of the 11th Light Infantry Brigade, wrote a letter to General Creighton Abrams, the new overall commander of U.S. forces in Vietnam. He described an ongoing and routine brutality against Vietnamese civilians on a part of American forces in Vietnam that he personally witnessed and then concluded, \"It would indeed be terrible to find it necessary to believe that an American soldier that harbors such racial intolerance and disregard for justice and human feeling is a prototype of all American national character, yet the frequency of such soldiers lends credulity to such beliefs. \u2026 What has been outlined here I have seen not only in my own unit, but also in others we have worked with, and I fear it is universal. If this is indeed the case, it is a problem which cannot be overlooked, but can through a more firm implementation of the codes of MACV (Military Assistance Command Vietnam) and the Geneva Conventions, perhaps be eradicated\". Colin Powell, then a 31-year-old Army major, was charged with investigating the letter, which did not specifically reference M\u1ef9 Lai, since Glen had limited knowledge of the events there. In his report, Powell wrote, \"In direct refutation of this portrayal is the fact that relations between Americal Division soldiers and the Vietnamese people are excellent.\" Powell's handling of the assignment was later characterized by some observers as \"whitewashing\" the atrocities of M\u1ef9 Lai. In May 2004, Powell, then United States Secretary of State, told CNN's Larry King, \"I mean, I was in a unit that was responsible for My Lai. I got there after My Lai happened. So, in war, these sorts of horrible things happen every now and again, but they are still to be deplored.\" Unidentified dead Vietnamese man Independently of Glen, Ronald L. Ridenhour, SP5, a former door gunner from the Aviation Section, Headquarters Company of the 11th Infantry Brigade, sent a letter in March 1969 to thirty members of Congress imploring them to investigate the circumstances surrounding the \"Pinkville\" incident. He and his pilot, Warrant Officer Gilbert Honda, flew over My Lai (4) several days after the operation and observed a scene of complete destruction. At one point, they hovered over a dead Vietnamese woman with a patch of the 11th Brigade on her body. Ridenhour had learned about the events at M\u1ef9 Lai (4) secondhand from talking to members of Charlie Company over a period of months beginning in April 1968. He became convinced that something \"rather dark and bloody did indeed occur\" at M\u1ef9 Lai (4), and was so disturbed by the tales he heard that within three months of being discharged from the Army he penned his concerns to Congress. He included the name of Michael Bernhardt, an eyewitness who agreed to testify, in the letter. Most recipients of Ridenhour's letter ignored it, with the exception of Congressman Mo Udall and Senators Barry Goldwater and Edward Brooke. Udall urged the House Armed Services Committee to call on Pentagon officials to conduct an investigation. Independent investigative journalist Seymour Hersh, after extensive interviews with Calley, broke the M\u1ef9 Lai story on November 12, 1969, on the Associated Press wire service, on November 20, Time, Life and Newsweek magazines all covered the story, and CBS televised an interview with Paul Meadlo, a soldier in Calley's unit during the massacre. The Plain Dealer (Cleveland, Ohio) published explicit photographs of dead villagers killed at M\u1ef9 Lai. Unidentified dead body thrown down a well In November 1969, Lieutenant General William R. Peers was appointed by the Secretary of the Army and the Army Chief of Staffs to conduct a thorough review into the My Lai incident, March 16\u201319, 1968, and its investigation by the Army. Peers' final report, presented to the higher-ups on March 17, 1970, was highly critical of top officers at brigade and divisional levels for participating in the cover-up, and the Charlie Company officers for their actions at M\u1ef9 Lai (4). According to Peers' findings: The 1st Battalion members had killed at least 175\u2013200 Vietnamese men, women, and children. The evidence indicates that only 3 or 4 were confirmed as Viet Cong although there were undoubtedly several unarmed VC (men, women, and children) among them and many more active supporters and sympathizers. One man from the company was reported as wounded from the accidental discharge of his weapon. \u2026 a tragedy of major proportions had occurred at Son My. SP5 Capezza burning a dwelling However, critics of the Peers Report pointed out that it sought to place the real blame on four officers who were already dead, foremost among them the commander of Task Force BARKER, Lieutenant Colonel Frank Barker, who was killed in a mid-air collision on June 13, 1968. Also, the Peers Report avoided drawing any conclusions or recommendations regarding the further examination of the treatment of civilians in a war zone. In 1967, an American journalist Jonathan Schell found out that in the Vietnamese province of Quang Ngai, where the My Lai massacre occurred, up to 70% of all villages were destroyed by the air strikes and artillery bombardments, including the use of napalm; 40% percent of the population were refugees, and the overall civilian casualties were close to 50,000 a year. Regarding the massacre at My Lai, he stated, \"There can be no doubt that such an atrocity was possible only because a number of other methods of killing civilians and destroying their villages had come to be the rule, and not the exception, in our conduct of the war\". In May 1970, a sergeant who participated in Operation Speedy Express wrote a confidential letter to then Army Chief of Staff Westmoreland describing civilian killings on the scale of the massacre occurring as \"a My Lay each month for over a year\" during 1968\u20131969. Two other letters to this effect from enlisted soldiers to military leaders in 1971, all signed \"Concerned Sergeant\", were uncovered within declassified National Archive documents. The letters describe routine civilian killings as a policy of population pacification. Army policy also stressed very high body counts and without regard to who was killed. Alluding to indiscriminate killings described as unavoidable, Commander of the Ninth Division, then Maj. Gen. Julian Ewell in September 1969 submitted a confidential report to Westmoreland and other generals describing the countryside in some areas of Vietnam as resembling the battlefields of Verdun. In July 1969, the Office of Provost Marshal General of the Army started to examine the evidence collected by the General Peers inquiry regarding possible criminal charges. Eventually, Calley was charged with several counts of premeditated murder in September 1969, and 25 other officers and enlisted men were later charged with related crimes. On November 17, 1970, a court-martial in the United States charged 14 officers, including Major General Samuel W. Koster, the AMERICAL Division's commanding officer, with suppressing information related to the incident. Most of the charges were later dropped. Brigade commander colonel Henderson was the only high-rank commanding officer who stood trial on charges relating to the cover-up of the My Lai massacre; he was acquitted on December 17, 1971. During the four-month-long trial, Lieutenant Calley consistently claimed that he was following orders from his commanding officer Captain Medina. Despite that, he was convicted to life in prison on March 29, 1971, after being found guilty of premeditated murder not less than twenty people. Two days later, President Richard Nixon made the controversial decision to have Calley released from armed custody at Fort Benning, Georgia, and put under house arrest pending appeal of his sentence. Cally's conviction was upheld by the Army Court of Military Review in 1973 and by the U.S. Court of Military Appeals in 1974. In August 1971, Calley's sentence was reduced by the Convening Authority from life to twenty years. Cally would eventually serve three and one-half years under house arrest at Fort Benning including three months in a disciplinary barracks in Fort Leavenworth, Kansas. In September 1974, he was paroled by the Secretary of the Army Howard Callaway. In a separate trial, Captain Medina denied giving the orders that led to the massacre, and was acquitted of all charges, effectively negating the prosecution's theory of \"command responsibility\", now referred to as the \"Medina standard\". Several months after his acquittal, however, Medina admitted that he had suppressed evidence and had lied to Colonel Henderson about the number of civilian deaths. Captain Kotouc, an intelligence officer from the 11th Brigade, was also court-martialed as Medina and found not guilty, as well as his commander Colonel Henderson. Major General Koster was demoted to Brigadier General and lost his position as the Superintendent of West Point. His deputy Brigadier General Young received a letter of censure. Both were stripped of their Distinguished Service Medals awarded for Vietnam. Most of the enlisted men who were involved in the events at My Lai (4) had already left military service, and were thus legally exempt from prosecution. In the end, of the 26 men initially charged, Lieutenant Calley was the only one convicted. Some have argued that the outcome of the M\u1ef9 Lai courts-martial failed to uphold the laws of war established in the Nuremberg and Tokyo War Crimes Tribunals. For example, Telford Taylor, senior American prosecutor at Nuremberg wrote that legal principles established at the war crimes trials could have been used to prosecute senior American military commanders for failing to prevent atrocities such as the one at My Lai. The U.S. Secretary of the Army Howard Callaway was quoted in The New York Times as stating that Calley's sentence was reduced because Calley honestly believed that what he did was a part of his orders\u2014a rationale that contradicts the standards set at Nuremberg and Tokyo, where following orders was not a defense for committing war crimes. On the whole, other than My Lai court-martial, there were thirty six military trials held by the U.S. Army from January 1965 until August 1973 for crimes against civilians in Vietnam. In early 1972, the camp at M\u1ef9 Lai (2) where the survivors of the M\u1ef9 Lai massacre had been relocated was largely destroyed by Army of the Republic of Vietnam (South Vietnam) artillery and aerial bombardment, and remaining eyewitnesses were dispersed. The destruction was officially attributed to \"Viet Cong terrorists\". The truth was revealed by Quaker service workers in the area through testimony in May 1972 by Martin Teitel at hearings before the Congressional Subcommittee to Investigate Problems Connected with Refugees and Escapees in South Vietnam. In June 1972, Teitel's account of the events was published in The New York Times. Many American soldiers who have been in My Lai during the massacre accepted personal responsibility for the loss of civilian lives. Some of them expressed regrets without acknowledging any personal guilt, as, for example, Ernest L. Medina, who said, \"I have regrets for it, but I have no guilt over it because I didn't cause it. That's not what the military, particularly the United States Army, is trained for.\" On March 16, 1998, a gathering of local people and former American and Vietnamese soldiers stood together at the place of the My Lai massacre in Vietnam to commemorate its 30th anniversary. American veterans Hugh Thompson and Lawrence Colburn, who were shielding civilians during the massacre, addressed the crowd. Among the listeners was Phan Thi Nhanh, a 14-year old girl at the time of the massacre. She was saved by Thompson and vividly remembered that tragic day, \"We don't say we forget. We just try not to think about the past, but in our hearts we keep a place to think about that\". Colburn challenged Lieutenant Calley, \"\u2026to face the women we faced today who asked the questions they asked, and look at the tears in their eyes and tell them why it happened\". American diplomats or any other officials did not attend the meeting. More than a thousand people turned out March 16, 2008, forty years after the massacre, to remember the victims of one of the most notorious chapters of the Vietnam War. The Son My Memorial drew survivors of the massacre, the families of the victims and returning U.S. war veterans alike. One survivor, who was a 8-year girl on March 16, 1968, said, \"Everyone in my family was killed in the My Lai massacre \u2014 my mother, my father, my brother and three sisters. They threw me into a ditch full of dead bodies. I was covered with blood and brains\". The U.S. was unofficially represented by a volunteer group from Wisconsin called Madison Quakers, who in 10 years built three schools in My Lai and planted a peace garden. On August 19, 2009, Calley made his first public apology for the massacre in a speech to the Kiwanis club of Greater Columbus, Georgia: \"There is not a day that goes by that I do not feel remorse for what happened that day in My Lai\", he told members of the Kiwanis club. \"I feel remorse for the Vietnamese who were killed, for their families, for the American soldiers involved and their families. I am very sorry.\" Duc Tran Van, who was seven years old at the time of My Lai massacre and now resides in Remscheid, Germany, called the apology terse. He wrote a public letter to Calley describing the plight of his and many other families to remind him that time did not ease the pain, and that grief and sorrow over lost lives will forever stay in My Lai. Lieutenant Colonel Frank A. Barker \u2013 commander of the Task Force BARKER, a battalion-sized unit, assembled to attack the 48th Battalion of the Viet Cong supposedly based in and around My Lai (4). He allegedly ordered the destruction of the village and supervised the artillery barrage and combat assault from his helicopter. Reported the operation as a success; was killed in Vietnam on June 13, 1968, in a mid-air collision before the investigation had begun. Captain Kenneth W. Boatman \u2013 an artillery forward observer, was accused by the Army of failure to report possible misconduct, but charge was dropped. Second Lieutenant Stephen Brooks \u2013 the 2nd Platoon Leader, Charlie Company, turned a body count of 60 for the second platoon; later killed himself in Vietnam. Major Charles C. Calhoun \u2013 operations officer of Task Force BARKER, charges against him of failure to report possible misconduct were dropped. Second Lieutenant William L. Calley Jr. \u2013 platoon leader, 1st Platoon, Charlie Company, First Battalion, 20th Infantry Regiment, 11th Infantry Brigade, 23rd Infantry Division. Was charged in premeditating murder of 102 civilians, found guilty and sentenced to life. Was paroled in September 1974 by the Secretary of the Army Howard Callaway. Lieutenant Colonel William D. Guinn Jr. \u2013 Deputy Province Senior Advisor\/Senior Sector Advisor for Quangngai Province. Charges against him of dereliction of duty and false swearing brought by the Army were dropped. Colonel Oran K. Henderson \u2013 11th Infantry Brigade commander, who ordered the attack and flew in a helicopter over M\u1ef9 Lai during it. After Hugh Thompson immediately reported multiple killings of civilians, Henderson started the cover-up by dismissing allegation about the massacre and reporting to the superiors that indeed 20 people from My Lai died by accident. Was accused of alleged cover-up and false swearing by the Army; charges were dropped. Major General Samuel W. Koster \u2013 commander of the 23rd Infantry Division (United States) of the United States Army, known as AMERICAL Division, was not involved with the planning of the My Lai (4) search-and-destroy mission. However, during the operation he flew over My Lai (4) and monitored the radio communications. Afterward, Koster did not followed up with the 11th Brigade commander colonel Henderson on the initial investigation, and later was caught into cover-up. Was charged by the Army with failure to obey lawful regulations, dereliction of duty, and alleged cover-up; charges dropped. Later was demoted to Brigadier General and stripped of a Distinguished Service medal. Captain Eugene M. Kotouc \u2013 military intelligence officer assigned to Task Force BARKER; he partially provided information, on which the M\u1ef9 Lai combat assault was approved; together with Medina and a South Vietnamese officer, he interrogated, tortured and allegedly executed VC and NVA suspects later that day. Was charged with maiming and assault, tried by the jury and acquitted. Captain Dennis H. Johnson \u2013 52d Military Intelligence Detachment, assigned to Task Force BARKER, was accused of failure to obey lawful regulations, however charges were later dropped. Second Lieutenant Jeffrey U. Lacross \u2013 platoon leader, 3rd Platoon, Charlie Company; testified that his platoon did not meet any armed resistance in My Lai (4), and that his men did not kill anybody, however, since, in his words, both Calley and Brooks reported a body count of 60 for their platoons, he then submitted a body count of 6. Major Robert W. McKnight \u2013 operations officer of the 11th Brigade; was accused of false swearing by the Army, but charges were subsequently dropped. Captain Ernest L. Medina \u2013 commander of Company C, First' battalion, 20th Infantry; nicknamed Mad Dog by subordinates. He planned, ordered, and supervised the execution of the operation in S\u01a1n M\u1ef9 village. Was accused of failure to report a felony and of murder; went to trial and was acquitted. Captain Earl Michaels \u2013 company commander during My Lai operation; he died in a helicopter crash three months later. Brigadier General George H. Young Jr. \u2013 assistant division commander, 23rd Infantry Division; charged with alleged cover-up, failure to obey lawful regulations and dereliction of duty by the Army; charges were dismissed. Major Frederic W. Watke \u2013 commander of Company B, 123rd Aviation Battalion, 23rd Infantry Division, providing helicopter support on March 16, 1968. Testified that he informed Colonel Henderson about killings of civilians in My Lai (4) as reported by helicopter pilots. He was accused of failure to obey lawful regulations and dereliction of duty; charges were dropped. Captain Thomas K. Willingham \u2013 Company B, Fourth Battalion, Third Infantry Division, assigned to Task Force BARKER; charged with making false official statements and failure to report a felony; charges were dropped. Altogether, 14 officers directly and indirectly involved with the operation, including two generals, were investigated in connection with the My Lai massacre, except Lieutenant Colonel Frank A. Barker, Captain Earl Michaels and Lieutenant Stephen Brooks, who had died before the beginning of the investigation. 1st Platoon, Charlie Company 1st Battalion 20th Infantry Michael Bernhardt \u2013 Private First Class; Rifleman; he dropped from the University of Miami to volunteer in the Army. Bernhardt refused to kill civilians in My Lai. Later, Captain Medina threatened Bernhardt trying to deter him from exposing the massacre; as a result, Bernhardt was given more dangerous assignments such as point duty on patrol. He would later be affected with a form of trench foot as a direct result. Bernhardt told Ronald Ridenhour, who was not present in My Lai during the massacre, about the events, thus, pushing him to continue his investigation. Later he would help expose and detail the massacre in numerous interviews with the press, and he served as a prosecution witness in the trial of Medina, where he was subjected to intense cross examination by defense counsel F. Lee Bailey. Michael Bernhardt is a recipient of the New York Society for Ethical Culture's 1970 Ethical Humanist Award. Herbert L. Carter \u2013 Private First Class; \"Tunnel Rat\"; he claimed he shot himself in the foot in order to be MEDEVACed out of the village when the killings started. Dennis L. Conti \u2013 Private First Class, Grenadier\/Minesweeper; testified he initially refused to shoot, but later fired some M79 grenade launcher rounds at a group of fleeing people with unknown effect. Lawrence C. La Croix \u2013 SP4; Squad Leader; testified favourably for Captain Medina during his trial. In 1993 sent a letter to Los Angeles Times saying, \"Now, 25 years later, I have only recently stopped having flashbacks of that morning. I still cannot touch a weapon without vomiting. I am unable to interact with any of the large Vietnamese population in Los Angeles for fear that they might find out who I am; and, because I cannot stand the pain of remembering or wondering if maybe they had relatives or loved ones who were victims at My Lai\u2026 some of us will walk in the jungles and hear the cries of anguish for all eternity\". James Joseph Dursi \u2013 Private First Class; Rifleman; killed a mother and child, then refused to kill anyone else even when ordered to do so by Lieutenant Calley. Ronald Grzesik \u2013 a team leader. He claimed he followed orders to round up civilians, but refused to kill them. Robert E. Maples \u2013 SP4; Machine Gunner; stated that he refused an order to kill civilians hiding in a ditch even being threatened by his commanding officer to be shot himself. Paul D. Meadlo \u2013 Private First Class; Rifleman; said he was afraid of being shot if he did not participate. Lost his foot to a land mine the next day; later, he publicly admitted his part in the massacre. David Mitchell \u2013 SSG; Squad Leader; accused by witnesses of shooting people at the ditch site; pleaded not guilty. Mitchell was acquitted. His attorney was Ossie Brown of Baton Rouge, Louisiana, who thereafter became the district attorney of East Baton Rouge Parish, Louisiana. Charles Sledge \u2013 SP4; Radiotelephone Operator; later prosecution witness. Harry Stanley \u2013 PV2; Grenadier; claimed to have refused an order from the lieutenant Calley to kill civilians that were rounded-up in a bomb-crater. Refused to testify against Calley. After he was featured in a documentary and several newspapers, the city of Berkeley, California, designated Oct. 17 as Harry Stanley Day. Esequiel Torres \u2013 previously had tortured and hanged an old man because Torres found his bandaged leg suspicious. He and Roschevitz (described below) were involved in the shooting of a group of ten women and five children in a hut. Later he was ordered by Calley to shoot a number of people with a M60 machine gun; he fired a burst before refusing to fire again, after which Calley took his weapon and opened fire himself. Charged with murder, however acquitted. Frederick J. Widmer \u2013 SP4; Assistant Radiotelephone Operator; Widmer, who has been the subject of pointed blame, is quoted as saying, \"The most disturbing thing I saw was one boy\u2014and this was something that, you know, this is what haunts me from the whole, the whole ordeal down there. And there was a boy with his arm shot off, shot up half, half hanging on and he just had this bewildered look in his face and like, 'What did I do, what's wrong?' He was just, you know, it's, it's hard to describe, couldn't comprehend. I, I shot the boy, killed him and it's\u2014I'd like to think of it more or less as a mercy killing because somebody else would have killed him in the end, but it wasn't right.\" Before being shipped to South Vietnam, all Charlie Company's soldiers went through an advanced infantry training and basic unit training at Pohakuloa Training Area in Hawaii. They were taught in Schofield Barracks how to treat prisoners and how to distinguish Vietcong guerrilla from a civilian by a Judge Advocate. Other soldiers Nicholas Capezza \u2013 Chief Medic; Charlie Company; insisted he saw nothing unusual. William Doherty and Michael Terry \u2013 soldiers on the 3rd Platoon, who participated in the killing of the wounded in a ditch. Ronald L. Haeberle \u2013 SGT; Photographer; Information Office, 11th Brigade; was attached to C Company. Minh, Duong \u2013 Sergeant; ARVN interpreter, 52nd Military intelligence Detachment, attached to Task Force BARKER; confronted Captain Medina about the number of civilians that were killed. Medina reportedly replied, \"Sergeant Minh, don't ask anything \u2013 those were the orders.\" Gary D. Roschevitz \u2013 Sergeant; Grenadier; 2nd platoon; according to the testimony of James M. McBreen, Roschevitz killed five or six people standing together with a canister round, which had a shotgun effect after exploding; also grabbed an M16 rifle from Varnado Simpson to kill five Vietnamese prisoners. According to various witnesses, he later forced several women to undress with the intention of raping them. When the women refused, he reportedly shot at them. Varnado Simpson \u2013 Private First Class; Rifleman; 2nd Platoon; admitted that he slew around 10 people in My Lai on Captain Medina's orders to kill not only people, but even cats and dogs. He fired at a group of people where he allegedly saw a man with a weapon, but instead killed a woman with the baby. He committed suicide in 1997, after repeatedly acknowledging remorse for several murders in M\u1ef9 Lai (4). Rescue helicopter crew Warrant Officer One Hugh Thompson, Jr. \u2013 helicopter pilot who confronted the ground forces personally. Died 6 January 2006. Specialist Four Glenn Andreotta \u2013 crew chief. Killed In Action: 8 April 1968. Specialist Four Lawrence Colburn \u2013 door gunner. Hugh Thompson, Jr. rescued Vietnamese civilians during the My Lai massacre A photographer and a reporter from the 11th Brigade Information Office were attached to the Task Force BARKER and landed with Charlie Company in Son My on March 16, 1968. However, the AMERICAL News Sheet published on March 17, 1968, as well as the Trident, 11th Infantry Brigade newsletter from March 22, 1968, did not mention the death of noncombatants in great numbers in Mai Ly (4). The Star and Stripes published a laudatory piece \"U.S. troops Surrounds Red, Kill 128\" on March 18. On April 12, 1968, the Trident wrote that, \"The most punishing operations undertaken by the brigade in Operation Muscutine's area involved three separate raids into the village and vicinity of My Lai, which cost the VC 276 killed\". On April 4, 1968, the Information office of the 11th Brigade issued a press-release Recent Operations in Pinkville without any information about mass casualties among civilians. Subsequent criminal investigation uncovered that, \"Both individuals failed to report what they had seen, the reporter wrote a false and misleading account of the operation, and the photographer withheld and suppressed from proper authorities the photographic evidence of atrocities he had obtained.\" The first mentions about the My Lai massacre appeared in the American media after Fort Benning's vague press release concerning the charges pressed against Lieutenant Calley, which was distributed on September 5, 1969. Consequently, NBC aired on September 10, 1969 a segment in the Huntley-Brinkley Report which mentioned the murder of a number of civilians in South Vietnam. Following that, emboldened Ronald Ridenhour decided to disobey the Army's order to withhold the information from the media. He approached reporter Ben Cole of the Phoenix Republic, who did not have enough resolve to handle the scoop. Charles Black from the Columbus Enquirer uncovered the story on his own but also decided to put it on hold. Two major national news press outlets \u2013 The New York Times and the Washington Post received some tips with partial information but did not act on them. A phone call on October 22, 1969, answered by freelancing investigative journalist, Seymour Hersh, and"} +{"id":"RedPajamaCommonCrawl.0038","text":"New junk science movie: \"Not evil, just wrong\" I warned you about it earlier. Crank science sites across the internet feature news of another cheap hit on Rachel Carson and science in movie form. \"Not Evil, Just Wrong\" is slated for release on October 18. This is the film that tried to intrude on the Rachel Carson film earlier this year, but managed to to get booked only at an elementary school in Seattle, Washington \u2014 Rachel Carson Elementary, a green school where the kids showed more sense than the film makers by voting to name the school after the famous scientist-author. The film is both evil and wrong. Errors just in the trailer: Claims that Al Gore said sea levels will rise catastrophically, \"in the very near future.\" Not in his movie, not in his writings or speeches. Not true. That's a simple misstatement of what Gore said, and Gore had the science right. \" . . . [I]t wouldn't be a bad thing for this Earth to warm up. In fact, ice is the enemy of life.\" \"Bad\" in this case is a value judgment \u2014 global warming isn't bad if you're a weed, a zebra mussel, one of the malaria parasites, a pine bark beetle, any other tropical disease, or a sadist. But significant warming as climatologists, physicists and others project, would be disastrous to agriculture, major cities in many parts of the world, sea coasts, and most people who don't live in the Taklamakan or Sahara, and much of the life in the ocean. Annual weather cycles within long-established ranges, is required for life much as we know it. \"No ice\" is also an enemy of life. \"They want to raise our taxes.\" No, that's pure, uncomposted bovine excrement. \"They want to close our factories.\" That's more effluent from the anus of male bovines. The trailer notes the usual claim made by Gore opponents that industry cannot exist if it is clean, that industry requires that we poison the planet. Were that true, we'd have a need to halt industry now, lest we become like the yeast in the beer vat, or the champagne bottle, manufacturing alcohol until the alcohol kills the yeast. Our experience with Rivers and Harbors Act of 1899, the Clean Air Acts and the Clean Water Act is that cleaning the environment produces economic growth, not the other way around. A city choked in pollution dies. Los Angeles didn't suffer when the air got cleaner. Pittsburgh's clean air became a way to attract new industries to the city, before the steel industry there collapsed. Cleaning Lake Erie didn't hurt industry. The claim made by the film is fatuous, alarmist, and morally corrupt. When the human health, human welfare, and environmental effects which could be expressed in dollar terms were added up for the entire 20-year period, the total benefits of Clean Air Act programs were estimated to range from about $6 trillion to about $50 trillion, with a mean estimate of about $22 trillion. These estimated benefits represent the estimated value Americans place on avoiding the dire air quality conditions and dramatic increases in illness and premature death which would have prevailed without the 1970 and 1977 Clean Air Act and its associated state and local programs. By comparison, the actual costs of achieving the pollution reductions observed over the 20 year period were $523 billion, a small fraction of the estimated monetary benefits. \"Some of the environmental activists have not come to accept that the human is also part of the environment.\" Fatuous claim. Environmentalists note that humans uniquely possess the ability to change climate on a global scale, intentionally, for the good or bad; environmentalists choose to advocate for actions that reduce diseases like malaria, cholera and asthma. We don't have to sacrifice a million people a year to malaria, in order to be industrial and productive. We don't have to kill 700,000 kids with malaria every year just to keep cars. \"They want to go back to the Dark Ages and the Black Plague.\" No, that would be the film makers. Environmentalists advocate reducing filth and ignorance both. Ignorance and lack of ability to read, coupled with religious fanaticism, caused the strife known as \"the Dark Ages.\" It's not environmentalists who advocate an end to cheap public schools. The trailer shows a kid playing in the surf on a beach. Of course, without the Clean Water Act and other attempts to keep the oceans clean, such play would be impossible. That we can play again on American beaches is a tribute to the environmental movement, and reason enough to grant credence to claims of smart people like Al Gore and the scientists whose work he promotes. \"I cannot believe that Al Gore has great regard for people, real people.\" So, this is a film promoting the views of crabby, misanthropic anal orifices who don't know Al Gore at all? Shame on them. And, why should anyone want to see such a film? If I want to see senseless acts of stupidity, I can rent a film by Quentin Tarantino and get some art with the stupidity. [Update, November 23, 2009: This may be one of the most egregiously false charges of the film. Gore, you recall, is the guy who put his political career and presidential ambitions on hold indefinitely when his son was seriously injured in an auto-pedestrian accident; Gore was willing to sacrifice all his political capital in order to get his son healed. My first dealings directly with Gore came on the Organ Transplant bill. Gore didn't need a transplant, didn't have need for one in his family, and had absolutely nothing to gain from advocacy for the life-saving procedure. It was opposed by the chairman of his committee, by a majority of members of his own party in both Houses of Congress, by many in the medical establishment, by many in the pharmaceutical industry, and by President Reagan, who didn't drop his threat to veto the bill until he signed it, as I recall. Gore is a man of deep, human-centered principles. Saying \"I can't believe Al Gore has great regard for real people\" only demonstrates the vast ignorance and perhaps crippling animus of the speaker.] That's a whopper about every 15 seconds in the trailer \u2014 the film itself may make heads spin if it comes close to that pace of error. Where have we seen this before? Producers of the film claim as \"contributors\" some of the people they try to lampoon \u2014 people like Ed Begley, Jr., and NASA's James E. Hansen, people who don't agree in any way with the hysterical claims of the film, and people who, I wager, would be surprised to be listed as \"contributors.\" It's easy to suppose these producers used the same ambush-the-scientist technique used earlier by the producers of the anti-science, anti-Darwin film \"Expelled!\" Here, see the hysteria, error and alarmism for yourself: Ann McElhinney is one of the film's producers. Her past work includes other films against protecting environment and films for mining companies. She appears to be affiliated with junk science purveyors at the Competitive Enterprise Institute, an astro-turf organization in Washington, D.C., for whom she flacked earlier this year (video from Desmogblog): Remember, too, that this film is already known to have gross inaccuracies about Rachel Carson and DDT, stuff that high school kids could get right easily. Anyone have details on McElhinney and her colleague, Phelim McAlee? A few sane, scientific-minded people have noted the film, too. Ecorazzi had some sharp words Update, October 12, 2009: One of movie's producers acting badly, as Al Gore provides evidence of the movie's errors Related posts, at Millard Fillmore's Bathtub: The killer CO2 cloud climate change \"skeptics\" don't want you to know about Monckton will lie about anything Monckton lies again (and again, and again, and again, and again . . .)! The continuing saga of a practicer of fictional science Post-film premiere update, here Please spread the word: 522 Comments | Accuracy, Climate change, Cost of Green, DDT, Environmental protection, Global warming, Green Politics, Junk science, Rachel Carson, Voodoo history, Voodoo science | Tagged: Al Gore, Climate change, Cost of Green, Environmental protection, film, Global warming, Green Politics, Junk science, Politics, Science, Voodoo history, Voodoo science | Permalink Posted by Ed Darrell The article the British Chiropractic Association hopes you will not read Science-based Medicine carried this article yesterday, and several other blogs have joined in. Below is the article Simon Singh wrote for which he is being sued for libel by the professional association for British chiropractors. It's a good cause, so I'll stretch it another little while. Science-based Medicine introduced the article with this: Last year Simon Singh wrote a piece for the Guardian that was critical of the modern practice of chiropractic. The core of his complaint was that chiropractors provide services and make claims that are not adequately backed by evidence \u2013 they are not evidence-based practitioners. In response to his criticism the British Chiropractic Association (BCA) sued Simon personally for libel. They refused offers to publish a rebuttal to his criticism, or to provide the evidence Simon said was lacking. After they were further criticized for this, the BCA eventually produced an anemic list of studies purported to support the questionable treatments, but really just demonstrating the truth of Simon's criticism (as I discuss at length here). In England suing for libel is an effective strategy for silencing critics. The burden of proof is on the one accused (guilty until proven innnocent) and the costs are ruinous. Simon has persisted, however, at great personal expense. This is an issue of vital importance to science-based medicine. A very necessary feature of science is public debate and criticism \u2013 absolute transparency.This is also not an isolated incident. Some in the alternative medicine community are attempting to assert that criticism is unprofessional, and they have used accusations of both unprofessionalism and libel as a method of silencing criticism of their claims and practices. This has happened to David Colquhoun and Ben Goldacre, and others less prominent but who have communicated to me directly attempts at silencing their criticism. This behavior is intolerable and is itself unprofessional, an assault on academic freedom and free speech, and anathema to science as science is dependent upon open and vigorous critical debate. What those who will attempt to silence their critics through this type of bullying must understand is that such attempts will only result in the magnification of the criticism by several orders of magnitude. That is why we are reproducing Simon Singh's original article (with a couple of minor alterations) on this site and many others. Enjoy. Some practitioners claim it is a cure-all but research suggests chiropractic therapy can be lethal Simon Singh The Guardian, Original version published Saturday April 19 2008 Edited version published July 29, 2009 You might be surprised to know that the founder of chiropractic therapy, Daniel David Palmer, wrote that \"99% of all diseases are caused by displaced vertebrae\". In the 1860s, Palmer began to develop his theory that the spine was involved in almost every illness because the spinal cord connects the brain to the rest of the body. Therefore any misalignment could cause a problem in distant parts of the body. In fact, Palmer's first chiropractic intervention supposedly cured a man who had been profoundly deaf for 17 years. His second treatment was equally strange, because he claimed that he treated a patient with heart trouble by correcting a displaced vertebra. You might think that modern chiropractors restrict themselves to treating back problems, but in fact some still possess quite wacky ideas. The fundamentalists argue that they can cure anything, including helping treat children with colic, sleeping and feeding problems, frequent ear infections, asthma and prolonged crying \u2013 even though there is not a jot of evidence. I can confidently label these assertions as utter nonsense because I have co-authored a book about alternative medicine with the world's first professor of complementary medicine, Edzard Ernst. He learned chiropractic techniques himself and used them as a doctor. This is when he began to see the need for some critical evaluation. Among other projects, he examined the evidence from 70 trials exploring the benefits of chiropractic therapy in conditions unrelated to the back. He found no evidence to suggest that chiropractors could treat any such conditions. But what about chiropractic in the context of treating back problems? Manipulating the spine can cure some problems, but results are mixed. To be fair, conventional approaches, such as physiotherapy, also struggle to treat back problems with any consistency. Nevertheless, conventional therapy is still preferable because of the serious dangers associated with chiropractic. In 2001, a systematic review of five studies revealed that roughly half of all chiropractic patients experience temporary adverse effects, such as pain, numbness, stiffness, dizziness and headaches. These are relatively minor effects, but the frequency is very high, and this has to be weighed against the limited benefit offered by chiropractors. More worryingly, the hallmark technique of the chiropractor, known as high-velocity, low-amplitude thrust, carries much more significant risks. This involves pushing joints beyond their natural range of motion by applying a short, sharp force. Although this is a safe procedure for most patients, others can suffer dislocations and fractures. Worse still, manipulation of the neck can damage the vertebral arteries, which supply blood to the brain. So-called vertebral dissection can ultimately cut off the blood supply, which in turn can lead to a stroke and even death. Because there is usually a delay between the vertebral dissection and the blockage of blood to the brain, the link between chiropractic and strokes went unnoticed for many years. Recently, however, it has been possible to identify cases where spinal manipulation has certainly been the cause of vertebral dissection. Laurie Mathiason was a 20-year-old Canadian waitress who visited a chiropractor 21 times between 1997 and 1998 to relieve her low-back pain. On her penultimate visit she complained of stiffness in her neck. That evening she began dropping plates at the restaurant, so she returned to the chiropractor. As the chiropractor manipulated her neck, Mathiason began to cry, her eyes started to roll, she foamed at the mouth and her body began to convulse. She was rushed to hospital, slipped into a coma and died three days later. At the inquest, the coroner declared: \"Laurie died of a ruptured vertebral artery, which occurred in association with a chiropractic manipulation of the neck.\" This case is not unique. In Canada alone there have been several other women who have died after receiving chiropractic therapy, and Edzard Ernst has identified about 700 cases of serious complications among the medical literature. This should be a major concern for health officials, particularly as under-reporting will mean that the actual number of cases is much higher. If spinal manipulation were a drug with such serious adverse effects and so little demonstrable benefit, then it would almost certainly have been taken off the market. Simon Singh is a science writer in London and the co-author, with Edzard Ernst, of Trick or Treatment? Alternative Medicine on Trial. This is an edited version of an article published in The Guardian for which Singh is being personally sued for libel by the British Chiropractic Association. Other venues: The Skeptic Blog Calgary Skeptic's Society Blog Gimpy Blog Moansters Incorporated The Family Voyage, life with autism Related material: Description of the litigation at Science Punk; description of how litigation has pushed chiropractors to better practice Phil Plait describes the Singh\/BCA episodes at Bad Astronomy White Coat Underground on efficacy of chiropractic practice; and be sure to see issues explained here Terra Sig Illata on Canadian case, and California fake chiropractor case ERV, who always has pithy comments \u2014 this one is very safe for work Nature editorial on the case Wall Street Journal editorial, \"Britain chills free speech\" Connotea bookmarks on the case and issue Science Based Medicine, \"Chiropractic and Stroke\" 2 Comments | Academic freedom, Accuracy, First Amendment, Free press, Free speech, Freedom of the Press, Health care, History, Journalism, Junk science, Jurisprudence, Justice, knowledge, Law, medicine, Science, Weblogs, Woo | Tagged: British Chiropractic Association, British Law, Chiropractic, First Amendment, Free press, Free speech, Journalism, Junk science, libel, Science, Voodoo science, Woo | Permalink India accepts climate junk science; U.S. suffers It would be good news were it not so bad: India, usually considered a threat to U.S. dominance in science, has turned its back on climate science and instead, citing junk science claims, rejected overtures to reduce pollution that affects climate. India appears to have fallen victim to the hoaxters who claim climate change is no big deal. From the Financial Times: A split between rich and poor nations in the run-up to climate-change talks widened on Thursday. India rejected key scientific findings on global warming, while the European Union called for more action by developing states on greenhouse gas emissions. Jairam Ramesh, the Indian environment minister, accused the developed world of needlessly raising alarm over melting Himalayan glaciers. He dismissed scientists' predictions that Himalayan glaciers might disappear within 40 years as a result of global warming. \"We have to get out of the preconceived notion, which is based on western media, and invest our scientific research and other capacities to study Himalayan atmosphere,\" he said. As if the atmosphere of the Himalayan range is unaffected by emissions from Europe or Asia. As if the glaciers in the Himalayas, and the snowfall, and the water to India's great rivers, come independent from the rest of the world. Deadly air pollution obscures the India Gate, New Delhi, India, November 2008 - NowPublic.com It's interesting to see these issues play out politically. India and China both understand that the U.S. and Europe have much more to lose from climate change than either of those nations. Climate damage to the U.S. wheat belt, for example, would chiefly close off U.S. production of wheat for export, opening markets for others \u2014 like India and China. Critically, such damage also hurts U.S. ability to offset balance of payments issues, providing economic and finance advantages to China's banks. U.S. ports are much more vulnerable to climate change damage, from increase storms and changing ocean levels, than are ports in India and China \u2014 and there are more ports that are vulnerable in the U.S. and Europe. India's inaction and recalcitrance should not be used as justification for the U.S. to do nothing, thereby slitting its own patriotic throat. But watch: Climate denialist blogs, \"hate-America-first\" outlets like World Net Daily, and Osama bin Laden will hail India's inaction. Let's hope cooler heads prevail, lest we run out of cooler heads. Shake of the old scrub brush to Brown Hell and Watt's Up With That. If this is important to you, please share it; click on the button you choose below. 7 Comments | China, Climate change, Cost of Green, Economics, Energy, Environmental protection, foreign affairs, Global warming, Globalization, Green Politics, Hoaxes, India, Junk science, Natural resources, Politics, pollution, Rampant stupidity, Reason, Science, Voodoo science, War on Science, Water | Tagged: Climate change, Cost of Green, denialism, Fighting Back, foreign affairs, Global warming, Junk science, National Security, Science, Sovereignty, Voodoo science | Permalink Hoax exposed: \"The Great Global Warming Swindle's\" swindle Nicely done, too, I think; this is one more alarm bell to tell us why there will be no Nobel Peace Prize for global warming deniers. From the same guy who so brilliantly brings us the Global Warming Crock of the Week: Tip of the old scrub brush to Tim Lambert at Deltoid. 23 Comments | Accuracy, Climate change, Cost of Green, denialism, Environmental protection, Global warming, Hoaxes, Junk science, Science, Voodoo science | Tagged: Climate change, Cost of Green, denialism, Global warming, Junk science, Science, Voodoo science | Permalink Encore post: Rebutting junk science, \"100 things to know about DDT\" point #6 (the \"500 million saved\" or \"500 million died\" errors) Encore post \u2014 originally posted in August 2007. Another in a continuing series, showing the errors in JunkScience.com's list of \"100 things you should know about DDT.\" (No, these are not in order.) In the summer of 2009, the denialists have trotted this error out again. Steven Milloy and the ghost of entomologist J. Gordon Edwards listed this as point six in their list of \"100 things you should know about DDT \"[did Edwards really have anything to do with the list before he died?]: 6. \"To only a few chemicals does man owe as great a debt as to DDT\u2026 In little more than two decades, DDT has prevented 500 million human deaths, due to malaria, that otherwise would have been inevitable.\" [National Academy of Sciences, Committee on Research in the Life Sciences of the Committee on Science and Public Policy. 1970. The Life Sciences; Recent Progress and Application to Human Affairs; The World of Biological Research; Requirements for the Future.] In contrast to their citation for the Sweeney hearing record, which leads one away from the actual hearing record, for this citation, the publication actually exists, though it is no longer available in print. It's available on-line, in an easily searchable format. [I urge you to check these sources out for yourself; I won't jive you, but you should see for yourself how the critics of Rachel Carson and WHO distort the data \u2014 I think you'll be concerned, if not outraged.] The quote, though troubled by the tell-tale ellipses of the science liar, is accurately stated so far as it goes. The problems? It's only part of the story as told in that publication. The National Academy of Science calls for DDT to be replaced in that book; NAS is NOT calling for a rollback of any ban, nor is NAS defending DDT against the claims of harm. The book documents and agrees with the harms Rachel Carson wrote about eight years earlier. Sign at the National Academy of Sciences building, Washington, D.C. Milloy (and Edwards, he claims), are trying to make a case that the National Academy of Sciences, one of the more reputable and authoritative groups of distinguished scientists in the world, thinks that DDT is just dandy, in contrast to the views of Rachel Carson and environmentalists (who are always cast as stupid and venal in Milloy's accounts) who asked that DDT use be reduced to save eagles, robins and other songbirds, fish, and other wildlife, and to keep DDT useful against malaria. First, there is no way that a ban on DDT could have been responsible for 500 million deaths due to malaria. Calculate it yourself, the mathematics are simply impossible: At about 1 million deaths per year, if we assume DDT could have prevented all of the deaths (which is not so), and had we assumed usage started in 1939 instead of 1946 (a spot of 7 years and 7 million deaths), we would have 69 million deaths prevented by 2008. As best I can determine, the 500 million death figure is a misreading from an early WHO report that noted about 500 million people are annually exposed to malaria, I'm guessing a bit at that conclusion \u2014 that's the nicest way to attribute it to simple error and not malicious lie. It was 500 million exposures to malaria, not 500 million deaths. It's unfortunate that this erroneous figure found its way into a publication of the NAS \u2014 I suppose it's the proof that anyone can err. This error, \"500 million deaths,\" crops up in several publications after it was originally made near the end of the 1960s; honest researchers would get a good copy editor who would do the math and realize that 500 million people would not have died from malaria had there been no control at all, since 1939, when DDT was discovered to have insecticidal properties. Were Milloy and Edwards making a good faith case, I'd excuse it; but Edwards was a scientist and should have known better, Milloy has been spreading this falsehood long enough he could not fail to know better. But the actual publication from the National Academy of Sciences suggests other issues that JunkScience.com would rather you not know about. Importantly and specifically, the National Academy of Sciences is calling for broad research 1.) to avoid the problems that DDT presented (problems which Junk Science denies exist), and 2.) to combat the continuing evolution of the insect pests (evolution which Junk Science also denies), and 3.) to provide insecticides that hit specific targets to avoid the collateral damage of harming helpful insects, other animals and especially predators of the harmful insects (more problems that Junk Science pretends do not exist). Three pages carry references to DDT in the book, The Life Sciences: Recent Progress and Application to Human Affairs \u2014 The World of Biological Research Requirements for the Future (National Academy of Sciences, 1970). This was a study of the state of science in several areas, with a survey of places particularly ripe for research considering human needs in the world. It was a sort of road map of where governments and other funders of research should spend their research monies in order to have the greatest beneficial effects. The book suggests the need for extensive funding for research in biology over the following decade or two, or four. Were Milloy and Edwards correct that DDT was the panacea lifesaver, one might wonder why DDT was included in the book at all except to note a great success that precludes need for further research. That's not what the book says at all. Among the chief recommendations, NAS said research had to focus on rapidly biodegradable, closely targeted chemical pesticides to replace the DDT-style, long-lived, broad spectrum pesticides. NAS recognized the environmental dangers of DDT first and foremost in the introduction and statement of key recommendations: It is imperative that new, degradable insecticides and pesticides with highly specific actions be devised and that their ecological consequences be understood, as it is imperative that the full ecological impact of the existing armamentarium of such agents be evaluated. Classical dose responses, evaluated only in terms of mortality or morbidity statistics, will not suffice; such data also must include an assessment in terms of modern knowledge of cell physiology, metabolism, and cytogenetics. [see page 11 of the book.] These are exactly the things Milloy and Edwards ignore. This is a warning that simple toxicity tests on humans are not enough \u2014 pesticides need to be tested for downstream effects. That is what Rachel Carson called for in Silent Spring, research to understand the full effects of chemicals we use in the wild. This recommendation from NAS fully recognizes that chemicals like DDT, while they may offer significant benefits, can at the same time be significantly dangerous and damaging. From the general introduction, the NAS authors point to three specific DDT-related issues. In general, the NAS view of DDT can be summarized like this: 'DDT produced some great benefits fighting harmful insects, but its benefits need to be balanced against its great dangers and great potential for long-term damage. DDT is the poster child for beneficial chemicals that are also hazardous. We need to understand all the dangers as well as some of the benefits, in order to make wise decisions on chemical use. In the interim, where we have gaps in our knowledge, we should be careful.' By carefully selecting only part of a statement by the NAS in one of the three areas of research, and leaving out all the qualifying statements, Milloy and the late Edwards misrepresent what NAS said. NAS was not calling for greater use of DDT. NAS was not calling for continued use of DDT. NAS was not criticizing any of the bans on DDT usage. NAS was saying we don't know how great is the danger from DDT, and more study is needed; and use of DDT must be restricted in the interim. Excerpt 1: Crop research Increase research in rotating crops, herbicides and pesticides: In a section mentioning the need for alternative treatments, and commending organic methods of farming, on page 182 NAS notes the efficacy of crop rotation, and then talks about the need to have several different tools available to get rid of weeds and insect pests. Similarly, recognition of the insecticidal properties of DDT in 1939, initially used against insects directly injurious to man, indicated the intelligent application of understanding of insect physiology, entomology, pharmacology, and the arts of the organic chemist could prevent crop destruction by insects. To date, the use of 2,4-D has increased yearly even though it has been replaced in part, and DDT is being withdrawn because of concern for its potentially adverse effects on man, transfer to the general environment, prolonged persistence, destruction of beneficial insects and possibly other wildlife, and stimulation of resistance in the target insects. These are now matters of broad general concern, and it is regrettable that public decisions must be made on the basis of our limited knowledge. But these compounds paved the way for modern agriculture. Without their equivalent, modern intensive agriculture is not possible, and, just as the continual breeding of new crop strains is imperative, so too is a continuing search for effective herbicides and pesticides, optimally with specific effects on offending organisms, degradable in the soil and nontoxic to man and animals. Attainment of these goals will require continuously increasing understanding of plant and insect physiology and life cycles. Control of undesirable species by biological means is, in many ways, the most attractive possibility for future exploration. The notion is by no means new; attempts at such control began late in the nineteenth century. Indeed, some 650 species of beneficial insects have been deliberately introduced into the United States from overseas, of which perhaps 100 are established. These are now major factors in the control of aphids and a variety of scale insects and mealybugs. More recently, microbes and viruses have been considered for these purposes, a few of which are being used; for example, spores of the bacterium B. thuringiensis are used to control the cabbage looper and the alfalfa caterpillar. Some insects have been utilized for control of weeds \u2014 e.g., prickly pear in Australia and the Klamath weed in the western United States \u2014 while a combination of the cinnabar moth and the ragwort seed fly is required to keep down the population of the toxic range weed, the tansy ragwort. There is no ringing endorsement for bringing back DDT, but rather a much more sophisticated understanding demonstrated that a variety of tools, some chemical and some living, need to brought to bear in agriculture and health \u2014 coupled with a clear understanding that non-beneficial effects need to be studied and understood, for all attempts to control pests for crops, and threats to humans. This is quite contrary to the general tone of Milloy's and Edwards's list, and far beyond the misleading snippet they offer. Near the end of that first paragraph, the NAS call for pesticides that are pest specific, rapidly degradable once released, and nontoxic to humans and other beneficial creatures, targets and shoots directly at DDT, which is non-specific, long-lived in the soil, and toxic to almost everything. That's just the first of the three mentions of DDT. Excerpt 2: Industrial technologies \u2013 Pesticide research The second mention is in a discussion specific to pesticides. The NAS panel recommends research to find safe, short-lived alternatives that target specific pests. DDT is a long-lived toxin that has broad targets. This is a very long entry, but unlike the JunkScience.com guys, I think accuracy is more than one quote ripped out of context; in context, you see that NAS is not defending DDT as a safe, panacea against malaria. I quote from the NAS publication at length, below; I want you to see that NAS is not contradicting Rachel Carson in any way; in fact, NAS is paying homage to Carson, adopting her calls to action in research and development, while updating the science which showed, in 1969, that Carson was right more than anyone could have known. Because it's a long quote, I'll put it in a different color, not boxing it where the formatting gets out of hand: From: The Life Sciences: Recent Progress and Application to Human Affairs \u2014 The World of Biological Research Requirements for the Future (National Academy of Sciences, 1970) [Beginning on page 213] As noted earlier, the properties of DDT and 2,4-D inaugurated a new era in management of our living resources and gave rise to a new industry. Each touched off a wave of research that continues to the present, seeking newer compounds that are species-specific, safe, and degradable. For the moment, the use of such compounds is indispensable; until superior means and materials are found, these compounds are essential to the success of our agriculture, while assisting in maintenance of our woodlands and protection of our health. It is the scale of this use, rather than their intrinsic toxicity, that has properly generated public concern over the effects of these chemicals on the public health. In 1966, total production of all pesticides in the U.S. was 1,012,598,000 pounds. The rapid increase in use occurred because new pesticides have been developed that control hitherto uncontrolled pests, and broader use of pesticides in large-scale agriculture has increased crop yields significantly. Current trends in crop production involving large acreages, greater use of fertilizers, and intensive mechanized cultivation and harvesting offer particularly favorable opportunities for insect pests and would result in large crop losses to these pests unless control measures were applied. The increased number of new pesticides in part reflects a second generation of pesticides with more appropriate persistence for economic control of specific pests, more complete control of the pest, less hazard for the applicator, or less hazardous residues on the crop. An additional impetus to the development of the pesticides comes from the fact that many insect pests have developed resistance to the older pesticides. The development of pest resistance does not necessarily entail the development of more dangerous pesticides; the new agent need only be chemically different to overcome resistance. The continuing search for new, more nearly ideal pesticides requires the joint effort of research teams composed of organic chemists, biochemists, pharmacologists, physiologists, entomologists, and botanists. The effort is managed much like the development of new drugs, each chemical entity being tested in a \"screen\" of a variety of insects. About 73 percent of the total insecticide usage is in agriculture, and about 25 percent is used in urban areas by homeowners, industry, the military, and municipal authorities. The remaining 2 percent is applied to forest lands, grassland pasture, and on salt and fresh water for mosquito control. Over 50 percent of the insecticide used in agriculture is applied to cotton acreage alone. When insect-control measures are not used in agriculture, insect pests take 10 to 50 percent of the crop, depending on local conditions. Losses of this magnitude are not readily tolerated in the United States in the face of a rapidly increasing population and a concomitant decrease in agricultural acreage. In this sense, the use of pesticides might be deemed essential at this time for the production and protection of an adequate food supply and an adequate supply of staple fiber. While alternative methods of pest control are under investigation and development, they are not yet ready to displace completely the chemical pesticides, and it appears that a pesticide industry will be required for some years to come. Pesticides have been tremendously effective, but individual pesticides, like sulfa drugs and antibiotics, tend to lose their effectiveness as species resistance to them develops. Hence, there will be a continuing search for new pesticides as long as pesticides are considered to be required for the economy or the public health. This search will require the continuing participation of able biologists. As with drugs, new pesticides, optimally, should be selectively toxic for specific pests, rather than broadly toxic against a wide variety of pests with serious side-effects on nonpest species. Broad-spectrum pesticides affect an essential enzyme or system common to a wide variety of pests. A selective pesticide, on the other hand, either should affect an essential enzyme or system peculiar to a particular pest or should be applied in such a way that only the particular pest gains access to it. An interesting example of a selective pesticide is the rodenticide norbormide, which is highly toxic for rats, particularly for the Norway rat. By contrast, the acute oral toxicity of norbormide for other species is much lower, the lethal dose for a great variety of birds and mammals, per kilogram of body weight, being more than 100 times greater. The mechanism of the selective toxic action of the norbormide for rats is not yet elucidated. Achievement of target specificity requires a sophisticated knowledge of the anatomical, physiological, or biochemical peculiarities of the target pest as compared with other pests or vulnerable nonpests; a pesticide may then be developed that takes advantage of these peculiarities. This is obviously not easy to accomplish, and norbormide may prove to be unique for many years. An alternative is the introduction of a systemic pesticide into the host or preferred food of the target pest. Other pests or nonpests would not contact the pesticide unless they shared the same host or food supply. As an example, a suitable pesticide may be applied to the soil and imbibed by the root system of a plant on which the pest feeds. The pest feeding on the plant then receives a toxic dose. The application of attractants or repellents (for nontarget species) would increase the selectivity of the systemic pesticide. The use of systemic pesticides on plants used for food by humans or domestic animals poses an obvious residue problem. There has been a strong public reaction against the continued use of pesticides on the grounds that such use poses a potential threat to the public health as well as being a hazard to wildlife. Careful investigations have so far failed to establish the magnitude of the threat to the public health; i.e., there are as yet few if any clear-cut instances of humans who have suffered injury clearly related to exposure to pesticides that have been used in the prescribed manner. Report No. 1379 of the 89th Congress (July 21, 1966)* concluded: The testimony balanced the great benefits of disease control and food production against the risks of acute poisoning to applicators, occasional accidental food contamination and disruption of fish and wildlife. . . . The fact that no significant hazard has been detected to date does not constitute adequate proof that hazards will not be encountered in the future. No final answer is possible now, but we must proceed to get the answer. (Italics ours [NAS]). Failure to establish such hazard does not mean that it does not exist. There are no living animals, including those in the Antarctic, that do not bear a body burden of DDT. Large fish kills and severe effects on bird populations have been demonstrated. The large-scale use of these agents has been practiced for less than two decades, and use has increased annually until this year (1969). Whereas the anticholinesterase compounds, which have high acute toxicity (and hence are highly hazardous to the applicator), are readily and rapidly degraded in nature, the halogenated hydrocarbons are not. With time, their concentration in the soil and in drainage basins, lakes, ponds and even the oceans must continue to increase, thereby assuring their buildup in plant and animal tissues. Over a sufficient time period, this is potentially disastrous. And should such a period pass without relief, the situation could not be reversed in less than a century. Because of the large economic benefit to the farmer, it is pointless to adjure him to be sparing; unless restrained by law, he will make his judgment in purely personal economics terms. But mankind badly needs the incremental food made possible by use of effective pesticides, and the enormous benefit to public health of greatly reducing the population of insects that are disease vectors is a self-evident boon to humanity. Thus it is imperative that alternative approaches to pest control be developed with all possible dispatch, while we learn to use available pesticides only where they are clearly necessary and desirable and to apply them in the minimal amounts adequate to the purpose. A recent development in insect-pest control has been the possible use of juvenile hormone. This hormone, normally produced by insects and essential for their progress through the larval stages, must be absent from the insect eggs if the eggs are to undergo normal maturation. If juvenile hormone is applied to the eggs, it can either prevent hatching or result in the birth of immature and sterile offspring. There is evidence to suggest that juvenile hormone is much the same in different species of insects, and analogs have been prepared that are effective in killing many species of insects, both beneficial and destructive. There would, therefore, be great danger of upsetting the ecological balance if juvenile hormone were applied on a large scale. What is needed, then, is development of chemical modifications of juvenile hormone that would act like juvenile hormone for specific pests but not for other insects. For example, a preparation from balsam fir, which appears to be such an analog, has been identified and is effective against a family of bugs that attack the cotton plant, but not against other species. If it proves possible to synthesize similar analogs specific for other pests, a new type of pesticide may emerge. If this happens, it will be extremely important to explore possible side-effects on other insect species and on warm-blooded animals before introduction of yet a new hazard into the biosphere. We cannot rest with existing pesticides, both because of evolving resistance to specific compounds and because of the serious long-term threat posed by the halogenated hydrocarbons. While the search for new, reasonably safe pesticides continues, it is imperative that other avenues be explored. It is apparent that this exploration will be effective only if there is, simultaneously, ever-increasing understanding of the metabolism, physiology, and behavior of the unwanted organisms and of their roles in the precious ecosystems in which they and we dwell. * U.S. Congress. Senate. Committee on Government Operations. Interagency Environmental Hazards Coordination, Pesticides and Public Policy (Senate Report 1379). Report of the Subcommittee on Reorganization and International Organizations (pursuant to S. R. 27, 88th Cong., as amended and extended by S. R. 288), 89th Cong., 2d sess., Washington, D.C., U.S. Government Printing Office, 1966. Anyone should be able to see from various parts of that excerpt that NAS was not defending DDT as harmless; that instead, NAS was saying that despite its great utility, DDT use needed to be extremely limited, and that substitutes for it needed to be found as quickly as possible \u2014 and then, the substitutes need to be researched to make sure they don't have unintended bad effects, on other species, at other places, at other times. Excerpt 3: The Great Hazards \u2013 Man and his environment The third excerpt has the money quote \u2014 it contains an obvious error of fact, but an error that has been seized upon and trumpeted from one end of the world to the other: The 500 million dead miscalculation. Critics of environmental stewards like to trot this out, sometimes going so far as to accuse Carson and environmentalists of genocide, for the deaths of 500 million people that would have been prevented but for our concerns 'for a few silly birds.' I reiterate, the mathematics do not work. If we assumed 5 million deaths to malaria every year for the 20th century, we'd get 500 million deaths. Records indicate total deaths as high as 3 million in some years; since World War II, deaths have averaged about 1 million per year. So, even were it true that DDT bans unnecessarily caused all those deaths (and it's not true), the total, between 1946 and 2006 would be about 50 million deaths. The \"500 million deaths\" figure is incorrect by a multiple of 10, at least, in addition to being absolutely in error historically. DDT never offered the realistic hope of eradicating malaria; by 1965, it was already failing where it was applied, and human institutional failures (not environmentalists) prevented its application in places where it might have helped. The National Academy of Sciences (NAS) discusses hazards from chemistry and biochemistry, in one of its final chapters studying life sciences and their applications to human affairs. NAS authors write about the need to study causes of deaths and how to prevent them (including lung cancer and smoking), and there is discussion on the difficulty of getting clear answers to every question. In a section titled \"Man and his environment,\" NAS discusses environmental damage: Deforestation, pollution, and animal and plant extinctions. On page 430, there is an example given of supposedly beneficial chemicals turning toxic once released; DDT is the example: Then NAS discusses DDT: Large-scale use of pesticides can start a chain in which these substances concentrate in plant an animal tissues and, when ingested, accumulate in the adipose [fat] tissue of the human body. As an illustration of this process, consider the record of Clear Lake, California, where DDD (a breakdown product of DDT) entered the lake at 0.02 part per million (ppm). A year later, its concentration was 10 ppm in the plankton, 900 ppm in fish that eat the plankton, and 2,700 ppm in fish that eat fish that eat plankton. No data are available concerning people who ate such fish. The effects of these changes in the environment on man himself are not known. NAS notes that absence of proof of damage should not imply safety, and the article notes that small doses of pollutants, repeated over time, can cause serious health problems. And then, on page 432, NAS discusses the harmful, latent effects of substances considered to be beneficial \u2014 using DDT as the example: Until reliable evidence thus obtained becomes available, public health measures designed to minimize exposure to such pollutants are patently advisable. But surely a rule of reason should prevail. To only a few chemicals does man owe as great a debt as to DDT. It has contributed to the great increase in agricultural productivity, while sparing countless humanity from a host of diseases, most notably, perhaps, scrub typhus and malaria. Indeed, it is estimated that, in a little more than two decades, DDT has prevented 500 million deaths due to malaria that would otherwise have been inevitable. Abandonment of this valuable insecticide should be undertaken only at such time and in such places as it is evident that the prospective gain to humanity exceeds the consequent losses. At this writing, all available substitutes for DDT are both more expensive per crop-year and decidedly more hazardous to those who manufacture and utilize them in crop treatment or for other, more general purposes. The health problems engendered by undesirable contaminants of the environment may also be raised by substances that are intentionally ingested. Only large-scale, long-term epidemiological research will reveal whether the contraceptive pills, pain killers, sleeping pills, sweetener, and tranquilizers, now consumed on so great a scale, have any untoward long-range effects on their consumers.* Man has always been exposed to the hazards of his environment and it may well be that he has never been more safe than he is today in the developed nations. Food contamination is probably minimal as compared with that in any previous era, communal water supplies are cleaner, and, despite the smog problem, air is probably less polluted than in the era of soft coal or before central heating systems were the norm. Witness the fact that jungle dwelling natives of South America exhibit a considerably higher incidence of chromosomal aberrations in their somatic cells than does the American population. But modern man also increasingly exposes himself to the chemical products of his own technologies and has both the biological understanding to ascertain the extent of such hazards and the prospect of technological innovation to minimize them where they are demonstrated. To do less would be improvident and derelict. * This sentence was written in June 1969. Revelations of the untoward effects of both steroid contraceptives and cyclamates were made public months later. As presented by the \"100 facts about DDT\" list, all the qualifiers, warnings, and listed harms of DDT are left off. The numbers cited in the quoted section are in error, and considering that the NAS was calling for research into the harms of DDT, research to replace DDT with chemicals that were short-lived, more carefully targeted by species, and fully researched to avoid the collateral harms DDT caused, it seems dishonest to present that edited quote as an endorsement of DDT. It is no endorsement at all. And so, it is dishonest to present the quote at all so grossly out of context. Steven Milloy should strike"} +{"id":"RedPajamaCommonCrawl.0039","text":"Signs of the times (1) Recession drives adult children back live with parents Newspapers continue to be filled with news of the development of the oppressive state and the downfall of civilisation, while the relevant departments of my suppressed and unrecognised university continue to be prevented from contributing their comments to the intellectual life of this time. Front-page news today: Year of recession forces half a million adults aged 35 to 44 to return to live with parents. But, in spite of the pressures on those living independently, and in spite of publicising our position as best we can on the internet, none of these people come to live nearby to become associates with our cooperative consortium for working towards a large and adequately financed institutional environment supported by a business empire, until such time as it can get recognition and support from the sources available to the ersatz universities of the oppressive society. Parents, of course, may provide their offspring with advantages, such as ironing their shirts, without the offspring contributing any useful work or money to alleviate the position of the parents in return, and this \u2013 i.e. benefits without contributions \u2013 is something we could not do. But the prospects for long-term progressive improvement of our position, and hence of any new associates, would in most circumstances be better, although dependent on their actually coming. With no one willing to work for us we have, of course, found it almost impossible to improve our position from Ground Zero, although we might have been able to develop much faster with more people. 'Tough love' There are often articles in the press about the increasing problems of both pensioners (poverty-struck and surrounded by feral neighbours) and \"graduates\" of \"universities\" finding themselves without prospects in life in modern oppressive society. Now the government (specifically the Department for Business, Innovation and Skills) has issued an appalling \"guide\" on how parents \"should\" \"help\" graduate children. Obviously violating the basic moral principle of not imposing on people an official interpretation of how they should evaluate the existential possibilities of their situation, this guide viciously suggests that parents should throw their children out of house and home, to make them earn a living or else claim disability allowance. Oh yes, it actually advocates sending them to enter into an abusive interaction with a qualified sadist (\"doctor\") if they show signs of depression! And allow them to \"relax\" after qualification but not for too long, says the guide. Don't let the weeks turn into months, and cut their allowance so they will be forced to seek a \"job\" - or, of course, a disability allowance. All of these ideas were applied to me, only then it was \"don't let the days turn into weeks\" and hide my Post Office Savings Book, so I would feel that I had no capital in the world except the coins I saved whenever I was given a bus fare and walked instead. I never blamed my parents for this; I knew they were under pressure from people like the Principal of Somerville. Dame Janet Vaughan would have had no scruples about slandering me to a local educational authority and telling them to place pressure on my parents and hence on me. Hence my plan was aborted to get my parents to move to Oxford so that I could live at home while writing my unofficial physics thesis. Thus at the end of the ruined \"education\", during which I had been prevented from acquiring qualifications, society moved in for the kill and completely ruined the lives of three people, not just the one who had been in its clutches. King George VI's Christmas speech, 1939 When war had been declared on Germany and hence the British Empire faced another world war, King George VI made a Christmas broadcast which became famous. I have always suspected that it was his wife, later the Queen Mother, who put him up to this, and this is confirmed by something found via Google, which claims that his wife drew his attention to this poem*, which he quoted. It places the whole thing in an open-ended context which is clearly very un-modern. I said to the man who stood at the Gate of the Year, 'Give me a light that I may tread safely into the unknown.' And he replied, 'Go out into the darkness, and put your hand into the Hand of God. That shall be better than light, and safer than a known way.' According to the Canadian Broadcasting Corporation, The tradition of a royal Christmas Day broadcast began in 1932 with King George V, who spoke from a studio at the royal residence Sandringham. The message reached about 20 million people by radio. The message began: 'I speak now from my home and from my heart to you all; to men and women so cut off by the snows, the desert, or the sea, that only voices out of the air can reach them.' The war was certainly the Queen Mother's great project in life, although she was very angry with the Duke of Windsor for abdicating and causing her husband's early death by forcing him to become king. The war over, her husband dead and her daughter safely installed as Queen, she found herself with no purpose in life and it is scarcely surprising that she took to gin and horse-racing. * by Minnie Louise Haskins; the complete poem can be read here 'We appeal for \u00a31m as initial funding for a social science department in our unrecognised and unsupported independent university. This would enable it to publish analyses of the unexamined assumptions underlying current discussion of cultural and psychological issues. Such analyses could include an examination of what leads to the anachronistic tone of the quotation discussed above.' Charles McCreery, DPhil Some comments on coronation One supposes that it was the purpose of the old-fashioned coronation ceremony to impress upon the recipient his importance in a certain context, and of his acting henceforward on impersonal motivation in the best interests of the territory of which he now became the representative and agent, without being led astray by the merely personal. This was made as impressive as possible so that he would not forget about it in the future. And it is not irrelevant that the whole thing was supposed to place the royal person and his territory in relation to something outside of society, which was supposed to be run in accordance with a divine purpose. Cf. Land of Hope and Glory, performed on occasion at coronations, \"God who made thee mighty, make thee mightier yet\". Fifty years ago I knew someone who read history at Oxford, and at her interview to determine whether she would get a first or a second, she was asked to discuss \"the divine right of kings\". I am sure that even then one was expected to make this idea sound ridiculous, and perhaps she failed to do so, as she was an old-fashioned Christian. Nevertheless, I am sure that this reference to an outside context conferred some psychological advantages on the anointed ones. The present Queen certainly seems to have a sense of divine mission and, not long after her coronation, made a speech to the nation in which she promised to consecrate her life to the service of the Empire. She has always fulfilled her role, as she saw it, impeccably, although this has not preserved her from criticism as cold and unemotional. Comments on modern psychology \u2013 comparison of Princess Diana with the Queen Mother (continued) To make the obvious explicit in the case of Princess Diana contrasted with the Queen Mother, the reason I say I find modern psychology incomprehensible is that I can quite easily imagine myself behaving as the Queen Mother did, and never giving away anything that the royal family would not consider it to be in their interests to have given away. But I cannot imagine at all the psychological events that went into Diana's very damaging public discussion of Prince Charles, to whom she was married. And yet I suppose a lot of people can imagine this, since such betrayals of confidence appear to go on all the time in modern society, at all social levels, so I suppose that there is no longer any such thing as a concept of something being in confidence between individuals. From the television dramas one gathers that it is considered interesting and attractive to promise not to give something away, and then to do so, which shows there is an awareness that you do not have to keep your word, although you may have led someone to believe (more fools they) that they can rely on you to do so. When people do insist on not giving away information about someone, this is virtually always portrayed as misguided. They are covering up for a criminal or pervert in withholding information from police or doctors, setting other people at risk and preventing the criminal or pervert from getting the punishment he deserves or the \"help\" which he needs. Cases almost never occur in the television dramas in which an individual is protected by discretion from wrongful persecution by agents of the collective. I say \"almost\" never because there was a case recently in which a policeman threw away a cassette which might have incriminated someone. But the \"someone\" was a doctor, hence \"good\". The crime of which the doctor might have been convicted was (so far as I could gather from a very inattentive observation of the unattractive episode) that of assisting a suicide in framing someone on whom he wished to take revenge, so that they would be supposed to have murdered him when he was found dead. Princess Diana and the Queen Mother When I say that I find people's psychologies incomprehensible this is because I find nothing in them that corresponds to basic principles in my own; in fact there seems often to be a deliberate inversion of them. I imagined that since Sir George Joy had had a mystical experience up a mountain in Arabia, even if he would do nothing to help me he would not actively create difficulties for me. I thought this would be a general principle which someone who had had a mystical experience would apply to anyone with an obvious aim or sense of direction. In fact it turned out not to be so and he joined in with the machinations against me as enthusiastically as anyone else. A friend of mine from Somerville, who had been brought up in a hotbed of socialist ideology, commented on my naivet\u00e9 in having supposed he would do anything to help me, at least in the sense of not hindering me. She seemed amused that I should have thought such a thing, as if she had more insight than I did, and no doubt she did, because this is one of the things that I always find incomprehensible, as I can find no parallel to it in my own psychology. In fact one finds that what one might have supposed to be principles in the context of old-fashioned bourgeois psychology no longer are, and instead inversions of them appear to be regarded as appropriate principles of conduct The behaviour of Princess Diana when she married into the Royal Family, in comparison with that of the late Queen Mother, might be regarded as a striking example of this. The Queen Mother maintained absolute discretion about the affairs of the royal family, even to members of her own family. Princess Diana, although from an equally aristocratic family, lost no time in spilling the beans on Prince Charles to the media, and washing her dirty linen as publicly as possible, which was successful in gaining the sympathy of the population for herself and accelerating the decline of the monarchy, which in turn is associated with an increasing level of criminal behaviour throughout the country. (The social workers etc. who act ostensibly against the criminal or antisocial behaviour are actually no less criminal than the muggers and rapists, although in slightly less obvious ways.) Intellectuals sorting rubbish copy of a letter to an academic Please let all potential financial supporters (such as salaried and statusful academics who have never suffered from being deprived of a career) know of our continuing and urgent need for financial support. A significant amount of extra work has been created for us (as it is intended to do) by the ridiculous restrictions on waste disposal. Small bins are provided, allegedly to discourage waste, so now every householder must spend significant amounts of time carefully sorting waste into different categories, crushing it to reduce volume, and burning what cannot be fitted in. Even if extra domestic workers are employed, of the usual unreliable and expensive sort, this is practically certain to be something which they cannot do without much instruction and supervision on the part of the employer, thus ensuring that his liberty to spend his time doing anything he might regard as purposeful will be still further reduced. It is not only the amount of time that has to be directly expended on sorting and organising waste, but the fact that it adds to the burdens of one's mental organising capacity, thus seriously damaging one's life. Some responsible person has now to think constantly about the state of the bins and the variations in the waste which arises, in relation to the collection of different kinds of bins at various times. The modern agent of the oppressive society likes to talk as if it was only the chronological time obviously spent on a given activity that entered into the equation. For example, the Master of an Oxford college asserted to a colleague of mine that geniuses are not frustrated by having to earn a non-academic living, since from time to time they have some hours \"free\" in the evenings, and it is impossible (according to him) to do concentrated intellectual work for more than three hours at a time. Which only goes to show how hostile to ability the modern ideology is. Obese mothers and the loss of a principle A newborn girl was taken into care because of fears her weight would balloon in the care of her obese parents. The child was removed from her mother within hours of being born earlier this week and has been placed with a foster family. Her parents, who are both clinically obese, have already had two children taken into care amid concerns about the youngsters' weight. They have been warned they risk losing their remaining four children if they too fail to shed pounds. Before she became pregnant, the mother weighed 23st. At that time one of her children, a toddler, weighed 4st and her 13-year-old son weighed 16st. Social workers in Dundee confirmed they took the baby because of fears the infant's weight would balloon. Her devastated mother, who is 40, discharged herself from hospital on Tuesday, a day after the birth. She and her husband, who cannot be named for legal reasons, were warned last year to bring their children's weight down. Last night a Dundee council spokesman said the decision to take the girl was given 'careful consideration'. She added: 'It is never taken lightly and always at the forefront is what is the best course of action for the welfare and safety of the child or children.' (Daily Mail, 22 October 2009) Before the Welfare State came in, in 1945, there must have been many people who would have found the idea of a new-born baby being taken away from its mother, whether or not the mother was obese, horrifying in principle. Now this does not seem to be the case. People may argue over whether the reasons are good enough, but the basic idea that the state should be free to remove children in their 'best interests' (as assessed by agents of the collective) has apparently been generally accepted. Bertrand Russell on Nietzsche He [Nietzsche] condemns Christian love because he thinks it is an outcome of fear: I am afraid my neighbour may injure me, and so I assure him that I love him. If I were stronger and bolder, I should openly display the contempt for him which of course I feel. It does not occur to Nietzsche as possible that a man could feel universal love, obviously because he himself feels almost universal hatred and fear, which he would fain disguise as lordly indifference. His 'noble' man \u2013 who is himself in day-dreams \u2013 is a being wholly devoid of sympathy, ruthless, cunning, cruel, concerned only with his own power. King Lear, on the verge of madness, says: 'I will do such things \u2013 What they are yet I know not \u2013 but they shall be The terror of the earth.' This is Nietzsche's philosophy in a nutshell. It never occurred to Nietzsche that the lust for power, with which he endows his superman, is itself an outcome of fear. Those who do not fear their neighbours see no necessity to tyrannize over them. Men who have conquered fear have not the frantic quality of Nietzsche's 'artist-tyrant' Neros, who try to enjoy music and massacre while their hearts are filled with dread of the inevitable palace revolution. I will not deny that, partly as a result of his teaching, the real world has become very like his nightmare, but that does not make it any the less horrible. (Bertrand Russell, History of Western Philosophy*) 'Those who do not fear their neighbours see no necessity to tyrannize over them.' Bertrand Russell was brought up in a stately home with tutors paid for by his parents. He had very little reason to fear his neighbours, and any such 'neighbours' lived outside the boundaries of the desirable hotel environment in which he grew up. He was not exposed to the social hostility of even a fee-paying school environment. Bertrand Russell is both unrealistic and unanalytical about the psychology of the 'noble' man as delineated by Nietzsche. Russell claims that Nietzsche endows his superman with a 'lust for power' which is 'an outcome of fear'. He then gives a quotation from King Lear, which he uses to illustrate the motivations that he (not Nietzsche) ascribes to the 'noble' man. The quotation from King Lear, however, expresses Lear's reaction to his helpless situation as a dethroned and infirm old man, cast out by his daughters, deprived of servants and exposed to the elements. There is much more that could be said in criticism of this piece by Bertrand Russell. If the philosophy department of my unrecognised and suppressed independent university were not kept unjustifiably deprived of academic status and financial support, one of the things it would be able to do would be to publish analytical critiques of various writings by Bertrand Russell, among others. * first published in 1946 by George Allen and Unwin, this edition published by Routledge, 2004 - from chapter on Nietzsche, p. 693 'We appeal for \u00a31m as initial funding for a social science department in our unrecognised and unsupported independent university. This would enable it to publish analyses of the unexamined assumptions underlying utterances by philosophers, such as Russell's remarks discussed above.' Charles McCreery, DPhil 'Any undergraduates or academics are invited to come to Cuddesdon in vacations as voluntary workers. They are expected to have enough money of their own to pay for accommodation near here, but would be able to use our canteen facilities. However, we cannot enter into correspondence about arrangements before they come. While here, they could gain information about topics and points of view suppressed in the modern world, as well as giving badly needed help to our organisation.' Celia Green, DPhil The Alien Life The concept of the \"alien God\" is an important element of Gnostic Christianity. The following extract from Hans Jonas provides an introduction to the idea. The fact that this concept occurred in many of the various forms of Gnosticism which spread around the Mediterranean for several centuries after the supposed life of Christ suggests that it may have arisen from the views and outlook of an original philosopher\/psychologist who lived at approximately that time. The concept of alienness could be seen as associated with a kind of open-ended scepticism or agnosticism towards the existential situation, antithetical to the dogmatic materialism and reductionism characteristic of present day ideology, as expressed by Richard Dawkins and others. \"In the name of the great first alien Life from the worlds of light, the sublime that stands above all works\" This is the standard opening of Mandaean compositions ... The concept of the alien Life is one of the great impressive word-symbols which we encounter in gnostic speech, and it is new in the history of human speech in general. It has equivalents throughout gnostic literature, for example Marcion's concept of the \"alien God\" or just the \"Alien,\" \"the Other,\" \"the Unknown,\" \"the Nameless,\" \"the Hidden,\"; or the \"unknown Father\" in many Christian-gnostic writings. Its philosophic counterpart is the \"absolute transcendence\" of Neoplatonic thought. ... The alien is that which stems from elsewhere and does not belong here. To those who do belong here it is thus the strange, the unfamiliar and incomprehensible; but their world on its part is just as incomprehensible to the alien that comes to dwell here, and like a foreign land where it is far from home. Then it suffers the lot of the stranger who is lonely, unprotected, uncomprehended, and uncomprehending in a situation full of danger. Anguish and homesickness are a part of the stranger's lot. The stranger who does not know the ways of the foreign land wanders about lost; if he learns its ways too well, he forgets that he is a stranger and gets lost in a different sense by succumbing to the lure of the alien world and becoming estranged from his own origin. ... In his alienation from himself the distress has gone, but this very fact is the culmination of the stranger's tragedy. The recollection of his own alienness, the recognition of his place of exile for what it is, is the first step back; the awakened homesickness is the beginning of the return. (Hans Jonas. The Gnostic Religion. Beacon Press: Boston, 2001, pp. 49-50) 'We appeal for \u00a31m as initial funding for a social science department in our unrecognised and unsupported independent university. This would enable it to publish analyses of the unexamined assumptions underlying current discussions in the philosophy of religion.' Charles McCreery, DPhil Baroness Delyth Morgan [a person called \"Children's Minister\"] commissioned a report [at great expense to taxpayers] on home education, which alleges that parents could be using home education to mask sexual abuse and\/or domestic servitude. (Daily Mail, 5 October 2009, Letters page, extract from letter written by Nikki Galbraith.) But 'teachers' and education 'authorities' certainly are using the concept of 'education' to destroy the lives of both children and their parents, and no-one commissions me to write a report on that, although I have offered to do so. No such thing as genius The commonsense view of invention ... overstates the importance of rare geniuses ... the question for our purposes is whether the broad pattern of world history would have been altered significantly if some genius inventor had not been born at a particular place and time. The answer is clear: there has never been any such person. (Jared Diamond, Guns, Germs and Steel, Jonathan Cape 1997, pp. 244-245.) I think that the wish to establish that there is no such thing as genius, in the sense of ability to do things in a way that is qualitatively different from other people, is very strong in the modern ideology, and this accounts for the constant opposition which I have encountered. When my mind gets enough to work on I don't think it does work like other people's. When I mentioned to a philosopher that Rosalind Heywood wanted to prevent my incipient research institute from building up to any size, he asked 'Why?' Various answers can be given but certainly one is that if I were allowed any freedom of action at all there would be a distinct risk of my noticing some relationship that other people had not noticed and would be unlikely to notice, and also starting to build a quite complex system of relationships on the first one. (As I did with the areas of potential research that I identified when I was at the Society for Psychical Research and have been prevented from proceeding with.) I suppose that is why there was so much aversion to my taking degrees in science when I was at school so that I would be able to have a suitable career in research. Consciously or unconsciously, people perceived that I did not have the inhibitions that would have made me safe. At that time I did not think about being able to do more than other people in the way of making progress in research; I thought only of having as intense and hardworking a life as possible, both in exam-taking in the present and in research in the future. Now, of course, I do think that I could make a lot of progress in any field that I was able to work in. Other people are inhibited by their social belief-system as well as by relative lack of IQ. I say I could make a lot of progress in any area in which I was permitted to work, but that depends on its being something to do with reality. I know that no real progress could be made if I were financed to run a large research department on topics such as Causes of Absenteeism in a Bootlace Factory or similar. However, provided it were large enough to have a hotel environment attached, my life would become liveable and I might get something out of any research or writing which I might do in my spare time, as well as its contributing to the progress of science. If I were provided with finance for a philosophy department, primarily devoted to criticising the pernicious rubbish that is being freely produced by other university philosophy departments, the same would be true. It would not exactly be making progress to criticise what has sprung up under the auspices of the modern ideology, but it should be done. When someone I know was studying philosophy of science at Cambridge, they showed me a paper which included dogmatic assertions that no advance in science depended on above-average individuals. There was nothing that could not be done by ordinary people, provided they worked together as a group. This paper also, if I remember correctly, referred to the concept of IQ as an example of a false hypothesis which (it was apparently considered self-evident) had failed. That was over twenty years ago; there must be a great many equally criticisable papers being produced all the time now. The right not to be killed Debbie Purdy is a woman suffering from multiple sclerosis who thinks she may, in the future, wish to commit suicide with the assistance of the Swiss euthanasia group Dignitas, and who says she would want her husband to accompany her on her trip. The Director of Public Prosecutions has been ordered to clarify the factors which would be taken into account when deciding whether to prosecute someone for the crime of 'assisting suicide'. The Daily Mail claims this has taken Debbie Purdy 'a step closer to dying on her own terms'. Critics of the latest development seem to fall into two camps. They may deplore suicide on moral grounds. For example, Ruth Dudley Edwards writes about a friend, a successful lawyer, who 'decided when he was diagnosed with terminal cancer that he would try to make his dying life-enhancing for others'. Her comments seem to imply that other should follow his example, whether they want to or not. Curiously, one does not hear the same people condemning the common practice by doctors of hastening the death of terminally ill persons by administering excessive doses of painkillers, or suggesting those people could have been induced to make their dying 'life-enhancing' for others. Perhaps it is presumed that a doctor's judgement on this issue can never be wrong. The other type of critic regards the latest development as a move down the slippery slope towards legalising murder. Part of the problem here lies in the definition of 'assistance'. Accompanying someone to the place where they plan to commit suicide seems innocuous. Giving an elderly person a lethal injection and claiming afterwards that they asked you to do it may seem less so. As is usual in such discussions, however, the context \u2013 that medical goods and services are immorally controlled by a monopolised profession which transfers the right of decision from the patient to the doctor \u2013 is ignored. If the law on medicine reflected the basic moral principle (respect for individual volition, unless others are harmed) a number of consequences would follow. First, medicine delivered by doctors would become more accessible to many people who currently find it obnoxious to submit to arrogant authority figures who can choose to refuse them what they urgently need. Second, the goods and services necessary for treatment would also become available without the involvement of doctors. For both these reasons there are likely to be people currently contemplating suicide who would be able to recover their health sufficiently to want to go on living. Third, the issue of 'assistance' would become far less relevant. In a free market for all medicines, including those which can be used to produce a painless death, ways would be found for individuals to administer the means of suicide themselves, even if they were incapacitated, without an active role being played by outsiders. Family members could be present at the suicide without having to become involved. People would not have to travel to far-off locations to achieve their objective. Fourth, and most importantly, the issue of assistance by medical professionals would also cease to have the same level of relevance. This \u2013 not assistance by laymen, and certainly not 'assistance' in the sense of accompanying on a journey \u2013 is the most worrying possibility among those being contemplated. In the institutional setting of a hospital, where respect for autonomy is absent, and where 'best interests' arguments have been used to perform euthanasia without consent*, legalising suicide-with-assistance in general seems certain to lead to even more surreptitious medical-killing-with-presumed-consent than is already going on. * as for example in the case of Hillsborough victim Tony Bland Capital, freedom and the King's head Copy of a reply to an email from a person living overseas, who appears to have been a fan of my books for some years. What I have written is of general relevance to people who might consider coming. I gather you are thinking of coming to this country. There are problems associated with someone coming from outside the EU, and I am afraid we could not give you any help with them. Things are very difficult these days with all the restrictions on personal liberty that have arisen. We are extremely overworked as it is. You would have to solve these problems for yourself, if at all. The idea has been widely encouraged, in this country and elsewhere, that the difficulties of becoming sufficiently independent to do what you want to do by building up capital (if you have not inherited enough without building it up for yourself) can be avoided by accepting an impoverished life and finding something 'creative' or 'interesting' to do within it. I do not myself subscribe to this idea, although unfortunately I think that some people have taken my books as providing support for it. If anyone wants to come and form an association with us, it is very desirable that they first build up enough capital, by saving out of income if necessary, to get themselves to Oxford in a trouble-free way and pay for rented accommodation for themselves near to us. It is only by building up money for oneself that one increases one's freedom of action, which includes freedom from social interference. In the pre-1945 world, saving money had a numinous respectability. Children had money-boxes, provided by the Post Office, with the King's head on the front. When the boxes were opened, the coins could be used to buy savings stamps or savings certificates, which were stuck into books with the child's name on the front, encouraging him to think of his capital \u2013 built up by saving \u2013 as his territory and as an extension of himself. Now capital is seen as faintly immoral, and idealistic young people are encouraged to believe it would be better if it was not in the hands of private individuals at all. Watching, as usual, the least offensive thing I could find on the TV while I used my exercise machine, I found myself seeing The Killing Fields, about the Khmer Rouge in Cambodia. Everyone in this film was risking, and trying to avoid, torture and death at short notice, as murderously inclined collections of people washed around the country, and other people tried to guess where they would go next and what would be the best direction in which to run. Now the effects of the Khmer Rouge were obviously terrible in one sense, and (like other instances of communist revolution) destructive towards the more middle and upper-class elements of society. However, such a condition of society would seem to select against some relatively dysfunctional genes. And it seems very reminiscent of the gang warfare now prevalent in many inner cities, as one hears. So perhaps it is the case that, whenever relieved of immediate pressures of any other kind, such as the need to work in some way to keep alive, human beings are programmed to form up in groups to start fighting one another. Like mating rituals, this clearly serves a function in selecting against unfavourable genes, and selecting in favour of intelligence sufficient to guess accurately who is likely to want to kill one, provided it is combined with an ability to run fast. Both very low intelligence and weak legs are being selected against. However unpleasant, this may be an inevitable feature of human society. Perhaps civilisation is intrinsically unstable, because it tends to produce forces that promote certain changes in the gene pool, these changes being of a kind perceived as dangerous because they are potentially maladaptive for survival, and this produces a hardwired backlash in favour of more primitive conditions. 1850: the watershed The rise of individualism prior to 1945 was not a simple matter. Probably the factors that would lead to its downfall were present from an early stage, and certainly so by the time the Society for Psychical Research was founded in 1882. Herbert Spencer identified a watershed at about 1850. Society, as he saw it, was always in a state of conflict between collectivism and individualism. Up to 1850, individualism was gaining ground; after it, the balance turned the other way and individual freedom declined in favour of collectivism. Prior to the 19th century, there had been many monopolies. For example, Queen Elizabeth I had granted an exclusive right to print music to Tallis and Byrd (1575). No one could have their music printed by anyone else if they happened to have fallen out with Tallis and Byrd. And the guilds were as monopolistic as the modern medical profession. No one could make and sell candles, for example, unless they had been apprenticed and become a member of the candlemakers' guild. As the monopolies were abolished, commercial freedom gave rise to intellectual freedom. After 1850, we may suppose, the consequences of the earlier legislation in favour of free trade and against monopolies continued to bear fruit in the expanding activities of the intellectual upper class, but also in the psychological reactions of some of them against the enjoyment of this freedom by others, even if they had benefitted from it themselves. In 1794 Prussia was the first European country to bring in state education, wishing to have an educated and indoctrinated population which would provide competent and compliant soldiers for its armies. It also brought in universal conscription in 1862. Prussia won the Franco-Prussian war; other countries thought that the universal education had provided Prussia with an advantage, and followed suit. My suppressed independent university has a suppressed History Department as well as one in Philosophy, which needs only funding and status to be contributing significantly to the intellectual life of its time. Picking one's way through the debris copy of a letter to a person who came to one of my seminars You seemed to understand why what I say in my books, and my outlook in general, arouses such hostility and makes me an Outsider. If I meet you again I hope you might explain it to me because, however odd it seems to you, I do not actually see anything outrageous in it. I am just, as I always was, a perfectly respectable bourgeois capitalist, and since my official 'education' left me excluded from an academic career, it seemed to me obvious and inevitable that I would proceed to try to build up an academic institution (an independent university) around myself. But, of course, by now I am familiar with the fact that this arouses extreme hostility. Nowadays, practically everyone takes socialism for granted and discussions proceed within that context, so my views are regarded as 'extreme' although they are more or less what everybody else took for granted before the socialist ideology became dominant. A crucial date was 1945, when the 'Welfare State' (the Oppressive State) was initiated, which was also when I started attending the Ursuline High School, aged 10. You say that I said in some book that existential psychology is optimistic. That is a very vague statement, especially as there is so little existential psychology around, and it is probably only true at all of a fairly advanced sort of psychology with considerable awareness of the existential situation. So it is more meaningful to say what is the case so far as I personally am concerned. I certainly have no optimism at all about developments in the society around me, or about my chances of making any progress that depends on any response or feedback from the social environment, which becomes ever more hostile and unfavourable to my efforts to improve my position and become intellectually productive. And leaving myself out of it, the global future appears unsavoury and uninteresting, wiping out the advantages of the recent brief period of Western civilisation. The world appears to be 'progressing' towards a type of global communism, via terrorism and street riots, so far as I can tell from the French television news. Nevertheless, it is true that I have an underlying optimism which enables me to keep going, and to keep hoping that I can pick my way through the falling debris of society, and even hope to find ways of improving my position by trying (among other things) to appeal to outsiders for financial support. The deterioration of society around us makes it even more difficult for us to progress, and thus even more urgent for us to appeal as widely as possible for the financial support we need, as well as for people to come and work here, and for moral support of all kinds. Adler and modern society If there were any principle of permitting expression of all valid points of view, then we would have a claim on financial support and social recognition for our squashed and suppressed philosophy department. But why should one expect that to be the case? Neither Nazi Germany nor Marxist Russia permitted the expression of views critical of their ideology, so why should socialist Britain? In fact socialist America and Europe as well. We have never had any interest taken by any overseas university in the possibility of setting us up properly with funding and status. Why should a state-financed system have any interest at all in providing opportunity for intellectual activity of any kind? Both Nazi Germany and communist Russia successfully eliminated contributions to culture from relatively high-IQ sections of the population and reduced them in numbers. This was not explicitly stated as the real object of the exercise, but should one expect any ideological movement openly to state its real aims and objects? As Adler said (but it applies more precisely to the users of public money \u2013 freedom confiscated from individuals \u2013 than to the individuals who may be left with very limited resources) what someone is aiming at in life may be more realistically inferred from the situations he consistently brings about than from his verbal protestations. Accepting that the society in which I live is aiming to destroy people like me, which seems the only realistic conclusion, it is no surprise that my life is still so bad. Vulnerable to doctors Another terrible development which has not yet come about, but soon will, and which as usual we are prevented from speaking out against by lack of social status and financial support. Discussing different plans to computerise medical records in a recent Daily Mail: Patients' medical records could be transferred to Google under plans being considered by the Tories ... But campaigners and doctors claim patient information could be vulnerable to hackers. And there are also concerns it could put lives in danger because it would be harder for doctors to access vital medical information in an emergency than under Labour's rival NHS computer scheme. * Campaigners claim that the medical records of victims might be 'vulnerable to hackers'. But it seems no one is complaining that they would be vulnerable to doctors which is \u2013 or ought to be \u2013 the most serious concern. 'Patient confidentiality' now means that not only the socially authorised sadist you have consulted will be free to record his opinions about your problems, but that these opinions are accessible to all members of the medical Mafia. Which makes a mockery of the idea of seeking a second (or third) opinion and starting from scratch with another doctor, difficult though that is anyway already, and almost impossible without the 'permission' of the doctor first consulted, and without the second doctor knowing that he had a predecessor. * 7 July 2009 The genius of the proletariat I think that statusful agents of the collective should want to visit the least fortunate members of society to hear how they experience the difficulties of their position. But I know that this is an old-fashioned idea which seems natural to me because I remember pre-Marxist society, and it has no applicability within the current quasi-Marxist society in which everyone, even those old enough and middle-class enough to remember society before the revolution, has converted to the new religion and regards themselves as agents of it. The idea that innate ability is to be done down and suppressed has always been intrinsic to communist ideology. This is a quotation from a book about Marxism which shows that Trotsky had this idea. The proletariat, [Trotsky] argued, could not produce any culture at the present time because it was not educated, and, as for the future, socialist society would not create a class culture of any sort but would raise the whole of human culture to new levels. The dictatorship of the proletariat was only a short, transient phase after which the glorious classless society would set in \u2013 a society of supermen, any one of whom could become the intellectual equal of Aristotle, Goethe, or Marx. * What such ideas mean in practice, in Britain today and for at least the last 60 years, is that those who have shown any signs of the sort of ability that makes them potential geniuses (i.e. who might do something noticeable if not prevented from doing so) are thrown down and out, and kept down and out. * L. Kolakowski, Main Currents of Marxism, Vol. 3, Oxford University Press, 1978, p 52. The outsider-hero in children's fiction, then and now The look in her eyes was exactly the look which Miss Minchin most disliked. She would not have it; she was quite near her, and was so enraged that she actually flew at her and boxed her ears \u2026 It made Sara start. She wakened from her dream at the shock, and, catching her breath, stood still a second. Then, not knowing she was going to do it, she broke into a little laugh. 'What are you laughing at, you bold, impudent child?' Miss Minchin exclaimed. It took Sara a few seconds to control herself sufficiently to remember that she was a princess. Her cheeks were red and smarting from the blows she had received. 'I was thinking,' she answered. 'Beg my pardon immediately,' said Miss Minchin. Sara hesitated a second before she replied. 'I will beg your pardon for laughing, if it was rude,' she said then, 'but I won't beg your pardon for thinking.' 'What were you thinking?' demanded Miss Minchin. 'How dare you think?' '\u2026 I was thinking what would happen if I were a princess and you boxed my ears \u2013 what I should do to you. And I was thinking that if I were one, you would never dare to do it, whatever I said or did \u2026' 'Go to your room,' cried Miss Minchin breathlessly, 'this instant! Leave the schoolroom! Attend to your lessons, young ladies!' Sara made a little bow. 'Excuse me for laughing if it was impolite' \u2026 (Frances Hodgson Burnett, The Little Princess) Narcissa Malfoy strolled out from behind the clothes rack. 'Put those away,' she said coldly to Harry and Ron. 'If you attack my son again, I shall ensure that it is the last thing you ever do.' 'Really?' said Harry, taking a step forwards and gazing into the smoothly arrogant face that, for all its pallor, still resembled her sister's. He was as tall as she was now. 'Going to get a few Death Eater pals to do us in, are you?' Madam Malkin squealed and clutched at her heart. 'Really, you shouldn't accuse \u2013 dangerous thing to say \u2013 wands away, please!' But Harry did not lower his wand. Narcissa Malfoy smiled unpleasantly. 'I see that being Dumbledore's favourite has given you a false sense of security, Harry Potter. But Dumbledore won't always be there to protect you.' Harry looked mockingly all around the shop. 'Wow ... look at that ... he's not here now! So why not have a go? They might be able to find you a double cell in Azkaban with your loser of a husband!' (J.K. Rowling, Harry Potter and the Half-Blood Prince) Tories: honouring a commitment is 'far too expensive' I have commented previously on the victimisation of pensioners. They are suitable objects for victimisation because they tend to be relatively middle class. The fact that middle class people are able to live longer, through a combination of forethought, intelligence and prior capital accumulation, is taken as a reason for penalising them. According to the prevailing ideology, it ought not to be possible for them to benefit from these factors compared to other people, because it is unfair. One of the most appalling features of the anti-pensioner policy programme is means-testing, which I have discussed before. A prior contract between individuals and the state \u2013 that they were guaranteed to benefit from contributions they made towards the state retirement fund \u2013 has been cavalierly rescinded. Some people, like myself, even made voluntary contributions on this understanding, which is now revealed to have been entirely conditional. More and more of the state pension will be contingent on people having no savings, once again penalising those with forethought, intelligence, etc. The excuse for this is to target increasingly scarce resources at those 'with the greatest need'. This 'need' argument seems to be becoming the excuse for penalising the majority of potential recipients of state benefits and handouts, with only the alleged 'underclass' or 'underprivileged' being the approved targets for state spending \u2013 though whether even these people truly benefit from any of the 'services' designed with them in mind may be doubted. The Conservative Party, which might have been expected to take a different line on all this, shows little sign of recognising the principle involved. Once upon a time the principle of not reneging on contracts would have formed a natural part of the ethos in this country, and various politicians and spokespersons, particularly from the conservative end of the political spectrum, could have been expected to make reference to it in defence of maintaining (e.g.) the originally planned system of state pensions. No longer, it seems. David Cameron, the current Conservative Party leader, has some strange priorities. He has said that: One of the greatest unfairnesses for the elderly [is] that those who [have] worked hard, saved up and"} +{"id":"RedPajamaCommonCrawl.0040","text":"Post-Election Notes, 2014 Posted on November 5, 2014 Posted by John Scalzi 245 Comments Election results for the Ohio Governor's race. The Democratic candidate got his ass handed to him. And they are: 1. Well, that was disappointing, if not entirely unexpected. The smart money was for the Republicans taking the Senate, which is what they did; in 2015 they will have 54 seats, which is a comfortable majority, but not anywhere close to a veto-proof majority. So: Welcome the the Obama Veto Era, in which the president shoots down anything he doesn't like, and that's essentially the end of it. This means that gridlock will happen somewhere else than in the Senate, which is where it's been for the last four years. No doubt this means we will hear Mitch McConnell and other Senate Republicans intoning about how this means the president is obstructionist, etc., which will be ironic, at least. 2. I'm not the sort of person dense enough to say \"The GOP controls the Congress! This is great news for Obama!\" but I'm not going to lie, either: I'm very curious to see how Obama handles this upcoming congress. The man has no more elections in front of him and no reason to do any damn thing the Congress will want him to do if doesn't want to. And as noted above, he wields the power of the veto, which the GOP is very unlikely to be able to overcome. This has the potential to very interesting, indeed. (P.S., GOP: You still really really really shouldn't try to impeach Obama. It's not gonna work. But don't listen to me, if you don't wanna. In fact, I don't imagine you will. Which dovetails nicely into the next point:) 3. The main thing I think we'll see is the federal government once again getting incrementally stupider and\/or mendacious, because at this point the GOP does not put a premium on intelligence, when it comes to its elected officials. And why should it? Fielding nincompoops seems to be working for them, and has for the last several election cycles at least. I find this exasperating but I don't think there's any short-term cure for it. Until and unless the GOP gets hit with massive election losses, over several cycles, there's no percentage in them changing a damn thing. 4. A good number of my Democratic\/liberal friends wonder what the hell just happened. The answer: Look, there are a lot of Republican and conservative leaning folks in the US, and they're not going to just wander in front of a bus and disappear. Indeed, most of the Senate races last night were in conservative-leaning states and the 2014 election was GOPers\/conservatives last chance to register their displeasure at Obama, who they hate with a foamy passion. Did you think they were going to miss out on that chance? As noted above, from a practical point of view, as regards the federal government it's going to be for naught, but that's not the point. Now, as a side effect, the GOP also survived in state-level races where it absolutely should not have. The fact that Sam Brownback and Rick Scott in particular managed to get re-elected as governors in Kansas and Florida despite their abject incompetence is bad news for both of those states, I think Kansas in particular (Florida, it seems, has a larger buffer for stupidity in its state house). Once again, this says to the GOP that it doesn't have to change anything it's doing, because again, why should it? It can win elections with politicians just this dumb. 5. But let's not let the Democrats off the hook, either, shall we. In my particular state, Ohio, the party absolutely humped the bunk, with a disastrous candidate for governor (he won only two of 88 counties, and just 33% of the vote \u2014 Jesus, he even lost Cleveland), a poor showing in statewide races (i.e., a big fat goose egg with only one Democrat in a statewide race getting more than 40% of the vote) and loss of seats in the legislature. The Ohio Democratic Chairman has resigned, as well he should have (he also lost his state House seat, which is injury to insult). Ohio is not a red state; it's as purple as they get. The margins of victory here should not have been nearly as lopsided as they were. You can't just blame voting laws, the Koch brothers and luck of the electoral draw for these losses, either here in Ohio or elsewhere. The Democrats should also look to their candidates and their organizations. You have to give people a reason to vote for you beyond voting against the other team. 6. This election is a cogent reminder to Democrats and other folks of a liberal\/progressive bent that they can't just wait about smugly expecting the Great Blue Demographic Wave to swamp the GOP, bringing about a new shiny utopia of health care and solar power. I'll note that I warned folks two years ago not to get cocky and that the mid-terms were out there, and that the GOP (despite the general low quality of its recent candidates) is not stupid. Surprise! Now, maybe the GOP is eventually demographically doomed and maybe it isn't, but even if it is, you can't just expect it to go down without a fight. This is what that fight looks like. If you didn't see it coming, you can't blame the GOP for that. It fights dirty (which is different than fighting illegally) and it's got lots of money. Expect more of the same. The question for Democrats\/progressives is what they are going to do about it. (GOP\/conservative folks: Don't get smug either. You have problems of your own, and Hillary's out there, lurking about.) 7. Finally, if you're a Democrat\/progressive freaking out now, remember what the GOP were doing two years ago, and what you were doing four years ago, and what the GOP was doing six years ago. US politics is in an especially messy phase in recent years, and I don't see it getting much better anytime soon. What I do know is \u2014 yet again \u2014 a lot can change in a couple of years. A lot is almost certain to change in a couple of years. If anyone thinks this election was indicative of anything but of this particular election cycle, well. History would seem to be giggling at you for that impression. In any event: Election's done, the results are in, and these are the cards we play for the next two years. Let's see what happens next. \u2190 US Folks: Remember to Vote More Leaves \u2192 245 Comments on \"Post-Election Notes, 2014\" John Scalzi November 5, 2014, 9:33 am Play nice with each other, please. Also, if at all possible (and it is possible) avoid either gloats of exultation or portentous posts of utter doom and ruin. It ain't football. Thanks. MaximumBob I find it interesting that voters seem to want higher minimum wage (AR, AK, NE, SD), legal pot (OR, DC and got 55% in FL but didn't \"pass\"), tighter gun control (WA) and less restrictions on abortion and birth control (CO)\u2026\u2026and Republican representation. Seems legit. Hillary Rettig \"This election is a cogent reminder to Democrats and other folks of a liberal\/progressive bent that they can't just wait about smugly expecting the Great Blue Demographic Wave to swamp the GOP, bringing about a new shiny utopia of health care and solar power.\" This. There are surely lots of narrow, bigoted, ignorant people up there, but if the Dems can't run good campaigns (and from what I saw, a lot of them can't) it's not the voters' fault. In many areas liberal initiatives, like raising the minimum wage and legalizing marijuana, were voted in while liberalish (emphasis on \"ish\") politicians weren't. A sure sign that the politicians failed to make their case. I think that people have given up on government. I have to wonder if things won't turn violent if the govt continues to be ineffective. I'm not some revolutionary i'm pretty left leaning these days, but I just see a lot of people frustrated and eventually that leads to someone losing patience and doing something extreme. One thing about the GOP owning both houses, they will have a hard time blaming anyone else for the failure of government to pass legislation. Aside from vetos, but I don't suspect there will be a lot of those. Unless you have some extreme positions coming through. YuriPup It's days like today that I could weep for the world we are leaving for my son and Athena and their children. And the ****ers will be long dead before the chickens come home to roost. The Gneech I don't see Hillary being a problem for the GOP. I don't think she's electable, and I can't figure out why so many people seem to think she is. One thing the Republicans do waaaay better than the Democrats is to get people to vote in mid-term elections, which is why it always goes this way. If you really want people to feel enfranchised, get them to vote when turnout numbers are down! That's when a single vote really does make a difference. G. Deckrow Check your date in the first point. It should be 2015. sraymonds I didn't jump into politics until the election of 2012, at the ripe age of 32, so I really don't know what was going on before then. Is there anything I should be reading to know what happened 4 years ago? Right now I'm doom and gloom but we'll get through it. Jim Saul (@jjsaul) \"Democracy is the theory that the common people know what they want, and deserve to get it good and hard.\" \u2013 H. L. Mencken Republicans did a great job of inspiring fear and hatred\u2026Democrats did\u2026? Hopefully they'll figure out something by 2016. I'm just hoping Obama woke up this morning and thought \"Fuck it\u2026I've got nothing to lose.\" And I'm clinging to those small silver linings in different places like Prop 47 in CA and sick leave in MA both passing and the personhood bunk in CO getting defeated. G. Deckrow: Jason Peters (@bledderag) Also keep in mind that several longtime Democratic senators retired in predominately red states, the seat pickup for the GOP was not a surprise there. The silver lining is that 23 of the 33 seats up for grabs in 2014 are currently held by Republicans, which means the Dems have a decent chance of gaining the ground back in the next election. As you noted, it was a bad playing field in the Senate (Democratic wave election in 2008 meant that the Dems were defending largely red state pickups from that year; sixth year of the Obama administration), and I think the Democrats played it pretty badly. Some of the Democrats who won in 2008 were stiffs (Udall in Colorado, Hagen in NC, Warner in VA) and they didn't do well in a horribly competitive year. You know it's a bad year for Democrats when Maryland elects a Republican governor (only one in the last 40+ years). strugglingwriter As a liberal I can't get that down that the Democrats lost. They are only slightly better than the Republicans and don't do much when they have the majority anyhow. The one thing I wanted to go right last night did, we got rid of our terrible Republican governor in Pennsylvania. I've been waiting 4 years for that. @The Gneech I agree completely on Hillary's chances of being elected, which are very small. If this is the Dem strategy for 2016, they're not paying attention to the noise on the ground. The Democrats need to find better candidates for the next mid-term elections and for 2016. This was a DNC debacle. Joe H. My suggestion: Before the end of the year, ram through every judicial and executive nomination still awaiting confirmation. Stephen Michael Kellat It is unfortunate that the Democratic line-up for the state-wide offices wasn't better than it turned out to be. Mr. FitzGerald set too much of the tone in the top-line race with issue after issue erupting starting with him abandoning his first running mate pick. Others down the state-wide races ticket stayed too quiet until it was too late, it seemed. Seeing normally hard-blue Ashtabula County vote for Governor Kasich was certainly a shock when the unofficial numbers were posted at night's end last night. howardbrazee The ads weren't against policies of the Democrats (which are mostly significantly to the right of Nixon's) \u2013 they were against the president \u2013 who wasn't running. All of the policies that the left hates about Obama are policies that the right doesn't wish to mention \u2013 as the right likes them. We will see what happens. The election that I found to be most telling is Scott Walker's reelection. Apparently economic failure of his policies aren't nearly as important as other issues. DigitalAtheist Meh. I've been of the opinion that once the Republicans got control of both houses, the Democrats should just sit back and let them pass everything they want to. Figure after a while enough people will be burned and send the whole party packing \/fantasy> On the more serious side, I hope President Obama has a good supply of \"Veto\" stamps. What republican is going to be able to beat Hillary? I am not excited by her, but she's got way more approval, excitement and electability than anyone else you can mention. I can't imagine that some unknown will emerge as a strong contender in the two years. I think this is a double edged sword for the GOP. They have just enough rope to hang themselves. They have control of the senate. But if they can't do anything productive with it in the next two years the presidential election is going to suffer. And productive hadn't seemed to be a priority lately. fuzznose McConnell is by no means guaranteed the post of Senate Majority Leader. That position is chosen by the Republican senators, and doesn't mean that the \"senior\" senator gets it\u2026.although it might seem that way. On the other hand, the President Pro Tem is a more prestigious, if largely less powerful than the SML. I'm not enthused about having McConnell as the SML, any more than I am about having Boehner as the Speaker of the House. As for impeaching Obama, I think that would be a big mistake, since it would bring the Vice-idiot, er, Vice-President into the office, something that would be an even bigger disaster. With regard to Hillary Clinton, let's note that her (still potential) involvement is two years away and that, despite my aside, this comment thread should probably focus on the election that just took place. In other words, let's not make this an \"all Hillary Clinton\" thread, please. jeanfiend Personally, I live in Cleveland \u2013 I voted Green this election because here we remember Mr. FItzgerald for his fifteen minutes of infamy. It seems indicative of what happens when the Dems don't put sufficient emphasis on running a smart candidate. (Or checking history.) Shrike58 A big problem for Dems is that with the passing of a form of national healthcare they really have no salient issues that fire their imagination. If you want to be blunt, both parties have shot their wad and we could use a new party system. The problem with the politics of populism for the Democrats is that this normally means embracing racism. The problem for the GOP playing footsie with the politics of populism is that, eventually, they're going to have to cross the folks who write the checks, and that's not going to happen. If there was a lost opportunity for the Dems it was not to look at the the debacle of 2008 as partly caused by criminality, and seriously try bringing those people to justice. Barring that fighting for mortgage relief might have been the next best thing. I wasn't a big fan of the concept, in as much as if you were stupid enough to sign a bad mortgage I'm not sure I have a lot of sympathy for you, but it would be a serious symbol that the Dems took the middle class seriously. Alex Hazlett I voted against incumbents and anybody who spammed the airwaves or my mailbox, without regard to their party of record. I have given up on the whole lot of them. Maryland last had a Republican governor (Bob Ehrlich) from 2003-07. It's not impossible here, for a moderate Republican. David @ 9:53, Maryland's governor from 2003 to 2007 was Bob Ehrlich, also a Republican. Ghoulie McGreusome (@mcjulie) On the progressive policies\/Republican policy makers thing: in 2004 Pew Research (I think) released the results of a poll that showed a majority preferred John Kerry's platform, but attributed it to George W. Bush. After that I really started to notice that was a consistent pattern in mainstream \"neutral\" media \u2014 sympathy for Democratic and liberal policy preferences, but a strong partisanship toward Republican candidates. Even in very liberal Seattle, our only daily physical paper, The Seattle Times, pulls this routinely \u2014 supporting, say, pro-environmental policies, at the same time they endorse anti-environmental Republicans. Why? And what's to be done about it? I don't know. But I get really sick of media outlets portraying a \"wave\" election like this as if the sentiment of the voters as a whole has changed. I guess they like that narrative because it makes it seem like American voters shift their political opinions really dramatically every couple of years. But, you know, I didn't change *my* mind. And I'll bet none of you did, either. The other problem is obvious: liberal-leaning voters tend to sit out mid-term elections. Why? And what's to be done about that? Theophylact And the one before him was Spiro Agnew. Theo, see my comment @ 10:24. AndrewD Well John, I am British and have no standing in this matter, but I will say to anyone who complains about the result-did you vote, are you politically active. Are you an active Democrat or something else? If you do not like the result organise and work for 2016 and the result you want. I am active in UK politics so I can say this. P.S. Earth to the US its been nice to know you but goodbye, have fun as you disintegrate. The question as to what GOP candidate could beat Hillary leaves unspoken the woman's ability to beat herself; this is always an option. She kind of did it the first time around by being surrounded by too many people who told her what she wanted to hear and being out-maneuvered by Obama's ability to run a campaign. It is also not to be assumed that the issues (mostly superficial) of 2014 will be those of 2016; if the dynamite does go boom on the foreign policy front that can only have a major impact. I can't see things going well for the GOP if they run another candidate selling \"National Greatness.\" Neo-isolationism from the likes of Rand Paul might sell though. Particularly if Hillary gets tarred-and-feathered as the person who lost the Middle East. The GOP candidates lack, well, knowledge of the world around them. I am a conservative, and have always leaned toward voting for Republicans (although I am not, generally, a straight GOP ticket voter, I tend to, you know, vote for people who can do the job), and I have been disappointed in who the GOP puts forth as candidates. This year, I should not complain, since I did not vote, but I am going to anyway- (Having recently moved, and not being registered in the state and county in which I now reside, I felt that it would be silly for me to cast an uniformed vote) I am tired of trying to choose a candidate based on one or two issues, and I am tired of both sides (but mostly my own party) making it that way. The Republican candidates who won did so based on one or two key issues on which they pontificated during most of their campaigns. The ones who lost, well, made all Conservatives look bad with their avoidance of concession speeches and their comments of \"well, let's wait until all the votes are cast,\" making us all look like childish sore losers. Ugh. That is all. Shawna (A Mediated Life) Once again, I'm delighted to live in the progressive utopia of the PNW. We've been consistently left-leaning for decades, and are thriving here, including economically. Of course, I do worry about what nonsense will be visited upon us at the Federal level now, to say nothing of worrying about the rest of the country save New England. This election cycle sucked. Obama sucks and I voted for him twice. And add me to the list of Democrats who loathes the idea of Hillary for President in 2016. Mark Terry A friend of mine who follows politics more closely than I do (and I see it was mentioned up above as well) noted that voters seemed to vote for a lot of liberal issues\u2014tighter gun control, higher minimum wage, looser controls of abortion\u2014while voting in conservatives. Which makes me wonder\u2014and I probably don't have the energy to research this\u2014if some of these conservatives were actually far more liberal than their Tea Party predecessors. Time will tell. And for whatever reason, it seems like people really, really have short-term memory issues. Maybe it's something in the water, but 2008 wasn't that long ago. The GOP almost collapsed the economy, companies were laying people off left and right, housing prices dropped through the floor, unemployment was high, etc. Yet people claimed yesterday that we were on the wrong track. I don't get it, but I have a long track record of not really understanding how people respond politically to things going on around them. coo1b1ue Well when the new majority leader takes over, he'll open a drawer somewhere and find all the legislation from the House that did not get acted upon by the Senate because Senator Reid was trying to protect his caucus from going on record with some tough votes. How'd that work out for ya? Also Mr Reid was attempting to protect the President and his Party from getting the \"obstructionist\" label they were trying so desperately to pin on their political opponents. But now thise chickens will be coming home to roost as the President will either have to veto everything or make a deal. As for the Republicans, it's not enough to win. They have to do come up with a legiislative agenda and get bi-partisan approval for the bills they enact. They have to not run Congress like the Democrats have. They can get bipartisan bills on tax reform, immigration, and fixing the aweful legislation that is Obamacare. And they need to pass pro-growth economic measures. They can do all that. And they should. Andrew Lloyd The thing of the Veto power is that it can be used quite effectively by the GOP. Sure, there will be a straight repeal of the ACA which Obama will veto. But they can also send stuff up to the President that are antithetical to Obama (e.g., a guarantee that plans that existed pre-ACA are still allowable under the ACA, that sort of thing). The GOP was far more disciplined as a party this cycle than most before it, and I think Boehner and McConnell are smart enough to allow the right about of Kabuki theater from their caucuses without doing anything particularly self-destructive. David @ 9:53, Maryland's governor from 2003 to 2007 was Bob Ehrlich, also a Republican @MaximumBob @Joy Yes, that's why I said \"only one in the past 40 years.\" That one would be\u2026Bob Ehrlich. McConnell is by no means guaranteed the post of Senate Majority Leader. That position is chosen by the Republican senators, and doesn't mean that the \"senior\" senator gets it\u2026.although it might seem that way. Oh, he's pretty much guaranteed Senate Majority Leader. He helped take the Senate back and his only credible rival (Rand Paul) wants to run for President in 2016. Hard to do that and be SML. Dave Hogg It was a midterm election. The president's party gets whacked in midterms, and that was especially true this time, because this class of Senators rode in on Obama's coat-tails in 2008. Congress is still going to be useless, because now the Dems will wave around the filibuster threat, and Obama will veto anything that gets through. Was it a fun night? No. But it wasn't unexpected, and it isn't going to ruin the world. At least not to any new extent. Ugh. Lost a sentence in there\u2026 \"But they can also send stuff up to the President that are antithetical to Obama (e.g., a guarantee that plans that existed pre-ACA are still allowable under the ACA, that sort of thing). By finding stuff that's popular, but which Obama cannot sign without causing a great deal of tsuris for the Democratic base, they can cause quite a bit of trouble simply by the fact of forcing the President to take broadly unpopular positions. David, thought you were referring to the incoming elected last night. My bad. Not the Reddit Chris S. Congress will achieve a lot in the next two years: 1) 397 veto'd attempts to repeal Obamacare 2) Another 2,000 hours of Ben Ghazi !!111!!!! hearings 3) Abortion restrictions at Federal level, probably some sort of personhood bill 4) Tax cuts for the mega-wealthy, social security \"reforms\" for the rest of us 5) Impeachment hearings of Obama for being President while black. Hopefully Obama will start being angry and call the Reps on their utter bullshit, but I doubt it \u2013 it's the Democratic way of rolling over rather than sticking the boot in (no hearings about the disastrous Iraq war, compare that 4,000 US dead, 500,000 Iraqi dead, $1 trillion in debt) to the Benghazi sideshow (4 dead \u2013 tragic, but in a different scale, and the ambassador was off being a spook on a State Department issue, while the CIA were doing their own thing). Small note of good news, in New York, the Working Families Party (progressive) got enough votes to stay on the ballot (50,000 votes). No worries. I can see the confusion. In other news, the new House of Representatives got a head start on its work today by, even before they were inaugurated, impeaching President Obama and, just for good measure, reimpeaching President Clinton. Growing up in NE Ohio, I can't ever remember both Lorain and Cuyahoga counties going Republican \u2014 second Rhodes administration, maybe? The best way of understanding American Politics is to assume that the Republican party is a Chinese Communist front organisation dedicated to destroying the US. May I be the first here to congratulate The PRC on it's latest success. Really David, where's your imagination? You don't think that they would pre-impeach Hillary Clinton second, rather than re-impeaching Bill? Best way to keep her off the ballot! Walt G And the torch of obstruction passes to Obama. I see that Scalzi voted for the Green candidate for governor in his state. Would that there had been a Green candidate in my state. I had the choice of a Democrat I didn't want, a Republican I didn't want, and a Libertarian I really didn't want. Laura (@Bookworm) While I'm primarily distressed about the Senate changing hands, and all the governorships remaining\/becoming Republican, I was also distressed that the district I vote in, in upstate NY, didn't even have a challenger for the incumbent Republican Representative to the House. Come on, I watched West Wing, isn't this the kind of thing (fictional) Josh Lyman should've been all over? [And unless someone has some fantastic alternative candidate to recommend for 2016 (someone less hawkish & again fracking, please), I'll be rooting & voting for Hillary.] John Blake Arnold While people hate LBJ for Vietnam, others remember him for the Civil Rights Act. Often, it is our most disparaged Presidents during their tenure in office who seemingly achieve the most, despite being reviled. Please count me with those other folks on SNL's \"How's He Doing\" as a person who is still a supporter of Obama. I find this hilarious: http:\/\/www.nbc.com\/saturday-night-live\/video\/hows-he-doing-with-chris-rock\/2823749?onid=148621#vc148621=1 You left out the likely 'obama executive action without congress' part of his presidency. Word is he is going to legalize illegal immigrants on his own. I am not sure this will stand in court. Before liberals get all excited and support this, this moves power to the executive branch\u2026 you won't be so excited when the next republican president (and there will be a next one) uses the same authority to do stuff you don't like. My self interest big concern is Obama decides to unilaterally increase H1B visas. I know lefties cry racism any time anyone has issues with immigration. You don't even look at the issues. These are indentured servants. My employer has cut wages of new hires by 40%. They are able to do this because they can get h1b transfers. Like most h1b employers they don't sponsor for greencards (costs money and employee will quit to get paid when they get a greencard) so they own them. The only reason employers won't this is low wages and 'you can't quit so you have to put up with whatever we want'. This often includes repeated move at your own expense, sign contracts in india that would not be legal here, seizing tax returns (google this its called 'forfeiture'), not paying out 401k when they quit, sueing them for quitting, working 80-100 work weeks. These are all things they can't do to me because I can quit and I don't have to worry about being deported. I don't know if he will unilaterally act on this. If he does, the result will be alot of american citizens lose their jobs to lower wage indentured servants. If you actually know people on h1bs ask them. They will confirm this treatment. Peter Cashwell I wonder whether McConnell and Boehner will be able to hold back the flood of IMPEACH BENGHAZI EBOLA IMPEACH KENYAN IMPEACH BENGHAZI BENGHAZI IMPEACH! that has built up behind their dam. Ted Cruz, at least, is going to go after Obama (and almost certainly after McConnell as well), and that has the potential to create enormous rancor among Republicans (and perhaps some cheap amusement for Democrats). Mind you, it won't do the party, the Senate, or the nation a bit of good, but I can't say with confidence that Cruz & Co. won't try it. In Illinois the only statewide race that was under actual contention was the Governorship, and the Republicans won that one. I can't say I'm thrilled, but the incumbent Democrat wasn't doing a great job, so I'm not surprised. About the only thing you could say for Quinn was that at least he wasn't corrupt. The new Gov isn't a teapartyer, and does support birth control being mandated to be provided in employer-provided health insurance, contrary to Hobby Lobby, so that's something. And he's been very coy about it, but he appears to be pro-choice. Possibly. Considering that there's approximately no downside to a Republican being against any abortions anywhere anyhow think of the BAYBEES, his reticence on the subject is something I can only regard as a hopeful sign. I wish him well, and hope he does a good job for the state. On the more progressive front, we had two state Constitution questions which both passed with large margins, one which \"would prohibit any law that disproportionately affects the rights of eligible Illinois citizens to register to vote or cast a ballot based on the voter's race, color, ethnicity, status as a member of a language minority, national origin, religion, sex, sexual orientation, or income\" and one which \"would expand certain rights already granted to crime victims in Illinois, and give crime victims the ability to enforce their rights in a court of law.\" Basically it's to let crime victims know about criminal hearings. We also had three non-binding advisory questions, one to increase the minimum wage, one to require all health insurance plans to cover contraception, and one to tax income of over a million dollars at 3% to fund schools. All passed quite comfortably. Our Senate race was never in doubt, but now I can go back to eating ice cream again. (The challenger for the Senate seat would be a terrible Senator, but his company makes AMAZING ice cream.) Before liberals get all excited and support this, this moves power to the executive branch The next Republican President is going to try to shift power whatever Obama does, so forgive me if I'm not shaking my fist at this one. See, eg, Bush, George W. This seems to me to be pretty much what happens in a midterm election\u2013at least, it's happened many times before, to FDR, Truman, Reagan, Clinton\u2026 It'll happen to the republicans, too; if they manage to take the White House in 2016, look for a democrat majority in the house and\/or senate in 2018. Hasdrubal @Andrew Lloyd at 10:38 That's what I'm wondering, too. Forget veto-proof, 54 seats in the Senate isn't enough for cloture. It would be profitable for Democrats to let the President do the heavy lifting and veto everything, that would allow sitting Senators to avoid being painted with the same brush as they do Republicans who use the filibuster. But can they trust him and do their interests always align? The minute Republicans get something through that the President can live with but is problematic for Senators, they open themselves up for some serious challenges. If I were looking to challenge a Senate seat in 2016, I'd be working up a line something like \"A 'No' vote is just a 'Yes' in disguise when the Senate only has 54 Republicans.\" The Republicans can be very strategic right now, passing legislation that sounds compelling to the center but can be seen as a defeat for the Democrats, forcing the Democrats to filibuster or veto popular measures. It's what the Democrats have been doing to the Republicans. The question is, will the Republicans do so, or will they keep their focus on their base and not force the Dems to make hard decisions? Joy: the problem is that \"moderate Republican\" appears to be an endangered species. There aren't many left out in the wild. Most of the ones I know have become Independents. Noblehunter Guess, a Canadian policy similar to H1B blew up spectacularly when it hit the news that companies were hiring temporary workers preferentially over Canadians. I think the government ended up scrapping the whole thing, which they had introduced. Hopefully Obama was paying attention. Forget veto-proof, 54 seats in the Senate isn't enough for cloture What remains of the filibuster is unlikely to survive the next Congress if McConnell thinks he can get Obama's signature on something. Margy Rydzynski Reblogged this on Collectables and commented: Bill Stewart For the most part, Obama's going to veto the more obnoxious bills that he can, and while the Republicans were able to dominate the Senate in 2008-2012 by threatening to filibuster things with their 40-seat minority, the Democrats won't be able to pull that off. The tough parts are going to be budgets (because Obama has to pass some kind of budget) and judicial appointments (especially if there's a Supreme Court vacancy.) I hope the Democrats have the guts to filibuster any budget that defunds Obamacare, and Obama has the guts to veto it, but who knows what else the Republicans will defund, or what other parts of the big intrusive Homeland Security \/ Pentagon mafia they'll try to give more money to. Hillary Clinton was very electable in 2008, except that there was suddenly a brilliant public speaker who was mostly anti-war while she was much more pro-war, and Obama won the primaries and the Convention. Her big negative for current electability isn't the pro-war position, it's that the Republicans who passionately hated her for being a Clinton, and a woman, and a liberal, have had eight more years to demonize and attack her, though that mostly works with the people who also hated Obama, and her perfomance as Secretary of State was hopelessly lackluster. Eric RoM This jumped out at me: \" US politics is in an especially messy phase in recent years, and I don't see it getting much better anytime soon.\" And when it is, watch out brown people in far-away places that cross US corporations. Bad US public policy is bad for US citizens, and even worse for the rest of the world. Most Republican Congress since 1948. Truman. GOP shall try and fail to govern, blame Obama's vetoes, and Hillary will be the 2016 President when GOP fails to govern. MutantSupermodel Well they DID legalize recreational marijuana in D.C. so I'm thinking if they just start eating some pot brownies and cookies during session everything will be just peachy. Maybe mix it in their coffee and tea. Blow some through the air vents. rochrist I think that, along with the usual mid-term election nonsense, we're seeing the GOP's long range plan to sew up the country via gerrymandering and voter suppression beging to take effect. And the more they control state governments, the more that will continue to increase. As for the 'there's no difference between them' crowd, we'll see what you think in 12-18 months. If Justice Ginsburg goes, that will be something to be very very worried about. Deborah Frederick I agree with your entire post. Love what you said about Rick Scott, but we deserve what we get from him. The voters of Florida are our own worst enemy. The tendancy for progressive initiatives to pass while regressive politicians are elected does boggle me. Does it just boil down to the cult of personality? Wow, this is gloomy. I for one am upbeat in spite of this setback a few thoughts: 1. This is Obama's fault. Obama kept reaching his hand out to work with the party of no even when it was clear that they had no intention of working with him. There comes a point when you realize that you have to fight for principal hopefully the President has now learned that and will stop the repukes from the games they plan to play. 2. That said, the GOP's head will explode, and it will be fun to watch, when Hillary becomes President, and yes mark these words she will. 3. This will be the last great victory for the GOP. White House insiders have promised that an executive order for immigration reform is coming, but even if it doesn't we will see reform come and the party of the privileged white male will come to an end. 4. Admittedly the GOP was very clever to quiet the radical elements of their party from the religious nuts to the teabaggers but now the rats will come out of the woodwork, and when they do, the country will be vary happy that the President will be there to stop them and that Hillary is waiting in the wings. 5. The GOP also wisely was quiet in their war on women, but again, the idiots can't help themselves, this will also help Hillary in 2 years. 6. Mark these words, 2016 will be deja vu, it will seem like 2008 all over again as the Democrats not only retain the White House, but gain the house and senate as well. The tide will turn, hey look even gamergate is already dead! Jerome O'Neil All this election did was swap one set of corporate interests with another. The notion that Hillary Clinton is some kind of liberal is about as absurd as her husband being some kind of liberal, or Obama being some kind of liberal. They're all center right corporate puppets that govern from a center right, corporate friendly position. 40 years ago they'd all have been republicans. In fact, I think 40 years ago Hillary *was* a republican. There hasn't been a liberal in the White House since 1944, and there hasn't been a serious liberal lobby in the congress since the 60s. That the nation has slipped so far to the right that we call these people \"liberal\" with a straight face is the saddest thing. Chris L. Owens Nice analysis, I think we can count on the GOP to shoot themselves in the foot early on. What is most alarming to me though, is GOP domination at local\/state levels. John P. Murphy As a NH resident, I'm just happy our state had the self-respect to not elect Scott Brown. I'm not an enormous fan of Jeanne Shaheen, but at least she's lived here for more than ten months. @Blackadder: 2008 had a very big tail-wind for the Dems, what with war weariness, a huge financial crisis, a deeply flawed Republican ticket and a charming fellow in Barack Obama. I don't see that confluence building anything close to that for Hillary Clinton. I am not saying she can't win \u2014 as they say in Arkansas, she might should \u2014 and the 2016 map looks tough for the Republicans to hold the Senate, but there just won't be anything like 2006 or 2008 for the Dems to pick up the House. Where are those 37 seats going to come from? I also think that too many folks see HRC's political acumen through the lens of her husband's incandescently great political skills. I don't think she shares them, particularly. A couple of pieces of analysis I've seen that interest me: One, someone pointed out in regard to the strange contrast between progressive referendums passing and the election results, it's much harder to gerrymander a referendum. And two, Hilary now has someone to run against. Before she was in the awkward position of having to distance herself from Obama, now she can run against the GOP controlled congress. Giorgio S. Germanos I want to add this thought about Hillary. Are we really so sure that she is going to enter the race? Is she maybe too old? And I have, one other, more basic fear with her, ever since I read a John Birmingham novel. Some right-wing nut assassinating her (there I said it), there-by plunging our country into recriminations and outright intrigues. But even beyond that I see: \u2014 A Limit on Abortion Rights \u2014 A Limit on LBGT Rights \u2014 More Jim Crow style laws \u2014 A Repeal of Obama Care (ACA) \u2014 More Tax Cuts for the wealthy \u2014 More Taxes for the Poor and the Middle Class (hidden and obvious) \u2014 Soldiers on the Ground in Iraq and Syria \u2014 That darn XL Pipeline wet-dream \u2014 Abolishing the EPA (you want clean water, \"buy you\" a filtered water bottle bud) \u2014 More coal burning plants \u2014 Reducing the MPG requirement for passenger cars and trucks \u2014 Restricting immigration, BUT allowing more Tech Visas for companies like Microsoft and Google (even though plenty of tech people are still looking for a job) \u2014 Reducing National Parks and allowing clear cutting and such \u2014 More Deep Horizon please (Drill Deep, Drill Now) \u2014 You say they took God out of School and Politics? Let's put him back in! \u2014 Cut science funding to $0 \u2014 Eliminate SNAP \u2014 Eliminate Medicaid \u2014 Eliminate Medicare \u2014 Privatize Social Security \u2014 Eliminate Unemployment Insurance All these and more are coming soon\u2026.. J\/K\u2026.. Oh wait\u2026.. They'll vote for them, then after Obama VETOES every single Bill, they'll Impeach him, right around May or June. Yeap, it's coming. Americans just voted for all of this. Sign Ahead Seems like we had an awful lot of \"What the heck\u2026let's see what happens\" candidates in my corner of of the country this year, especially for the Democrats. Not entirely surprising, since I live in a very red district in a mostly red state, but it reinforced my impression that the Democrats don't have their @*#&* together. It felt a bit like I was trying to hire someone for an important job. But the candidates didn't have the right skills, didn't know what the job entailed and weren't actually interested in the position. Don Whiteside\u2122 (@donw) Well they DID legalize recreational marijuana in D.C. And now we wait to see whether congress stops it in the next 60 days. As far as this Maryland governor thing, I think people misunderstand the political landscape in Maryland to some extent. They're a strongly democratic state in a somewhat atypical way, particularly if you judge by federal government standard. There's a lot of people in Maryland who are registered democrats and vote for democrats\u2026 both of who would be republicans in other places. There's also a lot of strong pockets of conservatism. Watch the signs as you drive from the DC area to the Eastern Shore and you get a picture of this. If you've ever talked to a California Republican you get a sense of this phenomenon. Judging state level stuff by the way the folks caucus in the federal buildings doesn't work exactly well. cranapia Much as I hate to say it, the GOP managed to be (electorally) smart in one very important respect \u2014 message discipline across the board. If there were candidates out there prone to chuntering on about \"legitimate rape\" and wombs that could magically repel rapist semen, the more\u2026 florid anti-Obama conspiracy theories and how generally disgusting the poor, women, queers and poor people are, they were kept well off the radar. stringmonkey \"It ain't football.\" Thanks for that, Mr. Scalzi. If there's one thing that drives me completely nuts about American culture, it's our endless fixation on identifying black vs. white over comparing shades of gray. Greg, this poll result tells you all you need to know about Obama Derangement Syndrome among Republicans: \"Who do you think was more responsible for the poor response to Hurricane Katrina: George W. Bush or Barack Obama?,\" 29 percent of a pool of Republican primary voters in Louisiana blamed Obama, who took office in 2009, and 28 percent blamed Bush, whose term lasted through 2008. Hurricane Katrina hit on Aug. 29, 2005. Short version \u2013 fact don't influence peoples voting. Otherwise Yertl the Turtle would have lost Kentucky, for blatantly lying (Kynect will stay, but I will repeal Obamacare!\" and the lapdog media not pillorying him for it. rochrist: contrast between progressive referendums passing and the election results, it's much harder to gerrymander a referendum. But senators and governors are voted on by the whole state. That a bunch of southern states elected republican senators\/governors doesn't surprise me. But Massachusetts is as blue as you get, yet they just elected a Republican governor, and you can't blame that on gerrymandering. Sometimes it feels like no matter how progressive\/forward we get with referendums, people still want a strong authoritarian daddy type in office who talks tough and is \"serious\" and makes the world black and white and decisions are easy. Before she was in the awkward position of having to distance herself from Obama, She distanced herself from Obama by showing how much of a Hawk she's willing to be, at which point, does it matter who's elected if both candidates end up trying to out-do the other as to how eager they are to go to war against whoever the boogeyman is at the moment? now she can run against the GOP controlled congress. The only good thing I can see about the next two years is maybe the republicans will try to impeach Obama and fail. Maybe they'll try to ram some of their more crazy right-wing legislation through and fail because Obama vetoes it. They might try to portray Obama as the obstructionist, but with a little luck, they'll tip their hand as to just how fricken rabid and insane some of them are. The best thing that happened last cycle was McCain let Sarah Palin talk and show the world just how nutso she is. Maybe if the R's do that for the next two years, it'll sway voters come 2016. Cause Ginsburg is getting old and we can't afford another right wing nutjob on the supreme court. Doc S Hats off to the Republican Party for the consistent messaging and marketing. The drum beat of \"fail fail fail\" from all the corners of the right set the terms of the arguments, and Democrats didn't really succeed in countering the message. My only hope is that the candidates that presented themselves as center-right are truly center-right. The concern is that this group of candidates were better at not publicly shooting themselves in the foot. Time will tell. In Illinois, we have a venture capitalist that is going to start as our new governor in 2015. He is inheriting some serious issues"} +{"id":"RedPajamaCommonCrawl.0041","text":"Candyce Counseling DEEP Center Counseling DEEP Center Training How I Do It Loving the Questions: My Blog Weekly Wisdom: Quotes in Your Inbox Collected Quotes Collected Poetry Grief Quotes & Poetry Articles by Candyce Sign up here for blog posts and resources that help you discover vitality, even when you hurt Everything that irritates us about others can lead us to an understanding of ourselves. \u2014 Carl Jung The idea [of therapy] isn't to give people answers, or lead their bark of longing into a safe, dull, protected harbor, but to make people aware of the depths of possibility in their hearts and lives; help them remove the barriers that keep them from being the people they were meant to be. \u2014 John O'Donohue We're out there somewhere between the known and the unknown, trying to reel in both for a closer look. \u2014 Anne Lamott, Bird by Bird All thought begins with the recognition that something is out of place. \u2014 Plato Eventually we realize that not knowing what to do is just as real and just as useful as knowing what to do. Not knowing stops us from taking false directions. Not knowing what to do, we start to pay real attention. Just as people lost in the wilderness, on a cliff face or in a blizzard pay attention with a kind of acuity that they would not have if they thought they knew where they were. Why? Because for those who are really lost, their life depends on paying real attention. If you think you know where you are, you stop looking. \u2014 David Whyte Love's function is to fabricate unknownness \u2014 e. e. cummings One's philosophy is not best expressed in words; it is expressed in the choices one makes. In the long run, we shape our lives and we shape ourselves. The process never ends until we die. And, the choices we make are ultimately our own responsibility. Learning is not attained by chance, it must be sought for with ardor and attended to with diligence. \u2014 Abigail Adams I want to live the real life. I want to my live life close to the bone. \u2014 John Mellencamp, The Real Life, The Lonesome Jubilee There's more than just one answer to these questions Pointing me in a crooked line. The less I seek my source for some definitive, The closer I am to fine. \u2014 Indigo Girls, Closer to Fine, Indigo Girls It's not always about survival, this life we are given; it's usually so much easier than that. It's about trusting the eternal life force that is flowing within us\u2014letting that force lead the way through all of the inevitable changes we will face across the span of our time here on Earth. \u2014 Elizabeth Lesser, Broken Open The world breaks everyone and afterward some are strong at the broken places. \u2014 Ernest Hemingway It is not only that some [people] become strong at the broken places; it is also that, through trauma, others become strong, and discover that they are strong in ways they never knew. \u2014 Diana Fosha, Trauma Reveals the Roots of Resilience Healing may not be so much about getting better as about letting go of everything that isn't you\u2014all of the expectations, all of the beliefs\u2014and becoming who you are. Not a better you, but a realer you. \u2014 Rachel Naomi Remen The curious paradox is that when I accept myself just as I am, then I can change. \u2014 Carl Rogers As long as we are alive, we feel fear. It is an intrinsic part of our makeup, as natural as a bitter cold winter day or the winds that rip branches off trees. If we resist it or push it aside, we miss a powerful opportunity for awakening. \u2014 Tara Brach, Radical Acceptance There is only one heroism in the world: to see the world as it is, and to love it. \u2014 Romaine Rolland To the world you may be just one person. To one person you may be the world. We are imperfect mortal beings, aware of that mortality even as we push it away, failed by our very complication, so wired that when we mourn our losses we also mourn, for better or for worse, ourselves. As we were. As we are no longer. As we will one day not be at all. \u2014 Joan Didion, The Year of Magical Thinking Sometimes remembering will lead to a story, which makes it forever. That's what stories are for. Stories are for joining the past to the future. Stories are for those late hours in the night when you can't remember how you got from where you were to where you are. Stories are for eternity, when memory is erased, when there is nothing to remember except the story. \u2014 Tim O'Brien, The Things They Carried To put the world right in order, we must first put the nation in order; to put the nation in order, we must first put the family in order; to put the family in order, we must first cultivate our personal life; we must first set our hearts right. \u2014 Confucius You do not need to leave your room. Remain sitting at your table and listen. Do not even listen, simply wait, be quite still and solitary. The world will freely offer itself to you to be unmasked, it has no choice, it will roll in ecstasy at your feet. Curiosity restores is a state of heightened awareness. Culturally, this has been considered a child's activity. By the time we're grown, we're supposed to know enough not to get bogged down in life's miraculous detail. But the spiritual journey reactivates our sense of miracle and invites us to pause again, squatting over the sidewalk cracks, to ponder the lives of ants and stars. \u2014 Christina Baldwin, Life's Companion You gain strength, courage and confidence by every experience in which you really stop to look fear in the face. You are able to say to yourself, I lived through this horror. I can take the next thing that comes along. You must do the thing you think you cannot do. \u2014 Eleanor Roosevelt, You Learn by Living I feel like a small battlefield in which the problems, or some of the problems, of our time are being fought out. All one can hope to do is keep oneself humbly available, to allow oneself to be a battlefield. After all, the problems must be accommodated, have somewhere to struggle and come to rest and we, poor little humans, must put our inner space at their service and not run away. \u2014 Etty Hillesum, An Interrupted Life Between endings and beginnings there is a blank time where nothing is supposed to happen. It's frustrating, fearful, but it's supposed to be this way. Like a tree in winter, on the outside there is nothing going on, but inside is hidden growth. This growth explodes in spring. Spring can't happen without the blank time. \u2014 Peter McDonald To find in ourselves what makes life worth living is risky business, for it means that once we know we must seek it. It also means that without it life will be valueless. \u2014 Marsha Sinetar, Ordinary People as Monks and Mystics To get to the simplicity of a thing, you have to go through the complexity, and only once you've gone into and through the complexity can you state the simplicity. What never rings true is the person who states the simplicity without understanding the complexity. \u2014 Susan Slater Blythe Even a thought, even a possibility, can shatter and transform us. \u2014 Neitzsche In many ways, constancy is an illusion. . . . Of any stopping place in life, it is good to ask whether it will be a good place from which to go on as well as a good place to remain. \u2014 Mary Catherine Bateson, Composing a Life A collective problem, if not recognized as such, always appears as a personal problem. Despair is our chance to wrestle with fire and come through. In the dark times, will there be singing? Yes. There will be singing about the dark times. Art can compel people freely, gladly, and spontaneously to sacrifice themselves in the service of man. \u2014 Tolstoy A true piece of writing is a dangerous thing. It can change your life. \u2014 Tobias Wolff Nothing is more powerful than individuals acting out of their own conscience. \u2014 Vaclav Havel Every death is like the burning of a library. \u2014 Alex Haley The character of a society is the cumulative result of countless small actions, day in and day out, of millions of people. \u2014 Duane Elgin The real voyage of discovery is not in seeking new places, but in seeing with new eyes. \u2014 Marcel Proust The secret to having good ideas is to have a lot of ideas, then throw away the bad ones. \u2014 Linus Pauling The rocks in the water don't know how the rocks in the sun feel. \u2014 Haitian Proverb That which is spoken from the heart is heard by the heart. \u2014 Jewish saying Change occurs when deeply felt private experiences are given public legitimacy. \u2014 Ghandi Ten times a day something happens to me like this\u2014some strengthening throb of amazement\u2014some good sweet empathic ping and swell. This is the first, the wildest and the wisest thing I know: that the soul exists and is built entirely out of attentiveness. \u2014 Mary Oliver This is the true joy in life, being used for a purpose recognized by yourself as a mighty one. \u2014 George Bernard Shaw If you're never scared or embarrassed or hurt, it means you never take any chances. \u2014 Julia Sorel Let's dare to be ourselves, for we do that better than anyone else. \u2014 Shirley Briggs Family and work. Family and work. I can let them be at war, with guilt as their nuclear weapon and mutually assured destruction as their aim, or I can let them nourish each other. \u2014 Ellen Gilchrist, The Writing Life A hundred times a every day I remind myself that my inner and outer life depend on the labours of other men, living and dead, and that I must exert myself in order to give in the same measure as I have received and am still receiving. At one level inspiration is the ability to see beauty and mystery in everything men and women do. Wisdom resides inherently within experiences of hardship. \u2014 Elizabeth Andrew, Writing the Sacred Journey When you set out on a journey and night covers the road, you don't conclude that the road has vanished. How else could we discover the stars? \u2014 Nancy Willard Imagination is a memory that, while perhaps not accurate in its facts, is reliable in describing emotional truth. Even those truths that are painful will ultimately increase my wisdom, undergird my strength, make possible my art. \u2014 Pat Schneider, Writing Alone and With Others There is ecstasy in paying attention. You can get into a kind of Wordsworthian openness to the world, where you see in everything the essence of holiness. It's a hard thing to explain to somebody who hasn't felt it, but the presence of death and danger has a way of bringing you fully awake. It makes things vivid. The essence of who you are is ultimately mysterious, ungraspable and numinous\u2014completely different from every other structure of matter. When I dare to be powerful\u2014to use my strength in the service of my vision\u2014then it becomes less and less important whether I am afraid. \u2014 Audre Lorde Professionals give advice; pilgrims share wisdom. \u2014 Bill Moyers The worst thing that happens in life is not death. The worst thing would be to miss it. . . . I think the great danger in life is not showing up. Wonder is not a Pollyanna stance, not a denial of reality; wonder is an acknowledgement of the power of the mind to transform, to notice, to decide what experience shall mean. Emotional attachment is probably the primary protection against feelings of helplessness and meaninglessness. \u2014 McFarlane and van der Kolk There is no such thing as complete independence from others or overdependence. There is only effective or ineffective dependence. Secure dependence fosters autonomy and self-confidence. \u2014 Susan Johnson In care of the soul there is trust that nature heals, that much can be accomplished by not-doing. \u2014 Thomas Moore Love makes your soul crawl out from its hiding place. \u2014 Zora Neale Hurston No one suspects the days to be gods. \u2014 Emerson Why do you never find anything written about that idiosyncratic thought you advert to, about your fascination with something no one else understands? Because it is up to you. There is something you find interesting, for a reason hard to explain. It is hard to explain because you have never read it on any page; there you begin. You were made and set here to give voice to this, your own astonishment. \u2014 Annie Dillard, The Writing Life Spiritual life is contractual. The sacred cannot dialogue with the unresponsive. Pursue, keep up with, circle round and round your life. . . . Know your own bone: gnaw at it, bury it, unearth it, and gnaw at it still. \u2014 Thoreau When people get into therapy, or when they need healing, their real hope is that they'll come to the secret frontier in themselves, some unknown source of energy and healing in themselves, where the divinity of who-ness is protected. This is a spiritual quest. Do you have the patience to wait till your mud settles and the water is clear? Can you remain unmoving till the right action arises by itself? \u2014 Stephen Mitchell's translation of the Tao Te Ching We cannot solve our problems in the same state of consciousness in which we created them. By nature, men are nearly alike; by practice, they get to be wide apart. There is nothing enlightened about shrinking so that other people won't feel insecure around you\u2026.As we are liberated from our fear, our presence automatically liberates others. No one is born with skill. It is developed through exercise, through repetition, through a blend of learning and reflection that's both painstaking and rewarding. And it takes time. \u2014 Twila Tharp, The Creative Habit It takes a lot of courage to release the familiar and seemingly secure, to embrace the new. But there is no real security in what is no longer meaningful. There is more security in the adventurous and exciting, for in movement there is life, and in change there is power. \u2014 Alan Cohen Dare to be na\u00efve. \u2014 Buckminster Fuller One of the reasons I am happy now is that I did the work I had always dreamed of doing. But I didn't start doing it seriously and professionally until I was forty years old. Patience and perseverance have a magical effect before which difficulties disappear and obstacles vanish. \u2014 John Quincy Adams With courage you will dare to take risks, have the strength to be compassionate, and the wisdom to be humble. Courage is the foundation of integrity. \u2014 Keshavan Nair One isn't necessarily born with courage, but one is born with potential. Without courage, we cannot practice any other virtue with consistency. We can't be kind, true, merciful, generous, or honest. Wheresoever you go, go with all your heart. To dare is to lose one's footing momentarily. To not dare is to lose oneself. \u2014 Soren Kierkegaard Rituals are a good signal to your unconscious that it's time for it to kick in. We learn what we have said from those who listen to our speaking. \u2014 Kenneth Patton \u2014 Emily Dickinson Never apologize for showing feeling. When you do so, you apologize for the truth. When you begin to touch your heart or let your heart be touched, you begin to discover that it's bottomless, that it doesn't have any resolution, that this heart is huge, vast, and limitless. You begin to discover how much warmth and gentleness is there, as well as how much space. \u2014 Pema Chodron At times our own light goes out and is rekindled by a spark from another person. Each of us has cause to think with deep gratitude of those who have lighted the flame within us. \u2014 Albert Schweitzer Appreciation can make a day, even change a life. Your willingness to put it into words is all that is necessary. \u2014 Margaret Cousins Be open to unexpected words and adventures. Spend time being in a state of quiet expectation and see what (or who) comes your way. \u2014 Susan Goldsmith Wooldridge, Poemcrazy I have no idea about what death is, but because I have been in association with it so intimately, I have a much greater sense of the value of life and of what life can be. A man who has not passed through the inferno of his passions has never overcome them. Don't keep it all inside. Don't keep your aching, celebrating, wonder making heart alone. . . Write your own song. \u2014 Blue October, Inner Glow Meaning drives us from despair to wonder, from confusion to clarity, from hesitance to confidence. And the only place to find meaning is in the importance of small things. Your sacred space is where you can find yourself again and again. \u2014 Joseph Campbell If sequestered pain made a sound, the atmosphere would be humming all the time. \u2014 Stephen Levine, Unattended Sorrow Your unconscious can't work when you are breathing down its neck. My daddy always told me to just do the best you knew how and tell the truth. He said there was nothing to set a man's mind at ease like wakin up in the morning and not havin to decide who you were. And if you done something wrong just stand up and say you done it and say you're sorry and get on with it. Don't haul stuff around with you. \u2014 Cormac McCarthy, No Country for Old Men The routine is as much a part of the creative process as the lightening bold of inspiration, maybe more. And this routine is available to everyone. Keeping a [journal] need not be a major chore\u2014just a few minutes of notes each day can be valuable. Writing crystallizes insights, fools the defense of forgetfulness, and builds a collection of ideas and reflections that can spur further insights even years later. \u2014 Roger Walsh, Essential Spirituality Real knowledge is to know the extent of one's ignorance. There is nothing selfish about enjoying yourself. In fact, as wise people have long said and psychologists have since discovered, happiness makes people less self-focused and more altruistic. Development involves giving up a smaller story in order to wake up to a larger story. \u2014 Jean Houston Satisfaction isn't so much getting what you want as wanting what you have. \u2014 David Myers Suffering is a call for inquiry, all pain needs investigation. \u2014 Sri Nisargadatta Maharaj Character cannot be developed in ease and quiet. Only through experience of trial and suffering can the soul be strengthened, vision cleared, ambition inspired, and success achieved. The unexpected brings us light and darkness, joy and sorrow, life and death. And it brings discovery. Some of our most important discoveries are made when we're not looking. The truth is that our finest moments are most likely to occur when we are feeling deeply uncomfortable, unhappy, or unfulfilled. For it is only in such moments, propelled by our discomfort, that we are likely to step out of our ruts and start searching for different ways or truer answers. \u2014 M. Scott Peck Nothing on earth is more gladdening than knowing we must roll up our sleeves and move back the boundaries of the humanly possible once more. We don't see things as they are, we see them as we are. \u2014 Anais Nin We must learn to reawaken and keep ourselves awake, not by mechanical aid, but by an infinite expectation of the dawn. \u2014 Henry David Thoreau The moment one gives close attention to anything, even a blade of grass, it becomes a mysterious, awesome, indescribably magnificent world in itself. \u2014 Henry Miller Let us not look back in anger or forward in fear, but around in awareness. \u2014 James Thurber People usually consider walking on water or in thin air a miracle. But I think the real miracle is not to walk either on water or in thin air, but to walk on earth. Every day we are engaged in a miracle which we don't even recognize: a blue sky, white clouds, green leaves, the black, curious eyes of a child \u2014 our own two eyes. All is a miracle. It is, in fact, nothing short of a miracle that the modern methods of instruction have not entirely strangled the holy curiosity of inquiry. Children require guidance and sympathy far more than instruction. \u2014 Annie Sullivan Creativity is a type of learning process where the teacher and pupil are located in the same individual. \u2014 Arthur Koestler The wisdom we know deep inside ourselves is infinitely richer than anything we can be taught. In times of change, learners inherit the Earth, while the learned find themselves beautifully equipped to deal with a world that no longer exists. \u2014 Eric Hoffer You must learn day by day, year by year, to broaden your horizon. The more things you love, the more you are interested in, the more you enjoy, the more you are indignant about, the more you have left when anything happens. \u2014 Ethel Barrymore A master can tell you what he expects of you. A teacher, though, awakens your own expectations. \u2014 Patricia Neal It is easy in the world to live after the world's opinion; it is easy in solitude to live after our own; but the great man is he who in the midst of the crowd keeps with perfect sweetness the independence of solitude. Most of the important things in the world have been accomplished by people who have kept on trying when there seemed to be no hope at all. \u2014 Dale Carnegie I know the price of success: dedication, hard work, and an unremitting devotion to the things you want to see happen. \u2014 Frank Lloyd Wright When we turn to our innate wisdom for the harmony of mind and gut, we heal the entrance to the heart as it seeks to beat in rhythm with the world. Let me tell you the secret that has led me to my goal: my strength lies solely in my tenacity. \u2014 Louis Pasteur Although seemingly mundane, ordinary experiences contain within them a vivacity, a sense of wholeness, and a will beyond our own. Creativity is just connecting things. When you ask creative people how they did something, they feel a little guilty because they didn't really do it, they just saw something. It seemed obvious to them after a while. That's because they were able to connect experiences they've had and synthesize new things. \u2014 Steve Jobs What man actually needs is not a tensionless state but rather the striving and struggling for some goal worthy of him. What he needs is not the discharge of tension at any cost, but the call of a potential meaning waiting to be fulfilled by him. \u2014 Victor Frankl The art of progress is to preserve order amid change and to preserve change amid order. \u2014 Alfred North Whitehead Try to learn to let what is unfair teach you. \u2014 David Foster Wallace, Infinite Jest Life is a process of becoming, a combination of states we have to go through. Where people fail is that they wish to elect a state and remain in it. This is a kind of death. It is not the strongest of the species that survives, nor the most intelligent, but the one most responsive to change. \u2014 Charles Darwin Deep unspeakable suffering may well be called a baptism, a regeneration, the initiation into a new state. \u2014 George Eliot \u2026 without darkness? Nothing comes to birth,? As without light? Nothing flowers. \u2014 May Sarton There are things you can't reach. But you can reach out to them, and all day long. The wind, the bird flying away. The idea of God. And it can keep you as busy as anything else, and happier. \u2014 Mary Oliver, Excerpt from Where Does the Temple Begin, Where Does the Temple End? There is no moral precept that does not have something inconvenient about it. \u2014 Denis Diderot A man who becomes conscious of the responsibility he bears toward a human being who affectionately waits for him, or to an unfinished work, will never be able to throw away his life. He knows the why for his existence, and will be able to bear almost any how. Thou shalt not be a victim. Thou shalt not be a perpetrator. Above all, thou shalt not be a bystander. \u2014 Holocaust Museum, Washington, D.C. Sentimental assertions are always a form of detachment; they confront the acute, terrible awareness of individual pain, the sharp particularity of loss or the fierce individuality of passion with the dulling universal certainty of platitude. \u2014 Mark Doty, Dog Years It helps to resign as the controller of your fate. All that energy we expend to keep things running right is not what's keeping things running right. We're bugs struggling in the river, brightly visible to the trout below. With that fact in mind, people like me make up all these rules to give us the illusion that we are in charge. I need to say to myself, they're not needed, hon. Just take in the buggy pleasures. Be kind to the others, grab the fleck of riverweed, notice how beautifully your bug legs scull. We in America do not have government by the majority. We have government by the majority who participate. There's nothing glorious about being a professional. . . . Professionalism probably comes down to being able to work on a bad day. \u2014 Norman Mailer, The Spooky Art Anyone can become angry\u2014that is easy. But to be angry with the right person, to the right degree, at the right time, for the right purpose, and in the right way\u2014that is not easy. \u2014 Aristotle, The Nichomachean Ethics Our passions, when well exercised, have wisdom; they guide our thinking, our values, our survival. \u2014 Daniel Goleman, Emotional Intelligence Curiosity in the service of intimacy can be scary and exciting (much like rafting or canoeing down the rapids). . . Shame imprisons curiosity and curiosity, welcomed, banishes shame. \u2014 Ken Benau They say that time changes things, but you actually have to change them yourself. \u2014 Andy Warhol If you want to go fast, go alone. If you want to go far, go together. \u2014 African proverb I wanted a perfect ending. Now I've learned, the hard way, that some poems don't rhyme, and some stories don't have a clear beginning, middle, and end. Life is about not knowing, having to change, taking the moment and making the best of it, without knowing what's going to happen next. Delicious Ambiguity. Freedom from the desire for an answer is essential to the understanding of a problem\u2026. If we can really understand the problem, the answer will come out of it, because the answer is not separate from the problem. \u2014 Jiddu Krishnamurti A ship is safe in harbor, but that is not what a ship is for. \u2014 Thomas Aquinas Wise elders will likely be those individuals who stay both mentally and physically vital throughout life. \u2014 Louis Cozolino, The Neuroscience of Human Relationships We need to live in mindful harmony with our feelings, not attempt to control them. \u2014 Leslie Greenberg and Sylvia Paivio, Working With Emotions in Psychotherapy Everything in excess! To enjoy the flavor of life, take big bites. Moderation is for monks. \u2014 Robert Heinlein Help me to find myself as I walk in another's shoes. \u2014 from prayer song from Ghana We [humans] are the only creatures who are in-between. We're of the earth, but don't belong to it, because we strain after the heavens; and yet the heavens aren't full in us. So this wonderful, restless, eternal longing in us has us always on a quest. I don't think there's such a thing as a bad emotion. The only bad emotion is a stuck emotion. Let me keep my distance, always, from those who think they have the answers. Let me keep my company always, with those who say Look! and laugh in astonishment, and bow their heads. \u2014 Mary Oliver, from Mysteries, Yes Be not the slave of your own past. Plunge into the sublime seas, dive deep and swim far, so you shall come back with self-respect, with new power, with an advanced experience that shall explain and overlook the old. The truth is not for all men, but only for those who seek it. \u2014 Ayn Rand The truth is rarely pure and never simple. Whoever is careless with the truth in small matters cannot be trusted with important matters. One certain lesson life has taught us: that authentic identity derives from facing reality, not ignoring it. \u2014 Jane Adams, I'm Still Your Mother Everything that happens in my day is a transaction between the external world and my internal world. Everything is raw material. Everything is relevant. Everything is usable. Everything feeds into my creativity. But without proper preparation, I cannot see it, retain it, and use it. Without the time and effort invested in getting ready to create, you can be hit by a thunderbolt and it'll just leave you stunned. Remember that all through history the way of truth and love has always won. There have been tyrants and murderers and for a time they seem invincible but in the end, they always fall\u2014think of it, ALWAYS. \u2014 Mahatma Gandhi I think, at a child's birth, if a mother could ask a fairy godmother to endow it with the most useful gift, that gift would be curiosity. Men have forgotten this truth, said the fox. But you must not forget it. You become responsible, forever, for what you have tamed. \u2014 Antoine de Saint-Exupery It's not enough to have a dream unless I'm willing to pursue it. It's not enough to know what's right unless I'm strong enough to do it. It's not enough to join the crowd, to be acknowledged and accepted. I must be true to my ideals, even if I'm excluded and rejected. It's not enough to learn the truth unless I also learn to live it. It's not enough to reach for love unless I care enough to give it. \u2014 Source Unknown Integrity is telling myself the truth. And honesty is telling the truth to other people. \u2014 Spencer Johnson What you perceive, your observations, feelings, interpretations, are all your truth. Your truth is important. Yet it is not The Truth. \u2014 Linda Ellinor Keep the company of those who seek the truth. Run from those who have found it. There are no whole truths; all truths are half-truths. It is trying to treat them as whole truths that plays the devil. There are trivial truths and the great truths. The opposite of a trivial truth is plainly false. The opposite of a great truth is also true. \u2014 Niels Bohr All truths are easy to understand once they are discovered; the point is to discover them. \u2014 Galileo In a time of universal deceit, telling the truth becomes a revolutionary act. \u2014 George Orwell Love truth, but pardon error. Most people spend their whole lives using their strengths to cover up and hide their weaknesses. They expend tremendous energy in keeping themselves a house divided. But if you surrender to your weakness, therein lies your pathway to genius. A person who knows and utilizes his true weakness and uses his strength to include it is a whole person. He may seem rough around the edges, but there are so few people like that that they lead their generation. \u2014 Feldenkrais The truth will set you free. But not until it is finished with you. \u2014 David Foster Wallace Couples are jigsaw puzzles that hang together by touching in just enough points. They're never total fits or misfits. In time, a pair invents its own commonwealth, complete with anthems, rituals, and lingos\u2014a cult of two with fallible gods. \u2014 Diane Ackerman, One Hundred Names for Love Creative exploration [is] impossible, without (humble) acknowledgement of the unknown. \u2014 Jordan B. Peterson, Maps of Meaning How can we know ourselves by ourselves? . . . Soul needs intimate connection, not only to individuate, but simply to live. For this we need relationships of the profoundest kind through which we can realize ourselves, where self-revelation is possible, where interest in and love for soul is paramount. \u2014 James Hillman, Myth of Analysis Owning and integrating our own past\u2014the good and the bad\u2014is the way we can make the present better. Again, you can't connect the dots looking forward; you can only connect them looking backwards. So you have to trust that the dots will somehow connect in your future. You have to trust in something \u2013 your gut, destiny, life, karma, whatever. This approach has never let me down, and it has made all the difference in my life. Meaning emerges from engagement with the world, not from abstract contemplation of it. \u2014 Iain McGilchrist, The Divided Brain and the Search for Meaning Wholeness is not achieved by cutting off a portion of one's being, but by integration of the contraries. \u2014 C.G. Jung The world spins. We stumble on. It is enough. \u2014 Colum McCann, Let the Great World Spin \u2014 William Butler Yeats If you ever find you're the most talented person in the room, you need to find another room. \u2014 Austin Kleon If we have no peace, it is because we have forgotten that we belong to each other. \u2014 Mother Teresa Courage is what it takes to stand up and speak; courage is also what it takes to sit down and listen. Character is like a tree and reputation like a shadow. The shadow is what we think of it; the tree is the real thing. \u2014 Abraham Lincoln We are at the very beginning of time for the human race. It is not unreasonable that we grapple with problems. But there are tens of thousands of years in the future. Our responsibility is to do what we can, learn what we can, improve the solutions, and pass them on. \u2014 Richard Feynman Intelligence is the ability to adapt to change. \u2014 Stephen Hawking The thing about a story is that you dream it as you tell it, hoping that others might then dream along with you, and in this way memory and imagination and language combine to make spirits in the head. There is the illusion of aliveness. Being safe is about being seen and heard and allowed to be who you are and to speak your truth. History, despite its wrenching pain, cannot be unlived, but if faced with courage, need not be lived again. If we are to achieve a richer culture, rich in contrasting values, we must recognize the whole gamut of human potentialities, and so weave a less arbitrary social fabric, one in which each diverse human gift will find a fitting place. \u2014 Margaret Mead Hope begins in the dark, the stubborn hope that if you just show up and try to do the right thing, the dawn will come. You wait and watch and work: you don't give up. \u2014 Anne Lamott Everything has its wonders, even darkness and silence, and I learn, whatever state I may be in, therein to be content. People living deeply have no fear of death. Take risks and you'll get the payoffs. Learn from your mistakes until you succeed. \u2014 Bobby Flay Whenever you find yourself on the side of the majority, it's time to pause and reflect. There should be a word that means beginning\/end because nothing begins without something dying. We deem those happy who from the experience of life have learnt to bear its ills without being overcome by them. Don't ask what the world needs. Ask what makes you come alive, and go do it. Because what the world needs is people who have come alive. \u2014 Howard Thurman Refuse to deny what you know but consent to how little that will always be, and, when the moment comes, the sky will open and the liberating intrusion will descend upon you. \u2014 Jack Miles, The Best American Spiritual Writing 2004 I did not have to believe. I only had to wonder. \u2014 Patricia Monaghan, Physics and Grief (in The Best American Spiritual Writing 2004) In nature nothing remains constant. Everything is in a perpetual state of transformation, motion, and change. However, we discover that nothing simply surges up out of nothing without having antecedents that existed before. Likewise, nothing ever disappears without a trace, in the sense that it gives rise to absolutely nothing existing in later times. \u2014 David Bohm, (in The Best American Spiritual Writing 2004) There is a way of beholding nature which is a form of prayer, a way of minding something with such clarity and aliveness that the rest of the world recedes. It . . . gives the brain a small vacation. I do not at all understand the mystery of grace \u2013 only that it meets us where we are but does not leave us where it found us. Coming to the city was like entering a tunnel, he said, and finding to your surprise that the light at the end didn't matter; sometimes in fact the tunnel made the light tolerable. Collect books, even if you don't plan on reading them right away. Filmmaker John Waters has said, \"Nothing is more important than an unread library.\" We bring about a world in consciousness that is partly what is given, and partly what we bring, something that comes into being through this particular conjunction and no other. And the key to this is the kind of attention we pay to the world. She whispered, as though revealing a secret, \"God waits for us to create Him\u2026\" She was telling us that we have the responsibility to reveal God, each in our own way, moment by moment\u2026 as we breathe, as we speak, as we move through our life. We create God by being. Without us God is invisible. \u2014 Fariha de Menil Friedrich, talking about her mother Dominque de Menil's thoughts and words as she was dying Spiritual forces are of consequence in real world affairs and a capacity for reverence sustains a commitment to justice. \u2014 Emilee Dawn Whitehurst The attitude of receptivity, indispensible in art, is also the attitude necessary for ecumenism\u2014TO LISTEN. \u2014 Dominique de Menil A thing that is really done from the heart will one day or another again touch the hearts of others. \u2014 Marie-Alain Couturier In order to keep our balance, we need to hold the interior and exterior, visible and invisible, known and unknown, temporal and eternal, ancient and new, together. When a great moment knocks on the door of your life, it is often no louder than the beating of your heart, and it is very easy to miss it. \u2014 Boris Pasternak Reductionism is merciless. \u2014 Douglas Hofstadter It takes courage to love, but pain through love is the purifying fire which those who love generously know. Deep practice is built on a paradox: struggling in certain targeted ways\u2014operating at the edges of your ability, where you make mistakes\u2014makes you smarter. Or to put it in a slightly different way, experiences where you're forced to slow down, make errors, and correct them\u2014as you would if you were walking up an ice-covered hill, slipping and stumbling as you go\u2014end up making you swift and graceful without your realizing it. \u2014 Daniel Coyle If you look into your own heart, and you find nothing wrong there, what is there to worry about? What is there to fear? Every great and commanding moment in the annals of the world is a triumph of some enthusiasm. Don't look for the big, quick improvement. Seek the small improvement one day at time. That's the only way it happens\u2014and when it happens, it lasts. \u2014 John Wooden A big heart is both a clunky and a delicate thing; it doesn't protect itself and it doesn't hide. It stands out, like a baby's fontanel, where you can see the soul pulse through. Being young and trying to catch a glimpse of the depths, of the true self, of the soul, or whatever human beings have called it over the centuries, we often find ourselves surrounded by bossy, hectoring voices trying to short-circuit our personal experience by super-imposing their own disappointments. Much of this bossiness masquerades as an education. Vulnerability is our most accurate measurement of courage; vulnerability is the birthplace of innovation, creativity and change. \u2014 Brene Brown If you're not prepared to be wrong, you'll never come up with anything original. \u2014 Ken Robinson Real security is contemplating death, not pretending it doesn't exist. \u2014 Eve Ensler To go beyond is as wrong as to fall short. Being alive is being aware, being able to be touched and moved and changed, being able to respond rather than to react, being able to see and hear. To be seen and understood by the one we love best may be the most powerful weapon against shame. Most of us bring to everyday life a somewhat na\u00efve psychological attitude in our expectations that our lives and relationships will be simple. Love of the soul asks for some appreciation for its complexity. We still and always want waking. There is a delicate balance that we need to honor as we try to find meaning in any event or state of mind: Many people confuse finding meaning with finding a reason, putting our finger on something or someone for blame. There's a paradox in the notion that creativity should be a habit. We think of creativity as a way of keeping everything fresh and new, while habit implies routine and repetition. That paradox intrigues me because it occupies the place where creativity and skill rub up against each other. Every child is an experiment of nature. Children need their parents' curiosity about them as an avenue of self-discovery. Emotion is not opposed to reason. Emotions guide and manage thought in fundamental ways and complement the deficiencies of thinking. \u2014 David Foster Wallace, This Is Water: Some Thoughts, Delivered on a Significant Occasion, about Living a Compassionate Life Despite not knowing if what he felt from moment to moment would pass or last forever, he entered fully into his shifting states of violent rage, self-pity, longing, heartbreak, cynicism, without losing the ability to think about what was happening to him. That took courage, I thought, living with the suffering in a mindful way, as an artifact of being, neither good nor bad. The decisions for which we bear responsibility are the ones we make. Be a yardstick of quality. Some people aren't used to an environment where excellence is expected. If there is anything that we wish to change in the child, we should first examine it and see whether it is not something that could better be changed in ourselves. I don't like that man. I must get to know him better. A small group of thoughtful people could change the world. Indeed, it's the only thing that ever has. Some people think love is the end of the road, and if you're lucky enough to find it, you stay there. Other people say it just becomes a cliff you drive off, but most people who've been around awhile know it's just a thing that changes day by day. If I'd waited to know who I was or what I was about before I started \"being creative,\" well, I'd still be sitting around trying to figure myself out instead of making things. In my experience, it's in the act of making things and doing our work that we figure out who we are. While the left hemisphere's raison d'\u00eatre is to narrow things down to a certainty, the right hemisphere's is to open them up into possibility. In life we need both. In fact for practical purposes, narrowing things down to a certainty, so that we can grasp them, is more helpful. But it is also illusory, since certainty itself is an illusion \u2013 albeit, as I say, a useful one. Love and the search for truth are unifying principles. Though the human body is born complete in one moment, the birth of the human heart is an ongoing process. It is being birthed in every experience of your life. Everything that happens to you has the potential to deepen you. It brings to birth within you new territories of the heart. Suffering passes, but the fact of having suffered never passes. \u2014 Leon Bloy If you're really listening, if you're awake to the poignant beauty of the world, your heart breaks regularly. In fact, your heart is made to break; its purpose is to burst open again and again so that it can hold ever-more wonders. \u2014 Andrew Harvey The capacity for inner dialogue is a touchstone for outer objectivity. \u2014 Carl Jung, \"The Transcendent Function\" We are human less by virtue of our ideal goals than by the vice of our inferiority. \u2014 James Hillman, Healing Fiction When we have for so long been judged by everyone we meet, just to look into the eyes of another who does not judge us can be extraordinarily healing. \u2014 Jack Kornfield, A Path With Heart And there is a Catskill eagle in some souls that can alike dive down into the blackest gorges, and soar out of them again and become invisible in the sunny spaces. And even if he forever flies within the gorge, that gorge is in the mountains; so that even in his lowest swoop the mountain eagle is still higher than other birds upon the plain, even though they soar. \u2014 Herman Melville, Moby Dick I've been absolutely terrified every moment of my life and I've never let it keep me from doing a thing I wanted to do. \u2014 Georgia O'Keefe The soul that beholds beauty becomes beautiful. \u2014 Ploteinus Melancholy gives the soul an opportunity to express a side of its nature that is as valid as any other but is hidden out of our distaste for its darkness and bitterness. \u2014 Thomas Moore, Care of the Soul Where danger is, there is salvation also. \u2014 Holderlin No one should deny the danger of the descent, but it can be risked. No one need risk it, but it is certain that someone will. And let those who go down the sunset way do so with open eyes, for it is a sacrifice which daunts even the gods. Yet every descent is followed by an ascent. One of the first things to learn if you want to be a contemplative is to mind your own business. Nothing is more suspicious, in a man who seems holy, than an impatient desire to reform other men. \u2014 Thomas Merton, New Seeds of Contemplation When beliefs need some modification, We make it with much trepidation, For our world is then new, And things seem all askew, 'til we're used to the new formulation. \u2014 Professor Arnold Tustin To dare to be aware of the facts of the universe in which we are existing calls for courage. \u2014 W. R. Bion Trust in what you love, continue to do it, and it will take you where you need to go. \u2014 Natalie Goldberg, Writing Down the Bones Then to the depths! \u2013 I could as well say height: It's all the same. \u2014 Goethe, Faust If you want the whole thing, the gods will give it to you. But you must be ready for it. \u2014 Joseph Campbell, The Joseph Campbell Companion The ultimate measure of a man is not where he stands in moments of comfort and convenience, but where he stands at times of challenge and controversy. Learning always involves self-transcendence. Learning calls forth what is in us, helping us to move toward authenticity and wholeness. \u2014 Karl Rahner Open your heart, your gaze, to the visitations of angels, even if the gifts they bring may not be centeredness and balance but eccentricity and a wholly unfamiliar sense of pleasure called joy. \u2014 James Hillman, The Rag and Bone Shop of the Heart These are little packets of light and you need to plant them early in the year and remember to mark where they were because lots of times they look like weeds in the beginning and"} +{"id":"RedPajamaCommonCrawl.0042","text":"Category Archives: Wings Of VirtualPilot3D Fokker DR.1 Triplane \u2013 [THE RED BARON] December 16, 2018 Wings Of VirtualPilot3D, WW I Fighter PlanesFokker Aircraft, Fokker DR.1, Fokker DR.1 Engine, Fokker DR.1 Triplane, Fokker DR1 Cockpit, Manfred Von Richthofen, The Red BaronJack \"ICEMAN\" Taylor Fokker DR.1 Triplane Manfred von Richthofen also known as \"The Red Baron\" made the Fokker DR.1 Triplane infamous and they will forever be linked in history. It is the Fokker DR.1 that is etched in everyone's mind when they think of the Red Baron. This incredible aircraft briefly gave the Luftstreitkr\u00e4fte (German Air Service) a deadly advantage as soon as it appeared over the Western Front. The Fokker DR.1 was built by Fokker-Flugzeugwerke after the Luftstreitkr\u00e4fte captured a Sopwith Triplane in February, 1917. Anthony Fokker inspected a captured Sopwith Triplane in April, 1917 while visiting Jasta 11. After inspecting the Sopwith Triplane's design, Anthony Fokker returned to his Schwerin factory and instructed Reinhold Platz to build a triplane. It's mportant to note that Anthony Fokker did NOT give Reinhold Platz any technical information about the Sopwith design. This would be German engineering at it's BEST! Fokker Dr.1 \u2013 Manfred von Richthofen, 03-09-1917 \u2013 Extremely Rare Footage! Manfred von Richthofen flew one of the first two pre-production triplanes that were designated F.I. These were the first triplanes in accord with Idflieg's early class prefix for triplanes. On September 1, 1917, Manfred von Richthofen jumped into the cockpit of his Fokker DR.1 serial number 102\/17. He shot down two enemy aircraft within the next two days. Richthofen quickly determined that the F.I was far superior to the Sopwith Triplane in every way. Richthofen also strongly recommended that all fighter squadrons be reequipped with the Fokker DR.1 as quickly as possible. In September 1917, Idflieg sent in a production order for 100 Fokker DR.1's in September in addition to 200 more aircraft in November. 320 triplanes would be produced during World War I. There are only three triplanes that are known to have survived the Armistice. One is believed to have crashed sometime in the late 1930s and two were lost to Allied bombing raids on Germany during World War II. There are no surviving triplanes but there are some original Dr.I artifacts on display in museums. There are a large number of replica aircraft that have been built over the years for private collectors and museums. If you're lucky, you might even see one at an air show near you! Fokker Aircraft Fokker's first aircraft design was the the Spin (Spider) pictured below and was the first Dutch-built plane to fly in his home country. Because of better opportunities in Berlin Germany, on February 12, 1912, Anthony Fokker founded Fokker Aircraft (Fokker Aviatik GmbH). Fokker sold several Fokker Spin monoplanes to the German government and had his factories built in Germany. He was able to quickly capitalize because of World War I which did NOT start out as an air war. There was no such thing as an air war before World War I. The invention of powered flight was in 1903 and aviation was still in its infancy. Before powered flight, armies would use hot air balloons for observing enemy positions like they did during the American Civil War for example. So, it was natural for the militaries of the time to utilize aircraft the same way. They installed state-of-the-art cameras to photograph troop positions and to get a bird's eye view of the battle field. These early reconnaissance missions were relatively safe because there was no such thing as air combat yet. Troops on the ground would often shoot at these aircraft but were unsuccessful. They would send their reconnaissance aircraft to harass the enemies. The aircraft weren't armed so the thought of shooting down enemy aircraft had still not been thought of. Until on some unknown date in history by an unknown pilot took a shot at an enemy aircraft with his pistol. Since that time forward, the \"The DOGFIGHT\" was born and a new era of warfare unleashed. Fokker DR1 Cockpit Take a look at the replica Fokker DR1 Cockpit below. It is an exact replica of The Red Barons cockpit and as you can clearly see. It was cramped and had little to no flight instruments. Most cockpits during that time did not look much different. Even though these aircraft were state-of-the-art at that time. The cockpit was crude at best! One of the major problems with the Fokker DR1 Cockpit was the lack of visibility for the pilot during takeoffs and landings. Another big problem was that the cockpit was cramped and made of inferior materials which made for a crude and hazardous cockpit. The biggest problem of all was the placement of the twin 7.92 Spandau machine guns and the lack of sufficient crash pads on the front of the cockpit. This became a huge issue because the pilots were vulnerable to severe head injuries or even death in the event of a crash landing. This proved to be true once the Fokker DR.1 entered service and they started getting shot out of the sky. Pilots did not want to crash land a Fokker DR.1 because they were well aware of aircrafts deficiencies. Lots of German pilots were seriously injured and killed because of these design flaws. If all of this was not dangerous enough for the pilots, they also wore no parachutes. All though they had parachutes at the time pilots did not wear them. So, if the unthinkable were to happen and your plane is shot down. You had three choices and each and every one of them was worse than the next. You could shoot yourself, burn alive inside the airplane or jump to your certain death. Do you have what it takes to be a World War I fighter pilot? Fokker DR.1 Engine You are looking at a close-up view of a replica Fokker DR.1 Engine. Since their are no original Fokker Dr.1 Engines in existence, obviously a replica Fokker DR.1 Engine had to be built. Authentic rotary engines are extremely scarce and difficult to find. Finding an authentic rotary engine is half the battle. If you happen to come across an authentic rotary engine, prepare to pay an astronomical price for it! Since authentic rotary engines are so rare and expensive. Almost all replica aircraft are powered by a Warner Scarab or Continental R-670 radial engine. These are some of the finest rotary engines that money can buy! There are a few Fokker DR.1 replicas that do feature the vintage Le Rh\u00f4ne 9J or the reproduction Oberursel Ur.II rotary engines. These engines are just as airworthy as their counterparts in every way. The power plant used for the production variant of the Fokker DR.1 was the Le Rh\u00f4ne 9J engine. This engine was manufactured under license in Germany by Motorenfabrik Oberursel and sold as the Oberursel UR.II. The Oberursel UR.II had 110 hp in a reference to its nominal power rating and was a perfect match for the Fokker DR.1 Triplane. The Oberursel UR.II gave the Fokker DR.1 an incredible rate of climb and an advantage over enemy aircraft. The Oberursel UR.II is a 9 cylinder rotary aircraft engine that was originally produced in France and powered many other World War I fighter planes too! This AMAZING rotary engine flew for all sides in World War I and a handful still fly today. These engines were ahead of their time and well designed by the engineers. They were well built and designed plus the engineers got every ounce of horsepower they could get out of those engines. Manfred von Richthofen \u2013 \"The Red Baron\" \u2013 World War I Ace Of Aces! Manfred von Richthofen \"The Red Baron\" was born on May 2, 1892 in the Breslau, Province of Silesia, Kingdom of Prussia, German Empire. The Red Baron is the MOST FAMOUS fighter pilot ever! He flew for the German Air Force during World War I and is considered to be the ace of aces and the finest fighter pilot during the war. He only flew for three years but left a legacy that will last an eternity. Richthofen is officially credited with 80 air victories during the war. Some historians say the number of air victories credited to Richthofen is well over 100. However, for some strange reason all of Richthofen's air victories were not documented. During research done in the 1950s, historians discovered that 73 out of Richthofen's 80 \"OFFICIAL\" air victories were verified, matching British and French records. The Germans even kept records of serial numbers, models of the aircraft and names of pilots as well. German ace fighter pilot Oswald Boelcke met a young Manfred Von Richthofen which led him to entering flight training school in October 1915. Manfred von Richthofen also had a younger brother named Lothar von Richthofen who was training troops in Luben. Manfred encouraged his brother Lothar to transfer to the Fliegertruppe. In just one month, Manfred von Richthofen joined the Kampfgeschwader 2 (\"No. 2 Bomber Squadron\"). Manfred Von Richthofen's first plane was NOT the World Famous Fokker DR.I but the two-seater Albatros C.III. At first i seemed that Manfred was not a natural aviator. Infact, he was considered to be a below average pilot by his flight instructors. He struggled to control his aircraft and crashed the very first time he took the controls. That's not a very good start for a fighter pilot. Especially, for the LEGENDARY Manfred von Richthofen! Dogfight \u2013 The Mystery of the Red Baron (Full Documentary) \u2013 Timeline You would think this would deter Manfred but it had the opposite effect on him. He became a more astute pilot and worked even harder to master the skills it would take to eventually become the fighter pilot history knows all to well. The \"LEGENDARY\" Red Baron! It wouldn't be long until Manfred would get his chance. Within just 60 days from Manfred's first day at Fliegertruppe, he would be sent into battle for the very first time. Well, in an airplane anyways! It was April 26, 1916 when Manfred von Richthofen was flying over the Verdun when he spotted a French Nieuport. The moment of truth arrived so Manfred engaged the enemy without any hesitation quickly gaining the advantage. Once Manfred was in shooting range he blasted away hitting the French Nieuport and shooting her down over Fort Douaumont. For some reason lost to history, Manfred never did get credit for his first official air victory. The Red Baron's Final Flight! The Red Baron flew into the history books in just three short years. He became a legend while he was still alive! Tragically, just after 11:00 am on April 21, 1918, Manfred was flying over Morlancourt Ridge near the Somme River when his cousin Lt. Wolfram von Richthofen was fired upon by a Sopwith Camel piloted by novice Canadian pilot Lieutenant Wilfrid \"Wop\" May of No. 209 Squadron, Royal Air Force. The Baron quickly gave chase and forced May to counter with evasive maneuvers. It was at this exact moment that flight commander, Canadian Captain Arthur \"Roy\" Brown engaged the Baron and fired on him. It's not known whether Brown shot the Baron or if it was from ground fire. Manfred was struck in the heart by a single .303 bullet. Although Manfred von Richthofen's death is shrouded in mystery, there is no doubt that The \"LEGENDARY\" Red Baron will live on forever! He is perhaps the MOST FAMOUS fighter pilot of all-time! Fly The Fokker DR.1 NOW! Go back in time and experience what it was like to fly with the wind in your hair, bugs in your teeth and engine oil all over your face. This is real-life flying the way it was meant to be! You are moments away from flying a REAL Fokker DR.1 that is so life-like it will blow your senses away! This is a flight simulation experience like no other in the world and the Fokker DR.1 is just the beginning! Inside Virtual Pilot 3D are 200 airplanes and helicopters that are exact replicas of their real-life counterparts. There is no other flight simulator game on the market that has this many aircraft to fly. Virtual Pilot 3D is a next generation flight simulator designed to be the MOST REALISTIC flight simulator game ever released to the public! Virtual Pilot 3D is an award winning flight simulation game that rivals popular flight simulator games such as Microsoft Flight Simulator and X-Plane. Although those incredible flight simulator games are GREAT! Virtual Pilot 3D is far better than they are and has a six year track record to prove it! Virtual Pilot 3D is definitely the GREATEST flight simulator game of all-time and it just keeps getting better and better! Go ahead and click on the orange button below now! You'll be taken to the \"OFFICIAL\" Virtual Pilot 3D website where you'll see everything this AMAZING flight simulator game has to offer. You'll instantly qualify for a HUGE discount just for stopping by and there is a BIG surprise waiting for you on the next page too! Jump into the cockpit of the Fokker DR.1 Triplane, the airplane that The Red Baron made famous! I hope to see you in the air soon pilot! Eurofighter Typhoon \u2013 [Most Advanced Fighter] December 19, 2018 Fighter Jets, Wings Of VirtualPilot3DEurofighter, Eurofighter Cockpit, Eurofighter Flight Simulator, Eurofighter Top Speed, Eurofighter TyphoonJack \"ICEMAN\" Taylor The first prototype of the Eurofighter Typhoon made its first flight on August 6, 1986. This was a technology demonstration aircraft built by the British Aerospace EAP. Early test flights were successful and exceeded all operational requirements to be a great air superiority fighter. The Eurofighter would become the largest multinational collaboration project ever assembled by France, Germany, Italy, Spain and the UK. The first prototype of the finalized Eurofighter Typhoon made its first flight on March 27, 1994 and flew flawlessly during her test flights. She was originally designed to be an air superiority fighter that is extremely agile. The Typhoon was specifically designed to be a supremely effective dogfighter in combat. This AMAZING airplane is one of the BEST front line fighter planes in the world today! 4K Fantastic Display GAF Eurofighter Typhoon 'Ghost Tiger' ILA BERLIN 2018 On January 30, 1998, the very first production contract was signed between Eurofighter GmbH, Eurojet and NETMA. The first Air Force's in Europe to receive Typhoons were Germany, Italy, Spain and the UK. The procurement totals were as follows: Germany 180, Italy 121, Spain 87 and UK 232. On August 4, 2003, the first Eurofighter Typhoons went into service and Germany received the very first series production Eurofighter (GT003). In 2003, Spain also took delivery of its first series production aircraft and became the second Air Force in Europe to receive Typhoons. Unfortunately, soon after the Spanish Air Force had a training accident near Otep\u00e4\u00e4 in Estonia. The pilot inadvertently released a AIM-120 AMRAAM air-to-air missile which either self-destructed in air or landing somewhere unexploded. There were no human casualties and the AIM-120 AMRAAM air-to-air missile was never found. On December 16, 2005, the European Typhoon reached initial operational capability (IOC) with the Italian Air Force (Aeronautica Militare). Italy became the third country in Europe to have operational Typhoons with the UK becoming fourth country in Europe on August 9, 2007. The Austrian government announced its decision to buy the Eurofighter Typhoon on July 2, 2002. The purchase included 18 Typhoons, logistics, maintenance, training and a Eurofighter Flight Simulator. The Eurofighter Typhoon has an intentionally relaxed stability design making the Typhoon a very agile aircraft at both low and supersonic speeds. This INCREDIBLE aircraft will give any fighter plane in the world a run for its money. That includes 5th generation and stealth fighter planes as well. In the right pilots hands, the MIGHTY Typhoon is DEADLY and feared by her enemies! Looking at the Eurofighter Typhoon is like looking at fine art in a museum. She is a beautiful airplane that looks like something out of the future. The Eurofighter Typhoon is the MOST ADVNCED fighter plane ever to fly for Europe. The Eurofighter was designed during the height of the Cold War in order to counter Russian fighter planes. Before the Eurofighter, Nato countries flew American made aircraft such as the F-16 fighting Falcon. The Eurofighter first entered service in Europe on August 4, 2003 and is still in service today. Since the Eurofighter entered service, there have been 623 Typhoons built with many more to come. The Eurofighter is so advanced and ahead of its time that it will be Europe's frontline fighter for many decades to come. She is designed to adapt to latest technologies and can be easily refitted with the latest weapons systems and avionics. Eurofighter Production Each Eurofighter Typhoon costs \u20ac90 million Euros ($102,821,850.00 US Dollars) system cost Tranche 3A, \u00a3125 million Pound sterling ($158,202,500.00 US Dollars) including development plus production costs. The primary users are the Royal Air Force (UK), German Air Force, Italian Air Force and Spanish Air Force. The Eurofighter Typhoon is unique in modern combat aircraft in that there are four separate assembly lines. Each partner company assembles its own national Eurofighter Typhoon but builds the same parts for all production aircraft including exports. Leonardo (left wing, outboard flaperons, rear fuselage sections), EADS CASA (right wing, leading edge slats), Premium AEROTEC (main centre fuselage) and BAE Systems (front fuselage inboard flaperons, (including foreplanes), canopy, tail fin, rear fuselage section and the dorsal spine). Eurofighter Top Speed The Eurofighter Top Speed is 1,550 mph which is Mach 2.02 or in more simpler terms, \"Twice The Speed Of Sound\". The Typhoon has a range of 3790.005 Kilometers (2,355 Miles) which can cover the entire continent of Europe. With her superior speed, she can outrun most frontline fighters and out maneuver them even at high speeds. This is one of the most maneuverable airplanes ever built and designed to dominate its opponent in a dogfight. You can have the most beautiful airplane in the world with the deadliest and most advanced systems ever devoted for combat. However, the most important part of an airplane is its power plant and what a power plant the Eurofighter Typhoon has under the hood. This particular engine is as advanced as the Eurofighters design and is the perfect power plant for this incredible machine. It is this power plant that makes the Eurofighter so deadly! The Eurofighter Typhoon is fitted with two Eurojet EJ200 engines. These engines are capable of providing up to 60 kN (13,500 lbf) of dry thrust and >90 kN (20,230 lbf) with afterburners. You can take a look at one the Eurojet EJ200 engines in the photograph below. The Eurojet EJ200 engine is capable of supersonic cruise without using afterburners (Supercruise). This is an an advantage over most of its counterparts. Only 5th generation fighters such as the F-22 Raptor and F-35 Lighting are capable of supersonic cruise without using afterburners. One advantage the Eurofighter has over the F-22 is that it can launch weapons while under supercruise to extend their ranges. The EJ200 engine has the potential to be fitted with Thrust Vectoring Nozzles (TVN). This would make the Eurofighter Typhoon insanely maneuverable. She already possess SUPERIOR agility! Eurofighter Cockpit You can't talk about this AWESOME airplane unless you talk about the Eurofighter Cockpit. This is where all the magic happens and is the core of the Eurofighter Typhoon. The Eurofighter Cockpit is every fighter pilots dream and is where the present day meets the future. Pilots access the cockpit by either a telescopic integral ladder or an external version of the ladder. The integral ladder is stowed in the port side of the fuselage just below the cockpit. Once inside the cockpit, the pilot will see a glass cockpit without any conventional instruments. The Eurofighter Cockpit features three full colour multi-function head-down displays (MHDDs). All formats on each display are manipulated by means of XY cursor, soft-keys and voice Direct Voice Input or (DVI Command). She also features a voice and hands-on throttle and stick (Voice+HOTAS) plus a wide angle heads-up display (HUD) with forward-looking infrared (FLIR). The Eurofighter Typhoon features the Direct Voice Input (DVI) system that uses a speech recognition module (SRM). The DVI provides the pilot with an additional natural mode of command and control and approximately 26 non-critical cockpit functions. This reduces the pilot workload that will enhance aircraft safety while expanding mission capabilities at the same time. The Eurofighter Typhoon can use its Instrument Landing System (ILS) for landing in poor weather. This aircraft also features an enhanced ground proximity warning system (GPWS) and is based on the TERPROM Terrain Referenced Navigation (TRN) system used by the Panavia Tornado. This is just a fraction of the avionics and controls featured inside the Eurofighter Typhoon and why the Eurofighter Cockpit is ahead of its time! Amazing Flying The RAF Eurofighter Typhoon Through The Mach Loop At Low Level Over UK \u2013 Cockpit View Have you ever wondered what it would be like to fly in a real-life Eurofighter Typhoon? Well, I've got GREAT news for you today! All you have to do is click the play button on the video above and fly with the RAF aboard the Typhoon. Make sure your sound is turned up so you can hear every minute of this flight. You aviation enthusiasts are going to love this video because there is no music, just the beautiful sound of the twin Eurojet EJ200 engines. So go ahead and grab some popcorn and enjoy the flight! This is the closest thing to flying the real thing so you're going to absolutely love it! I really hope your enjoyed your flight and your feet are safely back on the ground. What an incredible feeling it must be to fly one of those things and to think it's just another day at the office for those guys. If you are a flight enthusiast like myself, you're probably wanting to fly the Eurofighter yourself. There is a way to fly the Eurofighter without having to join the RAF and it's a lot easier than you may think. You are only a click away from flying Europe's MOST ADVANCED fighter plane inside \"The Worlds MOST REALISTC Flight Simulator Game!\" The only flight experience more REALISTIC than this is flying a real-life Eurofighter! There are lots of GREAT flight simulator games on the market, I know because I've flown them all. Those flight simulator games are AWESOME but Virtual Pilot 3D is far SUPERIOR! In fact, you haven't flown a REAL flight simulator until you fly Virtual Pilot 3D. This is the BEST flying experience you can get from a desktop that is so realistic, it'll literally take your breath away! Eurofighter Flight Simulator! Okay Pilots! You are moments away from a 4K flying experience that is second to none! All you have to do is click on the orange button below NOW! It only takes about eight minutes to download Virtual Pilot 3D so you'll be in the air in no time at all. WARNING! This is a REALISTIC Flight Simulator! This is the MOST REALISTIC Eurofighter Flight Simulator you'll find anywhere online and it's just like flying a real-life Eurofighter! Virtual Pilot 3D is a REALISTIC flight simulator game which means that you have to fly these aircraft just like a real-life pilot. Even though you can just jump into the cockpit and fly arcade style, you can also fly like a real-life fighter pilot! Virtual Pilot 3D has lots of flight training manuals and videos so you'll be flying in no time at all. It's like having your very own flight school on your computer. There is nothing like Virtual Pilot 3D on the market and is an industry leader. Virtual Pilot 3D is much, much more than just a flight simulator game! It can be used by student pilots to perfect their flying skills without the cost of an airplane and flight instructor. This is as REAL as it gets! I know you're ready to jump into the cockpit of the Eurofighter Typhoon. Go ahead and click on the button below and I'll see you on the next page where you'll see all the features Virtual Pilot 3D has to offer and there are BONUSES and a HUGE discount offer waiting for you. This is a RISK-FREE offer so you have nothing to lose! Click on the orange button below for the \"ULTIMATE\" flight simulation experience NOW! The Hindenburg Disaster \u2013 [FINAL FLIGHT] December 25, 2018 Airships, Wings Of VirtualPilot3DHindenburg, Hindenburg Disaster, Hindenburg Interior, LZ 129 Hindenburg, The Hindenburg, Zeppelin Flight SimulatorJack \"ICEMAN\" Taylor The Hindenburg On May 3, 1937, The Hindenburg departed from Frankfurt, Germany to Lakehurst, New Jersey its first scheduled round trip between Europe and North America of the season. Even though there were strong headwinds slowing the Hindenburg's Atlantic crossing, it was still a routine flight as it approached Lakehurst, New Jersey for a landing three days later. Just before the LZ 129 Hindenburg made her final approach into Lakehurst on May 6, 1937, there was a severe line of thunderstorms approaching the area. The Hindenburg's arrival was delayed for several hours as a safety precaution while the thunderstorms passed through the area. At approximately 7 PM Eastern Standard Time, Captain Max Pruss in command of The Hindenburg was cleared for the final approach into the Naval Air Station in Lakehurst. Hindenburg Disaster: Real Zeppelin Explosion Footage (1937)- Must See! She slowly made her final approach into NAS Lakehurst at an altitude of 650 ft (200 m) with Captain Max Pruss at the controls. At approximately 7:21 PM Eastern Standard Time, a pair of landing lines were dropped from the nose of The Hindenburg. The landing lines were grabbed by ground handlers to secure the airship. Approximately 4 minutes later, at 7:25 PM Eastern Standard Time. The Hindenburg suddenly exploded and was engulfed in flames as she plummeted to the ground. It only took a little more than thirty seconds for The Hindenburg to be fully engulfed in flames. This horrible tragedy was over almost as quickly as it started. The Hindenburg disaster was magnified because she was using hydrogen gas which is highly flammable for lift instead of the non-flammable gas helium. The silvery cloth covering The Hindenburg contained material which included cellulose nitrate which is also extremely flammable. The use of hydrogen gas and the flammable cloth material contributed to this historic disaster. There were 36 passengers and 61 crew aboard The Hindenburg. Incredibly, only 13 passengers, 22 crew and one member of the ground crew were killed. In all, 36 people were killed in The Hindenburg disaster. It is AMAZING that more people weren't killed on that fateful day. The exact cause of The Hindenburg disaster still remains a mystery today! LZ 129 Hindenburg The LZ 129 Hindenburg (Registration: D-LZ 129; Luftschiff Zeppelin #129) and the lead ship of the Hindenburg class. She was a HUGE German commercial passenger-carrying rigid airship and made a total of 63 flight from 1936\u201337. The Hindenburg was built and designed by the Zeppelin Company (Luftschiffbau Zeppelin GmbH) on the shores of Lake Constance in Friedrichshafen, Germany. The Hindenburg was to be approximately 803 ft 10 in (245 m) long and 135.1 ft 0 in (41.2 m) in diameter. Her Power-plant were 4 Daimler-Benz DB 602 (LOF-6) diesel engines with 890 kW (1,200 hp) each. She carried a crew of 40 to 61 and could accommodate 50\u201370 passengers. The Hindenburg's performance was also impressive as well! She had a maximum speed of 85 mph (135 km\/h) and could make an Atlantic crossing in just 3 days time. This AMAZING airship was a true marvel of engineering and state-of-the-art technology in 1937. Just imagine what it would be like to see an airship the size of The Hindenburg flying overhead. Most of you have seen a Goodyear Blimp and you know those airships are huge and impressive in their own right. The Goodyear Blimp is less than one fourth the size of The Hindenburg! She is 192 ft (58.5 m) long. You could just imagine the enormous size of The Hindenburg! The largest airships ever built were the two Hindenburg-class airships built by the Zeppelin Company. The two airships were the (LZ 129) and the (LZ 130). These airships were built to an all-duralumin design and was originally designed for helium, heavier than hydrogen but nonflammable. She would later be designed for hydrogen because the United States would not sell helium to Germany. This would be one of the many contributing factors to The Hindenburg Disaster on May 6, 1937. Hindenburg Interior We'll start our Hindenburg Interior tour with the Control Car where the Hindenburg is controlled from. The Hindenburg Control Room with Ludwig Felber at helm with possibly Knut Eckener to his right. The ballast board is located far left with the rudder station and gyro compass repeater. Off to the right is the eyepiece of a drift measuring telescope and to the right of that is the altimeter, the engine telegraph, speaking tube, engine instruments and axial corridor with a variometer to the far right. The interior of the Hindenburg was even more impressive than the airship itself and rivaled luxury liners like the Titanic. This was true luxury flying at its best and must have been the ultimate traveling experience at that time. A one way was ticket cost around $400 USD which was a fortune in 1937 but you are flying in complete luxury. A roundtrip ticket cost $720 USD which was about the same price as an automobile at that time. As you can see by the color Hindenburg Interior photos, you got what you paid for. The image above is from The Hindenburg's dining room with the world map on the wall. The chairs were comfortable and the dining room was large enough to accomodate 50 to 70 passengers comfortably. There was plenty of elbow room for all the passengers and crew aboard The Hindenburg. She was designed to be the most luxurious airship in the skies and she was. Flying over the Atlantic Ocean usually took 3 days so the passengers and crew needed sleeping quarters. There were 25 double-berthed cabins at the center of A Deck and 9 more double-berthed cabins on B Deck. Each cabin measured approximately 78\u2033 x 66\u2033 and the doors and walls were made of a thin layer of lightweight foam covered by fabric. The Cabins were decorated in one of three color schemes. They were Cabins were decorated in one of three color schemes which were grey, beige or light blue. Just like a luxury liner, The Hindenburg featured Promenades On either side of A Deck. The promenades featured seating areas with large windows that could be opened during flight. The Hindenburg also had a writing room which featured paintings by Otto Arpke depicting scenes from all around the world. The small writing room was located right next to the lounge and waiting room area. Believe or not, there was even a smoking room aboard as well. Hindenburg Disaster Below is the MOST FAMOUS Hindenburg Disaster image of all-time! This historic photo was taken at approximately 7:25 PM Eastern Standard Time at Naval Air Station in Lakehurst, New Jersey. The reason why this colorized photo looks familiar to most of you is because this iconic image has been used in appearances in media over the decades. An illustration of this image was used for the 1975 Hollywood blockbuster film, \"The Hindenburg\". The famous image of the burning Hindenburg was used as the cover of Led Zeppelin's self-titled debut album January 12, 1969. Led Zeppelin chose this image for their album cover because the band was not expected to do well. They were expected to crash and burn just like the Hindenburg but history shows that Led Zeppelin became the GREATEST rock and roll band of all-time! There have been other uses of this photo in countless books and magazines over the years as well. You are looking at another colorized image of The Hindenburg Disaster. This particular photo was taken from the original Hindenburg Disaster film and colorized. It only took approximately 30 seconds or less from the time The Hindenburg exploded to the frame this image was taken from the film. If you look closely, you can clearly see people running from the disaster as The Hindenburg falls to the ground. Colorizing these photos bring The Hindenburg Disaster to life! The Hindenburg Disaster would be the LAST GREAT airship disaster of the 20th century. It would also be the end of an era! Luxury airship travel would go down in flames with The Hindenburg. It wasn't just the disaster that ended airship travel but an improvement in aviation as well. It was no longer feasible to build enormous airships for air travel so the golden age of large German commercial passenger-carrying rigid airships was over! Mega Disasters \u2013 The Hindenburg The Hindenburg Disaster destroyed a true modern marvel of German engineering and proved that no matter how far advanced man's technology becomes, a MEGA disaster could be just seconds away. For years, historians and engineers have tried to figure out exactly what happened on that fateful day in 1937. Even though The Hindenburg Disaster still remains a mystery, there's a lot that we do know. Their have been many theories as to what happened and one particular theory has gained some traction. So much so that there were two motion pictures based on this theory. I already mentioned one film earlier named The Hindenburg released in 1975 and the pilot episode of the NBC series Timeless uses the Hindenburg as the first destination of the Time Team. Both films uses a fictional storyline that hints at sabotage. Although the sabotage theory has never been proven, most historians believe sabotage was the cause of the disaster. At the time, Nazi Germany was in political turmoil and it was thought that enemies of the Nazi regime planted a timed bomb onboard The Hindenburg. She was the pride and joy of Germany so destroying The Hindenburg would make a great target for Hitler's enemies. Another hypothesis often involves a combination of leaking gas and atmospheric static conditions known as St. Elmo's fire. St. Elmo's fire (also known as St. Elmo's light) is a weather phenomenon which luminous plasma is created by a coronal discharge from a sharp or pointed object in a strong electric field such as a thunderstorm. The luminous plasma coronal discharge is often seen as a bluish or other color glow. These are just two of the numerous theories over the years that have never been proven. Regardless of what caused The Hindenburg Disaster, she is one of the GREATEST engineering feats in aviation history! Fly The Hindenburg In A Real Zeppelin Flight Simulator! It's been over 71 years since the tragic Hindenburg Disaster. Even though The Hindenburg no longer flies passengers across the Atlantic Ocean. She still flies in all her glory inside the World's MOST REALISTIC Zeppelin Flight Simulator, VirtualPilot3D\u2122! Virtual Pilot 3D is a state-of-the-art 4K smart flight simulator that is designed to be the MOST ADVANCED flight simulator game ever created for a home PC. This is flying the way it's supposed to be and the BEST flight simulator game on the market today! Virtual Pilot 3D rivals other flight simulator games like Microsoft Flight Simulator and Flight Simulator X. Those flight simulator games are considered the top flight sims money can buy but Virtual Pilot 3D is lightyears ahead of the competition. Those flight simulator games are GREAT but Virtual Pilot 3D is even better! Virtual Pilot 3D has advanced features that are only available with this award winning flight simulator game. Unlike other flight simulator games in the industry, Virtual Pilot 3D offers FREE monthly software updates that include new scenery, new aircraft and flight software upgrades. This is the ONLY flight simulator game on the market that just keeps getting better with time. In fact, you'll never have to buy another flight simulator ever again! You can fly The Hindenburg in just a few moments from now. All you have to do is click on the orange button below and I'll see you on the next page. There, you'll be introduced to the GREATEST flight simulator the gaming world has ever seen. Flying The Hindenburg is just the tip of the iceberg! There are over 200 additional airplanes, helicopters, spaceships and gliders to choose from. If it flies, it's in the game! F-117 Nighthawk Stealth Fighter \u2013 We [RULE] The Night! December 28, 2018 Stealth Aircraft, Wings Of VirtualPilot3DF-117 Cockpit, F-117 Nighthawk Stealth Fighter, F-117 Top Speed, F117 Flight Simulator, Lockheed F-117 NighthawkJack \"ICEMAN\" Taylor F-117 Nighthawk Stealth Fighter The F-117 Nighthawk Stealth Fighter was made famous for its role during the Persian Gulf War in 1991. She was the aircraft that fired the first shots of Desert Storm and lead the way into the most heavily defended city in the world at that time, Baghdad. With her stealth technology, she was easily able to penetrate enemy airspace undetected and strike her targets with laser like precision. On the first night of the war, it was reported that the Lockheed F-117 Nighthawk hit 80% of their designated targets with zero combat losses. Later reports were scaled back to a 41\u201360% success rate which is still pretty impressive. The F-117 was the only aircraft that the coalition would risk over Baghdad because it was so heavily defended. Most of the optically aimed AAA and infra-red SAMs were located on the outskirts of the city making it possible for other aircraft to hit targets inside the downtown Baghdad area. F-117 Nighthawk \u2013 Wings Over the Gulf: First Strike Part (2\/4) During the Gulf War in 1991, the F-117 logged in approximately 6,905 flight hours scoring direct hits on 1,600 high-value targets while flying 1,300 sorties in Iraq. She carried 500-2000 pound laser-guided bombs designed for hardened targets such as underground bunkers and aircraft hangers. Although the F-117 is designated \"F\" for fighter, she is a ground attack aircraft only and NOT a dogfighter. The F-117 was specifically designed to be the world's first invisible plane and defeat any enemy radar system. It is her unique design that made her stealth capabilities possible. Stealth technology has its advantages and disadvantages such as sacrificing performance for stealth. The F-117 Stealth Fighter is a ground attack aircraft that is NOT very maneuverable because of a high sweep wing angle of 50\u00b0 degrees needed to deflect incoming radar waves. Another disadvantage to stealth technology is the F-117's speed and performance. This is due to lower engine thrust and losses in the inlet and outlet, a very low wing aspect ratio and a high sweep wing angle of 50\u00b0 degrees as mentioned earlier. Because of these design considerations and no afterburner, the F-117 Nighthawk is limited to subsonic speeds. It is this revolutionary design that gives the F-117 a radar cross-section of about 0.001 m2 (0.0108 sq ft), which is about the size of a small bird on a radar screen. The Lockheed F-117 Nighthawk was proposed by Skunk Works Director Kelly Johnson and his assistant Ben Rich. In the early 1970's the United States Air Force (USAF) approached Lockheed with a stealth concept for a first strike aircraft. Kelly Johnson proposed a rounded design which he believed the smoothly blended shapes offered the best combination of stealth and speed. Kelly's assistant Ben Rich, proposed faceted-angle surfaces which he believed would provide significant reduction in radar signature and that necessary aerodynamic control could be easily provided with computer units. In May 1975, a Skunk Works report titled \"Progress Report No. 2, High Stealth Conceptual Studies\" showed why the rounded concept was rejected in favor of the flat-sided design proposed by Ben Rich. Although both concepts were revolutionary, the flat-sided design proved to be stealthier. This highly unusual design makes the F-117 Nighthawk aerodynamically unstable in all three aircraft principal axes. Constant flight corrections need to be made by a fly-by-wire (FBW) flight control system to maintain controlled flight. Without this state-of-the-art fly-by-wire (FBW) flight control system. It would be impossible for pilots to fly the F-117. The F-117 is just too aerodynamically unstable! Experienced fighter pilots were both shocked and amazed at the unusual design of the F-117 Nighthawk. One pilot was quoted as saying that stated that when he first saw a photograph of the F-117 Nighthawk, he promptly laughed and thought to himself that the F-117 clearly can't fly. He was right in a sense because early stealth aircraft such as the F-117 were specifically designed for minimal radar cross-section (RCS) rather than aerodynamic performance. On June 18, 1981, the first YF-117A, serial number 79-0780, made its maiden flight from Groom Lake (Area 51), Nevada. That's only 31 months after the full-scale development decision was made. The first production F-117A was delivered in 1982 and operational capability was achieved in October 1983. The F-117A Nighthawk 4450th Tactical Group would be stationed at Nellis AFB, Nevada. F-117 Top Speed The F-117 Top Speed is a modest Mach 0.92 (617 mph, 993 km\/h) which is its maximum speed and cruise speed is at Mach 0.92. Because of the F-117's design, she is not capable of super-sonic speeds. However, the F-117 Nighthawk's lack of speed makes up for her invisibility to radar. Early stealth fighter designs were all about stealth, not aircraft performance. The F-117 Nighthawk's power-plant are 2 General Electric F404-F1D2 turbofans with 10,600 lbf (48.0 kN) each. She has a range of 930 nmi (1720 km) and a service ceiling of 45,000 ft (13,716 m). Wing loading is 67.3 lb\/ft\u00b2 (329 kg\/m\u00b2) and the thrust to weight ratio is 0.40. The General Electric F404-F1D2 turbofans were a perfect fit for the F-117 Nighthawk and gave her maximum performance in spite of her unusual aerodynamic design. In the early 1990's, Lockheed proposed a new variant of the F-117 Nighthawk for the United States Navy (USN). This new variant would be suitable for carrier use and was dubbed the F-117N \"Seahawk\". However, the United States Navy had no interest in the single mission capabilities of the F-117N \"Seahawk\". The F-117N \"Seahawk\" would have differed from the F-117A Nighthawk in many different ways. The new variant would include a bubble canopy, reconfigured tail, a less sharply swept wing and elevators. After the Navy shot down the F-117N \"Seahawk\" proposal, Lockheed submitted an updated proposal that included an a larger emphasis on the F-117N as a multi-role aircraft rather than just an attack aircraft. The new F-117B was a land-based variant that featured all of the F-117N capabilities. This variant was proposed to the United States Air Force (USAF) and the Royal Air Force (RAF). The renewed F-117N proposal was also known as the A\/F-117X. The F-117N nor the F-117B were ordered by the Royal Air Force (RAF) or the United States Air Force (USAF). These aircraft could be fitted with a new ground-attack radar system with air-to-air capability. She also featured optional hard-points allowing for an additional 8,000 lbs (3,600 kg) of payload. In this new role, the F-117N \"Seahawk\" and F-117B could carry AIM-120 AMRAAM air-to-air missiles. F-117 Cockpit The F-117 Cockpit was very spacious for pilots compared to traditional fighter planes. She featured ergonomic displays and controls making the pilots job so much easier with everything at their fingertips. One of the problems pilots faced was their limited field of view. It was somewhat obstructed by the design of the canopy with a gigantic blind spot in the rear. Since the F-117 Nighthawk was an attack aircraft and not a dogfighter, the lack of visibility was not a huge problem for pilots. The avionics inside the F-117 Nighthawk were state-of-the-art at that time and the core of this magnificent aircraft. Even though she featured stealth technology to evade enemy radar, she relied on her quadruple-redundant fly-by-wire flight controls, sophisticated navigation and attack systems integrated into a digital avionics suite. No other aircraft in the world at that time featured an avionics package like this! Take a look at the F117 Cockpit photo below and see what it looks like from a fighter pilots point of view. As you can see, the F117 Cockpit is roomier and the ergonomic displays and controls are right in front of the pilot. Just like other fighter planes, the control stick is right in between the fighter pilots legs with the throttle on the left. This cockpit configuration was extremely efficient for pilots and relatively comfortable on long flights as well. The F-117 Nighthawk's sophisticated navigation and attack systems navigate primarily by using GPS and high-accuracy inertial navigation. All F-117 Nighthawk missions are coordinated by an automated planning system. This automated planning system can automatically perform all aspects of an attack mission including weapons release and safely return to base. The F-117 Nighthawk could technically fly a mission without a pilot in command! 11 Little Known Facts About The F-117 Nighthawk \u2013 F-117 Is Still Flying The Amazing Lockheed F-117A Nighthawk was a flying legend during her time and exceeded all expectations when the moment of truth arrived. She performed flawlessly in combat and proved to be the most valuable asset in the United Air Force's inventory. Even though she wasn't very fast, she was nearly invisible to radar making her the world's first stealth fighter to enter service. She has paved the way for a new generation of stealth fighters with unimaginable capabilities. There were a total of 64 F-117 Stealth Fighters built, 5 YF-117As and 59 F-117As. The F-117 Nighthawk exclusively saw service with the United States Air Force (USAF). The Royal Air Force (RAF) was offered to buy the F-117 Nighthawk during the Reagan administration but declined for reasons unknown. Each F-117 Nighthawk cost approximately $42.6 million USD (flyaway cost) and $111.2 million USD (average cost). A Flyaway cost is the basic cost of production including the tools to make the aircraft. It does not take into account research and development and supplementary costs for support equipment, avionics and weapons systems. The F-117 Nighthawk developed from the Lockheed Have Blue program. The F-117 Nighthawk first entered service in October of 1983 and was retired on April 22, 2008 when she took her last flight. Even though this MAGNIFICENT aircraft is no longer in service, she still flies inside the World's MOST ADVANCED flight simulator game, Virtual Pilot 3D! You are a click away from a flying experience like no other online. This is an HD 4K flight simulator game that is designed to be the MOST REALISTIC flight simulator ever created for a home PC. In fact, you haven't flown a REAL flight simulator until you fly Virtual Pilot 3D! Fly The F117 Flight Simulator NOW! Now that you know a little bit about the F-117 Nighthawk, it's time to have some fun! How would you like to fly the F-117 Nighthawk yourself? You'll experience exactly what it's like to be a real-life stealth driver! There is a word of caution, this flight simulator game is NOT for those that are faint of heart! The F117 Flight Simulator game is almost as intense an experience as real-life combat. ALMOST! You'll sweat bullets as you try to evade enemy defense systems so you'd better keep your head on a swivel. This is NOT your daddy's flight simulator game pilots so fly at your own risk! If you're ready for a kick-ASS flight experience like no other. Go ahead and click on the orange button below NOW! You'll be taken to the OFFICIAL Virtual Pilot 3D page where I'll personally give you a tour of the BEST flight simulator game you've never heard about, Virtual Pilot 3D! Flying the F-117 Nighthawk is just one of over 200 airplanes, helicopters, spaceships and every other flying machine imaginable. Virtual Pilot 3D is more than a flight simulator game! You can fly the F-117 Nighthawk Stealth Fighter by clicking on the orange button below NOW. Just for landing on our site today, you have instantly qualified for a 50% discount. This is a risk-FREE offer so you have nothing to lose but the GREATEST flying experience that money can buy. There are also FREE bonuses that will enhance your flying experience so make sure you catch this flight TODAY! Bell UH-1 Huey Helicopter \u2013 [THUNDER] Over Vietnam! January 1, 2019 Helicopters, Wings Of VirtualPilot3DBell UH-1 Helicopter, Bell UH-1 Huey Helicopter, Bell UH-1 Iroquois, Best Helicopter Flight Simulator, UH-1 Huey VietnamJack \"ICEMAN\" Taylor Bell UH-1 Huey Helicopter The Bell UH-1 Huey Helicopter was the workhorse during the US involvement in Southeast Asia and Vietnam. Because of that conflict, the Bell UH-1 Huey has become one of the world's most famous and recognized helicopters. One other trait that is unique to the Huey is the unmistakable sound she makes. No other aircraft on this planet sounds quite like a Bell UH-1 Iroquois. It sounds like thunder from above as"} +{"id":"RedPajamaCommonCrawl.0043","text":"The Andrews Family The Andrews Opera Company in \"The Mikado,\" Ed Andrews, center. BURNED TO A CRISP. HORRIBLE CATASTROPHE ON THE NORTHERN PACIFIC. Two Killed, Twenty Injured--A Special Train Conveying an Opera Company Ditched and the Sleeping Car Destroyed by Fire--A Wreck in Minnesota. BRAINERD, Minn., Jan. 15.--A horrible accident occurred on the Northern Pacific railroad at Jonesville, the first station east of here, at 3:50 this morning, by which two women met death in horrible form, being burned to death, while twenty others were injured. The dead are: MRS. EDWARD ANDREWS. MRS. LILLY WALLACE, Mrs. Andrews' nurse. The train was a special, consisting of the sleeping car Petrel and a baggage car, and was running as the second section of No. 9, the regular train from Superior. The special left South Superior at 11:30 last evening, having on board the Andrews Opera Company, going from Duluth to Grand Forks. The train was running at the usual rate of speed, when it struck a broken rail. The sleeper left the track and went down an embankment, landing bottom side up. The flames broke out from all sides of the car immediately and burned so rapidly that the crew could do nothing but extricate the passengers from the wreck. When it was thought all had been rescued a search revealed the fact that Mrs. Ed. Andrews, wife of the proprietor of the troupe, and her nurse, Mrs. Lilly Wallace, were missing. By this time the flames were turning so fiercely that it was impossible to get near the car. When the flames were finally subdued the remains were discovered, but so badly burned that it was impossible to identify one from the other. Twenty passengers, more or less seriously injured, were taken from the wreck. Physicians were taken from Brainerd on a special train. The injured were brought back to this city and taken to the Northern Pacific hospital as soon as possible, where they were given the best of care and medical attention. Davenport [Iowa] Morning Tribune, January 16, 1892, page 1 RAILROAD WRECKS. Special Train Derailed at Jonesville, Minnesota. THE SLEEPING CAR BURNED. Two Women Cremated in the Fire and Twenty People Injured in the Wreck. BRAINERD, Minn., Jan. 16.--A horrible accident occurred on the Northern Pacific, at Jonesville, the first station east of here, at 3:50 yesterday morning. A special train consisting of the sleeping car \"Petrel\" and a baggage car was running as second section of No. 9, the regular train from Superior. The special left South Superior at 11:30 the previous evening, having on board the Andrews Opera Company, going from Duluth to Grand Forks. The train was running at the usual rate of speed, when it struck a broken rail. The sleeper left the track and went down an embankment, landing bottom side up. The flames broke out from all parts of the car immediately, and burned so rapidly that the crew could do nothing but extricate the passengers from the wreck. When all had been rescued, as it was thought, a search revealed the fact that Mrs. Andrews, wife of the proprietor of the troupe, and her nurse, Mrs. Lily Wallace, were missing. By this time the flames were burning so fiercely that it was impossible to get near the car. When the flames were finally subdued the remains were discovered, but so badly burned that it was impossible to identify one from the other. Mrs. Andrews and Mrs. Wallace had occupied an upper berth at the forward end of the car and were wrapped in the bedclothes. It is supposed that both occupants were killed instantly. The rapidity with which the flames caught hold and spread through the car caused no little surprise. Twenty passengers, more or less seriously injured, were taken from the wreck, and the physicians were taken from Brainerd and on a special train. The injured were brought to this city and taken to the Northern Pacific hospital as soon as possible. Here they were given the best of care and medical attention. The hospital is one of the best in the country, and the injured will be well cared for. Mrs. Andrews was better known by her stage name of Miss Nannie Wilmington. She was the soubrette of the company and very popular. Conductor Ball, who was in charge of the train, says the sight was the most appalling of any he had ever witnessed. The shrieks and moans of the injured could be heard half a mile away. When Miss Douglass was brought from the car she was literally enveloped in flames, her hair being on fire. Mr. Andrews rescued their little baby and supposed his wife was safe. He is wild with grief. List of Injured. Miss Metia Fritch, prima donna, burned on hands and arms. Mrs. L. F. Baker, her sister, shoulder dislocated. Miss Mary Roe, soprano, slightly burned and bruised. George Andrews, baritone, burned on arms. Miss Ella Harris, chorus girl, burned on neck and arms. Jay A. Taylor, tenor, cut and bruised. H. Allen, chorus, burned on neck. Fred Allen, chorus, bruised. Miss Shearer, chorus girl, slightly burned. L. F. Barker, son of Mrs. Barker, burned on hands and arms. Florence Joy, chorus girl, severely burned on neck and head; will probably die. May Douglass, chorus girl, burned on head and arms; will probably recover. Hamilton [Ohio] Daily Democrat, January 16, 1892, page 2. Other accounts refer to Mrs. Wallace as a maid, and point out that the temperature at the time of the wreck was some forty degrees below zero. The passengers were forced to escape into the cold clad only in their nightclothes. LOCAL CITIZEN PRAISES MEDFORD OPERA COMPANY \"I had the pleasure of hearing the fine rendition of the opera 'Pinafore,' by the Dunbar Opera Company in which Medford actors and singers are conspicuous during my stay in San Francisco,\" said Porter J. Neff, who arrived home from that city this morning. \"And it will be good news to local music lovers that this fine company will be along this way soon and present 'Pinafore' here. \"Ed Andrews of Medford is the leading comedian of the company, and Chas. Hazelrigg, another well-known Medford man, is its musical director and orchestra leader. For this reason and also because the two Miss Hamiltons and Miss Wicks, also of Medford, are in the chorus. The company bears the nickname in the profession of the Medford Opera Company. The company is on a tour of the Pacific Coast state and has been playing a three weeks' engagement in 'Pinafore' at the Mason Theater in San Francisco. In that city they enjoyed a liberal patronage and won splendid comments for their fine performance from the newspapers and music lovers of the bay cities. I heard 'Pinafore' last Tuesday night and the company gives a better performance than they did in Robin Hood here last year at the Page Theater when they made such a hit. Ed Andrews plays the part of Sir Joseph in 'Pinafore.'\" Medford Mail Tribune, April 14, 1922, page 3 Caroline Andrews Weds Violinist and Takes the East by Storm By Anthony Euwer. Should a perfectly happy married man receive another woman's picture through the mail or should it be returned to preserve his own domestic tranquility--unopened and ungazed upon. Of course, if the man's wife doesn't mind, and if the uncle of the other woman sent the picture and not the other woman herself, and if the man himself, after due reflection and prolonged inspection, turns the picture over to the public press, where it rightfully belongs, in an uncontested beauty contest all of its own, then somehow, I think the man has dealt justly and wisely and should not be subjected to censure from anyone. But to turn over the picture without telling some of the things he knew about this woman would be like quoting a text without its context--which is sometimes a most unfair thing to do. One of the things I know is she is dainty and lovely to look upon and when she sings there's a something that calls you from the all-out-of-doors and your thoughts get tangled up with sunshine and thrushes and larks and moonlight and nightingales and all that sort of thing. Leastwise that's the way it made us feel that night in Carnegie Hall, where she sang with an immense orchestra before an audience of 4000 and more, with three encores and over half a dozen recalls, and I know that the real critics--those devoutly feared and revered gods of the high tribunals of Manhattan--when they talked about her the next day, spoke of \"a dainty little lady, the loveliness and youthful freshness of her voice, the singer's breadth of phrasing. the birdlike quality of her tones, purity of intonation, a display of high tones long sustained.\" If only now instead of pounding my enthusiasm into this clicking machine I could broadcast my inside information into a radio. I know just how it would go: \"Hello Medford! Hello Medford! Have you any notion what little Caroline Andrews has done since leaving your native heath? Did you know that down there in Little Old New York they're calling her the American Galli-Curci? Did you know how she packed the Capitol Theatre there on Broadway? Hello Medford! Do you know that I heard her there myself, last winter after standing in line a full half hour, and happen to know what I'm talking about? Did you know that she gave the Brandtford Theatre in Newark (one of the largest in the country) the biggest week's business it ever had--to which Victor Herbert, who followed her up the next week, can testify. Not so bad for our little girl, hey, Medford?\" The phenomenal rise of this young dancer is scarcely to be wondered at, her precocity being well accounted for when it is remembered that she was practically born on the operatic stage. Ed Andrews of the old Andrews Opera Company and Caroline Lee, for many years prima donna of this famous organization, were her parents, and Baby Caroline sang her dolls to sleep with the \"Jewel Song\" from \"Faust.\" George Andrews, her uncle, and a noted baritone, is now retired and living in Medford. It is particularly interesting to note that our Lady Caroline has attained her present distinction through an all-American preparation, nor has she had to go outside her own family to do it. This all-American preparation is crystallized in the person of one Madame Alice Parker, who is the aunt of Caroline and whose beautiful studio overlooking Broadway and 70th Street is the rendezvous for many of the brightest lights of Manhattan's musical firmament. Ed Andrews, the father of Caroline, has just completed a tour on the coast with the American Light Opera Company. Caroline is at the present writing continuing her big success in a concert tour of the eastern cities. Her sponsor, Madame Parker, has no intention, however, of letting things rest here. In the fall she sails for two years in Italy with Caroline and a number of other pupils, where the slogan will be \"Work, work, work! Work and play in that land of beauty and home of all that is beautiful in song and story.\" And now I ask you, oh, Medford, what could be finer than that for our little songbird of the old Cascades? Caroline was married on the 12th of June to Dore Werner, a violinist of brilliant accomplishment and a well-known and popular figure in concert throughout the East. It all happened one bright day up in the Cathedral of St. John the Divine.--Portland Journal. Medford Mail Tribune, September 5, 1922, page 4 ED ANDREWS AND OPERA COMPANY TO PLAY MEDFORD Medford lovers of the best in English light opera will be delighted to know that an old favorite and fellow townsman, Ed Andrews, supported by a company worthy of his reputation, will appear at the Page early in January, according to advices received by his brother, George Andrews. The company, known as the American Light Opera Company, recently played a series of eight performances in the Auditorium in Portland, at popular prices, winning a most enthusiastic reception from large audiences and wonderfully favorable notices from the dramatic critics of the Portland press, as well as flattering editorial praise, the latter an unusual tribute to an amusement enterprise. The company will appear again in Portland early in January for a return engagement at the Auditorium, after which they will make their appearance in Medford for a season of opera. Their return to Portland will be signalized by the first performances of two favorites in English grand opera, for which the company is now rehearsing under the able direction of Mr. Andrews, \"Cavalleria Rusticana\" and \"Pagliacci.\" Their repertoire in light opera, as played in Portland, included the favorite renditions which made the old Andrews Opera Company, headed by the Andrews brothers, so deservedly popular and well remembered still throughout the United States, \"Bohemian Girl,\" \"Martha,\" \"The Mikado,\" in which Ed Andrews again plays the role of \"Koko\" in his old-time inimitable manner, \"H.M.S. Pinafore,\" \"The Mascot\" and others. Many of the members of the company will be recognized here, as they appeared with Mr. Andrews last season at the Page in \"Robin Hood.\" No veteran of the stage, such as Ed Andrews is, could hoped for a more appreciative reception of his return to the boards than the critics of the Portland papers gave him on the occasion of every performance there; nor were the various other principals and the company as a whole less warmly and deservedly noticed. Ed Andrews' friends in the valley, and they are a host, know his ability in his chosen roles, and they will accord him the heartiest of welcomes when he again makes his bow across the footlights \"in his old home town.\" Medford Mail Tribune, December 15, 1922, page 10 When Farmers Sang Opera (Portland Journal) Friends of Ed Andrews, the veteran comedian of the American Light Opera Company, which closes its Portland engagement at the Auditorium today, tell an interesting story of how he first came to Oregon. Andrews was born in Minnesota but now claims Oregon his home because he owns a pear orchard in the Medford district, where he spends his leisure time when not impersonating Ko-Ko, the sheriff of Nottingham, the old miser of \"The Chimes of Normandy,\" or other equally well-known light opera characters. Charles Hyskell, newspaper man, of Portland, is responsible for Andrews becoming an Oregon fruitgrower, for in 1907 Hyskell came west from the middle states to give the state the once-over. [Ed Andrews settled in the Rogue Valley in 1905.] At that time Andrews was touring the states with an opera company and Hyskell, who had also been connected with ventures of that kind, had become one of his fast friends. Arriving at Medford, Hyskell wrote Andrews that things looked good to him, and a few weeks later Andrews with his family and the greater part of the opera troupe landed in Medford. All of them planned to become farmers or fruit growers; some took up homesteads, others purchased lands. Ivan Humason of Portland was at that time the druggist at Medford, and his store was the rendezvous of all newcomers. The first day in town Andrews and his musical director, Charles D. Hazelrigg, and other members of the former opera troupe, were escorted to the Humason store. When evening came, Humason, who was one of the leaders in the community's musical activities, as he was also here in the earlier days of Portland, excused himself, saying he had to attend a rehearsal of \"The Mikado,\" to be given by local talent. He had not the slightest suspicion of the newcomers being opera folk. [Andrews moved to the valley months before rehearsals began.] \"Come back tomorrow,\" he said to Mr. Andrews and his companions, \"and I'll take you around town and introduce you to the business men.\" Andrews hinted they'd like to attend the rehearsal, and they were invited. The young lady who had played the piano accompaniments was delayed somehow, and while waiting for her Hazelrigg entertained with a number of piano selections. That was fine, perhaps he could fill in until the pianist arrived. He thought so and began to play the opening scene from the opera. Hazelrigg discovered that the singers had only a few books of the score and handed his to Mr. Humason, who was directing. \"Take mine,\" he said, \"I think I can get along without it,\" and continued playing letter perfect. Humason was astounded, but went on with the rehearsal. A young banker was to sing the role of Pooh-Bah. He did not know his lines very well, and his acting was somewhat crude. By this time Andrews had climbed upon the stage. \"Perhaps I can help you a little,\" he suggested as he stepped in and sang the role with great abandon. \"What's this?\" exclaimed the now thoroughly amazed Mr. Humason. \"Stop the show!\" Everything was explained, and it was decided to postpone the public performance a few weeks so that all the new principals could be given their respective roles. The night of the performance, a gala event in the town, which was at that time getting on the map largely through the development of the Olwell Brothers' pear orchard, a Portland business man visited Jesse Enyart, Medford banker. \"After supper I want you to be my guest at the opera,\" said Enyart. \"We have some good local talent. They are to sing 'The Mikado.'\" The Portland man was not very keen about it. He had attended small town amateur performances before and offered various excuses, saying among other things his education in musical appreciation had been neglected, and so forth. However, he finally accepted. \"They are all farmers; but can sing and act,\" Humason assured him. The opening scene was put over in a way that revealed years of training. Then entered Henry Garson, as Nang-ki-Po, a tall, handsome tenor with a bell-like voice. He was originally from New York. \"You say he's a farmer?\" asked the Portlander, turning to his host Humason. \"Yep, he's a farmer from the Dry Creek district.\" Ko-Ko entered and threw the house into convulsions of laughter. \"Another farmer, I suppose,\" whispered the visitor. \"He's from the woods back of town, a homesteader.\" When Yum-Yum, Pitti-Sing and Peep-Boo, the three maids, tripped fairy-like upon the stage, the Portland business man and opera connoisseur became mildly sarcastic. \"Suppose these are farmers' wives?\" \"That they be,\" answered Humason truthfully. \"Well, then, the dinner's on me; you certainly have some remarkable farmers down here.\" Medford Mail Tribune, January 12, 1923, page 5 ED ANDREWS TO APPEAR HERE IN OPERA, JAN. 22 For some time past the many friends of Ed. Andrews here in the valley have been reading of his appearance in Seattle, Portland and other northern cities and have been anxiously looking forward to his paying his old home town a visit. Manager Hunt of the Page Theatre at last announces the American Light Opera Co. in a short season of comic opera in which Ed Andrews will star as comedian. The Rogue River Valley never had a more ardent booster than Ed Andrews. He sang the praises of the Rogue River Valley wherever he could get an audience and from all reports he never loses an opportunity of putting in a good word for this valley--and it is needless to say that his many friends will not lose the opportunity of seeing him in the different characters which he will portray here. The American Light Opera Co., with a cast of 40 people including a fine group of stars, a real singing chorus, orchestra, scenery, etc., is prepared to give standard operas in a way which will meet the demands of critic and layman alike. There will be Monday, Tuesday and Wednesday (matinee and night) performances as follows: Monday, Jan. 22 \"Bohemian Girl\"; Tuesday, Jan. 23, \"Mikado\"; Wednesday afternoon, Jan. 24, \"Chimes of Normandy\" and Wednesday night, \"Pinafore.\" LIGHT OPERA CO. HIGHLY PRAISED BY MEDFORDITE The American Light Opera Company, with our old fellow townsman, Ed Andrews, in the stellar lead, will arrive in Medford Sunday morning next, to open a three days' run at the Page on Monday evening, with \"The Bohemian Girl,\" followed by \"The Mikado,\" \"Chimes of Normandy\" and \"Pinafore,\" in all of which Mr. Andrews will appear in his well-known roles. Alan Brackenreed, who has recently returned from a visit in Portland, speaking of the reception given to the company there, said: \"It was a decided triumph from start to finish, and many expressions of regret could be heard from the departing audience on the last night that the company's stay could not be prolonged. Capacity audiences in the big Auditorium applauded every performance until the players had to decline further curtain calls. Mr. Andrews never appeared to better advantage in his long stage career than during this tour, and he found a warm place in the hearts of Portland music lovers for himself and for his company. English light opera, as rendered by this company, will ever find favor with the audiences which can be gathered to hear it in centers like Portland and other cities on the coast, and I have no doubt Medford will always provide a hearty and generous welcome to Mr. Andrews and his fellow players, among whom the audiences, here as elsewhere, will discern stage talent and voices of unusual promise and rare sweetness.'' SEASON OF OPERA, PAGE NEXT WEEK \"It's just as easy for the American Light Opera Company to score a triumph as it is for a frog to roll off a log,\" thus spoke David W. Hazen, music and dramatic critic on the Portland Telegram. He also says, \"This story is not going to be a sonnet in honor of the principals. These soloists have had so many nice things said about them that a pause will ensue. \"Right here and now some words are going to be written about the most tuneful chorus that has visited Portland since the Chicago Grand Opera Company was heard here. That organization was larger, but the voices did not ring any more musically throughout the Auditorium than do the voices in the chorus of the American Light Opera Company. \"DeWolf Hopper says he always plays the role of 'Koko' with apologies to Ed Andrews; you will see him at his best as a comedian in this opera. \"So far as the music is concerned, 'The Mikado' could furnish melodies for a dozen revues and have several left over, and the lines are quite as amusing as when Gilbert and Sullivan wrote their success, which has outlived them both. \"The men's chorus is one of the most satisfying features of the opera, while the women's chorus in the opening of the second act is quite lovely. The principal roles are capably taken, with Theo Pennington as Yum Yum, Harry Pfeil as Nanki-Poo, and Ed Andrews as Ko-Ko, lord high executioner. Fresh costumes of riotous coloring, good stage settings and well-trained voices go toward making 'The Mikado' well worth hearing.\" ED ANDREWS IN HIS BEST ROLE AT PAGE TONIGHT Ed Andrews will appear in one of his most popular roles in \"The Mikado\" at the Page this evening. He is known as \"Koko\" in every town in the country where Gilbert and Sullivan operas have been produced, and that means every town worth mentioning. The veteran comedian is supported on this tour by a cast of principals and a chorus worthy of comparison with any former production of this ever-popular opera. Theo Pennington as Yum-Yum, Paula Ayres as Katisha, Harry Preil as Nanki-Po, Paul Bundschu as Pooh-Bah, and, last but not least, George Olsen as the Mikado, sustain every tradition of former days in the rendition of their parts, sung with a freshness and sweetness of voice that win enthusiastic plaudits from every audience. Of Ed Andrews himself, it is enough to say that he appears as Koko in his own inimitable manner; no praise can go beyond that. The production is costumed and staged in a manner and with a completeness of detail that reflect credit upon the producer, Rex Reynolds, who has found in his present organization, with Ed Andrews in the lead, a fitting vehicle of expression for his own high ideals of dramatic art. ED ANDREWS IN 'MIKADO' SCORES A BIG KNOCKOUT That the large audience at the Page last night enjoyed \"The Mikado,\" the second in its series of four light operas the American Light Opera Company is playing during this local engagement, was evidenced by the hearty enthusiasm which this ever-popular comic opera of Gilbert and Sullivan was received and the almost continuous laughter which greeted the funny sayings and oddities of Ed Andrews, the chief comedian. \"The Chimes of Normandy'' was presented at this afternoon's matinee, and the last opera of the series, \"H.M.S. Pinafore,\" will be given tonight. Before the curtain at the opening of the performance, the manager of the company made a brief address stating that Ed Andrews was the mainstay of the American Light Opera Company organization and because of his well-known talent and experience was mainly responsible for its success. He further related that in the initial performance in America many years ago Ed Andrews had created the character of Ko Ko, lord high executioner, in which he long ago became famed, and his brother, George Andrews, another well-known and popular Medford man, of splendid voice, had originally played the character of Poo Bah. Ed Andrews since that time has accompanied this opera or led it on its always successful journeys over the country, and has played Ko Ko over two thousand times. \"The Mikado\" presentation of last night was, to use a slang phrase, a veritable knockout. The principals and chorus were excellent in their singing and acting. The fine chorus blended together more nicely, if possible, than in \"The Bohemian Girl'' of Monday night. The costumes and stage settings were also pleasing. But Ed Andrews as Ko Ko fairly dominated the performance with his comedy, zest and subtle wit. He only sprung a few local gags, but they hit the spot and increased the spontaneous laughter, especially when he plaintively stated in his inimical way that he did not have the heart to execute anyone--never even had executed a woolly aphid. Ably seconding Andrews in the mirth producing was George Olsen, that sterling young actor and comedian, in the character of the Mikado, emperor [of] Japan. Another big hit was a clever young lady, Miss Esther Snyder, who substituted last night for the star, Miss Theo Pennington, in the part of Yum Yum, which she played and sang with adorable simplicity and charm. Miss Paula Ayres, the contralto star, whose work always wins commendation as Katisha, did some fine singing and comedy work. Harry Pfeil, the tenor, as Nanki Poo, and Carl Bundschu, the baritone, as Poo Bah, appeared to good advantage, as did Ethel May Cook and Norman Chandler in supporting roles. ED ANDREWS ASKS ALL SINGERS TO MEET THURSDAY All members of the Choral Society and other singers of the entire valley are requested to meet at the library hall at Medford on Thursday evening at 7:30 for the purpose of talking over plans for the pageant to be given under the auspices of the Southern Oregon Fair Association. The date of the entertainment is to be on the evenings of July 26th and 27th. As this is a Rogue River Valley enterprise and in no way a local Medford affair, we trust that all parts of the community will take an interest in this midsummer pageant and help to make it an entertainment of which the entire valley will be proud. We also will require about sixty dancers and shall be pleased to have those who have talent in this line meet with us on Thursday evening. There will be a long training period under the instruction of competent ballet masters so that young people of natural talent may be trained to a point of efficiency. Dancers from 12 years up will meet the requirements. We may later select a ballet of children to assist. E. M. ANDREWS, Stage Director, Southern Oregon Fair Ass'n. Medford Mail Tribune, May 29, 1923, page 6 Ed Andrews gave a short talk on the operatic pageant \"Iolanthe,\" which is to be presented at the fair grounds on the evenings of the 26th and 27th of this month. \"Every detail of the performance will be visible from the most remote seat in the grandstand,\" said Mr. Andrews. \"Luckily the acoustics are excellent and the occupants of the seats the greatest distance from the stage will be able to hear perfectly. The pageant is to be one of the most impressive and complete outdoor entertainments over put on on the Pacific Coast. Any stage in the state of Oregon could not provide the facilities that would produce the stupendous effects which we intend to produce. \"The costumes will be dazzling and fantastic. Many of them are being made in San Francisco and some of the dancers' costumes are being made here. The cast of 175 people and the lighting effects will produce an effect beyond the expectations of most local people who anticipate a home entertainment. Mr. Hazelrigg has assembled an excellent orchestra and in addition to the costumes, lighting effects and dancing, the music by Arthur Sullivan assures a production of merit. I can assure you that the pageant will be a scenic and dramatic success.'' Seats will go on sale the end of this week, according to Secretary H. O. Frohbach, who urges all who wish box seats to apply at an early date. It is anticipated that the grandstand will not accommodate the audience and if additional seating space is to be added the fair board must have a measure of the attendance in advance. Prices for box seats are $1.65 for a regular seat in the grandstand, $1.10 and for children of school age 55 cents. No admission to the grounds will be charged. \"Oppose Detour Crater L. Road Above McLeod,\" Medford Mail Tribune, July 11, 1923, page 1 Writer Tells of Early Opera in Rogue Valley Interesting Sidelights of Medford Life 23 Years Ago Described In Telling of First Operetta; Newspapers Were at War (From Portland Telegram) It was 23 years ago this spring, when Medford was a village of 1200 souls, that the local talent decided to put on a light opera. The young folks were slightly weary of the monotony of an occasional buggy ride, or going down to the depot to see the train come in, or taking a trip on Barnum's dummy over to Jacksonville. At that time Johnny Olwell was beginning to brag about the money he could make raising Newtown apples, Julian Perkins had bought the Suncrest Orchard and was planting out some of the first pears, Doc Reddy was landlord of the swell Nash Hotel, Jess Enyart was president of the Medford Bank, while Charlie Nickell and Albert Bliton were engaged in a violent controversy as to which of the two rival weekly newspapers had the largest bona fide circulation, Albert claiming that Nickell's Tribune circulation was the bunk because he went through every incoming Southern Pacific train and passed his papers out free to all travelers, while Nickell retaliated with the allegation that Bliton's circulation was not only \"nix kommeraus\" but infra dig, for the reason that Albert, being the local land commissioner, compelled every homesteader when filing on a claim to subscribe for the Weekly Mail. Plenty of Local Talent All of these things, along with an occasional dance at the roller rink, of course, furnished constant community diversion more or less, in those days, but at times the interest lagged. It was during one of these mass reactions that the live wires voted to enact an amateur production of \"The Mikado.\" The ringleaders in this ambitious project included Ivan Humason, who kept the local drug store; Billy Isaacs, proprietor of The Toggery; Carl Narregan, the abstractor; Lawyer Holbrook Withington; Ed. Gore, the merchant; Miss Eifert, organist at the Presbyterian Church; Mrs. Clarence Hafer, Hazel Enyart and other prominent local talent. In the early evening of an April day three emigrants, Ed Andrews, opera comedian; Charles Hazelrigg, musical director, and the writer got off a train and ambled down the main street to the drug store. The party was armed with a letter of introduction from the late E. P. Rogers, general passenger agent at Portland for the Southern Pacific railroad, addressed to Ivan Humason, stating briefly that they were eastern business men and abjuring Humason to tune up and sing the praises of the Rogue River Valley. Hazelrigg Turns Director But Ivan at the moment had other songs in mind. It was within a few minutes of the hour set for a rehearsal of \"The Mikado.\" [Andrews had moved to the valley months before rehearsals began.] He invited the party to accompany him to the rehearsal and get acquainted with the people, which bid they gladly accepted. The pianist and director, Miss Eifert, was playing the organ at a choir practice and was late arriving at the rehearsal. So Hazelrigg modestly admitted that he could play the piano and offered to help. Although there was no extra score, Hazelrigg, a few moments later, had forgotten about his modesty and was playing \"The Mikado\" music with one hand and directing the rehearsal with the other, to the mild surprise of the company. Presently the action began for the principals, and Andrews offered some suggestions as to characterization and singing. The company's curiosity as to the identity of the strangers reached the breaking point when Andrews, having played the part of Ko-Ko some three thousand times from Broadway to San Antone, found himself the center of the rehearsal and demonstrating the business of all the characters. \"Who are you people, anyhow?\" one of the actors demanded to know. The truth of the matter then came forth, and there were general introductions all over again. Rehearsals Put Off \"Say,\" said Humason, \"if you people are going to settle in here we will put this rehearsal off till next fall and then have a regular show.\" It was done. In the following fall, when the opera was produced, half a dozen or more members of the former Andrews Opera Company had settled in the valley, and the skating rink was transformed into a theater. Jess Enyart, the banker, had as a guest at his home a Portland business man, whom he invited to accompany him to the opera. Believing he would be bored, the Portlander declined. \"But my daughter's in the show,\" Enyart urged. \"Come on, you'll like it.\" Thus importuned, the Portlander accepted. When Nanki-poo had sung his bit the Portlander perked up quite noticeably. The singer was Henry Gunson, a noted tenor who had sung all the standard operas and had a turn in grand opera. \"You got a professional to sing that part, eh?\" said Portland. \"He's Just a Farmer\" \"Oh, no,\" Enyart said, \"he's just a farmer over in the Big Sticky neighborhood.\" By this time they were listening to the \"Three Little Maids from School,\" a trio that included Nellie Andrews and Caroline Andrews, two experienced prima donnas, and Mrs. Clarence Hafer. Then Ed. Andrews came on in the role of Ko-Ko. The Portlander watched silently a few minutes, then turned to his host. \"I suppose,\" he grunted, \"you will say this is another farmer over on the Big Sticky, although he is playing the best Ko-Ko I ever saw.\" \"No, he doesn't live on the Big Sticky,\" Enyart said casually. \"He's got a ranch over by Roxy Ann Mountain and keeps a few cows.\" Later in the evening the Portlander, being fully convinced that he had witnessed a great performance of \"The Mikado\" by what was literally local talent, went out and bought supper for the entire party. Jackson County News, July 16, 1926, page 9 Opera on Wheels By Cornelia Andrews Du Bois The life of the early pioneer entertainers was quite different from that of today's stage stars. The story of the Andrews family is typical of the early troupes, and is told by Mrs. Dubois, whose grandfather was a brother of the famous troupers. A large red bandwagon pulled by six plumed and prancing grey horses and accompanied by the sound of lively march music played on six cornets and a snare drum could be seen traveling down the main street of a small town of the American frontier one afternoon in the fall of 1876. It was the type of wagon used by circuses, with tiers of seats going up to a high point in back; but this wagon was not part of a circus, for across the side was printed in large gold letters, that caught the rays of the sun, the words \"ANDREWS FAMILY SWISS BELL RINGERS.\" The bandwagon belonged to a family of entertainers who had traveled in it, with a baggage wagon following, all the way from St. Peter, Minnesota, across the dusty, bumpy roads of Iowa, Kansas and Nebraska. They had reached the Indian territory which today is part of the state of Oklahoma, and it was wild country indeed. Cowboys with six-shooters in their belts walked boldly down the street. Indians, feathered and blanketed, stared with hostile-looking faces as the bandwagon moved past them. To the members of the family, and particularly to the youngest, Florence, a pretty, black-eyed girl of 14 years, it was rather strange and terrifying. She knew that in the town hall that evening she would have to face an audience of the same kind of people she saw in the streets, not friendly people like those in the Methodist Church back in St. Peter where her father was the minister, and where she and her older brothers and sisters had often given concerts. How had the children of a Methodist minister, brought up on a farm in rural Minnesota, been started on the road as a troupe of entertainers? It seems strange to us now, but in those days there were a number of such troupes, of which the \"Singing Hutchinsons\" are a good example. Families were large, and there were many mouths to feed. If some of the family traveled they could sustain themselves and help out at home for those who were left behind. The grasshoppers had laid waste more than once to the fields of Minnesota and left depression in their wake, and the Andrews family, as well as others, were affected by it. Also, the people, especially in pioneer areas, were eager for music and laughter. There were no radios, no movies, only a few home-talent shows in churches or town halls. Traveling troupes were welcomed, and their small admission fees gladly paid. Some of the companies were first-rate, some not. Those of high quality, like the Hutchinsons and the Andrews, managed to stay on the road for many years. The Andrews family was unique in that it was not a concert troupe only. After adding Swiss bells, which were very popular then, they went on to form a light-opera company, and near the end of their long career before the public they added grand opera to their repertoire. They gave grand opera in English, and it was of surprisingly high caliber, considering the pioneer background of the family. John Andrews, the minister-father of ten children--six boys and four girls--had come to Minnesota by covered wagon in 1856. His father before him had come with the tide of pioneers from Virginia into Indiana and Illinois, and he was of English-Spanish stock, having voyaged from a West Indies plantation at the time of the Revolutionary War. This ancestry (the Spanish blood gave dark skin to all the Andrews children) may have accounted for some of their own adventurous spirit. Reverend Andrews was a circuit-riding minister in his early days on the Minnesota frontier at a time when he must go on horseback between remote wilderness churches, under hazardous conditions. But it was their father's love of music which really started the Andrews family on their long career. He brought to his log cabin home near St. Peter a small melodeon, which he laboriously hauled in a lumber wagon from Munger's Music Store in St. Paul. On it he hoped his children would learn to play and sing the hymns he loved. They did, and formed a double quartette of brothers and sisters; but they went on to organize a concert troupe and eventually an opera company, much to their father's embarrassment, since opera was frowned upon by the church. However, he loyally defended them, as long as they kept to high ideals of entertainment and as long as they maintained family relationships, taking husbands and wives and children with them on the road. At the height of their career as an opera company the Andrews family traveled in their own private railroad car, which had been converted into staterooms. Their tours carried them all over the country, into the East, South and Southwest, as well as the Middle West. They presented a season of summer opera in Peoria, Illinois, in an open-air theater, with great success, until the burning of the theater halted their performances there. Not long afterwards, in the late '90s, they established their summer headquarters at Lake Tetonka, near Waterville, Minnesota, where they ran a resort hotel, raised racehorses and gave opera on a stage built over the lake. The opera company had its share of misfortunes. Their special train, on the way to the West Coast, was wrecked near Brainerd, Minnesota, on a bitter cold January night in 1891, and Nannie Andrews, wife of Ed Andrews, was burned to death. Ed, who was famous for his role as Ko-Ko in Gilbert and Sullivan's \"Mikado,\" continued on the road for a long time after this--even after the Andrews Opera Company itself had disbanded. Another tragedy occurred when Charlie Andrews was killed in a railroad accident near Chicago. Charlie was advance agent and general manager for the company. After his death, George Andrews took over as manager as well as star performer. George, whose baritone voice was heard in the famous light-opera arias of those days, such as \"The Heart Bowed Down\" from \"The Bohemian Girl,\" was a matinee idol whose fans requested special solos not called for in the score. Of the four daughters, Laura sang coloratura soprano roles, Alice played the piano and directed the orchestra (she lost her voice from too much singing at an early age), and Florence was the prima donna contralto who played character parts like Katisha in \"The Mikado,\" and in later years was the star of the opera \"Carmen.\" But when Florence was young, her older brothers and sisters didn't consider that she was much of a singer, or an actress, either; and on her first tour in the bandwagon when the troupe arrived in the Indian territory, her brothers taunted her for being afraid and told her she would never last on the road as a trouper. She had already learned to play the cornet in the band for their street parades, could handle the second soprano bells--there were about 80 of the Swiss bells of all sizes, which were rung together for a chime-like effect--and besides this she could do comedy skits and dances with her brother Ed. Florence was to sing a solo called \"My Mother's Little Broken Ring.\" When she faced her audience that night in the town hall, wearing her sister Laura's red cashmere dress with a real bustle, Florence did not feel very confident. As she had feared, the audience was composed of cowboys and Indians, and she couldn't see a woman in the place. They were noisy and restless, but when she began to sing pleadingly, with her hands crossed as Laura had taught her, they became strangely quiet, and then, suddenly, when the she had finished, there was an explosion! Guns went off--not one, but several, and there was shouting. Florence fled in terror from the stage, almost tripping over her short train, and when she reached safety backstage, she was in tears. \"They shot at me! They tried to kill me!\" she told her brothers. But Charlie quieted her and said they weren't shooting at her at all, that the guns were pointed at the ceiling. They were merely applauding her! And as the shouting and shooting continued, he told her that she would have to return to the stage for a bow. This was a severe test of her courage, but she knew that if she didn't go back her brothers would never accept her as a trouper, and she turned and walked back onto the stage, with her knees trembling, and took her bow! In all the years the Andrews were on the stage, there were many hardships to meet. Performances had to be given in spite of illness and even death--disasters which would seem for a time to force the company off the road. But they went on, year after year, with laughter as well as tears, bringing entertainment into small communities as well as large ones. Their prices were never high and they gave the public, especially throughout the Middle West, an opportunity to hear good music at a low price, which in those days was rare. It is hard to realize now, with our wealth of entertainment for old and young, what troupes like the Andrews meant to the people of that time; but they were part of the pioneer spirit of character and courage which built Minnesota, just as much as those who fought the Indians and cleared the wilderness. Dr. Arthur Taylor, undated typescript circa 1960s, Southern Oregon Historical Society vertical files - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Ed. Andrews, a gentleman who has been living upon and improving a homestead out near Climax post office, has purchased the L. P. Hansen farm of eighty acres. The land is situated north and east of Medford about six miles, near the Dr. Pickel orchard. The price paid, including stock, tools and this season's crops, was $1500. Of the land six acres is planted to orchard and is, and has been, bearing fruit. Mr. Andrews expects to plant a considerable of the place to orchard the coming winter. The soil is sticky, but the thrift of the trees tells plainly that it's all right for fruit. The opinion prevails generally that Mr. Andrews has made an investment that will profit him big one of these days, as soon as a goodly portion of it is planted to trees. Land which will grow fruit has no license to go begging for buyers at a price much in advance of that paid by Mr. Andrews. Mr. Hansen, we understand, will go to the old country upon a visit. \"City Happenings,\" Medford Mail, September 8, 1905, page 5 BRINGS SETTLERS TO STATE Railway Booklet Induces Immigration to Oregon. Illustrative of the good results coming from railroad advertising being done by the Harriman lines, A. L. Craig, general passenger agent for the O.R.&N. and Southern Pacific lines in Oregon, tells of the effects had by one copy of the book on Oregon, Washington and Idaho sent to C. N. Hyskell, of Burlington, Ia.: \"In March, 1904, C. N. Hyskell, of Burlington, Ia., received a copy of our Oregon, Washington and Idaho book,\" said Mr. Craig. \"After reading it carefully, he brought his wife and three children to Oregon and secured 160 acres of land. Before coming he showed the same book to Edward Andrews, of Burlington, Ia., who brought his wife and one child. Mr. Andrews also secured 160 acres of Oregon land. He also showed the book to C. D. Hazelrigg, who brought his wife and secured 160 acres of land. Mr. Hazelrigg, through this book, induced his father-in-law and mother-in-law, Major and Mrs. Erdman, of Washington, D. C., to come to Oregon. They secured 160 acres of land and a house at Medford. Mr. Andrews, through this book, induced his brother-in-law, Edward White, of Minnesota, and two friends to locate in Oregon. These three bought 200 acres of Oregon land. Mr. White, through this book, induced his three sisters and mother to come to Oregon and they bought a house in Medford. Mr. Andrews lent the book to Lucin Wakefield, of Mankato, Minn., who came to Oregon and secured 160 acres of land. Mr. Wakefield induced his brother, Del Wakefield, and three children, to come to Oregon; also his sister, who is now teaching"} +{"id":"RedPajamaCommonCrawl.0044","text":"Financial Stability Review, May 2021 Euro area recovery has been delayed, with the impact of the pandemic increasingly concentrated in some sectors Financial markets exhibited remarkable exuberance as US yields rose Corporate solvency challenges could weigh on sovereigns, households and creditors Improved market sentiment towards euro area banks, but profitability and asset quality concerns remain Climate change may pose material risks to financial stability Policies should continue to support the recovery, while targeting the build-up of vulnerabilities in selected areas 1Macro-financial and credit environment 1.1Increasing concentration of risk in more vulnerable sectors and countries Box 1 Emerging markets' vulnerability to a reassessment of risk 1.2Benign financing conditions limit debt sustainability risks Box 2 Contingent liabilities: past materialisations and present risks 1.3Aggregate household resilience masks uneven impact of the pandemic 1.4Corporate solvency risks on the rise 1.5Euro area property market cycles diverge further 2Financial markets 2.1Partial spillover of risks from rising US rates 2.2Robust risk sentiment with pockets of market exuberance 2.3Sharp increases in interest rates may reveal vulnerabilities in risk assets Box 3 Risk of spillovers from US equity market corrections to euro area markets and financial conditions 3Euro area banking sector 3.1Increasing signs of asset quality deterioration Box 4 Credit risk transmission during the pandemic: the sovereign-bank-corporate nexus 3.2Profitability of euro area banks set for a slow recovery 3.3Banks' bond spreads tightened and capital ratios rose 4Non-bank financial sector 4.1Non-bank financial sector vulnerabilities could manifest in the high-yield corporate bond market 4.2Investment funds may be vulnerable to a global increase in interest rates Box 5 Investment fund flows, risk-taking and monetary policy 4.3Insurers engage in further risk-taking, but could benefit from the moderate increase in global interest rates 5Macroprudential policy issues 5.1Supporting economic recovery and the resilience of the banking sector amid pandemic-related vulnerabilities 5.2Further steps towards developing macroprudential policies for non-banks Box 6 Investment funds' procyclical selling and cash hoarding: a case for strengthening regulation from a macroprudential perspective Corporate zombification: post-pandemic risks in the euro area Climate-related risks to financial stability This is the third issue of the Financial Stability Review (FSR) prepared in the context of the coronavirus COVID-19 pandemic, with many euro area countries having faced a third wave of infections. As a result, a vast number of firms \u2013 particularly those in the services, leisure and travel sectors \u2013 still cannot operate normally, and the economy is still reliant upon policy support to prevent widespread unemployment, corporate insolvencies and economic contraction. The human and economic costs of the pandemic continue to accrue. That said, vaccination programmes are progressing and offering a route out of the pandemic. Financial markets have been driven by expectations of an upswing, exemplified by a striking rally in global equity markets. We are optimistic that financial and economic conditions will bounce back. There is, however, a reality that the pandemic will leave a legacy of higher debt and weaker balance sheets, which \u2013 if unaddressed \u2013 could prompt sharp market corrections and financial stress or lead to a prolonged period of weak economic recovery. The May 2021 FSR assesses financial stability vulnerabilities \u2013 particularly in the corporate sector \u2013 and their implications for financial market functioning, debt sustainability, bank profitability and the non-bank financial sector. Risks to financial stability remain elevated and have become more unevenly distributed. The pandemic has imposed higher costs on some vulnerable countries with larger services sectors, which in turn implies a greater need for continued policy support and growing interconnections between their government, corporates and banks. More broadly, the euro area banking sector also continues to face headwinds, with its profitability subject to uncertainty about the balance of loan losses to come and provisions already booked. This issue of the FSR also looks beyond the pandemic at the other great challenge of our time \u2013 climate change \u2013 and the risks that this poses to euro area financial stability. A special feature brings together the further enhancements that we have made to our framework for monitoring and assessing climate-related risks to financial markets, banks and non-banks. The Review has been prepared with the involvement of the ESCB Financial Stability Committee, which assists the decision-making bodies of the ECB in the fulfilment of their tasks. The FSR exists to promote awareness of systemic risks among policymakers, the financial industry and the public at large, with the ultimate goal of promoting financial stability. Luis de Guindos Vice-President of the European Central Bank A third wave of coronavirus infections in the euro area has weighed on the near-term economic outlook. More targeted lockdown and social distancing measures and economic adaptation have helped euro area economies to cope better with the pandemic. Nonetheless, many euro area countries faced a third wave of infections in the first months of 2021 that \u2013 together with the slow start of the vaccine roll-out \u2013 has delayed the economic recovery (see Chart 1, left and middle panels). Looking ahead, progress with vaccinations and the gradual easing of containment measures should support a rebound in economic activity in the course of 2021. The impact of the pandemic has been increasingly concentrated in some sectors and countries with pre-existing vulnerabilities. The euro area services sector continues to be more adversely affected by the restrictions on social interaction and mobility than manufacturing. The weakest performing sectors, such as trade, transport and accommodation, as well as arts and entertainment, have seen continued declines in gross value added of 2-4 times the aggregate. By contrast, the industrial sector has been recovering faster, supported by improved foreign demand. This sectoral divergence, combined with differing trajectories of the pandemic, has led to a wide divergence in 2021 economic forecasts at the euro area country level (see Chart 1, middle panel). US growth prospects have improved, triggering a rise in nominal yields with global implications, while the pace of euro area recovery has moderated in the short term Sources: Our World in Data, Consensus Economics Inc., Bloomberg Finance L.P., Reuters and ECB calculations. Note: Left panel: vaccination rate refers to people who have received at least one dose of a COVID-19 vaccine as a share of the total population. Data are obtained from the Our World in Data international COVID-19 dataset, which includes a full list of the national authorities disseminating country-level data. For more information, see Mathieu et al., \"A global database of COVID-19 vaccinations\", Nature Human Behaviour, 2021. Middle panel: the minimum-maximum range covers 11 euro area countries surveyed by Consensus Economics (Austria, Belgium, Finland, France, Germany, Greece, Ireland, Italy, the Netherlands, Portugal and Spain). Improved economic prospects for the United States led to a notable increase in US long-term nominal interest rates, with global effects. A faster roll-out of vaccinations and agreement on a sizeable fiscal stimulus programme have led to a marked improvement in the US economic growth and inflation outlook (see Chart 1, left and middle panels). The ensuing 60 basis point rise in US ten-year government bond yields since the start of 2021 (see Chart 1, right panel), first driven by higher inflation expectations and later by rising real rates, led to some modest spillovers to the euro area (see Chapter 2). These spillovers were partially offset as the ECB's Governing Council reinforced its accommodative policy stance by significantly stepping up its asset purchases. Beyond the euro area, rising US yields coupled with an appreciation of the US dollar could generate larger shifts in global capital flows and, as indicated by past crises, may represent a source of risk for emerging market economies with external financing needs (see Box 1 and Chart 2.8, right panel). As US interest rates rose and global bond markets sold off, equity markets saw a renewed rally. The rise in US benchmark bond yields led to a global sell-off in bond markets (see Chart 2, left panel). At the same time, equity markets remained buoyant, supported by a recovery in expected earnings and robust risk sentiment (see Chapter 2). The recent rise in composite stock indices has been coupled with a somewhat stronger advance by financial stocks. These had previously underperformed technology stocks, which were among the best performers in 2020 (see Chart 2, right panel). Despite the recent rotation across and within asset classes, some market segments continue to show signs of elevated valuations and may be at risk of a correction Sources: Bloomberg Finance L.P., IHS Markit and ECB calculations. Notes: Left panel: global equity markets are reflected by the MSCI All Country World Index and global bond markets by the Bloomberg Barclays Multiverse Index. Right panel: FAANG: Facebook, Amazon, Apple, Netflix and Google; NFC: non-financial corporate. The buoyancy of financial markets has stood in contrast to weaker economic fundamentals, while recent bouts of volatility highlight the risk of repricing. Despite the recent stock price declines in some sectors, stock market valuations remain elevated. In the United States, valuations stand well above pre-pandemic levels, whereas they are at more moderate levels in the euro area. Spreads on euro area non-financial corporate (NFC) bonds remain at risk of an abrupt repricing, in particular for the high-yield segment, where they have fallen below pre-pandemic levels despite growing vulnerabilities. Overall, risk assets remain sensitive to changes in the benchmark yield curve and a reassessment of valuations could ensue if investor expectations regarding the likelihood and pace of monetary policy tightening were to change without an accompanying improvement in growth prospects (see Chapter 2). Investment fund flows rebalanced from debt to equity, while non-bank financial institutions overall continue to have large exposures to firms with weak fundamentals Sources: EPFR Global, S&P Global Market Intelligence, ECB securities holdings statistics and ECB calculations. Notes: Left panel: \"March 2020 turmoil\" covers the period from 20 February to 26 March 2020, \"Recovery phase\" the period from 27 March to 6 November 2020, \"Vaccine news\" the period from 9 November 2020 to 12 February 2021 and \"Since bond market correction\" the period from 15 February to 11 May 2021. \"Other jurisdictions\" refer to euro area funds with an investment focus in the Asia-Pacific region and Canada. AUM: assets under management. Right panel: vulnerable holdings are defined as holdings with a negative credit watch or outlook by Standard & Poor's. ICs: insurance corporations; IFs: investment funds; PFs: pension funds. Many euro area investment funds, insurers and pension funds are exposed to a further rise in yields or a correction in credit markets. Investment fund flows have also rebalanced from debt to equity given rising yields (see Chart 3, left panel). Still, in their search for yield over recent years, non-banks have increased the duration risk of their debt securities portfolios to multi-year highs. This increases the sensitivity of their assets to higher rates, though for insurers and pension funds asset valuation losses could be compensated for by a fall in the value of their liabilities given the sector's negative duration gap. Non-banks also have large exposures to firms with weak fundamentals, with more than a quarter of the sector's NFC debt holdings subject to a negative credit outlook or credit watch by rating agencies (see Chart 3, right panel). Roughly half are also BBB-rated, only one notch above high-yield status. In parallel, since last November, investment funds have further reduced their liquidity buffers. Cash buffers and liquid asset holdings are now below pre-pandemic levels and are approaching new lows, leaving the sector highly vulnerable to fire sales of assets in the event of large-scale redemptions. Investment funds' liquidity risk has increased amid a search for yield (see Box 6) over recent years. This underscores the importance of strengthening the resilience of the non-bank financial sector, including from a macroprudential perspective (see Chapter 5). Reliance on debt has increased among vulnerable firms, amid higher rollover risks. Debt-to-equity ratios have increased considerably among the most leveraged firms, with the 90th percentile increasing from 220% at end-2019 to over 270% in the final quarter of 2020 (see Chart 4, left panel). Corporate earnings expectations for the euro area have remained below pre-pandemic levels, while corporate funding conditions remained around the tightest levels since the pandemic started, especially for small and medium-sized enterprises (SMEs), highlighting elevated refinancing risks. Higher (risk-free) rates would increase debt servicing costs from historical lows and could raise medium-term risks in countries with elevated debt levels. The substantial increase in liquidity buffers among euro area firms may cushion corporate rollover risks, even though this appears to be particularly relevant for large listed firms. Increased leverage, in particular by the most vulnerable corporates, may contribute to an increase in corporate insolvencies Sources: S&P Global Market Intelligence, Allianz Euler Hermes and ECB calculations. Notes: Left panel: a fixed sample of 1,183 euro area non-financial corporations with total assets larger than \u20ac50 million as at Q3 2019; data available for Q4 2020 are used. Right panel: the dashed line indicates projections. On the x-axis, \"t\" refers to the starting year of the respective crisis episode, i.e. 2008, 2011 and 2019 respectively; \"t+1\" refers to the year after, i.e. 2009, 2012 and 2020, and so on. Insolvency statistics and projections are taken from \"Vaccine Economics\", Euler Hermes, Allianz Research, 18 December 2020. Solvency risks in the corporate sector are set to rise as public support measures fade. Extensive policy support has kept corporate insolvencies unusually low in a period of extreme economic weakness, unlike during previous crisis episodes (see Chart 4, right panel). The impact of the pandemic on corporates is increasingly concentrated in the services sectors and among SMEs. This implies that a sudden tightening of financing conditions or a further delayed economic recovery could have more severe implications for financial stability than the aggregate picture suggests, in particular in countries heavily reliant on pandemic-sensitive sectors. Therefore, even as the economy recovers, corporate insolvencies are expected to increase from the very low levels observed in 2020, partly driven by a backlog of insolvency cases. As a result, governments face a delicate balance between prematurely adjusting support measures, which may contribute to triggering a wave of corporate insolvencies, and maintaining support measures for too long and thus keeping unviable corporates alive (see Special Feature A). Euro area households may be challenged by spillovers from corporates and a correction in residential property markets Sources: Eurostat, ECB, Jones Lang LaSalle and ECB calculations. Notes: Left panel: sensitive sectors comprise mining, construction, retail and wholesale trade, transport, accommodation and food services, professional and administrative services, as well as arts and entertainment and other services. Sensitivity to the pandemic has been determined by the relative year-on-year loss in gross value added. Capital letters refer to NACE codes as follows: A \u2013 Agriculture; J \u2013 Communication; K \u2013 Financials; O \u2013 Public sector; P \u2013 Education; Q \u2013 Health services. The size of the bubbles refers to the sectors' share in total bank loans to all sectors. The grey line indicates the linear trend. An increase in corporate insolvencies may impact households via employment prospects, so far prevented by policy support measures. On aggregate, household balance sheets have been cushioned so far, thanks to government income support schemes, record high saving rates, continued robust developments in euro area residential real estate markets and the recovery in stock markets. However, high dependence on government support schemes makes households vulnerable, and their financial and employment situation could worsen in the event of prolonged economic weakness, which may translate into job losses linked to a growing number of corporate insolvencies (see Chart 5, left panel). At the same time, continued strength in residential real estate markets and mortgage lending has increased household indebtedness and vulnerabilities. The risk of a correction in residential real estate markets has increased amid signs of overvaluation for the euro area as a whole. In contrast to the resilience of residential real estate markets, commercial real estate markets are already facing a substantial market correction (see Chart 5, right panel). A further decline in commercial real estate prices could feed through to the financial system via increased credit risk, decreased collateral values and losses on direct holdings, as well as to lower investment and economic activity by non-financial corporations. Continued need for government support may challenge the sustainability of public finances in some countries and make the withdrawal of policy support more difficult Sources: European Systemic Risk Board, European Commission, ECB and ECB calculations. Notes: Left panel: data refer to euro area aggregates. Government contingent liabilities include the financial sector. The snowball effect relates to the interest rate-growth differential. SovCISS: composite indicator of systemic stress in euro area sovereign bond markets; for further information, see Garcia-de-Andoain, C. and Kremer, M., \"Beyond spreads: measuring sovereign market stress in the euro area\", Working Paper Series, No 2185, ECB, October 2018. Right panel: discretionary fiscal measures include direct grants as well as tax measures. Numbers refer to actual take-ups. For further information, see \"Financial stability implications of support measures to protect the real economy from the COVID-19 pandemic\", European Systemic Risk Board, February 2021. The continued need for policy support may add to medium-term sovereign debt sustainability concerns in more vulnerable countries. The aggregate euro area sovereign debt-to-GDP ratio rose to 100% in 2020, up from 86% of GDP in 2019, as governments have financed extensive economic support to cushion households and firms. Fiscal policy support has been particularly large in some countries with a larger share of economic sectors most impacted by the pandemic and lockdowns (see Chart 6, right panel). As a result, vulnerabilities from the outstanding stock of debt appear higher than in the aftermath of the global financial crisis and the euro area sovereign debt crisis, although debt servicing and rollover risks appear more benign given continued favourable sovereign financing conditions in terms of both pricing and duration (see Chart 6, left panel). Contingent liabilities could increase sovereign debt levels further if the economic situation turns out to be weaker than expected and pandemic-related corporate loan guarantees are called on a broader scale (see Box 2). The associated increase in public debt levels, further delays in the implementation of the EU recovery fund or the emergence of an adverse sovereign-bank-corporate nexus (see Box 4) could trigger a reassessment of sovereign risk by market participants and reignite market pressures on more vulnerable sovereigns. This may render the exit from policy measures more challenging in vulnerable countries with a higher reliance on fiscal support measures. Euro area bank stock prices have recovered markedly from the low levels of October 2020. Bank equity prices have rallied in two waves on positive news about vaccines and reflation expectations. Banks outperformed the overall market, mirroring a wider recovery in previously underperforming stocks. While investors appear to anticipate that a steepening of the yield curve could support bank profitability, analysts' return on equity (ROE) expectations for 2022 have remained unchanged since last summer (see Chart 7, left panel). Nonetheless, euro area bank valuations remain depressed by both international and historical standards. Improved market sentiment towards banks, coupled with market expectations of an extension of the pandemic emergency purchase programme, have also translated into tighter spreads on bank bonds, further improving market funding conditions for euro area banks. Market sentiment towards euro area banks has improved significantly, despite continued profitability challenges and growing asset quality concerns Sources: Bloomberg Finance L.P., World Bank Doing Business Indicators, ECB supervisory data and ECB calculations. Notes: Left panel: \"EUR inflation swap\" refers to the euro area five-year forward inflation-linked swap rate five years ahead. Right panel: measures of time and cost of resolving insolvency are transformed into z-scores, i.e. they are presented as standard deviations from the sample mean and then averaged so that they can be jointly presented on one scale. Forborne loans refer to the share of total loans with forbearance measures. The bubble size corresponds to the NPL ratio for corporate loans. The red lines indicate sample medians. The grey line represents the linear trend. NPL: non-performing loan. Nevertheless, the outlook for bank profitability remains weak and the prospects for loan demand are uncertain. Euro area banks' ROE fell from 5.3% in 2019 to 1.3% in 2020 owing to pandemic-related loan loss provisions and ongoing margin compression in a low interest rate environment (see Chapter 3). Heterogeneity across countries was high, with banking sectors in some countries recording sizeable losses (see Chart 3.4). Despite recently improving market sentiment towards euro area banks, market analysts still expect profitability to recover only gradually, projecting an ROE of 3% and 5% for 2021 and 2022 respectively, given higher provisioning needs and lower expected operating income. The outlook for lending could be challenging as a result of both tighter credit standards and lower corporate credit demand. The former is related to banks' heightened risk perceptions, while the latter is associated with the adjustment of state guarantee programmes and the need to improve balance sheets. Early signs of a rise in loan impairments are becoming increasingly visible. Cushioned by large-scale fiscal, monetary and prudential support, bank asset quality has been preserved despite the sharp recession. In fact, the aggregate non-performing loan (NPL) ratio for the euro area reached its lowest level on record at 2.7% in 2020, as banks reduced legacy portfolios. Loan loss provision flows returned to pre-pandemic levels in the second half of 2020. But the normalisation may prove temporary, as early indicators of deteriorating asset quality are becoming increasingly visible, including a rise in forbearance. This is particularly the case in countries where lengthy and costly insolvency procedures inhibit claim enforcement (see Chart 7, right panel). A weaker than expected economic recovery and growing vulnerabilities in the corporate sector may entail higher loan loss provisioning going forward. In addition, as moratoria and public guarantees are gradually adjusted (see Chapter 1 and Box 2), credit risk may reappear with a lag, also implying increased loan loss provisions. Climate-related risks to euro area banks, funds and insurers could be material, particularly if climate change is not mitigated in an orderly fashion. Banks and non-bank financial institutions alike are faced with the task of managing the implications of climate change over the medium to long term (see Special Feature B). Both need to manage their exposure to a transition to a low-carbon economy and their exposure to physical risks associated with extreme weather and climate-related events or more insidious changes in climate (see Chart 8). ECB analysis suggests that such risks appear to be particularly concentrated in certain sectors, geographical regions and individual banks, exacerbating the related implications for financial stability. At the same time, data and methodological gaps still need to be addressed to evaluate climate-related risks comprehensively. In addition, climate-related financial risks that may emerge from the interplay between banks and insurers need to be recognised, with insurance coverage likely deteriorating as extreme weather and climate-related events become more frequent. Climate-related risks, both transitional and physical, could be material for euro area banks, funds and insurers, given high risk exposures and concentration Sources: Four Twenty Seven, Urgentem, ECB (AnaCredit), ECB securities holdings statistics and ECB calculations. Notes: The left panel shows the exposure of banks and non-bank financial institutions to firms that issue bonds or are listed in the equity market. The sample for loans consists of \u20ac4 trillion of exposures above \u20ac25,000 to non-financial corporations (NFCs) matched with emission data, corresponding to 80% of euro area loans to NFCs. The firms are classified as low, medium and high emitters according to their emission intensities in December 2019, i.e. the ratio of CO2 emissions to revenues. Low emitters are firms with less than 309 CO2-equivalent tonnes per million USD revenue (33rd percentile), while high emitters are firms with more than 1,068 CO2-equivalent tonnes per million USD revenue (66th percentile). Right panel: \"high-risk firms\" include those firms that are located in areas already highly exposed, or increasingly exposed, to physical hazards. See also notes to Chart B.2 for further details. Policy action may be required to ensure the resilience of the financial system to climate-related risks. Enhanced climate-related disclosure requirements, including in relation to companies' forward-looking emission targets, and deeper, more effective green financing are essential steps in a smooth transition towards a sustainable economy and a general reduction of climate-related vulnerabilities. At the same time, possible market failures can stem from data gaps, which would raise the risk of greenwashing. The upcoming ECB climate stress test will also analyse trade-offs in a forward-looking manner, thereby providing a further basis for future policy discussions. Ultimately, given the systemic dimension, considerations about how to mitigate climate-related risks in the financial system require a macroprudential perspective to be effective and to ensure cross-sector consistency. Extended policy measures have remained key in mitigating the economic costs of the pandemic, but vulnerabilities continue to build up in some areas. With many euro area countries facing renewed surges in infections, lockdown measures have been reinstated and economic support measures maintained. Divergence across countries and sectors has continued to increase, ultimately leading to a concentration of risk that often coincides with pre-existing vulnerabilities in both the real economy and the financial sector. Looking ahead, medium-term vulnerabilities for euro area financial stability remain elevated and relate to: (i) a mispricing of some asset classes, raising the risk of corrections in markets; (ii) growing balance sheet challenges in the public and non-financial private sectors; (iii) weaker bank profitability amid high credit risk exposure; and (iv) further increases in duration, liquidity and credit risks of non-banks. The financial stability implications could be amplified by the emergence of an adverse feedback loop across various sectors of the economy. Policies should remain broadly accommodative but could be more targeted to support a robust economic recovery amid remaining uncertainty and the potential for credit risk to materialise. Conditional on the economic impact of the pandemic, the extensive policy support, in particular for corporates, could continue to move gradually from being broad based to more targeted. In this context, fast and effective use of the \u20ac750 billion Next Generation EU (NGEU) recovery funds would complement national support measures and mitigate cross-country divergences in the coming years. Specifically for banks, capital relief measures should continue to prevent excessive deleveraging, while proper and timely recognition of credit risk would maintain confidence in balance sheets. In this context, it is worth noting the preliminary evidence which suggests that some banks may be reluctant to use available capital buffers, which could in turn affect credit conditions, especially for corporate lending. In the medium term, a higher share of releasable capital buffers could be considered, as it can enhance banks' ability to absorb losses and maintain the provision of key financial services in a crisis. In addition, concerns related to the expected asset quality deterioration in the banking sector reinforce the need for effective NPL solutions. Given the low interest rate environment and profitability challenges, efforts to address structural issues across banks should be stepped up. Finally, from a broader regulatory perspective, strengthening the banking union and the timely, full and consistent application of Basel III remain key policy priorities for the banking sector going forward. Further progress towards developing a macroprudential framework for non-banks is expected and would be highly welcome. In particular, the Financial Stability Board is developing recommendations targeting structural vulnerabilities associated with money market funds, open-ended investment funds and margining practices in order to enhance the resilience of the non-bank financial sector. Once issued, they should be swiftly implemented in the European Union as appropriate. 1 Macro-financial and credit environment 1.1 Increasing concentration of risk in more vulnerable sectors and countries Economic activity fell amid renewed lockdown measures, but activity has proved more resilient than during the first lockdown. The resurgence of coronavirus cases last autumn caused euro area governments to reinstate tight containment measures, which weighed on economic activity in the euro area in the fourth quarter of 2020 and the first quarter of 2021. At the same time, the economic impact of the second lockdown remained more contained than that of the first lockdown for two reasons. First, containment measures were on average less stringent than in the second quarter of 2020. Second, economic activity has become less sensitive to the stringency of lockdown measures, including across countries with different stringency levels, as firms and households have adapted to the new environment (see Chart 1.1, left panel). This higher resilience is not only visible on average, but also when comparing countries with different levels of stringency. Chart 1.1 Economy more resilient to lockdown measures, but considerable slack remains Sources: ECB quarterly sectoral accounts, Hale et al., Eurostat and ECB calculations. Notes: Left panel: the stringency index used is the Oxford COVID-19 Government Response Tracker from the Blavatnik School of Government, University of Oxford. It is based on 20 indicators, ranging from information on containment and closure policies (e.g. school closures, restrictions on movement) to economic (e.g. income support to citizens) and health system (e.g. coronavirus testing regime or emergency investments in health care) policies. It reports the strictness of lockdown-style policies that primarily restrict people's behaviour on a scale between 0 and 100. See Hale, T., Angrist, N., Goldszmidt, R., Kira, B., Petherick, A., Phillips, T., Webster, S., Cameron-Blake, E., Hallas, L., Majumdar, S. and Tatlow, H., A global panel database of pandemic policies (Oxford COVID-19 Government Response Tracker), Nature Human Behaviour, 2021. GFC: global financial crisis; GVA: gross value added. Slack in labour markets and subdued investment could point to a sluggish recovery. Although economic activity recovered to some extent in the second half of 2020, the number of employees and total hours worked remain substantially below pre-pandemic levels (see Chart 1.1, right panel). While hours worked are likely to rebound once employees on short-time work return to full-time work, the high share of laid-off workers who left the labour force altogether could herald a more persistent disruption to labour markets. Non-employed workers, especially from sectors that face a more permanent drop in demand, could face difficulties in re-entering the labour market after the pandemic, which would weigh on economic growth. Similarly, investment remains subdued, reflecting firms' uncertainty about the timing of the pandemic and their own growth prospects after the pandemic subsides (see Chart 1.1, right panel). Looking back at the global financial crisis as a precedent, a slow recovery of investment may also be a harbinger of a more sluggish recovery from the pandemic than the swift rebound in consumption suggests. While the availability of vaccines has improved the medium-term economic outlook, uncertainties remain in the near term. The approval of multiple vaccines in late 2020 and early 2021 improved the economic outlook for the euro area and reduced the uncertainty about the length of the pandemic. While this has boosted the growth prospects for 2022, the ongoing containment measures weigh on the near-term outlook (see Chart 1.2, left panel). In addition, the slow start to the vaccine roll-out in the euro area makes it unclear when the euro area will reach herd immunity and return to normal economic activity. Moreover, the virus continuing to evolve poses considerable tail risks as vaccine-resistant mutations may yet emerge, necessitating a prolonged period of constrained social and economic activity. Vaccines improve growth outlook, but slow roll-out and moderate fiscal support cause divergence from the United States and create tail risk of a prolonged pandemic Sources: ECB Survey of Professional Forecasters (SPF) and Our World in Data. Notes: Left panel: the horizontal axis displays the different quarterly SPF vintages containing the average real GDP expectations among professional forecasters. Growth rates are cumulative with 2019 = 100. Right panel: For more information on the data see the notes to chart 1 in the Overview. The linear projection is based on the average daily vaccination pace in the two weeks before the data cut-off date (11 May 2021). The shaded area indicates the levels of vaccinations typically associated with herd immunity (here excluding persons who have recovered from COVID-19). Emerging market economies (EMEs) are broadly consistent with the countries covered in Box 1 (subject to data availability) and comprise Argentina, Brazil, India, Indonesia, Mexico and Russia. The slow start to the vaccination campaign and a more moderate fiscal stance may leave the euro area lagging its advanced economy peers. The euro area was initially much slower than other advanced economies to ramp up vaccination (see Chart 1.2, right panel). As the pace of vaccination in the euro area picks up, however, this gap is narrowing. Nonetheless, the euro area may take longer than the United States or the United Kingdom to reach herd immunity depending on the further vaccination progress, which would allow for a return to normal. In addition, euro area governments have adopted a more moderate fiscal stance relative to GDP and compared with the respective output gap than the US administration in 2021. Although the \"Biden package\" of USD 1.9 trillion is expected to generate positive spillovers of up to 0.3% of real GDP for the euro area, the more accommodative fiscal stance in the United States could further increase the divergence between the two economic areas. Such a disparity in growth prospects could create upward pressure on real interest rates in the euro area and tighten overall financing conditions to the detriment of euro area corporates, households and sovereigns. Global risks remain contained, and emerging markets proved resilient as policy uncertainty in the United Kingdom and the United States fell. Despite the economic challenges and the slow global vaccination roll-out, financial conditions and capital flows in emerging markets have remained fairly resilient so far. These dynamics are, however, highly dependent on global risk appetite and monetary policy accommodation in advanced economies (see Box 1). The agreement of a trade deal between the United Kingdom and the European Union at the end of 2020 and the transition to a new administration in the United States have reduced policy uncertainty in both the United Kingdom and the United States. At the same time, the tensions relating to export controls on vaccines highlight the importance of trade in overcoming the pandemic, but also its fragility. Increasingly asymmetric impact of the pandemic gives rise to tail risks in most affected sectors Sources: IHS Markit and ECB quarterly sectoral accounts. Notes: Right panel: the horizontal axis shows the percentage change in gross value added (GVA) between the fourth quarter of 2019 and the second quarter of 2020, whereas the vertical axis shows the difference between GVA in the second quarter of 2020 and the fourth quarter of 2020 in percentage points. Observations refer to country\/sector observations at NACE Rev. 1 level. More sensitive sectors comprise mining, construction, retail and wholesale trade, transport, accommodation and food services, professional and administrative services, arts and entertainment, and other services. Sensitivity to the pandemic is determined by the relative year-on-year loss in gross value added. The divergence across sectors widened as containment measures became more targeted. The gradual reopening and the more targeted containment measures during the second lockdown allowed less badly affected sectors to widely resume normal activity, whereas services such as tourism, entertainment and travel to a large extent remained shut (see Chart 1.3, left panel). Consequently, the most affected sectors were not only hit most in the first half of 2020, but also rebounded less relative to the initial drop in the second half of 2020, increasing the divergence across sectors (see Chart 1.3, right panel). This divergence may widen further if the slow roll-out of vaccines necessitates continued containment measures over the summer tourism season, especially in southern European countries. Continued cross-sectoral divergence could trigger a costly reallocation of resources. The widening sectoral divergence poses risks to financial stability for two reasons. First, the most affected sectors face more severe liquidity and solvency risks than aggregate economic indicators suggest, and the materialisation of these risks could trigger an unravelling of macro-financial imbalances with adverse spillovers to other sectors. Second, the continued divergence will at some stage lead to a reallocation of resources from the most affected sectors to sectors with better growth prospects. The costs associated with such a cross-sectoral reallocation of resources, for example due to retraining of workers, could further weigh on the strength and pace of the economic recovery in the short to medium term. Emerging markets' vulnerability to a reassessment of risk Prepared by Irina Balteanu and Livia Chi\u1e6du[1] Financial conditions in emerging market economies (EMEs) have weathered the COVID-19 crisis well so far, despite an intense but short-lived stress episode at the onset of the pandemic. Financial conditions in EMEs have rebounded strongly since March 2020; they currently stand at levels similar to before the pandemic thanks to lower bond spreads and higher equity prices. Capital flows have also recovered, with market segments typically judged to be riskier by foreign investors, such as equity and local currency debt, recording strong inflows in the second half of last year. This rebound helped to relieve pressures on financial systems and support activity in EMEs. Nevertheless, recent concerns about rising bond yields and higher than expected inflation in advanced economies have translated in a tightening of financial conditions and slowdown of capital flows to EMEs. In this context, this box assesses potential vulnerabilities facing large EMEs and the risks posed to euro area financial stability. 1.2 Benign financing conditions limit debt sustainability risks The pandemic continues to weigh on fiscal budgets in 2021 as governments extend support measures. When governments reinstated strict containment measures at the end of last year, they also extended existing support measures to cushion the economic impact on firms and households. As a consequence, fiscal deficits in 2021 will be higher than projected last autumn and are expected to exceed the deficit in 2020 for the euro area as a whole (see Chart 1.4, left panel). In addition to existing liquidity support measures, governments started shifting more towards solvency support, for example by replacing government-guaranteed loans with grants or by injecting capital into larger, often state-associated companies. While the shift towards solvency support may be more effective in supporting weaker corporates which increasingly face solvency rather than liquidity problems, it also weighs on fiscal budgets more directly than indirect support measures that constitute contingent liabilities (see Box 2). Fiscal deficits remain large due to pandemic-related expenses, but gross interest payments benefit from the low interest rate environment Source: European Commission (annual macroeconomic database (AMECO)). Notes: Left chart: the solid line depicts the 3% fiscal deficit threshold which delineates excessive government deficits according to the Maastricht Treaty. Right chart: consolidated debt and interest payments refer to the general government of the 19 euro area countries. Extending the general escape clause of the Stability and Growth Pact until the end of 2022 could pre-empt a premature fiscal tightening. Current projections indicate that, due to the economic fallout from the pandemic, governments will continue to run up considerable fiscal deficits in 2022. As the deficits in more than half of the euro area countries are projected to exceed the 3% criterion in 2022, deactivating the escape clause at the end of 2021 might trigger a premature fiscal tightening in 2022. Extending the use of the clause this year already gives governments greater certainty about fiscal space going forward, which reduces the risk of an expectations-driven adverse spiral of reduced fiscal support, tighter corporate financing conditions and a further contraction in economic activity (see Box 4). At the same time, a strong rebound in economic activity would alleviate the need for additional fiscal support and thereby cushion the impact of already reinstating the Stability and Growth Pact rules in 2022.In addition, some stabilisation measures may be phased out as the economy recovers without a major contractionary impact. Even so, the recent increase in sovereign debt will have less of an impact on fiscal budgets than would have been the case in previous crises. The steady decline in government bond yields has reduced the average gross interest payments of euro area sovereigns despite higher debt-to-GDP ratios than in 2009 (see Chart 1.4, right panel). Aside from this effect, lower interest rates also imply that gross interest payments are less sensitive to changes in debt-to-GDP ratios over time. In 2009, a country with a debt-to-GDP ratio that was 10 percentage points higher on average faced gross interest payments that were 0.4 percentage points higher. That elasticity has shrunk by half since 2009, to 0.2 percentage points. As a consequence, increases in sovereign debt levels due to unexpected events such as the pandemic impose a smaller burden on fiscal budgets, which implies that sovereign balance sheets are more resilient to exogenous shocks than at the time of the global financial crisis. Nevertheless, a sustained rise in sovereign bond yields could raise refinancing costs for governments, which would have a negative effect on sovereign debt sustainability in the medium to long run. Low interest rates and longer maturities alleviate the fiscal footprint of higher sovereign debt Source: Government Finance Statistics (ECB). Notes: Left chart: cumulative net issuance refers to the cumulative issuance of government debt securities since February 2020 net of redemptions. Right chart: the calculation of the debt service ratio follows the methodology in Drehmann, M. and Juselius, M., \"Do Debt Service Costs Affect Macroeconomic and Financial Stability?\", BIS Quarterly Review, Bank for International Settlements, September 2012. The decomposition is based on changes in annual data. Governments locked in low interest rates in the second half of 2020 and early 2021 by issuing longer maturity debt, thus reducing rollover risk. Between December 2019 and March 2021, average sovereign bond yields declined by 43 basis points in the euro area, supported by accommodative monetary policy. Following an initial surge in short-term debt issuance last spring, governments locked in these favourable financing conditions by shifting their net issuance towards longer-term debt, in particular bonds with maturities of more than five years (see Chart 1.5, left panel and Chapter 2). This has not been affected so far by the recent rise in sovereign bond yields. Accordingly, the average residual maturity of sovereign debt increased by four months between May 2020 and March 2021. Low interest rates coupled with longer maturities partially offset the adverse impact of higher debt levels on debt service ratios. The large increase in sovereign debt-to-GDP ratios in 2020 increased the debt service ratio[2] relative to GDP for all euro area countries (see Chart 1.5, right panel). At the same time, longer maturities and to a lesser extent lower rates alleviated the increase in debt service ratios for sovereigns, especially in countries where debt-to-GDP ratios have increased significantly. In addition, approximately 35% of the increase in the euro area debt-to-GDP ratio is driven by the drop in GDP. As the economy recovers, this denominator effect will subside, further easing the debt service ratio and the rollover risk of sovereign debt. In addition, governments continue to hold sizeable deposits with the Eurosystem, which further cushions short-term debt servicing needs. The effectiveness of the EU recovery package is constrained by countries' absorption capacity and depends on the productive use of the funds. The \u20ac750 billion Next Generation EU (NGEU) package can complement national fiscal support measures in the coming years and help sustain the recovery without national budgets being directly negatively affected.[3] However, historical absorption rates of structural EU funds show that Member States would need to absorb the NGEU funds at an unprecedented pace to make full use of the package (see Chart 1.6, left panel).[4] Based on the absorption rates of year 6 in the 2007-13 multiannual financial framework (MFF), up to 55% of the more than \u20ac300 billion in grants contained in the NGEU Recovery and Resilience Facility (RRF) may remain unused (see Chart 1.6, right panel).[5] The lack of absorption capacity in the worst affected countries in particular may impede the disbursement of the NGEU funds, which could further exacerbate the cross-country divergence following the pandemic and potentially spur refragmentation pressures in sovereign bond markets. In addition, the need to absorb NGEU funds quickly may compromise the efficient and productive use of those funds. Limited absorption capacity at national level may inhibit the take-up and effectiveness of NGEU funds Sources: European Commission and ECB staff calculations based on Darvas, Z., \"Will European Union countries be able to absorb and spend well the bloc's recovery funding?\", Bruegel Blog, 24 September 2020. Notes: Year 1 is the first year of the respective programme, i.e. 2007 for the 2007-13 MFF, 2014 for the 2014-20 MFF and 2021 for NGEU. The 2007-13 MFF covers the Cohesion Fund, European Regional Development Fund and European Social Fund, while the latter is excluded in the 2014-20 MFF. The MFF payout rate is the share of the total amount committed to a Member State in the EU budget that has been paid out by the Commission. The MFF-related calculations cover euro area countries only (unweighted average). The NGEU grant profile shows the disbursements expected by the Commission as at July 2020. Right panel: the volumes only refer to the grants component of the RRF and absorption rates are based on the absorption of MFF funds in year 6 of the MFF period 2007-13. While favourable financing conditions mitigate short-term risks in the public sector, the continued need for fiscal support poses medium-term risks. Although financing conditions have limited the impact of increased sovereign debt levels on fiscal budgets and debt service costs, the pandemic continues to take a substantial toll on fiscal budgets. The need to extend existing support measures and retain automatic stabilisers will keep fiscal budgets tightly linked to the evolution of the pandemic. In addition, the adverse impact of continued containment measures on corporate balance sheets increases the risk that contingent liabilities will materialise and further strain public budgets (see Box 2). Finally, a sudden rise in interest rates could raise concerns about the sustainability of sovereign debt over the medium term, although the impact on sovereigns' debt service needs would be alleviated by the extended average maturity of sovereign debt portfolios. Contingent liabilities: past materialisations and present risks Prepared by S\u00e1ndor Gard\u00f3, Benjamin Hartung, Mariusz Jarmuzek and Algirdas Prapiestis Fiscal policy support has mitigated financial stability risks during the pandemic, but the vulnerabilities arising from contingent liabilities have increased for euro area sovereigns. National policy responses to support households and firms during the pandemic directly increased the aggregate euro area general government debt-to-GDP level by around 14 percentage points to around 100% of GDP in 2020. Additionally, public guarantee schemes that were introduced in 2020 constitute sizeable contingent liabilities for governments in most euro area countries, adding to the stock of both existing government guarantees and other implicit contingent liabilities, which reinforces concerns about the emergence of an adverse sovereign-bank-corporate nexus. Against this backdrop, this box presents historical evidence from contingent liability materialisations, investigates their commonalities and differences with the situation under the current pandemic-induced shock and assesses the ensuing risk for sovereigns. 1.3 Aggregate household resilience masks uneven impact of the pandemic Households' economic sentiment has improved on hopes of a swift economic recovery, although uncertainty about employment lingers. Survey-based measures of economic confidence started to improve at the end of 2020 when the vaccine roll-out began (see Chart 1.7, left panel). Despite the overall improvement in sentiment, forward-looking measures of unemployment continue to signal a deterioration in employment prospects. The euro area aggregate sentiment masks considerable differences between euro area countries, reflecting the uneven impact of the pandemic on households across the euro area. Households that report the largest deterioration in their financial situation over the last year also show the highest unemployment expectations for the coming 12 months, leaving them in a vulnerable position when support measures are scaled back (see Chart 1.7, right panel). Sentiment improved on the prospects for a vaccine, but unemployment expectations remain high Sources: ECB, European Commission and Hale et al. Notes: Left panel: \"Stringency\" is presented using an inverted scale, i.e. an increase (decrease) in the indicator corresponds to more (less) stringent policy to contain the coronavirus. For more information see the notes to chart 1.1, left panel. Right panel: \"Unemployment expectations\" reflects consumer expectations for the number of people who will lose their jobs over the next 12 months. \"Financial situation\" reflects how households score the change in their financial situation over the last 12 months on a five-point scale. A negative score reflects a deterioration in their perceived financial situation. Bubble size reflects the household debt-to-disposable income ratio in the fourth quarter of 2020 or the latest available figure for the household debt-to-disposable income ratio. Cushioned household income, excess savings and record high net worth have increased the overall financial resilience of households. Despite recovering from the initial shock of the pandemic, disposable income remains reliant on government support in the form of higher net social transfers (see Chart 1.8, left panel). Moreover, households saved a significant amount of their income as containment measures limited spending on durable goods.[6] Cumulative excess savings compared to the pre-pandemic savings rate stood at around 4% of GDP in the fourth quarter of 2020. Whether pent-up demand will translate into higher future consumption remains uncertain, despite a large share of the excess savings ending up in deposit accounts (see Chart 1.8, middle panel). Excess savings are likely held by higher-income households, which have a lower marginal propensity to consume. Finally, robust"} +{"id":"RedPajamaCommonCrawl.0045","text":"Star Trek: Title of Liberty, Part I 12\/22\/04 Tags: new crew Category: Miscellaneous By: R.J. Herschell Star Trek: Title of Liberty A short story based upon the series created by Gene Roddenberry Written by R.J. Herschell Stardate: 57878.7 Sector 554, near the Cardassian Border Starbase 334 Rear Admiral Lower Half Thomas Henderson walks out over the Operations Center of Starbase 334. He had just barely been assigned to this station, along with a minute group of vessels intended to uphold Federation law and maintain the peace. Sector 554 hadn't had any dedicated fleet assigned to it since the conclusion of the Dominion War four years ago. Now, he had been ordered to assume command of what became known informally as the Pike Fleet. This fleet consisted of one starship, a new kind of a vessel called a cutter, three runabouts and a Type-11 shuttlecraft that Starfleet Intelligence had been screwing around with. The Pike Fleet is hardly a military force. In reality, the fleet is a law enforcement agency dispatched to a location where most law enforcement measures were quite inadequate. Sector 554 was quite rampant with the Orion Pirate Cartel. They had used their animal women to seduce the major government officials on the three colony planets. They had an almost endless power there. Starbase 334 was one of the most dangerous Starfleet outposts because the law did not exist here. Luckily, due to re-elections in the sector, more professional governors had been elected, allowing stricter laws to be established over the cartels. Now, Starfleet was placing their final blows on the Orions by assigning this fleet. Henderson stands in the middle of ops, surveying the stars displayed on the main viewscreen. He was awaiting the arrival of the final three vessels in his fleet: the USS Zebulon Pike, the USS Wyatt Earp, and the USS Nathan Hale. The Zebulon Pike is a Galaxy-class warship, one of those uprated versions. It really wasn't much good for law enforcement, a bit too powerful for that. The uprated Galaxies were really good at blowing up stuff. The Pike's mission would be to patrol the section of Cardassian-Federation border that ran through Sector 554. The USS Wyatt Earp is the second of the new Pinkerton-class cutters. These cutters are fast and powerful. The Pinkerton-class is especially tailored for law enforcement. They are about twice the size of a Danube-class runabout, and carry enough firepower to make any pirate crap his shorts. The Pinkertons have a compliment of eight, allowing room for prisoner transport; but that is not the only kind of personnel they can transport. With a Grade 3 diplomatic rating, they can carry any diplomat for extended periods of time. This is quite convenient in diplomatic situations when a huge starship would cause undue tensions. Yet, the Pinkertons do not sacrifice security in these situations, which tend to be a powder keg. If they absolutely have to, they can fight their way out of any fix. The Pinkerton vehicles also feature a sickbay. While there is no dedicated doctor, this can serve as additional crew quarters or medical evacuation volume. The Pinkertons value to Starfleet lies in their ability to be deployed on any mission without the module-swapping the Danube-class runabouts have to go through. The USS Nathan Hale, appropriately named after probably the most famous American spy, is a Type-20 Shuttlecraft. Essentially, a Type-20 is a Type-11 that has a dedicated crew of five, and has been outfitted with enough weaponry to make it a considerable opponent in battle. She is a stealthy vessel, built to slip behind enemy lines and gather information unnoticed. Her role in law enforcement, being able to follow pirate vessels right to their base, is invaluable. Her entire crew comes from Starfleet Intelligence; they are some of the best officers in the United Federation of Planets. That crew is very professional, very dedicated, very trustworthy, and very intelligent. Admiral Henderson looks forward to working with these individuals. The Operations Center of Starbase 334 is rather confined. There are fifteen officers in this Center, all accomplishing various tasks. They move about the diamond shaped room running reports and collaborating on their various tasks. The dull roar they make can be compared to a bar on a weeknight. Their stations are arranged into three tiers, formed into a V, with the opening of the letter aimed at the viewscreen in the front corner. Down the point, or rather where the point should be, is an aisle, allowing officers easy access to the other tiers as they accomplish their business. At the very back of Ops, right under the Federation Seal painted above a systems panel installed in the back corner, is a single stand-alone station. This is the Commander's Information Providence station. The CIP was built with the intent of providing the commanding officer all the information he or she needed without disturbing any of the Ops Center crew. Directly in front of the CIP, one step down from the uppermost tier is a rather large and comfortable-looking chair. This, of course, is the command chair. This chair has been unoccupied for four years, as the Commander of the Starbase had a station to the right of the CIP, and the Executive Officer in the tier immediately in front of the Commander. Its purpose was to accommodate any visiting admiralty, such as a sector commander. Admiral Henderson stands in front of this chair, watching the bustle in Ops. Thomas turns around and proceeds to stand behind the CIP. He surveys the controls for a second, and then calls up the assigned patrol routes for the Pike fleet. The computer places this map on the main viewscreen, but nobody pays attention, too wrapped up in their work. Henderson had a perfectly fine view of this map on the CIP, and had no reason to look up at the viewscreen. After assuring himself that this was to his satisfaction, he restores the viewscreen and sits in the Admiralty chair. There was absolutely nothing to do while he waited. \"Admiral,\" Captain Sara James, the commander of Starbase 334, was standing to the Admiral's right, \"I think you would like to know that the Zebulon Pike will be here in five minutes. They are ferrying the Nathan Hale as well.\" \"Thank you, Captain. As soon as they arrive, I would like to meet with the command staff of both vessels in the situation room.\" Henderson responded to the petit, attractive Captain. \"I will have Military Comm pass it on.\" She acknowledged and proceeded to the upper tier, on the left hand side of the bridge, next to the CIP. She leaned over and whispered in the ear of an ensign seated there. Then returned to her station, reflected over the centerline of the bridge from the station she was just at. Admiral Henderson stood and began walking towards a door set in the forward right-hand wall of the Ops Center. There are four doors, one on each wall of the room. The forward right leads to what is called the Situation room. The fore-left leads to a hallway that ultimately leads to the turbolifts and a couple of conference rooms. The aft-left leads to Admiralty office, derelict since the conclusion of the Dominion War, and the aft-right leads to the CO's office, or ready room. Stepping over the threshold of the door, Henderson entered the situation room. The ambient lighting of this room is quite dark. There is one large screen on the other side of the room. Around the room, set into the union between the bulkhead and the overhead, are several screens. Most of them are off. Some are displaying random data concerning matters the Admiral couldn't care less about. In the middle of the room is a table with various screens and LCARS interfaces set in it. During a crisis situation, officers and commanders would be crowded around this table keeping an eye on the situation and commanding it. This room's purpose is to separate the bustle of running a situation from the bustle of running the station. In front of the large screen are two long tables, one set in front of the other. Each table has seating for eight, and a small LCARS panel in front of each seat. This was for briefing personnel about to take command in the field. To the left of those being briefed, that is the viewscreen's right, is a station dedicated to operating this screen. Here the presenter can stand to present crucial information to the commanders. Set in the bulkhead next to the door leading to the bridge are several large screens showing the status of the station, most of them inactive. Henderson moves to one of the operational panels, and brings up the lights. Proceeding to the presenter's station, he activates the presentation screen. He puts the sector map he was looking at on the bridge on that screen, and then sat patiently behind the presenter's station. He waits for the command crew of the Zebulon Pike and the Nathan Hale. A door adjacent to the aperture leading to the bridge opened, and four officers entered the situation room. Glancing around for a second; one of the captains motioned towards the two long tables and led the other three to the front row. Henderson started from his position before they had a chance to sit down. \"I am Admiral Thomas Henderson, sector commander.\" He introduced himself in a friendly businesslike tone. \"Captain Rachel Erickson, Admiral,\" one of them responded, extending her hand. She was about Tom's height, with what looked like could be long brown hair, but it was kept up in a bun. Her eyes were brown and spread a feeling of fellowship and innocence. She hardly looked like she should be in command of a starship. Nevertheless, she continued her introduction, \"I am the commander of the Zebulon Pike. This is my First Officer, Commander Bryan Jensen.\" She indicated a short muscular man with short light brown hair and blue eyes. Henderson shook both of their hands. \"Admiral,\" started the other man in the group. He is taller with medium length black hair. He seems sterner than the other two, \"Captain Kevin Smith, Commander of the Nathan Hale. This is my first officer, Commander Molly Griffin.\" Commander Griffin was a highly attractive officer with medium brown, again could be long, hair, same eyes, and she radiated an atmosphere of energy. Henderson firmly shook Smith's hand, and then the enthusiastic hand of Commander Griffin. Captain Smith fell into Tom's idea of an intelligence officer, but Commander Griffin was by far not what he expected. The four took their seats. First officers next to their captains, ready for the Admiral to begin his briefing. \"Welcome to Sector 554. You should have been doing your research, so I will spare you the details of the situation we're in. Since Starfleet is rather anxious to reestablish the law here, I will brief you quickly and allow you to get to work.\" The Admiral was interrupted as the doors to the situation room opened again, and two more individuals entered. \"Sorry we're late, Admiral. We just got in. Captain Steven Matthews of the Wyatt Earp,\" the medium height, medium built, brown-haired stud introduced himself, \"this is my executive officer, Commander Jason Harp.\" Captain Matthews indicated a tall, gangly commander who stood slightly hunched over with an expression on his face as if someone had just hit him over the head with a brick. \"Have a seat, gentlemen. We're just getting started,\" Henderson waited for them to be seated, \"Just as well. I'd much rather brief the fleet on the whole than drag out the whole affair. As I was just saying, I trust that you know this sector's history, so I will not go over that. You know that we have to let the citizens of this sector know that the Federation law is back in town. That will be the primary responsibility of the Wyatt Earp.\" \"Admiral,\" Commander Jensen spoke up, \"Wouldn't it make sense to put the Zebulon Pike in charge of law enforcement, as we are the more powerful vessel.\" \"No, actually. The Wyatt Earp is better geared toward law enforcement than the Pike is. Besides, I have something in mind for the Pike.\" Henderson answered. \"Aye, sir.\" Jensen nodded his acknowledgement. \"So, the Earp is responsible for law enforcement. Now, each colony has their own police force, so the Earp is to act as a supplement, not a replacement. Also remember that we don't have the resources to do much more. We have three runabouts here at Starbase 334 that can be used to augment your efforts if it becomes necessary. So, Captain Matthews, you will maintain a constant patrol between the three colonies in this sector. Just duck in and check up on them.\" \"Yes, sir.\" Matthews responded. \"Now, for the Hale,\" Henderson paused, \"I'll come back to you. Pike. You know that the Cardassian border runs through this sector. What I need the Pike to do is patrol that border. This section has been unprotected for too long, and Starfleet fears that the Cardassians have gotten some ideas in their spoon-heads,\" A chuckle rose among the commanders at Admiral Henderson's crack, \"Trade vessels are allowed to cross the border freely, but you need to make sure the Cardassian military stays on their side of the line. That's where we come to the Hale. You have two jobs. Keep an eye on things inside the sector. We need you to be an extra set of eyes for the Earp. Also, you will be patrolling the border upon occasion to make sure the Cardassians aren't up to fowl play. Nonetheless, I want you to be primarily worried about patrolling inside the sector. Are there any questions?\" Henderson noticed Captain Erickson's hand raise slightly, \"Captain.\" He acknowledged her. \"Yes, Admiral. How often do you want reports?\" \"I am going to ask for ops normal checks every half-hour to an hour. If I need any other reports in the interim, then I will contact you directly.\" He noticed she nodded in satisfaction, \"If there's nothing else, I'm going to dismiss you to go about your work.\" Sector 564, near the Federation Border Senit Nor Trading Station Ri'ta Gul Rinkad sits behind his desk in his dark Cardassian office. He is a stern military commander, hardened by many battles. He reads a report that Glinn Yistin had just handed him. Hatred burned in his bones. He knew all his life that the Federation could not be trusted. This report merely proved this to him. The United Federation of Hypocrites, that's what they were. The image of a glorious empire of peace, goodwill and cooperation, is all just a fa\u00e7ade to cover the corruption, greed, and imperial generals. They wrote and spoke visions, and then plotted and exploited the weak for their own gain. Rinkad throws the PADD down on the desk. He had seen enough. Yes, the Federation had helped Cardassia throw off the oppressive chains of the Dominion, and yes the Federation was helping them rebuild. But the Federation would have been in ruins if the Cardassians hadn't betrayed the Dominion. He knew that Cardassia had to choose the lesser of two evils. But that was four years ago. Now it was time to eliminate all evil. \"Glinn Yistin,\" his deep sinister voice addressed the officer across the desk from him, \"You're intelligence.\" \"Covert Operations, sir.\" His slithery voice corrected his superior from across the dark room, his face hidden in the shadows. \"Even better,\" the sinister voice of Rinkad sounded, the scheming intelligence obviously satisfied, \"I want you to find a solution to this.\" \"I have one ready, sir. All I have to do is test it.\" Yistin's monotonic, and smooth voice responded. \"I want to see it.\" Rinkad demanded of the man, looking in the direction he guessed Yistin was in. Yistin approached the desk, the light perimeter from the overhead lamp slowly slipping up his torso and finally revealing his cold Cardassian face. He dropped a pad of paper on the desk in front of Rinkad, \"Paper?\" The Commander showed the smallest surprise, retrieving the pad. \"No computer records. No intelligence leaks. After the Dominion War, Federation intelligence has been putting their noses in everything.\" Yistin responded, looking apprehensive about being in the light. \"Very good, Glinn. I like your style.\" Rinkad surveyed the paper with definite satisfaction glimmering out of his eyes, a twisted smile spreading over his face, \"and I like the code you put it in. It looks Federation.\" \"That's not a code, sir. That's an ancient Earth language, called German,\" Yistin responded again, \"Few Federation citizens know it. No Cardassians do.\" \"So no two-timing squeal box can read it and send it back to the Federation. Looks like you covered your tracks,\" Rinkad responded to Yistin, returning the pad. Yistin retrieved it and retreated to the darkness, \"Tell me, what is the plan?\" \"Let me test it first, Ri'ta. Then I will tell you everything.\" Yistin assured Rinkad. \"Do what you have to.\" Sector 554, at the Cardassian Border USS Zebulon Pike NCC 80225 Captain Erickson enters the bridge. It wasn't technically her shift for another two hours. However, the second officer, Lieutenant Commander Sam Brady, had called her to the bridge briefly. That was fine with her, being called up at five o'clock in the morning; she had gotten to bed early and was awake trying to find something productive to do. Straightening her uniform, she proceeded towards Commander Brady, sitting in the center seat of the bridge. \"Commander Brady, what do you have?\" She asked, approaching him. \"Captain,\" Sam stood and acknowledged the Captain, \"We saw a Cardassian vessel cross the border.\" \"A Cardassian vessel?\" She asked, emphasizing the indefinite article. \"Well, not just one. There have been fifteen incursions over the past hour. All of them are harmless Hideki-class scouts. The Pike could easily take on all fifteen of them.\" He explained. \"But fifteen incursions in one hour.\" She finished his sentence. \"Yes ma'am. I thought it was a bit odd.\" Brady looked into the face of his commanding officer as she thought about the matter. She sat down in the Command seat and brought her hand to her chin, staring blankly ahead of her. \"Did you report this to Admiral Henderson?\" She broke her trance and looked at Brady as he took a seat to her left. \"Yes, ma'am. We sent it with the status report seven minutes ago.\" She returned her gaze to the point ahead of her. \"Any answer?\" This time she didn't break her trance. \"No, ma'am. Admiral Henderson is probably just barely finding out.\" He looked ahead at the stars. Fifteen times he had seen the Hideki-class vessel grace that screen. It was really quite a beautiful vessel. But it signified a race the Federation has never been able to trust. \"Captain, there's another one coming across the border. Bearing 151 mark 339.\" The ensign at the tactical station behind Captain Erickson cried out over the sound of an alarm. \"Helm, set an intercept course for that vessel. Maximum safe speed. We need to let them know which side of the border is theirs. Yellow alert! Raise shields and charge phasers.\" She stared determinedly at the screen as the sound of the warp engines activated and the stars stretched past for the briefest of moments. They stayed at warp for only a second or two. The stars returned to normal and they watched their approach towards the Hideki scout from above it's position. \"Target them!\" Rachel ordered, staring daggers at the intruding ship. \"Sir, they're headed back to Cardassian space,\" The tactical operator called out as the ship spun around and warped off the screen, \"They're really moving, ma'am.\" \"Of course they are. A battleship heads for a glorified shuttle that you happen to be in with the guns ready to fire, you'd get back in your limits rather quickly,\" Erickson responded, almost laughing at fast the Hideki packed out, \"Maybe that'll put an end to the incursions for a while. If you need me, I'll be in my ready room.\" She stood and walked off the bridge. \"Fifteen incursions?\" Admiral Henderson had just arrived on the bridge after being summoned by the Commander Ryan Smith and was now looking over a report the Communications officer had handed off to him. \"Yes sir.\" Commander Smith answered standing in front of the Admiral right in front of the Admiralty Chair. \"Do you get the nasty feeling that the Cardassians are up to something?\" He asked, handing the PADD back to the Executive Officer. \"Yes sir. Either that, or the Cardassians are hiring horrible navigators.\" The Commander cracked as he accepted the PADD. \"Well, you'd think that after two or three incursions the commander would relieve the navigator of duty.\" Admiral Herschell responded. \"You'd think so.\" Tom walked to the back of the bridge and stood behind the CIP, staring at the stars on the viewscreen, \"Where is the Nathan Hale?\" \"It put in towards the end of Beta shift, Admiral.\" Ryan answered, standing in front of the CIP facing the Admiral. \"Get me Captain Smith,\" Henderson pauses for a moment, \"Captain Smith. Any relation?\" He asked Ryan, upon connecting the names. \"He's my older brother, sir.\" Ryan responded, in a professional voice as always. \"I see,\" Henderson frowns slightly in a trance as he makes small nods, \"Well, get him up here. I think we're going to need Starfleet Intelligence.\" Admiral's Ready Room \"Fifteen incursions, sir?\" Captain Smith blurted out in a tone of surprise, with a wide-eyed facial expression to match. \"Yes, Captain. Fifteen incursions in one hour,\" Henderson sat behind his highly polished desk, hands clasped in front of him and laid neatly on the mirror-like surface, \"What would an experienced intelligence man like you say to that?\" Henderson implored the Captain looking steadfastly for an answer. \"I would say that the Cardassians are up to something.\" Smith read a PADD with the Zebulon Pike's report on it. \"Oh, good. Now that an expert has said that I feel much better saying it myself,\" Henderson drew a look from Smith by his sarcasm, \"I know the Cardassians are up to something. But what?\" \"Well, the Captain could have stayed up late at a bachelor party and is now CUI.\" Kevin proposed with a look of innocence on his face. \"CUI?\" The Admiral knew nothing good could come from this question, yet he was still annoyingly curious. \"Commanding Under the Influence, sir.\" He responded, a grin cracking across his face, his shoulders shaking under the silent chuckles of his own joke. \"My kingdom for an officer who will give me a straight answer!\" Thomas rolled his eyes and leaned back in his seat. \"I'm Starfleet Intelligence, sir. I don't give anybody a straight answer.\" The Captain expressed the irony of his foolish jokes. \"I've noticed.\" Admiral Henderson's dry voice and dark expression flew from his slouched body in the seat. \"Listen, Admiral. Honestly, I can't begin to tell you without more information. Best guess: the Cardassians are preparing for an invasion.\" The first serious words out of Captain Smith's mouth. \"Invasion?\" Henderson leaned forward. Now that Smith was done with his jokes, the Admiral was interested. \"Not an immediate invasion. We don't trust the Cardassians, sir. Honestly, they have a harder time trusting us. They're engaged in military exercises. Running the border, trying to be undetected. Now that we have a Starship there, it makes it all that more exciting. They may feel that someday they may need to perform a preemptive strike to defend themselves.\" He rationalized. \"Why would they do that on the Federation border, now?\" \"Probably because they know the Federation is not going to declare war over a few incursions that didn't amount to anything. They don't trust us, but they know we're docile.\" Kevin replied truthfully. \"Yeah,\" Tom leaned back, again exasperated, \"It's hard being the teeth of an animal that refuses to fight.\" They sat for a moment, the Admiral rotating his chair towards the window in the office, such that he could see the stars. Contemplating what he had just heard for a few seconds he turned back around. \"Captain, what kind of 'more information' do you need?\" SS Cutty Sark Captain Ryan Harrin stood on the bridge of his transport vessel, examining the viewscreen ahead of him. The Cutty Sark was by far not the kind of ship he commanded when he was in Starfleet. Then again, the Cutty Sark wouldn't have been able to handle some of the things Captain Harrin put the Iowa through during the Dominion War. They were two vessels of two breeds. The Iowa's job was to fight other vessels. The Cutty Sark's job was to haul freight through relatively docile territory. It had one low powered phaser bank intended to clear annoying space debris. Captain Harrin reviewed his flight plan. It would take him over the Federation\/Cardassian border and straight to Senit Nor. There he would drop off his cargo of Saurian Brandy and pick up some h'sencar. H'sencar was some of the finest fabric in the Alpha Quadrant, and it was manufactured in Cardassian space. H'sencar was some of the most commodious material in the Federation, and merchant captains like Harrin had been trading whatever the Federation had to offer for this stuff for four years straight. There was a huge demand for it, and Harrin had every intention of continuing trade for h'sencar for however long it was profitable. He looked across the bridge of his vessel to see one of his crewmembers talking with a Starfleet security officer. The crewmember pointed to him and the security officer nodded. The crewman left the bridge while the officer proceeded over to Harrin. Harrin faced the man as he approached. \"Captain Harrin?\" The officer, his insignia indicated he was a lieutenant, asked the Captain. \"Yes, lieutenant, what can I do for you?\" Harrin couldn't figure out why security would be coming for him. As far as he knew, he didn't break any laws. \"Captian, Admiral Henderson would like to have a word with you.\" The officer spoke in a professional, yet easy going voice. \"Who is Admiral Henderson?\" Harrin recognized that name, but wasn't sure about it. \"He's the Sector commander, sir.\" \"I didn't know we had a Sector Commander.\" Henderson still rang a bell, but on a different front. \"We didn't until yesterday. He would still like to have a word with you.\" \"Did he say why?\" Harrin began to be concerned. A green-behind-the-ears sector commander wanting to talk to a merchant was never a good sign. \"No, sir. He just said it was urgent.\" The Lietuenant replied. Having been in Starfleet for most of his life, Ryan knew that when an Admiral said something was urgent, it was urgent. Whether or not the Admiral was right, which he rarely was. \"Lead the way, Lieutenant.\" The Lieutenant led Harrin out of the ship through the docking arm and through the bowls of the station. They walked into a turbolift and it carried them up to a hallway. Upon the turbolift opening, two doors were visible across the hall. The Lieutenant led Harrin through the ones on their left. This led them into a room that Harrin immediately recognized as a situation room. He had been in one too many of these during the Dominion War. Seated at the presenter's station was a face he hadn't seen for a long time. \"Tom!\" Suddenly he remembered where he had heard the name \"Henderson.\" \"Good morning, Randy.\" The Rear Admiral greeted Harrin. They shook hands enthusiastically. \"Captain Thomas Henderson of the USS Thunderchild. Long time no see! So they made you the Admiral of this sector.\" Harrin's apprehension had gone away at the meeting of an old friend. \"The war vet captains who stuck around were all put on the admiralty promotion list. My name finally came up. If you had stuck around, you would have made it to admiral as well.\" Henderson was glad to finally meet up with his old friend. \"Oh no, Tom. Starfleet was way too much adventure for me. I needed something a little more calm,\" They laughed. Both of them had been on very exciting missions, some of them together, \"So what is this I hear about you wanting to talk to me?\" \"I need you to do me a favor, Ryan. I need to put one of my officers on the other side of the border.\" \"And you want to stow them on my ship. I don't know, Tom.\" Ryan knew exactly what Tom was getting at. \"Now hear me out, Ryan. This is the officer I want to put on the other side of the border,\" the Admiral indicated a woman Ryan didn't notice before, \"This is Commander Molly Griffin from SI.\" Griffin was dressed in the same uniform Harrin used on the Cutty Sark. I want her to be your sensors officer, and get stranded at Senit Nor. I'll worry about getting her out, you just get her there.\" \"I already have a sensors officer, Dayton Garret.\" Ryan protested further. \"I don't know, but I think he's a suspect in an assault case in one of the bars. What do you think, Commander?\" Henderson turned to Griffin. \"You know what, sir, I think you're right.\" She responded in mock agreement. \"I'm sorry Captain Harrin, but I think I'll have to detain Mister, was it Garret?\" Henderson turned to Ryan in the same mock tone of voice. \"Oh come on, Tom! That's a load of bull and you know it! You can't convince anyone that Dayton would do something like that!\" Ryan was somewhat outraged. \"Don't worry, sir, our security staff on Starbase 334 is a crack team. They'll have your man cleared by the end of the day.\" Griffin interjected reassuringly. \"I should've known better than to mess with SI. Okay, I'll do it. But I want my man back.\" Ryan pointed his finger at the Admiral, emphasizing his last point. \"You got it, Ryan. But you'll have to stay mum about the whole affair. You need to act like Molly is your replacement for this mission. Even the guy we're going to take out of the game.\" Henderson explained. \"You don't have to read me the classified riot act, Tom. I still remember my Starfleet days,\" Ryan remembered one particular intelligence dodge he had to come up with that involved his wife's underwear. He grinned, \"Tom, remember the Sol-Dominion Repulsion?\" \"How could I forget?\" Tom asked, after turning away from the security officer that had escorted Harrin up here. The officer left the room, \"I'm still trying to get the hair back on my legs.\" Griffin did a take of wide-eyed curiosity. \"What?\" She asked, thinking Henderson had encountered some kind of chemical that had burned the hair off his legs. \"That's classified, Commander.\" Henderson responded. \"I'm intelligence, sir, I'm probably cleared.\" She pressed further. \"Commander,\" Henderson placed his hand on her shoulder in a fatherly way and put on a stern and frank demeanor, \"You won't be cleared until the day I die.\" She looked at him, confused. His statement was quite discombobulating. \"Sir? Under\u2026\" Molly really wanted to know when Starfleet Intelligence started classifying data like that, and began asking, but Henderson had returned to his normal bearing and interrupted her. \"Captain Harrin, go ahead and return to your vessel. I have already sent security to set these events in motion. Commander Griffin, I want you to go down to Tradewinds. Captain Harrin will come in there 'looking for a temp.'\" Henderson gave instructions to the two with him. They both immediately left the room. Tom stood in the middle of the empty room staring at one of the screens near the ceiling. It showed a map of the sector, and the ship movements therein. He stared at it, thinking about what he just set into motion. \"Let's hope this works.\" Tyson Paine just closed the last crate. He had been standing in the cargo bay inspecting every crate and inventorying everything here. It was actually less inventorying and more trying to figure out whether or not someone was smuggling an item aboard, or something of that sort, that would cause the Cutty Sark to be in danger or to get in trouble with Federation law. That was the job of the Chief of Security. He had been a security officer during the Dominion War; in fact he was Captain Harrin's Chief of Security on the Iowa. That's how they knew each other, and that's how Tyson ended up on this ship. The Payload Specialist was in charge of inventories. However, due to some of the interesting things they have found while doing inventories, the captain felt it was best for the Chief of Security to do this. Paine usually liked to do the inventories as the crates are coming on to the ship, that way it doesn't distract him from his duties. But he had a run-in with Station Security. They were telling him that Dayton Garret was a suspect in an assault. He couldn't believe anyone would think of Dayton that way. He was one of the nicest, most personable individuals. There was no possible way he could have assaulted anyone. A few minutes later, he entered the bridge of the Cutty Sark. This room wasn't much. Just three stations in front, helm, sensors and communications. The Captain's chair was in the middle with three stations behind it, Payload Specialist, Security, and engineer. The bridge wasn't always like this, the stations used to be spread around the walls and the Captain was at the helm station. Paine suspected that Harrin had rearranged the bridge to be more like a Starfleet bridge. The adage was true, a Starfleet captain never retires. He proceeded to his station and handed off a PADD to the Payload Specialist. \"Thanks, Tyson,\" John Feriman accepted the PADD, glanced at it, and then set it down. Then he leaned towards Paine and whispered, \"Hey, Tyson, what do you think about our new sensors operator?\" Feriman asked, indicating Molly Griffin. \"I don't think I can trust her, John. There's just something about her that's not right,\" He stared at her back, her brown flowing hair falling around her shoulders as she worked her station, \"I mean, don't you think it's a bit odd that security hauls off Dayton, and then the Captain goes into the Starbase bar and just happens to find a perfect replacement?\" \"Yeah, how do you suppose she got onto Starbase 334?\" Feriman asked him. \"I don't know. But, speaking as a retired Starfleet officer, it's kind of odd for someone who has no connection with either Starfleet or a vessel that trades at that station to be on that station.\" He answered. \"Captain, we are entering Cardassian space. Approximately one hour until we arrive at Senit Nor.\" Ms. Griffin spoke up, turning around to face Ryan. Harrin acknowledged her, and she turned back, making the briefest of eye contact with Tyson. Tyson tried to read her eyes, her expression. But it was too brief, and she was too emotionless. \"She's apprehensive.\" Tyson commented. \"Heard it in her voice?\" John asked. \"No. She's tapping on her console.\" John looked over and saw her fingers doing an impressive roll on the edge of the console. \"She looked at you,\" Tyson moved his head side-to-side, affirming John's observation, \"Did you see any apprehension?\" \"No, she's a blank slate,\" The hand Molly had been using to tap on the console clenched into a fist and returned to the console. She showed no further signs of emotion. She actually looked quite bored, \"The only people I have seen like that are Starfleet Officers. I mean, listen to how she reported our location. That's not the way most civilians would do it.\" Tyson rationalized, burning his gaze into her back. \"I think you're getting paranoid,\" John dismissed him, \"a civilian who wants to impress a new boss would do that.\" \"No, hear me out,\" Tyson had just figured something, as he waved his finger at John, \"You see, she was in a bar on the station. I'm a civilian, but I do things the Starfleet way because I used to be a Starfleet officer. She's a civilian, but she does things the Starfleet way because she was a Starfleet officer. My guess is that she did something that got her dismissed from Starfleet, and she was in the bar to drown her sorrows around the time the Captain came in.\" \"Yep, you're paranoid,\" John replied calmly, retrieving the PADD Tyson handed him earlier, \"I've been thinking about asking her out myself. She's hot.\" Tyson shot him a dark look, snorted, and went back to his work. As per Ms. Griffin's predictions, the Cutty Sark pulled into Senit Nor within the hour. The Helm had brought them into the old Cardassain mining station. This particular design was the one that made Deep Space Nine obsolete to the Cardassians. The Cutty Sark docked with no trouble. Captain Harrin assigned Paine and Griffin to retrieve the new supplies. His excuse was that he wanted Paine to inventory the h'sencar before it got onto the ship. The Payload Specialist was going to go close the deal, and the Engineer, Helm, and the Captain were going to go check out a relay to one of the thrusters. The only crewmembers left were Griffin and the Communications crewman. The Comm person had to stay behind in case they got any messages from anyone. So Griffin was sent with Paine to help bring the crates in. They all split off to do their various duties. John, Molly, and Tyson arrived at the end of the docking arm to be met by two Cardassian officials. \"That is Gil Samgar. I do most of my dealings with him.\" \"Don't you men Glen Samgar?\" Tyson read the insignia on his uniform. \"Maybe he got promoted.\" Molly interjected. \"That's a demotion.\" Tyson eyed Molly suspiciously, if she was a Starfleet officer, then why would she be so incompetent at the Cardassian rank system? \"You say you've never seen the other guy?\" Tyson asked as the Glen pointed them out to the other man with him, and they started coming over. \"No.\" John responded, preparing to meet them. \"He's a Ri'ta Gul. That's about equivalent to Rear Admiral Lower Half.\" Tyson whispered incredulously. Taking a quick glance at Molly. Her eyes were doing a dart around the room, taking everything in. \"That's why we bring you along on these,\" John barely had enough time to whisper to Tyson before the Ri'ta Gul and Glen Samgar were in range, \"Greetings, Glen.\" \"Greetings Mr. Feriman,\" Glen Samgar responded, \"This, Gul, is John Feriman, the Cutty Sark has done all of their dealings through him. This man is Tyson Paine, he is the security official of the Cutty Sark. I don't know who this woman is.\" \"Molly Griffin. I'm temping as sensors.\" She responded, extending her hand. \"Ms. Griffin, where were you assigned before coming aboard the Cutty Sark?\" The Ri'ta Gul moved in towards Molly, getting awfully close. His cold face staring straight down into her eyes. \"I am the First Mate on a merchant vessel undergoing maintenance,\" She boldly, almost defiantly, stared straight back into his eyes. Neither of them blink, \"The Starbase 334 engineers were hired, and I was left behind to coordinate their efforts.\" \"So you came from Starbase 334?\" His gaze bore straight into her, searching her eyes. She did not show any sign of emotion, her demeanor was just as cold and empty as his. \"To here, yes. I don't usually spend time there.\" There was a silence as their stares were locked at each other, waiting for the other to flinch, daring the other to blink. \"Gul, I do not believe we've met.\" Paine intervened, sensing the hostility between the two, extending his hand. \"Ri'ta Gul Rinkad. Superior officer of this sector.\" He finally broke his gaze away from Griffin, and turned it to Paine. But he didn't take his hand. \"It's a pleasure, Gul. Mister Feriman here will handle the business dealings. Miss Griffin and I will go down and get the goods.\" Tyson took a step forward, to be stopped by Rinkad's extended hand. \"You will be escorted by Glinn Yistin,\" Rinkad pointed to another Cardassian, even creepier than Rinkad. Nobody had noticed him as of yet, but he carried a book under one arm, \"Recent pirate activity in this sector. We need to keep an eye on the people we let into our cargo bays.\" He spoke coldly, then turned around and left the area. Yistin motioned Griffin and Paine towards him. Paine hated this situation, something was definitely not right. The last time he had that instinct, he ended up in an intense firefight. Fastening on the bearing he had developed as a Starfleet Security Officer, he marched forward, Griffin perfectly at his side. This was the first time he felt a sense of trust in her. She had survived a mental beating by a Cardassian flag officer, and she had survived well. If they got into a tiff, he knew he could rely on her nerves. \"You did well against that Ri'ta Gul back there. Most people would have broken down.\" Tyson whispered to her just before they got within to Yistin's hearing. \"Thanks,\" she smiled openly, \"I had a stern father.\" They both headed straight for Yistin. \"Come with me.\" He responded coldly. Then turned and marched down the corridor. After glancing at each other, Griffin and Paine followed. Griffin couldn't help but to notice the book Yistin was carrying. It had a symbol on the front that made a chill run up her spine. The Obsidian Order. She knew she had to get that book away from him somehow. Her gut told her that whatever it was she was looking for, that was it. After wandering through the station, travelling through a few turbolifts. They arrived in the musty and dark cargo bay. \"How many crates?\" He asked, with definite distaste in his work. \"I, don't know. Let me go check.\" Paine turned and began to leave the cargo bay. Just before he left the room, he turned around and looked at Molly. Should I leave her with him? I guess she's competent, she can handle him. He left. Yistin was thoroughly frustrated. He slammed his book down on top of one of the crates, Molly eyed the book, trying to figure out something to do. Getting an idea, she loosened the collar on her shirt, and rolled up her sleeves. Then she fluffed her hair, then threw her head back. Glancing up, she saw that Yistin was watching her, almost greedily. She smiled at him, then walked across the cargo bay and retrieved an antigrav cart. She pushed it to the crates, slinking across the room. She stopped the cart right next to the pile of crates. Then turning to give Yistin a perfect profile view of her, she stretched her arms, arching her back. Then she asked him, in a half-tired voice. \"Is this h'sencar?\" She pointed at a crate on the pile. \"Everything here, ma'am.\" She could see in his eyes that he was weakening to her strategy. He pointed at all of the piles of crates. She nodded, smiled at him again and gave him a half-glance. Then she reached over to pick up one off a pile. Suddenly she saw a hand next to her. She looked quickly at it's owner, seeing Yistin with a twisted smile on his face. All his smile did was make him look uglier, if that could be possible. \"Please, ma'am, allow me,\" He indicated that he wanted to pick up the crate for her. She allowed a wide grin to cross her face. She stepped back while he lifted the crate and placed it on the cart. Then he opened the box, and removed a bolt of the fabric, \"This is the finest fabric in the Alpha Quadrant.\" Why is he bragging about cloth? She thought, while she extended her hand and ran it over the fabric, \"It is quite\u2026soft.\" She said in her half-tired, drawling voice. On the last word she looked into his eyes. He struck her as quite unattractive. No wonder why he took the bait, no woman has ever acted like this around him. He leaned forward, his face getting closer to hers. Who said death is the ultimate sacrifice! Their lips touched. Griffin did her best to act like she was enjoying this moment. The bolt of cloth dropped, and her hands began to feel around his body. He wrapped his arms around her, and their kiss became more passionate. Hey! This isn't even the first date! \"What is going on here!\" Tyson had returned, with John at his shoulder. In a split-second, Molly immediately broke the embrace, and swung around flail armed, catching the book and sending it flying into the open crate sitting on the antigrav cart. Before anyone had a chance to see the book had changed his location, she ran over and slammed the crate shut. \"Thank you, Glinn. It looks like everything is here.\" She straightened her uniform, closing up the neck of it. She stood straight, trying to make it look like she was embarrassed Tyson came in. In reality, she was relieved. Tyson marched over to him, and leaned in to her. Speaking in a stern whisper. \"What are you thinking? Recreating with a Cardassian Officer while you're supposed to be doing a job?\" She gave him a dumb look. \"How many crates?\" Yistin was back to himself, except he was now standing next to Molly, seeming to take a defensive posture on her behalf. \"Twenty.\" Paine's voice lowered the temperature a couple degrees Celsius. \"They're right here.\" Yistin responded aggressively, pointing at the pile. Then he headed to the door of the bay. He turned around suddenly, eyeing the spot where he left his book. He looked concerned. Looking at Molly, he appeared to almost be ready to say something. Then he eyed John and Tyson, then proceeded out of the room. Tyson turned to her. \"That was brilliant, Miss Griffin!\" He was almost to the point of laughter. \"It was?\" His reaction somewhat took Molly off guard. \"Yeah, soften the guy up before he has a chance to attack you! Oh, the advantages of being a woman.\" He was shaking his head, smiling endlessly at what just happened. \"What do you say we get these crates on the ship and get out of here before that Ri'ta Gul finds something to keep us here?\" John asked Tyson. \"Yeah, Miss Griffin, I'm going to assume you already inspected this crate.\" He indicated the one on the cart, the one with that intelligence she had just \"gathered.\" \"Yeah, it has nothing but cloth in it.\" She responded. Over the next half an hour, they opened nineteen more crates and loaded them on the cart. Then they pushed it down to the Cutty Sark. Starbase 334 Situation Room \"Listen sharp, guys. The Cardassians are missing something they think is aboard the Cutty Sark,\" Admiral Henderson barged into the room from the Bridge. In there was the remainder of the crew of the Nathan Hale, \"They are very interested in getting this thing back. They are telling us to make sure no one goes into the cargo bay of the Cutty Sark until they have a chance to search it.\" \"The work of Commander Griffin.\" Captain Smith immediately concluded. The five officers were grouped around the table in the middle of the room. Captain Smith was standing in the middle of his crew, crowded on one end. Admiral Henderson leaned his hands on the other. \"That's what I'm guessing. I don't know her that well, though.\" He looked at Smith, to get his opinion. \"I've worked with Molly for three years, sir. She's good.\" He responded. \"That's all I need to know. So here's what's going to happen,\" Henderson straightened up and started walking around the room. The crew of the Nathan Hale cast their gaze around to watch him, \"I am going to take security on to the bridge of the Cutty Sark and make a big deal. You gentlemen are going to take a gander at the Cargo bay. If you find anything that looks like the Cardassians would be making a big deal over, take it.\" \"Admiral, it would be prudent if this document is not the only item we retrieve from the Cutty Sark.\" Lieutenant Sivinh, the Vulcan tactical officer of the Nathan Hale spoke up. \"What do you mean, Lieutenant?\" The Admiral paused near the tables facing the screen, behind the crew of the Nathan Hale who had turned to face him. \"I mean, sir."} +{"id":"RedPajamaCommonCrawl.0046","text":"An Olathe Hospital Sued Thousands for Medical Debt, and Dozens Went to Jail Precarious Balance of Cost and Compassion in Health Care Barbara Shelly Mark Wiebe Published July 8th, 2020 at 6:00 AM Above image credit: Olathe Medical Center and Emergency Medicine Care officials say they are making changes to help patients, but they are still suing more patients in court for unpaid bills than neighboring health systems. (Jeff Tuttle | The Journal) Haley Graves was running across the deck of her family's home in 2018 when she hit a patch of ice and went down on her right arm, breaking it in two places. Her mother, Debbie Graves, packed her injured daughter into her car for the five-minute drive to Olathe Medical Center. A year and a half later, the hospital sued Haley for being late on payments and summoned her to court. Haley, a 24-year-old woman who has autism, burst into tears when she learned about the summons. \"She thought she was going to jail,\" Debbie Graves says. It won't come to that for her, but the notice was the start of an ordeal that thousands of people in and around Johnson County can relate to: For patients who have run up charges at Olathe Medical Center, its emergency room and other associated health facilities over the past six years, the health system and its ER physicians group go to great lengths to collect overdue bills. Editor's Note: This story is being republished with permission from The Journal, a civic issues magazine of the Kansas Leadership Center. Other hospitals sue patients in Johnson County. But before the COVID-19 pandemic shook up daily life and shut down courtrooms, none did so as frequently as Olathe Medical Center. The hospital's emergency room physicians, who operate a private company called Emergency Medicine Care LLC, have, until recently, used the court system even more frequently to collect on unpaid bills from their patients. Occasionally patients with unpaid emergency room bills wound up in jail. That happened at least 60 times in the past six years, court records show. Those patients were arrested on bench warrants for contempt of court after they were sued and subsequently failed to appear in court. The bonds they posted to get out of jail were then applied to the debts they owed to Emergency Medicine Care. That happened to one patient interviewed by The Journal, Tracy Burford of Olathe, who was jailed in January after missing a fall court date. The $250 bond she paid to secure her release was paid to Emergency Medicine Care to resolve a judgment for several hundred dollars against her. When she was late to court again a week later, the judge issued another bench warrant, this one carrying a $500 bond. After receiving questions from The Journal about the practice of using bench warrants, the physician who serves as president of Emergency Medicine Care, Dr. Shawn Stanley, said in a statement that the group has instructed its legal representatives to stop issuing them as \"the final step in their collection process.\" Olathe Medical Center's financial assistance policy had already spelled out that it doesn't seek arrests as part of its collection efforts, but that didn't cover care through Emergency Medicine Care, which is a separate entity. One practice both providers share is the use of garnishments to collect on unpaid bills. When court summonses and collection notices don't get results, lawyers representing Olathe Medical Center and Emergency Medicine Care have sought garnishments, in which money that would otherwise belong to the patient \u2013 such as a paycheck or a bank account \u2013 gets paid to a creditor instead, often in increments. Between 2014 and 2019, health system patients were involved in about 800 garnishment cases, and at least 2,200 garnishment cases involved ER patients across the Olathe Health system, a Journal analysis of Johnson County court records show. The garnishments affected dozens of employees at workplaces such as Walmart and the Olathe School District. In at least 38 instances, attorneys for the hospital or ER doctors group sought garnishments from employees of Olathe Medical Center itself. Ashley Pierucci says her biweekly pay from the Olathe School District, where she worked as a paraeducator, dropped by about $75 last year because of a garnishment, leaving her with barely enough to pay bills and take care of her two young daughters. Pierucci says the charges stem from bills incurred during her second pregnancy, when she was covered by KanCare, the Kansas Medicaid program, which provides health coverage to some Kansans with little income. \"I tried fighting it, and it was never resolved, so they sued me,\" she says. The hospital's financial assistance policy indicates that patients who have documented Kansas Medicaid eligibility within the previous six months and who meet residency requirements will be presumed eligible for a discount of 100%. Hospital officials did not provide an explanation as to why Pierucci and other patients who report being on Medicaid would not presumptively be eligible for aid. With her paycheck reduced, Pierucci found herself juggling expenses. \"I have to alternate paying some bills,\" she says. \"I'll be late on one bill, and next month I'll pay it on time and pay another bill late. Just trying to make it work.\" Court records show Pierucci owed about $1,500 at the time her paycheck was garnished. \"I mean, if that's the only way I'm able to pay them that's fine,\" she says. \"But I wish I had more money in my pocket to do stuff with my girls.\" Hospital officials and their attorneys defend the lawsuits as a last resort when all other methods to resolve unpaid bills have failed. In a statement to The Journal, they indicated that they have been making changes to benefit patients struggling with unpaid bills, including providing alternative payment options and increasing the minimum balances on which they will try to collect. \"At Olathe Health, we continuously review our systems and procedures regarding financial assistance to make sure they are best serving our patients. Over the past three years, we have implemented changes to improve our financial assistance program, and recently updated our collection actions,\" a statement from hospital spokesman Mike Jensen said. But the challenges of dealing with medical debt in Kansas, one of 14 states that has not yet expanded Medicaid eligibility to cover more low-income residents, might only get more complicated. The pandemic that puts health workers across the state, such as Stanley and his colleagues, in harm's way also devastated the budgets of hospitals that, like Olathe Health, suspended elective procedures and outpatient visits in service of halting the spread of the virus and preparing to treat those affected by it. With the economy and the courts reopening amid high unemployment and hospitals in a weakened financial position, should more patients be worried about finding themselves in court if they can't pay for their care? After all, when the economy was roaring, medical debt still proved to be a widespread problem, even in Johnson County, where the median household income prior to 2019 was $84,915 a year. Survey data from the Urban Institute showed about 13% of county residents reporting having medical debt in collections as of 2019, with an average debt of $1,422. Haley Graves, who is 24 years old, unemployed and unable to work, was summoned into Johnson County District Court when she couldn't pay the bill after being treated for a broken arm. She ultimately agreed to pay $50 a month toward a $14,000 debt. ( Jeff Tuttle | The Journal) Yet not all providers use the courts to collect unpaid bills to the same degree. Between 2014 and 2019, Emergency Medicine Care and Olathe Medical Center accounted for about two-thirds of all uncontested collection lawsuits won by medical care providers pursuing limited civil actions in Johnson County District Court, The Journal's research shows. Every other identifiable hospital, medical center, physicians group and health system combined \u2013 about 280 different providers in all \u2013 account for the remaining third. Uncontested judgments occur when a defendant fails to adequately respond to a lawsuit and are a common outcome in medical debt collection cases. They frequently lead to creditors enlisting the help of the court to collect what they're owed through garnishments. The situation in Olathe is a window into how institutional policies and practices can have deleterious effects on the lives of low-income and working-class Kansans even in the wealthiest of places. It's a civic challenge that permeates other aspects of life in Johnson County and beyond, from housing to transportation to the criminal justice system. The Journal began looking into medical debt collection by nonprofit hospitals in Johnson County after ProPublica, a nonprofit newsroom that produces investigative journalism in the public interest, shared reader tips last November about medical debt collection practices in Kansas. Stanley notes that Emergency Medicine Care underwent a shift in leadership in July 2019, and a Journal analysis of Johnson County court records shows that the group's debt collection activities in court slowed considerably beginning that year. In a statement, the group emphasized Emergency Medicine Care's focus on providing \"expert compassionate care to patients and families of the Olathe Health System. \"We have done this in the setting of a global pandemic and unprecedented economic shutdown, all while focusing on the safety of our patients, nurses, supporting staff, and ourselves,\" the statement said. \"We have treated the most critically ill, often while those same patients were fully isolated from their loved ones. We have had to isolate ourselves at times from our own families due to this pandemic. This is our profession, and we will continue to provide the most complete, compassionate care to our patients as this pandemic continues.\" Olathe Medical Center spokesman Jensen also referenced the hospital's role in helping respond to COVID-19, saying that since the pandemic began \"our number one priority has been the safety of our patients, associates and providers, fulfilling our mission to help people through healing, health and happiness. \"During this time, the priority for our debt collection and financial assistance departments has been on how we can best accommodate our patients who have been financially affected by the pandemic,\" the statement said. \"We have altered our financial assistance and debt collection policies to accommodate patients dealing with financial hardship.\" Those changes include: providing additional charity care for patients who now qualify due to job loss or the loss of health insurance and offering extended payment plans and lower monthly payments. Jensen also noted that collection attorneys representing the health system suspended all court action in March when the pandemic started. \"Any resumed Court actions will be with consideration for pandemic-related circumstances and in conjunction with the Court's operations and directives,\" the statement said. How hospitals such as Olathe Medical Center choose to deal with medical debt after they care for patients, however, likely matters now more than ever. Amid rising costs for care, patients are being asked to cover more of their own health care costs through higher premiums, deductibles and copays. Although more Kansans gained health insurance after President Barack Obama signed the Affordable Care Act (ACA) into law a decade ago, about 8.5% of the population remained uninsured in 2017, according to the Kansas Health Institute, and those who do have coverage are frequently paying more. But with about 10% of Kansans out of work and more than 100,000 qualifying for unemployment benefits, an untold number of workers almost certainly have lost their health insurance. In Johnson County last month, the unemployment rate stood at 9.3% after being just 2.6% the previous May, according to the state Department of Labor. As many as 137 million Americans are struggling with medical debt, according to the Journal of Internal Medicine. In places such as Johnson County, where housing costs are high and 28% of jobs pay less than $15 an hour, there was a sizable population struggling to keep up with daily expenses even before pandemic-related job losses. Multiple research studies published over the past 15 years have documented how patients struggling with medical bills are more likely to defer care or not return to their doctor, decisions that have implications for their long-term health. Serving patients who can't afford to pay has traditionally been a role that nonprofit hospitals have filled and is one of the reasons they're exempt from taxes. But a handful of nonprofit hospitals around the country have faced scrutiny in recent years for aggressive debt collection practices. Some of those hospitals engaged in practices similar to what Olathe Medical Center patients report having experienced. The scrutiny has prompted some, but not all, institutions to reevaluate or change their policies. Olathe Medical Center officials say their collection practices are in accordance with Internal Revenue Service regulations and that they \"exhaust several attempts to accommodate a patient's financial needs before the account is turned over to a collection agency.\" In recent months, the system says it has also increased the minimum pursuable action to $750 from the previous threshold of $500. Jensen, the health system spokesman, said that hospital officials believe the higher minimum will ultimately decrease the number of cases Olathe Health sends to court. But court records show the health system is still pursuing a significant number of legal actions in 2020. The number of uncontested collection lawsuits won by the health system reached a six-year high of more than 600 in 2019. Olathe Health entities filed more than 300 limited action civil lawsuits through the end of May and won more than 170 uncontested judgments, even though courthouse operations were disrupted by the COVID-19 pandemic and hearings moved online. Emergency Medicine Care filed 100 lawsuits of its own and won 32 uncontested judgments. No other creditor won more than 91 uncontested limited action judgments over the same period, online court records show. The ACA added some requirements that nonprofit hospitals have to meet to retain their federal tax-exempt status. But hospitals such as Olathe Medical Center still have latitude to determine what they charge patients, what discounts and financial assistance to offer, as well as how to respond when a patient doesn't pay up. Patients often face the prospect of receiving multiple bills from different providers who may care for them at the same location, sowing the potential for confusion. A Kaiser Family Foundation survey indicated that Kansas is one of the nation's five worst states for surprise medical bills. The situation raises leadership questions about how nonprofit hospitals such as Olathe Medical Center should balance being fiscally responsible and dealing compassionately with patients' debts. Are hospitals making life for their patients \u2013 particularly those with the least ability to pay \u2013 better or worse? What responsibilities do patients themselves have? And what should state and community officials be doing to blunt the harm of such a pervasive problem? A 2017 community health access survey paid for by philanthropic health foundations in Kansas and Missouri (including the Kansas Health Foundation, funder of the Kansas Leadership Center, which publishes The Journal) showed that 28% of adults ages 19-64 in Kansas and 33% of children 18 years old and younger live in households that struggled paying medical bills over the previous year. At the time the survey was released, foundation officials told reporters that medical debt and a lack of insurance were \"financially crippling families\" and preventing them from getting the treatment they need. A 'night and day' difference The Graves family found the process of working out their bill with Olathe Medical Center stressful, even humiliating. The initial statement Debbie Graves received for treatment of Haley's broken arm was $31,000. Without explanation, that amount was reduced to $14,000. Court records show that Haley's charges were adjusted downward because she was uninsured. Under the ACA, hospitals aren't supposed to charge uninsured patients any more for a service than they would private insurers or a government insurance program for medically necessary care. And they're supposed to do this before factoring in discounts or write-offs for financial assistance. But the lower bill was still far out of reach for Haley's family. Because of her autism and related sensory issues, Haley is unable to work, her mother says. She receives an allowance from her parents and makes a few dollars selling clay figurines and jewelry on an Etsy shop, HevanlySprings. \"She has $20 to her name right now,\" Debbie Graves says. \"What are they going to do with that?\" Graves and her husband, Michael, operate a small nonprofit faith-based organization, My Father's House Ministries. Among other services, they provide birthday cakes for children in detention centers, shelters and other tough situations. And they grow organic produce to assist agencies serving Johnson County's growing homeless population. To meet living expenses, the family relies on personal gifts from friends and people who support their ministry, and income from two adult sons, both of whom work in supermarkets. When it came to paying the bills for Haley's injury, the family was on its own. Haley and her parents have no health insurance. Because of their unusual income structure, they are unable to qualify for a subsidy under the Affordable Care Act, Debbie Graves says. Kansas' Medicaid limits exclude most adults from coverage, and the Legislature has refused to join the majority of states in expanding eligibility. \"We're just like a lot of people,\" Graves says. \"We're living month to month. We have no retirement, no health care, zero savings.\" Graves says she visited a patient financial services office at Olathe Medical Center, hoping to work out a payment plan. A woman queried her about the family's sources of income, she says. Graves says the woman told her to look for a \"welcome pack\" in the mail, with a payment proposal. She never received any communication from the hospital, Graves says. But she did receive multiple not-so-welcoming letters from a law firm retained by the hospital. After the hospital sued, her mother hired a lawyer, Jordan Schwartz, who represents defendants in debt cases. \"Thank goodness for Mr. Schwartz, because we didn't know anything,\" Graves says. Schwartz says he has represented many clients being sued by Olathe Medical Center and its entities. Many are on limited incomes and think they can let their hospital bills slide, he says. They are surprised to find themselves in court, sometimes over relatively small amounts. His role, Schwartz says, is to negotiate with the hospital's attorney and work out a payment plan. Usually his clients pledge to make monthly payments, and the medical groups agree to stay the interest on the debt. As long as the client makes payments, the hospital will refrain from garnishing patients' paychecks or bank accounts. That's the deal Schwartz worked out for Haley Graves. After the hospital's attorney refused Schwartz's entreaties to reduce or forgive the debt, the family agreed to pay Olathe Medical Center $50 a month indefinitely. For both sides, it seemed the best they could do. Assuming she's able to make all the payments and avoid interest costs, Haley will be free of the debt in slightly more than 23 years under the payment schedule. Debbie Graves says the collection notices and court summonses caused her sleepless nights. \"I thought someone in the hospital would say something like, 'Look, Haley's uninsured. She's disabled. Maybe we can get you some help,'\" Graves says. \"Not that it matters, but it hurt my feelings to be treated like rubbish, instead of like a human being.\" In what turned out to be a painful but revealing coincidence, Michael Graves got knocked down by an overly enthusiastic puppy in January and broke his left arm. Ignoring the grotesque sight of her husband's dislocated wrist and twisted hand, Debbie Graves drove straight out of Olathe and headed for AdventHealth Shawnee Mission, a hospital 10 miles farther away than the trip she'd made with Haley. \"When they found out Michael was uninsured, they went to great lengths to try to help us,\" Graves says. \"I called them when I got the bill in the mail. I said, 'Look, I can't pay the whole thing up front.'\" In a single phone call, Graves says, a representative offered her a two-year payment plan in which the hospital would automatically withdraw a reasonable amount each month from the bank account she shares with her husband. There were no collection notices, no court summonses, no tears. \"No problem at all,\" Graves says. \"They were kind and considerate. It's not like we don't know that people need to get paid. We just need a way to do it. The difference between Shawnee Mission and Olathe, for the same injury, really, was night and day.\" Tracy Burford spent six hours in jail this past January after missing a court date. She used money she had saved up to pay other bills to bond herself out. The $250 went toward the judgment obtained by Emergency Medicine Care. (Jeff Tuttle | The Journal) How some with unpaid medical debt wind up in jail The pursuit of unpaid bills can result in patients facing consequences that go beyond simply being hounded to pay what they owe. When patients have judgments placed against them, they often end up owing interest accumulated before the judgments as well as paying for costs that plaintiffs incur in bringing their cases to court. Many patients also face the prospect of paying a 12% annual interest rate on their debts after the judgments, which is an amount set in state statute. There can be severe consequences for those who don't show up in court when ordered to do so. Tracy Burford of Olathe found that out when she was pulled over for a traffic violation. The officer told her there was a warrant out for her arrest. The charge: contempt of court. Burford, whose sole income is a monthly $734 disability check that cannot be garnished, had failed to appear in court for a hearing to explain why she had not satisfied a judgment against her. The judge had issued a bench warrant, with a $250 cash bond. After spending six hours in jail this past January, Burford used money she had saved up to pay other bills to bond herself out. The $250 went toward the judgment obtained by Emergency Medicine Care. Burford says she has colitis, a chronic inflammatory digestive disease. It is the reason she receives disability payments and also the cause of frequent visits to the emergency room or a clinic. She says she has Medicaid, but some expenses aren't covered. After her stint in jail, Burford was given a new court date. She says she was coping with an intestinal flareup that morning and arrived late. A lawyer then told her the judge would issue another warrant for her arrest, this time with a bond set at $500. All of this had been precipitated by a debt of about $400. She said she didn't know what she would do about the new warrant. More than five months after it was issued, the warrant has not yet been executed, court records show. \"If I had money for anything, I would have paid my bill to begin with,\" Burford says. ProPublica reported last year that patients in Coffeyville, in southeast Kansas, were being arrested under similar circumstances. Burford's arrest shows that similar medical debt collection practices happen elsewhere in Kansas. Between 2014 and 2019, at least 60 Emergency Medicine Care patients were arrested after missing court appearances, bonded out and had their bonds applied to the judgments against them. The arrests occurred after attorneys for Emergency Medicine Care requested that a judge call debtors into court because creditors were having trouble collecting. The figure could have been higher. The Journal's analysis of Johnson County court records shows that attorneys for Emergency Medicine Care prepared contempt citations to be served on ER patients in more than 500 cases between 2014 and 2019. Those patients often appeared in court and avoided a warrant. When it was queried on that practice \u2013 and how it differed from Olathe Medical Center's \u2013 the physician group took a step back. A statement from Stanley, of Emergency Care LLC, said the group relies on a third-party collection agency, Account Recovery Specialists Inc., with offices in Wichita and Dodge City. The company is known by the acronym ARSI and is used by other Kansas hospitals in collection actions, including Olathe Medical Center since late 2018. \"Our management team adamantly affirms that it has not provided ARSI with any directive or instruction to be any more aggressive with collections efforts,\" than the nonprofit hospital, the statement said. \"EMC was unaware that its patients purportedly faced more lawsuits and garnishments than patients who owed their debt to the nonprofit hospital prior to your (The Journal's) letter. \u2026 We have full intention for the companies that manage our billings and collections to take a compassionate and fair approach to these challenging situations.\" The statement referred additional questions about Emergency Medicine Care's collection process to Joshua Shea, the general counsel for ARSI. In an emailed response to questions, Shea described Olathe Medical Center as \"an extreme outlier\" among plaintiffs, including other ARSI clients like Emergency Medicine Care, because it doesn't seek contempt citations if a debtor fails to appear at a hearing to disclose financial information. Emergency Medicine Care \"like almost every other plaintiff who files lawsuits and like the overwhelming majority of ARSI clients, had not asked for the legal process to be halted prematurely with there being no post-judgment step following\" a no-show for a debtor's exam. \"With your recent questioning of them and informing them of what\" Olathe Medical Center has in place, Shea said the ER physicians group asked ARSI and the attorneys it works with to \"preclude the court from issuing contempt citations while they assess how to make sure\" that the two entities largely share the same collection practices. In a subsequent statement released June 21, Emergency Medicine Care indicated it has continued implementing CarePayment, a health care financing program also used by Olathe Medical Center that offers patients options for paying their bills over an extended period of time. \"The process has continued and no accounts have been sent to ARSI for collections since the onset of this process in February,\" the statement said. \"With the broad economic shutdown and widespread hardship ARSI was instructed by our group to halt all collection inquiries on existing accounts in early April. ARSI developed their own policy with the cessation of all collection practices extending for 90 days.\" Although the group did not respond to The Journal's request for a written copy of its collection and financial assistance policies, the statement said that, \"Emergency Medicine Care has and will continue to fully align our collection practices with that of Olathe Health.\" Olathe Medical Center and Emergency Medicine Care have sought garnishments to collect at least $3.4 million combined in unpaid bills since 2014. However, that figure only includes judgments posted in the district court's publicly available online summary of case activity and does not factor in all the fees and interest being charged. It's also not clear from court records how much has actually been collected. Of the judgments recorded publicly, the average debt being pursued was about $2,500 for Olathe Medical Center and about $850 for Emergency Medicine Care. Court records indicate that uncontested judgments account for only a portion of the legal activity involving Emergency Medicine Care and Olathe Health in limited action suits. Using the \"partial name search\" function on the Johnson County District Court's records website, The Journal found Emergency Medicine Care listed as the plaintiff in more than 5,900 limited action cases filed between 2014 and 2019. Olathe Medical Center was listed as the plaintiff in another 4,000 limited action cases over the same period. Representatives of Emergency Medicine Care and Olathe Health declined to specify how many collection lawsuits they had filed over the past six years. Some critics argue that more aggressive debt collections are bad not only for patients but also for the hospitals that engage in them, at least over the long haul. Trying to squeeze money out of patients who struggle to pay, they say, does little for a hospital's bottom line and could further trap struggling patients in a cycle of debt that makes it harder for them to pay off future hospital bills. Not every hospital engages in frequent court actions, and some are foregoing lawsuits more often in favor of working directly with patients to resolve their bills. Because Kansas courts have only gradually begun to resume normal operations, it's too early to say whether pandemic-related financial pressures will lead to more legal action by Olathe Medical Center and other hospitals. But such practices were hardly universal before the pandemic. When researchers studied garnishments related to medical debt in Virginia, they found that nearly two-thirds of hospitals there did not seek garnishments, according to a research letter in the Journal of the American Medical Association. A small number of hospitals, four of five of which were nonprofits, were responsible for 51% of all garnishment cases there. Shea of ARSI argues that his clients only sue after they have run out of all other options. He notes that 84% of Kansas hospitals had a negative operating margin. And that figure was before the pandemic. \"Ultimately what we have here are service providers who have gone unpaid for their work and that exhaust efforts to be paid something over some period of time or to be able to grant financial assistance or charity care to those in need,\" Shea wrote. The ways to reduce the number of lawsuits that hospitals such as Olathe Medical Center are filing, Shea says, include expanding the state's Medicaid program to ensure more low-income Kansans receive health coverage. He went on to say that members of the media such as The Journal could also better encourage awareness among consumers of the financial assistance and charity and extended payment options that exist among medical providers. \"I would disagree that a solution is for service providers, of any type, to go unpaid,\" Shea wrote. But when patients get sued, it leaves an impression. Haley Graves and more than a dozen other patients or relatives of patients told The Journal they won't soon forget the emotions that were churned up when they learned they were being sued by Olathe Medical Center or Emergency Medicine Care. Prior to the pandemic, the second-floor hallway at the Johnson County Courthouse could be a busy place on Thursdays. For patients who have been treated at Olathe Medical Center and owe a balance, it's often an opportunity to meet collections lawyers such as Michael Albani and strike a deal. (Jeff Tuttle | The Journal) 'I can't afford this' Barring shutdowns for pandemics and other emergencies, dozens of people file into Room 222 of the Johnson County Courthouse every Thursday morning for the \"answer docket,\" involving what is known in the legal trade as Chapter 61 actions. Journal reporters sat in on several of these dockets during the months of January and February, when the courts were operating normally. The largest share of those present those days were defendants who received a summons telling them that a creditor had filed a legal action against them to collect money that they allegedly owed. Many weeks, a hefty percentage of the complaints came from Olathe Medical Center and its health network and emergency room provider. The stories people brought to court were ones of injuries, illnesses, divorces and lost jobs \u2013 reasons why they had not and could not pay the debts that brought them there. But those stories don't matter that much in court. Under Kansas law, hard times and tough circumstances aren't enough to escape responsibility for paying one's bills. On a typical Thursday, Magistrate Judge Daniel Vokins listens as defendants get an opportunity to respond to the plaintiffs' allegations. The court gallery is usually filled with about 50 people. Some defendants come with friends or family. On the other side of the bar stand several lawyers representing clients who are attempting to collect money owed them. The docket usually lasts about half an hour and consists largely of the lawyers calling out names of defendants to see if they were in the courtroom. Vokins tells defendants they can admit or deny what's in the complaint. In a debt collection case, the complaint is straightforward: The plaintiff says it provided goods or services, and the defendant didn't pay for them. Defendants who deny what's set out in the complaint are advised by the judge to find a lawyer, or at least study up on Kansas civil law and provide a detailed answer to the complaint within 14 days. If they admit the debt is theirs, Vokins enters a judgment in favor of the plaintiff. In either case, he advises defendants to talk to the lawyers representing the entities that are suing them. Perhaps they can work something out. Lawyers and defendants file out of the courtroom and into the hallway. That's where the real action takes place. On a Thursday in January, at least a dozen of the people milling around the hallway were being sued by Olathe Medical Center. They trailed along as a pair of lawyers led the way down a staircase and a long hallway into a room usually reserved for jury pools. The lawyers handed out clipboards with forms on which defendants were expected to disclose the details and status of their employment, marriages, housing situations and sources of income. Lawyers and defendants then huddled for brief conferences to see if a payment plan was feasible. \"Could you afford $50 a week? How much could you pay? When do you expect you'll find a job?\" Elvira Lemus walked out of the jury room steaming. A baby in her family had been treated at Olathe Medical Center for respiratory trouble, she said. The family had expected Medicaid to cover the child's expenses. When a $750 bill arrived, Lemus sent the hospital a letter with a copy of the child's Medicaid card. The next communication she received was a summons taped to the family's door three days before Christmas. In the jury room, a lawyer representing the hospital told her to try to work matters out with KanCare, the program through which Kansas administers Medicaid. But she only had two weeks to do so. After that the hospital would pursue measures to collect the $750 it said the family owed. Whatever the outcome, Lemus says she's certain of one thing. \"We've always used that hospital,\" she says. \"We will never go back.\" On another Thursday morning, three women with hospital-related cases waited outside the courtroom to talk to a lawyer. This time there were no clipboards and no chairs. All three women sprawled on the floor to complete their forms. One of them, Gina Andrew, says Olathe Medical Center was already garnishing 25% of the paycheck she earns as a preschool teacher for an unpaid balance of about $2,000, incurred when she visited the hospital with severe abdominal pains. Now Emergency Medicine Care was suing her for bills that court records show amount to about $800. \"I'm on my own,\" Andrew says. \"I can't afford this.\" When contacted recently, Andrew, 33, said she'd been laid off from her job, which paid about $14,000 a year, because the preschool had shut down due to the coronavirus. She receives unemployment benefits, which the hospital can't garnish. Andrew said she'd racked up her medical bills while going through a rough patch, and along with intestinal problems, she broke a finger. When that happened, she went to Overland Park Regional Medical Center, a for-profit HCA Midwest hospital. \"They worked with me,\" Andrew says. \"They were a lot better to deal with. I haven't been back to Olathe Medical Center. If I'm on my deathbed, I won't go back there.\" Natasha Tarrant appeared in court the same day as Andrew. She had spent a few days in Olathe Medical Center for high blood pressure soon after the breakup of her marriage, during which she lost her job and health insurance. Now she'd been summoned to court for an unpaid balance of $359. But with medical bills upward of $15,000, Tarrant feared more to come. In a brief conversation, a lawyer representing Emergency Medicine Care queried her about her progress filling out job applications. Tarrant figures any future paychecks will be garnished. \"As soon as I get a job, it's all going to disappear,\" she says. \"This is a foreign situation for me, because I was doing fine before all of this,\" Tarrant says. \"I do feel guilty about not paying, but at the same time, it's so extremely expensive.\" For other defendants, being called to court is stressful even when it's not financially catastrophic. On another Thursday in February, defendant Dana Nelson says she was insured when she had surgery at Olathe Medical Center in 2017. She called the hospital and, later, collections attorneys, to contest a bill of about $900. No one called back. \"I figured it was reconciled,\" Nelson said. Then she received a notice summoning her to court. By the time she got there, she had already paid the late amount. \"It creates a lot of stress and anxiety,\" Nelson says. \"We pay our bills.\" Dana Nelson thought her bill for surgery at Olathe Medical Center had been reconciled until she received a notice to appear in court. (Jeff Tuttle | The Journal) The judge's view The process for a defendant to wind up in Vokins' court can happen quickly, say as few as four to six months from a time a bill is first due, or take years. Under Olathe Medical Center policy, \"extraordinary collection actions\" such as lawsuits are not initiated by the medical center until 120 days after the date of the first post-discharge bill. The medical center generally accepts financial assistance applications up until 240 days from the date of the first post-discharge bill. Regardless of how they get there or how long it takes, once patients find themselves appearing as defendants in court, plaintiffs have a variety of tools at their disposal to compel patients to cooperate. Hospitals, or any creditor for that matter, have up to five years to issue a summons. During that time, they may resend their bills or send collection letters, possibly from a credit agency. Eventually, if a patient still hasn't paid, he or she could find a summons to appear in court taped to the front door, personally delivered or sent by registered mail. The summons orders a defendant to appear at a specific time, with this warning: \"If you do not appear before this court or file an answer at such time, judgment by default will be taken against you for the relief demanded in the petition.\" Despite that, the majority of cases go uncontested. Of the 12,000 cases Vokins hears every year, he estimates that about three-fourths of the defendants never appear in court. Because of the pandemic, Vokins says he had to postpone his Thursday dockets from mid-March through May 11 before he came up with a solution as to how to conduct his hearings. As of May 18, limited action cases are being heard through BlueJeans Video Conferencing, with about 30 or so people appearing with each docket. The only substantial change is that the debtors now supply their answers to questions about their finances in writing because it was hard to keep information confidential with video conferencing. Case filings decreased when courts adopted remote proceedings, Vokins says, and he estimates he'll be caught up on the backlog of cases by the end of June. \"From comments made from the collection attorneys, they indicated that some of their clients are holding off from filing lawsuits until the stay-at-home orders are rescinded, and on cases previously filed, they have some clients who do not want to take default judgments,\" Vokins wrote in an email. \"It appears the creditors are trying to work out payment arrangements, which I have encouraged attorneys to do.\" Still, it's important to remember that there's no law that requires communication by the time legal proceedings reach this point, just as there is no law that requires the plaintiffs and defendants to formally negotiate with a professional mediator. But Vokins encourages both. \"One complaint I've heard from debtors is they try to get information from attorneys by calling offices and can't get a return call,\" Vokins says. \"I've encouraged the attorneys, 'Look, communicate and see if you can work something out.' \" The avenues that patients have for not paying a bill once they are in court can be limited. Some defendants can dispute the amount or, in the case of a medical debt, argue that their insurance has failed to pay a bill covered by their policy. Some may claim that their medical provider failed to perform the correct service. But often, Vokins says, defendants will say they simply can't afford to pay the debt. \"That's not a legal defense,\" he says. Furthermore, few defendants in Vokins' court get an attorney at any stage of the process. Casey Johnson is assistant managing attorney at Kansas Legal Services in Wyandotte County, a nonprofit organization that offers legal advice and representation to low- and moderate-income Kansans. He says that people occasionally contact him for legal help with debts, medical or otherwise, but not often. \"A lot of times when I do, it's after the fact,\" Johnson says. \"After the fact,\" Johnson says, often means that the defendant has received notice that their wages are being garnished. At that point, the best that an organization like Kansas Legal Services can do is educate its client. This is what its lawyers will say: Kansas law allows creditors to garnish up to 25% of a debtor's wages, as long as the debtor is working more than 30 hours a week and earning more than minimum wage. For those who have received notice of garnishment, there is very little legal room for appeal. There is no provision in Kansas statutes that allows debtors to claim economic hardship as a way to avoid paying their debt. (Garnishments can stop when a patient declares bankruptcy.) Some sources of income cannot be garnished. These include but are not limited to: Social Security disability and retirement benefits, Supplemental Security Income, veterans benefits, and certain pension benefits and retirement funds. Assuming a defendant's income is not exempt, interest, penalties and court costs can all be applied to a debt and collected through garnishment. Unless otherwise stated in a contract, the creditor can charge up to 10% interest during the period before a judgment is entered, and up to 12% after the judgment is entered. Perhaps the most perilous threat a defendant can face is up to 30 days in jail. Here's how that can happen: Once a judgment is entered, the defendant has 14 days to pay the judgement. If it's not paid in full, the creditor can begin garnishing wages, but only if lawyers know where the defendant works or banks. Often, creditors don't have this information. Kansas law allows them to request that defendants appear in court to provide it. If the judge signs off on this request, defendants typically have about 30 days to appear in court, where they must tell the judge under oath where they work and bank. If defendants fail to appear, the creditors' attorneys can file a citation of contempt. The judge must sign off on this request, too. Once that happens, the creditors' attorneys are responsible for making sure the defendant is personally served the contempt citation and ordered to appear in court. Vokins says he also requires the attorneys to spell out the consequence for not appearing \u2013 namely, that a warrant may be issued for their arrest. Once Vokins signs off on that warrant, he sets a bond for $250, an amount that can double at his discretion if a defendant fails to appear again. \"I want language in there that failure to appear may result in a bench warrant for your arrest,\" he says. \"I want debtors to have notice of the consequences. Nothing in Kansas law requires that. It's my policy.\" The practice of issuing bench warrants is common, as Law360's Access to Justice newsletter detailed in a February story. Although the U.S. outlawed debtors' prisons in 1833 and the U.S. Supreme Court ruled in 1983 that jailing people over debt is unconstitutional, the American Civil Liberties Union counts 44 states that allow the arrest of someone who fails to appear in court after a creditor wins a judgment against them or who doesn't provide that creditor with information about their finances. Vokins objects to criticisms that ordering jail time could effectively be tantamount to sending the defendant to \"debtors' prison.\" The defendant is facing jail time for failing to obey a court order, not because of the debt, he stressed. And that jail time is something that's spelled out in Kansas statutes. \"The judge doesn't make the law; the legislators make the law,\" he says. \"The judges follow the law.\" The law also allows Vokins to apply the bond money to the judgment that defendants owe. \"I have the discretion that rather than issuing a fine against the judgment debtor on the contempt citation and the state of Kansas retaining that bond money, I order the bond applied to the judgment,\" Vokins states. \"That way the judgment creditor gets some money and the judgment debtor gets the credit, or reduction off of the outstanding balance owed on the judgment.\" Michael Rapp of Stecklein & Rapp, a law firm in Kansas City with offices in Kansas and Missouri that specializes in consumer protection, has appeared in Vokins' court a number of times. He has handled some medical debt cases, though most of those have focused on individuals whose debt is related to care received for a personal injury. Like Johnson with Kansas Legal Services, Rapp says that defendants severely limit their options when they admit in court that they owe the money their creditors say they owe. \"Once you raise your hand, it's over,\" he says. \"You've admitted to everything they say. You've 100% surrendered. There are no defenses left.\" Rapp's advice to defendants in medical debt cases? Don't initially admit to the debt. He says that there's always the possibility that a defendant can argue that a hospital's bill is not reasonable. \"Is it customary billing? If I'm uninsured, am I being charged a higher rate? Are they charging me more than someone else? If I negotiated in cash, would it be a lesser amount?\" Defendants can also argue the medical necessity of the procedure they received, or that someone else should have paid the bill, or that they did not receive charity care they were eligible for. But most defendants never receive legal advice before they appear in court. Confiscating bail money helps attorneys collect on unpaid debts. But it raises concerns in Rapp's view. \"Reasonable minds can disagree, but turning a civil contract issue into a criminal issue needs to be done with extreme caution.\" Collections attorneys, Rapp says, can resort to a number of tools to get the information they need before requesting a bench warrant \u2013 and judges should ask them to use those tools. Credit reports can yield valuable information, as can skip traces, which can help determine a person's whereabouts. \"What searching have they done before using the coercive force of the government?\" he asks. Issuing a bench warrant, Rapp says, is especially problematic in light of the fact that many defendants who end up in jail don't make much money. \"The system should not be set up to victimize the poorest among us,\" he says. \"And that's the frustrating part.\" Outside of Emergency Medicine Care, though, it's been exceedingly rare for providers associated with other major Kansas City health systems to have cases in which bench warrants are issued. Spokeswomen for the University of Kansas Health System and AdventHealth Shawnee Mission say their systems do not engage in that level of collection action. Spokeswomen for Saint Luke's Health System of Kansas City and Overland Park Regional Medical Center did not reply to messages seeking comment. The Journal reviewed 944 uncontested limited action judgments involving those four hospitals in Johnson County District Court between 2014 and 2019. It found just one instance where the record indicates that the judge issued a bench warrant. But online journal entries don't show who requested the warrant and whether it was ever executed. According to its website, Olathe Health began as a 30-bed hospital in 1953. It now encompasses Olathe Medical Center, Miami County Medical Center, and 40 family care and specialty clinics. (Jeff Tuttle | The Journal) Pandemic takes a financial toll The pandemic and its devastating economic effects, however, add another wrinkle to the tale. When hospitals stopped providing nonemergency care to prepare for a surge of COVID-19 patients, it caused budgets to tank almost universally. Citing figures from the American Hospital Association, The New York Times"} +{"id":"RedPajamaCommonCrawl.0047","text":"Sense-Making Myth for Late Modern Society? A study of Harry Potter, Lord of the Rings and Star Wars By Joseph Cushing and Pontus L\u00f6f Supervisor: G\u00f6ran Svensson We live in a world where the media is an important part of our lives, and big media conglomerates market cultural products across the globe. Hollywood dominates the international market for movies (e.g. Hollywood produced movies accounted for 71.7% of the box-office receipts across the EU in 1991).1 The most popular movie series (measured in ticket sales) of the latest years are Harry Potter, Lord of the Rings and Star Wars.2 Why do these movies attract so many people and why do certain fanatics queue outside box offices several weeks in advance? Harry Potter, Lord of the Rings and Star Wars have one thing in common: they are not set in our world but in warped magical fantasy worlds where there is a clear-cut definition of that which is good and that which is evil. Could the magical aspect of these stories be the key to understand the popularity? Religious historians refer to myths as stories about the meaning of life. According to Karen Armstrong a myth is something that has been around since the dawn of man.3 We humans have a unique ability to think about ourselves and our experiences of life, and we can imagine things beyond our everyday experience. This ability is utilized when people experience myths ' basically stories that put us in a larger context and show us the meaning of our own existence. Armstrong points out that the archeological findings from the Neanderthals have thought us five things about myth: 1. Myth often has its roots in our fear of personal annihilation. 2. Myth is materialized and given meaning in rituals (e.g. the sacrifice of animals). 3. Myth deals with the unknown; the situations that we lack words to describe. 4. Myth is meant to lead to action. Myth also puts us in the state of mind to take this action ' in this world or the next. 5. There exists an immanent world beyond our own that is richer, stronger and more consistent. According to this eternal philosophy we are only imperfect replicates of the archetypal pattern and we have to take part in the divine to truly realize our full potential. Armstrong points out that our way of looking at the divine today is not the same as it was before the 18th century. Before the Enlightenment people made no distinction between the gods, humans and nature. The way we view history has also changed since the 18th century; whilst we nowadays want to know what really happened, people used to be interested in what importance a certain event had. Myth used to describe the eternal truths about human existence, which could be realized in transcendent experiences (often in religion, but also in art, music, poetry etc.), but today the word myth often simply refers to something that is false. Armstrong writes that one cannot say that a myth is true or false in the same manner as one does in science. A myth is rather true if it can be applied to our lives, transforms us, and provides us with meaning and guidance. Over the last millennium the Western societies have changed a great deal. Church membership used to be universal and church attendance compulsory.4 When the Western society became modernized, religion became more intellectual and individual, rather than collective and ritual. There used to be one church, whilst we now have many. The scope of religious authority on a societal level has also shrunk. Some theoreticians also think that religion has become more privatized (i.e. religion has become a personal preference) and that transcendence is shrinking (i.e. the focus is the experience of everyday life, rather than universal salvation). Can the reason behind the success of Harry Potter, Lord of the Rings and Star Wars be that they fill the void of the old \"magical\", universal and ritualistic approaches to myth? 1.1 The Aim of the Study The main aim with this study is to investigate if fans like Harry Potter, Lord of the Rings and Star Wars because they fulfill a mythological need that is not met elsewhere in the so-called Western world. To do this we also have to briefly look into how Harry Potter, Lord of the Rings and Star Wars can be seen as myth. Hopefully this study will give some kind of answer to why these stories have become so popular. 2. Method and Material This study is mainly a survey designed as a self-completion semi-structured questionnaire that has been sent out via the Internet to a number of fans. The responses were submitted through e-mail forms from a website. The respondents are forum moderators of popular fan communities on the World Wide Web and originating from different countries (although the majority are from the U.S. or Sweden). An invitation to take part in the study was submitted to the fan sites listed in Appendix A. They were chosen because they seemed to be the most popular ones (mainly based on search results from the search engine Google). These are far from the only fan sites on the World Wide Web about Harry Potter, Lord of the Rings and Star Wars. They also mainly cater for English and Swedish speaking fans. As the survey was done anonymously, it is hard to measure how many of the moderators of these forums actually received the invitation and nearly impossible to count how many of the moderators of the fan sites in question did not take part in the study. This means that this study is quite limited when it comes to scope and the result cannot be generalized to all fans of Harry Potter, Lord of the Rings and Star Wars or even all forum moderators. The aim has been to get the moderators of the most popular fan sites to respond to the survey, as well as trying to get respondents who are non-American. The quantitative part of the survey results must be taken with a grain of salt. The focus is rather on the qualitative part, although the results from the closed questions will point the direction in the analysis of the open questions. The reason moderators were picked is based on the assumption that moderators function as opinion leaders who influence other fans because of their special authority (as moderators, knowledgeable fans with an extensive involvement in fandom.) The population of moderators is also relatively small, and the issue of random sampling is not as important as it would be if the population would consist of all fans using forums on fan communities. 3. Theory Below are two theories that could support the idea that fans like Harry Potter, Lord of the Rings and Star Wars because it fulfills a mythological need that is not met elsewhere. 3.1 The Arts as a Substitute for Religion Towards the end of the 19th century in Germany, the composer Richard Wagner and the philosopher Friedrich Nietzsche felt they lacked a sense of meaning in their society due to rationalization, technology and the rise of market economy.5 These new developments had also killed the spirit of German culture, and they thought the rediscovery of myth could breathe life into their society. Nietzsche believed that myth was an essential part of any culture as it increased the feeling of cohesion. Nietzsche's definition of myth is that it is a constantly evolving and visually intense way of dealing with the meaningless and silent natural world; a way of talking with nature. Nietzsche thought the best arena for finding meaning in one's existence was in The Arts (e.g. poetry, music, visual art and cinema) as he could not believe in religion. Both Nietzsche and Wagner tried to rediscover myth via cultural production, but they came to a disagreement about the aim of this production. Whilst Wagner saw myth in The Arts as a replacement of religion, Nietzsche saw them as a part of living a better life. With this view Harry Potter, Lord of the Rings and Star Wars can be a way of either replacing religion or enhancing one's life through the sense-making morals of these stories. 3.2 The Concept of Late Modernity The societies of today are different from the one that Nietzsche and Wagner lived in. Some thinkers have called the present world post modern, but the British sociologist Anthony Giddens has successfully pointed out that we rather live in late modern societies as our societies are not that different from modern societies (that are post traditional in nature), although he agrees that there have been some changes lately (e.g. consumerism, increased superficiality, cultural self-consciousness etc.).6 According to Giddens, the self in late modern societies is not fixed but rather reflexively made. People choose a lifestyle and they need trust in relationships and everyday life. Relationships are also negotiated. People accept all knowledge as provisional and take calculated risks. All societies of the world cannot be labeled late modern, but the respondents of the survey presented below are from late modern countries ' more or less. 3.3 The Media and the Dislodging of Traditions John B. Thompson addresses some interesting points surrounding the ideas of traditions in relation to media. In his book, The Media and Modernity: A Social Theory of the Media, Thompson titles one of his chapters \"The Re-mooring of Tradition.\" 7 He explains the structures of traditions in society as well as how the media has affected these traditions. This idea is relevant to our study because, as Thompson says, \"With the development of the media\u00a6 individuals were able to experience events, observe others and, in general, learn about worlds ' both real and imaginary ' that extended well beyond their day-to-day encounters.\" 8 According to Thompson, \"\u00a6tradition is anything which is transmitted or handed down from the past.\" 9 Thus, the heritage from old mythologies is part of tradition. The power and authority in rural areas has been shifting due to the exposure to media. The power of the traditional communication network of human rather than media contact used to be prevalent there. Now with the exposure to media, people feel less constrained to tradition and open to new ideas in the context of modern societies. However, as these societies break tradition they also are responsible for what Thompson calls a \u02dcmoral deficit'. This can be defined as \"incapacity to deal with certain questions of a fundamental kind concerning life and death, right and wrong, etc.\" 10 and myth thus becomes obsolete to the modern citizen. This theory supports the idea that the media can disseminate traditional beliefs at a global scale. Thus, the content of media products like Harry Potter, Lord of the Rings and Star Wars can influence all of humanity. The media has also made some traditional elements obsolete to the modern person, and Harry Potter, Lord of the Rings and Star Wars might be a substitute for the more magical aspects of old traditions. 4.1 Lord of the Rings Lord of the Rings and the mythology, languages and stories surrounding it were conceived by the British language professor J.R.R. Tolkien. The story follows the young hobbit Frodo Baggins on his dangerous journey to destroy the One Ring that otherwise could make the ring's maker, the Dark Lord Sauron, so powerful that he could eradicate all which is good in Middle-Earth. The story Lord of the Rings was first published by Allen & Unwin in 1954'1955 as the three novels The Fellowship of the Ring, The Two Towers and The Return of the King. There have been several attempts to turn the story into film, but the most successful was director Peter Jackson's and New Line Cinema's three movie installment from 2001, 2002 and 2003. The Canadian author David Day has written a book about the origins of Tolkien's mythology as well as other ring quests and has found connections to Norse Mythology, Arthurian Legends, Carolingian Legends, Celtic and Saxon Myths, German Romance, Greek and Roman Myths, Biblical Legends, Oriental Myths and more.11 According to Day, Tolkien's life ambition was to create a mythology for the British people as Tolkien thought there was nothing but \"impoverished chap-book stuff\" available.12 Tolkien's mythology was in fact a sort of alternate version of old British history and Tolkien wanted to tell the \"true story\" behind several myths (e.g. his creation and sinking of the island kingdom of N\u00famenor was the true story behind Atlantis). Tolkien did not want people to think of Lord of the Rings as allegorical, but he acknowledged that it could be applicable to real world events (such as World War II, even though Tolkien thought there were evil orcs on both sides of the conflict).13 David Day stresses the interpretation of the One Ring as the atomic bomb, but points out that this was not Tolkien's original intention as the books were written before atomic bombs were invented. The conclusion of Days' book is that the message of Lord of the Rings is not tied to historical events but to two universal truths; firstly that power can corrupt anyone and secondly that we need to rely on compassion in order to overthrow evil. The unusual hero Frodo Baggins does not destroy the One Ring by throwing it into the fire of Mount Doom himself, what saves Middle-Earth is his compassionate act of not killing the former owner Gollum. In the end the corrupted creature Gollum steals the ring from Frodo in order to satisfy his own desire, but trembles and falls into the fire and is destroyed together with his \"precious.\" 4.2 Star Wars The Star Wars saga was created by the American filmmaker George Lucas in the 1970s and follows the life and death of Anakin Skywalker who turns evil, as well as his farming son Luke Skywalker who turns into a hero and ultimately saves the galaxy far, far away. It was first made public as the surprisingly successful movie Star Wars in 1977, but there have been several follow-ups and prequels (as well as spin-offs, books, comics, etc.). In this study Star Wars is viewed as the story of the six major movies which can be divided into the original trilogy (i.e. A New Hope from 1977, The Empire Strikes Back from 1980, Return of the Jedi from 1983) and the prequel trilogy (i.e. The Phantom Menace from 1999, Attack of the Clones from 2002 and Revenge of the Sith from 2005). The prequel trilogy's story takes place before the original Star Wars trilogy. Probably the most renowned scholar on comparative mythology was the American professor Joseph Campbell. He was exited about the uses of myth in Star Wars and was actually one of George Lucas' inspirations.14 Campbell's book The Hero with a Thousand Faces (1949) mapped a common pattern within all religion and mythology, which he named \"the Hero's Journey\" or the \"monomyth\". According to Campbell, all religious and mythological stories have the same message and follow the same pattern (i.e. the departure from everyday life, the initiation to a godlike status and the return as a master of the two worlds). According to Lincoln Geraghty of the University of Portsmouth in the U.K. the \"culturally inherited myths\" in Star Wars follow the roots of western civilization.15 According to Geraghty, myth is used to form an identity of a region; in this case a nation can be represented. Hence, a nation's identity is formed by the political and social agendas of the myth creators' ideology. Geraghty quotes Jon Wagner's statement of \"\u00a6myth opens a space for creativity within the irreconcilable polarities of our existence.\" 16 When the Star Wars trilogy was created in 1977, America was in need of hope, and it came in the form of the creativity surrounding the myths of Star Wars. 1970s America needed \"some timeless wisdom\" as well as some social and moral guidance. George Lucas's theme of ancient mythology is what won America and the world's heart. \"Lucas devoured the great themes: epic struggles between good and evil, heroes and villains, magical princes and ogres, heroines and evil princesses, the transmission from fathers to sons of the powers of both good and evil. What the myths revealed to Lucas, among other things, was the capacity of the human imagination to conceive alternate realities to cope with reality: figures and places and events that were before now or beyond now but were rich with meaning to our present.\" 17 Lucas basically delves into history to help society learn about the present, according to Geraghty. The audience of Star Wars can form their own \"opinions from the mythical framework\" from the different sources and points of view using their own fantasy with the mythology. The fantasy of the myth in Star Wars relies on the \"unseen magical forces which bring order and personality to the universe.\" 18 The battle for order in Star Wars is between good and evil with the use of young heroes and ancient magic and sorcery. \"\u00a6it is not because audiences want to live in a mythic past but rather history and myth offer a better template to fantasize about and create the future.\" 19 The uncertainty and problems in the present world and society are counteracted by the myths in Star Wars, writes Geraghty. The shared mythology of a collective society as described above all comes from the historical representation which is told in story form. The story told here, which distinguishes between the big dilemma of right and wrong, is told by going into the \"alternate world\" and past setting, which is the background for Star Wars. 4.3 Harry Potter Harry Potter was created by the British writer J. K. Rowling in the 1990s and the first book Harry Potter and the Philosopher's Stone was published by Bloomsbury in 1997. The first in Rowling's planned seven-part series was a huge success, and six of the books have been published to date. Four of the books have also been turned into Hollywood movies by the movie studio Warner Brothers. The story follows the gifted wizard Harry Potter and his seven-year long schooling at the Hogwarts School of Witchcraft and Wizardry. The parts that have been published are the Philosopher's Stone (book: 1997, movie: 2001), the Chamber of Secrets (book: 1998, movie: 2002), the Prisoner of Azkaban (book: 1999, movie: 2004), the Goblet of Fire (book: 2000, movie: 2005), the Order of the Phoenix (book: 2003, movie: in production) and the Half-Blood Prince (book: 2005). The stories of Harry Potter are as mythological as they are exciting and full of adventure. Author J.K. Rowling reaches back in history as she tells the exciting tales of her young protagonist, Harry Potter. American history professor Edmund M. Kern has written a book titled The Wisdom of Harry Potter: What Our Favorite Hero Teaches Us about Moral Choices, which delves into the topic of the uses of history, legend, and myth in the stories of Harry Potter. Kern describes these two elements as such, \"On the one hand through her realistic presentation of fantastic elements taken from the past, she provides an alternative version of the world. On the other, through her realistic presentation of familiar elements taken from the past, she provides an ordinary version of the world.\" 20 Rowling uses the past which make her stories appealing. \"\u00a6she employs simple and exotic elements of history, legend, and myth to give her magical world its form.\" 21 The stories of Harry Potter are filled with ancient mythological symbols that add some moral values that Rowling expresses and they may or may not be noticed by readers. In our own times, many symbols with impressive historical pedigrees go entirely unnoticed because they are unfamiliar. They take on new significance, however, within the context of Harry's stories, which ask readers to suspend their disbelief of the fantastic. Symbols can certainly reflect human ideals, but they do not exist independently of how they are used.22 In the adventures, Harry encounters everything from mythological mermaids and mermen which symbolize \"enchantment, temptation, and death\" 23 to the sphinx which in ancient mythology could either mean \"royalty, fertility, and immortality (in Egypt) or death and destruction (in Mesopotamia).\" 24 Rowling's literary myth also has a parallel to Hercules' tale. In Harry Potter, Fluffy, the three-headed dog guards the door to the forbidden corridor just as in the tale Hercules, the dog Cerberus guards the gate to the underworld. However, the most important symbols are found in the contrast of the two groups Gryffindor and Slytherin. Gryffindor, which is the group of good wizards in Harry Potter is represented by the lion, for a griffin is a half-lion half-eagle. The lion can symbolize \"\u00a6a valorous souldier, whose magnanimity is such as he had rather expose himself to all dangers, and even to death itself, than to become captive.\" 25 Just as a lion is considered a king of its realm, so is a snake. The group Slytherin is represented by the snake, which is mythically described as \"\u00a6the infection of his pestiferous and poysonfull aspect, wherewith he poisoneth the aire.\" 26 This group of wizards called Slytherin can in no doubt be described as that which is not good. In Harry Potter there is a triumph over evil with the help of good ethics and creativity from our protagonist Harry. By deciphering what is right and wrong, the problems of the world are solved. Kern believes that this is part of the reason why these books have become so popular. The main thesis of Kern's book is that the morals of Harry Potter are an updated version of stoicism, expressed in how Harry Potter balances his own desires and the needs of the world.27 Harry Potter's moral choices are ambiguous and Rowling provokes her readers to think about the balance between \"rule-following versus rule-breaking; emotion versus reason, inherited predisposition versus acquired adaptability; and fate versus free will.\" 28 The stories of Harry Potter have received much attention from religious authors. The religious group of authors mentioned are modern American Evangelical Christians, more commonly known as \u02dcConservative Christians.' The story of Harry Potter is a narrative (just as religious stories are narratives) and people can create their own conclusions from narratives and relate them to their own daily life. Jeanette Sky contributes to the book Implications of the Sacred in (Post) Modern Media with her chapter titled \"Harry Potter and Religious Mediatization (sic)\". She describes the ideas from narratives of religion and myth as being part of a bigger cultural discourse where \"\u00a6various religious ideas and belief systems coexist with secular elements.\" 29 The secular element in this case is Harry Potter. The critiques which are coming from this religious community are from a specific dichotomy. \"As these Christian communities tend to read the world in dichotomies between black and white, good and evil, most cultural products released into these communities tend to be read accordingly.\" 30 The religious connections to the Harry Potter stories are very prevalent. Some Christian writers see the books as preaching Christianity. In referring to the stories of Harry Potter, Christian authors can see the evil in the antagonists and good in protagonists of the story. Christian author John Granger writes the following of Harry Potter: The Harry Potter novels...touch our hearts because they contain themes, imagery, and engaging stories that echo the Great Story we are wired to receive and respond to. (...) they address the need (really an innate need akin to our need for physical nourishment) that we have for spiritual nourishment in the form of edifying, imaginative experience of life in Christ. Because the Harry Potter books serve this purpose, they are excellent vehicles for parents wanting to share the Christian message of love's victory over death, of our relationship to God the Father through Christ, even of Christ's two natures and singular essence.31 The survey was conducted in May 2006 and there where 48 forum moderators who responded to the survey. 43.8% of the respondents were Star Wars fans, 29.2% were Lord of the Rings fans and lastly 27.1% were Harry Potter fans. The respondents had the following demographics: Female 54.2% Male 43.8% Missing value 2.1% Australia 2.1% Canada 6.3% Croatia 2.1% Germany 2.1% Norway 4.2% Sweden 29.2% United Kingdom 4.2% United States 47.9% 15 years or younger 8.3% 61 years or older 2.1% 5.1 Results from the introductory questions The first three questions regarding the stories concerned general matters, and the respondents could only respond to these questions openly. The answers have been grouped according to the stories as the reasons might be different between the stories. - What theme in X* first sparked your interest? The Harry Potter fans mostly found interest in J.K. Rowling's popular writing style. A theme of Rowling's writing style that mostly hooked people in was the exciting adventures along with the magical wonders, \"[...] Contained in the stories was a very nice world to escape to ' an alternate world, overflowing with magic, yet still a world recognizably our own\" 'American female. The Lord of the Rings fans had a lot of different answers. Many found the adventurous aspect (e.g. \"the quest against insurmountable odds\" 'American male) and the alternative world (e.g. \"I was very young but the elves and the hobbits were of much interest\" ' Swedish female) interesting, while others related to their personal lives (e.g. \"\u00a6I was breathtaken at the amount of inspiration that Tolkien gave me to fulfill my goal to become a writer\" 'Australian female). Many of the Star Wars fans replied that they were very young when they first saw a Star Wars movie. The alternative world, adventure, and the battle between good and evil were popular responses. The fact that it was set in space was also important to many respondents. As a Swedish male put it, \"[\u00a6] \u02dcrobots', lightsabers, aliens and spacefights was perfect for a kid of my age.\" Although there are many different answers, many fans of all stories say they were young when they first became interested and that they where intrigued by the adventurous writing style of the books as well as special effects when it came to the Star Wars movies. - What about X still interests you today? The Harry Potter fans generally found an interest in wanting to see how the series ends! However, the enchantment of the stories still intrigue the readers along with the fun involved with reading the stories, \"I still love playing detective and trying to figure out who is working for whom in the series and what motivates them to act \" 'American female. The Lord of the Rings fans are intrigued by the work J.R.R. Tolkien put into his world. By going through the Silmarillion, UT and HOME, you find that what is occurring in LotR is just the tip of the iceburg. It is the only book I know in which the author has placed so much detail and history into his world. There is so much there, you can almost be like an archeologist, digging into the history of whichever bit interests you. 'British male. As an American female Star Wars fans responds, many are still intrigued by Star Wars because \"[t]he timelessness of the story and the limitless possibilities for expansion.\" There is also a social aspect of why people still are fans. \"I don't think I'd be as interested as I am if I hadn't met a lot of great friends through SW. I'd still be a fan, but I doubt I would have spent a week outside the cinema queuing for Episode 3.\" 'Swedish female. A general theme in the responses is an urge to know more about the worlds of the respective stories. The Lord of the Rings fans were interested at looking into the history of the world, whilst the Harry Potter fans were curious about the mysteries and of how the story ends. Some of the Star Wars fans were interested in what happens in the so-called \"expanded universe\" (complementary books, comics, movies etc. set in the Star Wars universe), but most only wanted to revisit the original unaltered movie trilogy because of nostalgia. - Why do you think there are so many fans of X? The Harry Potter fans think that the characters which J.K. Rowling creates are easy for all people to identify with. Topics like teenage problems and the pressures of school are topics everyone can relate to. As a Swedish male writes, \"\u00a6it's a story which resembles many things in the real world\u00a6and that Harry is a human and [has] his teenage problems.\" The Lord of the Rings fans think the popularity depends upon the work Tolkien put into his world and his use of universal themes such as good vs. evil, hope, love, etc. An American female states it quite clearly: Frodo is Everyman and to an even greater extent, so is Sam. Their choices, their perils, their sacrifices and ultimate victory at great cost speak to us of what we can accomplish if we are faithful to the task appointed unto us. The virtue and beauty of Middle Earth makes it something clearly worthy of sacrifice, and the believability of Middle Earth through the careful craftsmanship of JRR Tolkien makes the story resonate with readers. The Star Wars fans point out several reasons behind the success. Some point out the quality of the story and that it deals with universal questions, others point out that there is something for everyone in the world of Star Wars. Other fans focus on how George Lucas has managed to keep the interest going by releasing new products. Another important factor according to some is the fan community that is seen almost as a family. A common explanation behind the success of these stories could thus be that they deal with universal questions, are set in multifaceted worlds that are different from our own, and that people can relate the stories to their everyday lives. 5.2 Results from the questions connected to myth The questionnaire also contained three questions that were intended to test the relation between these stories and myth. These could be rated on a scale of five choices and the respondents were also instructed to give motivations for their answers. The open answers have been grouped according to the closed responses. Do you think you can translate the good and evil sides of X to the real world? Strongly agree 27.1% Agree 35.4% Total agree 62.5% Neither agree nor disagree 25.0% Total neither 25.0% Disagree 12.5% Disagree strongly 0.0% Total disagree 12.5% Missing value 0.0% Total missing 0.0% Those who agreed acknowledge that good and evil are seen in today's world. Most fans of all three stories found parallels to the evilness of Adolf Hitler to the evilness of the villain in their selected story. But all could agree that the courageousness and dignity of the heroes were good qualities while the selfishness and greed in the villain were evil. One fan of Lord of the Rings uses vocabulary from the story in her outlook on the world, \"[\u00a6] But there is a need for the good people to act together, against the evil\u00a6to form a Fellowship, as it were.\" 'American female. Those who disagreed believe that it is dangerous to apply a \"black and white\" perspective to real world situations. Two Swedish respondents point to U.S. foreign policy as an example of the danger with this kind of thinking (e.g. \"I suspect that it could be a useful strategy for the Americans in their barbaric assaults against the Arabs to show them as inhuman orcs or southrons.\"). One American respondent who disagreed with this statement had quite an interesting motivation: \"The basic premise behind temptation and redemption, yes, can be translated\u00a6 I don't think the story applies to any specific political situation.\" Those who neither agreed nor disagreed had mainly three kinds of motivations. Some did not understand the question while some thought no story can be translated the real world. Lastly, some respondents had a more elaborated explanation, It would truly be a wonderful world if things where as black and white as in the old films of Star Wars, where evil is evil and good is good. Often in the real world, a person i[s] neither truly evil [nor] truly good. However, even if many things in Star Wars [are] simply good and evil there are exceptions that you can link to the real world. For example Anakin's turn to the dark side in the new films are full of decisions which at the time sees to be good ones but turn out to really add to Anakin's downfall. Vader's turn back to Anakin in Return of the Jedi is also an interesting one. It shows that he is not truly evil but a man with good intentions who made the wrong choices. Certainly applyable (sic) in the real world. The fans were mainly divided into two sides when it came to this question. One side thought that you could actually apply evil to the real world quite literally (e.g. \"The Emperor = George W. Bush\"). The other side thought that it is dangerous to directly translate the black and white perspective to political situations or people. Some of these respondents thought that good and evil could rather be interpreted as the inner struggle within every human between selfishness and altruism. - Do you think X has become so popular because it deals with magical and mythological aspects? Many of those who agreed think of these stories as a kind of escapism, an escape from everyday life. There is far too much reality in reality. When one is faced with making a living in today's world, one longs to escape to a world where things are better defined, where one can believe in the goodness, or evil, of those one deals with. In Middle Earth ' good is good, and evil is evil. It's black and white. In the real world, there are far too many gray areas. Good people do bad things, and bad people are able to simulate good until the final blow falls. The magic and myth of Lord of the Rings makes things a lot simpler. 'American female. Others take this argument even further. There is definitely a lack of spirituality in many western countries so the magical and mythological fulfill one aspect spirituality and religion used to give, like clear rules of what is good and bad, that there is something more than plain human beings. 'Canadian female. A Swedish male agrees with this description: I think that all human(s) carry a longing for another world of mystery. That feeling is stronger within some of us, and those are often easy victims for the power of Tolkien's creation. Tolkien's world is built upon a base of myth and legend and we carry small fragments of these myths with us, and when someone comes along who can forge those fragments together to a qualitative epic, we love it. An American male writes: \"Mythology was designed to be, like Star Wars, relevant in any time period. It has morals and stories that we can use today.\" There are also respondents who have a similar but different opinion: \"While these aspects are at the core of the Saga, most people favor Star Wars due to its fun factor. It's a fun way to occupy yourself for two hours. But I do believe that the magicial feeling that the Saga has, is a close second.\" Those who disagreed believe that people's interest in the stories is mostly from their fascination in the plot and settings of the story. Many in fact do not believe that magic is a crucial part to the story. \"There is not much magic in LOTR when you get right down to it. There is a magic ring, but it is rarely used. And when it is used, the consequences have little to do with magic.\"'American female. However, some respondents just chose to admit that they enjoy the adventure and aesthetics of the stories (e.g. \"\u00a6because of the lightsaber fights, cool space battles, and Darth Vader\"). Those who neither agreed nor disagreed found most of the stories' importance in the characters and plots, but did feel that the magic and mythology had some clear relevance. All could agree that the mythology of the story is more important than the magic in the stories. Once again, one can divide the respondents into two groups. One group believes that fans are primarily interested in these stories because of its fun adventurous nature, its characters, its plots etc. and another group sees these stories as a form of escape which to some, is motivated by a spiritual longing for something more than everyday life. - Do you think you are a fan of X because society lacks a spirit of ancient religion and mythology (e.g. collective rituals directed at the so-called otherworldly)? Strongly agree 6.3% Agree 4.2% Total agree 10.4% Disagree strongly 29.2% Total disagree 64.6% Those who agreed feel that they enjoy the fantasy world of their story because the world of \"LotR is a way to dream about a time when fear of the darkness was real, you believed in ghosts and trolls.\" Also, the world of the fantasy gives people a purpose in life (e.g. \"It would be nice to really KNOW that we have a purpose in life. The characters in Star Wars know this, all we can do is have faith, which is must harder\"). Those who disagreed were numerous and had several different reasons for not agreeing. Some did not understand the link between the supposed lack of myth\/religion in society and their interest in their story. Other rightly pointed out that it depends on what society one is speaking of and some did not think there is a lack of myth and religion in society (mainly the respondents from the United States). Many respondents also pointed out other reasons behind their interest in their story. A fan from Sweden answered that he liked Star Wars mainly because of nostalgia, the storytelling of the original trilogy and the Star Wars world (as he could escape into it like a \"dream world\"). Others are religious and do not think their story has a religious function. A female American answered that \"I am already well planted in a religion and I don't need Star Wars to fulfill that part of my life. Star Wars is a means of entertainment and escape for me and nothing more.\" A Croatian respondent answered that \"I come from a country that has history dating from the 7th century along with myriad of myths. Nope, I don't need a new mythology to brighten up my day. What I need is an inspiration to keep with everyday toils and a message that everything's possible.\" Another American female respondent writes that Harry Potter could never replace the ancient religion I hold to in my life. Nor do I think the majority of readers (for casual readers make up the bulk of sale, not the fanatics you find online) see it as a substitute. I imagine people like Harry Potter because it's fun to partake of his journey; I think the void it fills in society is more of a literary kind. Harry came along when people were shifting to electronics, but deep in their hearts craved a high-quality, developed story that was imagination-driven and wonder-filled. Some respondents also write that Lord of the Rings does not contain that much magic, and some Star Wars fans do not think the Force or the Jedi Order is that important for the quality of the story. Those who neither agreed nor disagreed mostly did not understand the question. However, a man from Great Britain thought that the idea of mythology and ancient religion is indeed still in our society, \"In the West we still have people who study White and Black magic, while many other societies still practice magical ritual.\" Two others still found their stories interesting and spiritual, but were clear to state that their interest was in the spiritual parts of the stories, not any possible underlying religious motive. Many pointed out that myth and religion is still present in society ' albeit in a different way than a few hundred years ago ' and that Harry Potter, Lord of the Rings and Star Wars are not related to personal beliefs. Rather these stories function as an escape from everyday life. The stories are made more appealing with mythological and magical elements, and function as contrasts to our technological and complex world. 6. Analysis and Conclusions How are Harry Potter, Lord of the Rings and Star Wars related to the concept of myth? Below is a line of argument that can support the idea that these stories function as sense-making myth in late modern societies (as presented in section 3.2) where the media plays an important role of both dislodging traditions and the distribution of media texts such as Harry Potter, Lord of the Rings and Star Wars (see section 3.3). 1. Myth is a narrative (often involving references to the so-called otherworldly) that has the potential to transform people so that they can deal with the conceived lack of meaning in human life 2. Of central importance to humans is to define what is good and what is evil, so that they can act in accordance to this dichotomy and feel that they are doing the right thing. 3. Harry Potter, Lord of the Rings and Star Wars are narratives that contain mythological themes (such as heroes, villains and godlike figures as well as the duality between good and evil). 4. One can find guidelines for what is good and evil in Harry Potter, Lord of the Rings and Star Wars that can be translated to the real world. 5. Fans are transformed by Harry Potter, Lord of the Rings and Star Wars. The stories provide the fans with ethical guidance as well as gives them a sense of meaning and cohesion. Points 1 and 2 are basically related to Karen Armstrong's definition of myth (see section 1). The former arch bishop of the Church of Sweden, KG Hammar, has argued that the central meaning of Christianity is altruistic love, and to dismantle the division of us and them (he referred to that Jesus helped outcasts and taught that you should love your enemy).32 This is an example of how a myth can provide a meaningful guide to how one should live life. Although Nietzsche did not applaud Christianity, he did see myth in the Arts (such as literature) as a way of making sense out of our meaningless lives, which relates to point 1. Points 3 and 4 are basically covered in section 4 of this study. Harry Potter teaches people to live a stoic life, whilst Frodo Baggins teaches people to rely on compassion and not to be tempted by power. Luke Skywalker becomes a hero by staying to his principles, whilst Anakin Skywalker is redeemed after a downfall to evil (because of egocentric reasons). The morals of the stories could be interpreted in the same way as KG Hammar interprets Christianity, i.e. altruistic love is better than selfish greed. When it comes to point 5 one has to rely on the empirical material of this study. The survey presented above supports that the mythology and magic of the stories are part of their successful appeal. Many respondents highlighted the duality of good vs. evil in the stories and a majority thought one could translate this perspective to the real world. Some of the respondents thought it could be translated directly to political situations whilst others thought it could be applied to the inner struggle within humans. The inner struggle between selflessness and selfishness follows KG Hammar's version of Christianity, whilst the direct application of good and evil to political situations tends to reinforce the concept of us vs. them. Several respondents actually related the ethics of the stories in exactly the way discussed here. I [relate the Good and Evil of Star Wars] all the time, actually. I find it very easy to associate Star Wars to the real world. Mostly the good side of it. I use quotes from Star Wars, the books and movies, in discussions with people about religion and the world in general. (i.e. \u02dcThe biggest problem in this universe is that no one helps each other.' 'Shmi Skywalker). A Harry Potter fans writes: \u00a6Rowling incorporates very real themes into her stories, even if she does so in a fantastical manner. While her heroes and villains tend to be a bit black-and-white, they nevertheless convey certain character traits that are recognizable in real good and evil. Harry's bravery, Voldemort's lust for power ' how the selfish pursuit of something not rightfully yours can mutilate you, body and soul. An American Lord of the Rings fan in the 41-60 age bracket brought the story of Lord of the Rings into the American struggle in Vietnam as her response to why she first became interested in Lord of the Rings. The idea that the smallest hands could have a major impact, despite what would seem to be impossible odds or insurmountable obstacles. I first read Lord of the Rings during the Vietnam era ' and this was a theme that was most appealing to many of my generation, who felt helpless to stop what we saw as senseless participation in wholesale slaughter to no legitimate end. In conclusion, this study does not give evidence that fans of these stories really do seek comfort in these stories when dealing with the big questions of life and death or with right and wrong (although the respondents thought it was possible to translate the good and evil sides of the stories to reality). Some respondents of the survey have given answers that might suggest that they use the stories as a kind of substitute for religion, but the vast majority of respondents see the stories as entertainment and\/or escapism. The study does show that the respondents find mythology and the duality between good and evil important ingredients in the stories and a part in their successful appeal. This study only suggests how Harry Potter, Lord of the Rings and Star Wars can be seen as myth. To investigate all fans of these stories would require a much larger study. The group of fans selected here would probably not be a good representation for all people who like these books and movies. If one should do a similar but larger study, it would be interesting to focus more on if and how people have been influenced by the morals of these stories. One might also reconsider the use of the last question on the questionnaire used in this study, because it is hard to answer as it contains several assumptions. Lastly, there seemed to be a disagreement about whether today's society lacks a sprit of ancient religion and myth. People (especially those from the United States) think religion is all around us, which of course is true in some sense. An American Star Wars fan states it quite sufficiently: \"I don't think society lacks the spirit of ancient religion\/myth at all, honestly ' our myths today just take different forms.\" One respondent applies the concept of religion to Harry Potter fandom: \"Real HP fans chat online about every detail, gather for movie and book release(s), feel happy to be part of a community, things that used to be the parish church or other religious buildings.\" This would also be a subject to dig further into. 1. Hesmondhalgh, David. The Cultural Industries. London: Sage, 2002. p. 188. 2. \"All Time Worldwide Box Office.\" IMDB. 2006. Internet Movie Database. May 2006. 3. Armstrong, Karen. Myternas Historia. Stockholm: Albert Bonniers f\u00f6rlag, 2005. pp. 7-18. 4. Gorski, Philip S. \"Historicizing the Secularization Debate: Church, State, and Society in Late Medieval and Early Modern Europe. ca. 1300 to 1700\", American Sociological Review, Vol. 6-5. 2000. pp. 138-167. 5. Safranski, R\u00fcdiger. Nietzsche ' tankarnas biografi. Stockholm: Natur och Kultur2003. pp. 74-95. 6. Gauntlett, David. Media, Gender and Identity ' An Introduction. London: Routledge, 2002. pp. 95-98. 7. Thompson, John B. The Media and Modernity ' A Social Theory of the Media. Stanford: Stanford UP, 1995. pp. 179-206. 11. Day, David. Tolkien's Ring. London: Harpercollins, 1994. 12. Ibid. pp. 11-18. 13. Ibid. pp. 177-183. 14. Brennan, Kristen. \"Joseph Campbell.\" Star Wars Origins. 2006. Jitterbug Fantasia. May 2006. 15. Geraghty, Lincoln. \"Creating and Comparing Myth in Twentieth-Century Science Fiction: Star Trek and Star Wars.\" Literature Film Quarterly, Vol. 33 Issue 3. 2005. pp. 191-200. 16. Ibid. p. 193. 20. Kern, Edmund M. The Wisdom of Harry Potter ' What our Favorite Hero Teaches Us About Moral Choices. Amherst: Prometheus. 2003. p. 191. 21. Ibid. p. 193 27. Ibid. p. 89. 29. Safranski, R\u00fcdiger. Nietzsche ' tankarnas biografi. Stockholm: Natur och Kultur2003. p. 236. 31. Ibid."} +{"id":"RedPajamaCommonCrawl.0048","text":"Cambridge, Jane D was born in 1945 and she registered to vote, giving her address as 15990 Quandary LOOP, BROOMFIELD, Broomfield County, CO. Her voter ID number is 3959049. Cambridge, Karen Kay was born in 1950 and she registered to vote, giving her address as 2002 Summerset DR, COLO SPRINGS, El Paso County, CO. Her voter ID number is 601405678. Cambridge, Keely Marie was born in 1986 and she registered to vote, giving her address as 325 S Almstead RD, WATKINS, Arapahoe County, CO. Her voter ID number is 6699958. Cambridge, Lavette Angela was born in 1986 and she registered to vote, giving her address as 3151 W Girard AVE # 623, ENGLEWOOD, Arapahoe County, CO. Her voter ID number is 600849770. Cambridge, Patricia Gay was born in 1949 and she registered to vote, giving her address as 12711 Colorado BLVD UNIT 516, THORNTON, Adams County, CO. Her voter ID number is 8394637. Cambridge, Regina M was born in 1937 and she registered to vote, giving her address as 11353 W 18Th AVE, LAKEWOOD, Jefferson County, CO. Her voter ID number is 4047764. Cambridge, Sarah Anne was born in 1987 and she registered to vote, giving her address as 1644 S Balsam ST, LAKEWOOD, Jefferson County, CO. Her voter ID number is 600611613. Cambridge, Vanessa was born in 1987 and she registered to vote, giving her address as 2250 Dallas ST UNIT 8, AURORA, Adams County, CO. Her voter ID number is 4921000. Cambridge-Shields, Audra Rhealene Ford was born in 1962 and she registered to vote, giving her address as 25504 Stansbery CIR, CONIFER, Jefferson County, CO. Her voter ID number is 7086958. Cambridge Upsons, Kristina was born in 1966 and she registered to vote, giving her address as 4931 Little Cub Creek RD, EVERGREEN, Jefferson County, CO. Her voter ID number is 4160342. Cambron, Andrew Lee was born in 1985 and he registered to vote, giving his address as 43546 E Iliff TRL, BENNETT, Arapahoe County, CO. His voter ID number is 733361. Cambron, Brittni Lynn was born in 1994 and she registered to vote, giving her address as 2430 12Th AVE, GREELEY, Weld County, CO. Her voter ID number is 601334111. Cambron, Charles Duane was born in 1939 and he registered to vote, giving his address as 705 Hunter DR APT #1409, PUEBLO, Pueblo County, CO. His voter ID number is 3023217. Cambron, Charles Frank Iii was born in 1992 and he registered to vote, giving his address as 1494 S Vaughn CIR, AURORA, Arapahoe County, CO. His voter ID number is 200339740. Cambron, Colleen Sue was born in 1957 and she registered to vote, giving her address as 43546 E Iliff TRL, BENNETT, Arapahoe County, CO. Her voter ID number is 731788. Cambron, Francisco Fernando was born in 1982 and he registered to vote, giving his address as 960 Evening Star CT, COLO SPRINGS, El Paso County, CO. His voter ID number is 601265106. Cambron, James Barton Jr was born in 1961 and he registered to vote, giving his address as 1803 Prairie RD APT 205, COLO SPRINGS, El Paso County, CO. His voter ID number is 200065954. Cambron, James Edward was born in 1949 and he registered to vote, giving his address as 4204 Carnoustie CT, COLO SPRINGS, El Paso County, CO. His voter ID number is 601192705. Cambron, James Michael was born in 1954 and he registered to vote, giving his address as 4504 Ketchwood CIR, HIGHLANDS RANCH, Douglas County, CO. His voter ID number is 5867822. Cambron, Jesse Alan was born in 1991 and he registered to vote, giving his address as 1550 Highway 50 UNIT 19, GRAND JUNCTION, Mesa County, CO. His voter ID number is 200349493. Cambron, Jessica Nicole was born in 1986 and she registered to vote, giving her address as 15264 Yellowthroat ST, PARKER, Douglas County, CO. Her voter ID number is 4016284. Cambron, John Ray was born in 1961 and he registered to vote, giving his address as 135 E Heritage CT, FRUITA, Mesa County, CO. His voter ID number is 2318048. Cambron, Polly B was born in 1974 and she registered to vote, giving her address as 311 Terrace PL, MANITOU SPGS, El Paso County, CO. Her voter ID number is 601753260. Cambron, Rachel Michelle was born in 1995 and she registered to vote, giving her address as 21850 Road G, CORTEZ, Montezuma County, CO. Her voter ID number is 601996672. Cambron, Robert A was born in 1955 and he registered to vote, giving his address as 43546 E Iliff TRL, BENNETT, Arapahoe County, CO. His voter ID number is 731787. Cambron, Sharon Louise was born in 1941 and she registered to vote, giving her address as 10336 W 55Th PL # 102, ARVADA, Jefferson County, CO. Her voter ID number is 4016700. Cambron, Teresa Elizabeth was born in 1962 and she registered to vote, giving her address as 2236 N 17Th ST UNIT K4, GRAND JUNCTION, Mesa County, CO. Her voter ID number is 2324880. Cambron, Thomas Fabian Iii was born in 1989 and he registered to vote, giving his address as 8111 E Yale AVE # 9-306, DENVER, Arapahoe County, CO. His voter ID number is 600845347. Cambron, Trevor Scott was born in 1985 and he registered to vote, giving his address as 5712 S Lowell BLVD, LITTLETON, Arapahoe County, CO. His voter ID number is 879695. Cambron, William Matthew was born in 1958 and he registered to vote, giving his address as 1518 E Monument ST, COLO SPRINGS, El Paso County, CO. His voter ID number is 7950902. Cambron-Keller, Joanna Lynn was born in 1982 and she registered to vote, giving her address as 4 Luxury LN, COLO SPRINGS, El Paso County, CO. Her voter ID number is 601218592. Cambron-Keller, Sara Ellen was born in 1988 and she registered to vote, giving her address as 6520 Delmonico DR APT 203, COLO SPRINGS, El Paso County, CO. Her voter ID number is 385459. Cambronne, Chad D was born in 1952 and he registered to vote, giving his address as 7707 S Dover ST, LITTLETON, Jefferson County, CO. His voter ID number is 4107657. Cambruzzi, Charles Joseph Sr was born in 1941 and he registered to vote, giving his address as 203 Tyson CT, TRINIDAD, Las Animas County, CO. His voter ID number is 3842623. Cambruzzi, Joanne C was born in 1966 and she registered to vote, giving her address as 2580 S Orchard ST, LAKEWOOD, Jefferson County, CO. Her voter ID number is 4004295. Cambruzzi, Joann T was born in 1959 and she registered to vote, giving her address as 10134 W Wesley DR, LAKEWOOD, Jefferson County, CO. Her voter ID number is 4216944. Cambruzzi, John Joseph was born in 1965 and he registered to vote, giving his address as 11864 W Auburn DR, LAKEWOOD, Jefferson County, CO. His voter ID number is 4003940. Cambruzzi, Judy Marie was born in 1934 and she registered to vote, giving her address as 2476 S Xenon WAY, LAKEWOOD, Jefferson County, CO. Her voter ID number is 601018958. Cambruzzi, Julie Ann was born in 1972 and she registered to vote, giving her address as 2456 S Lewis LN, LAKEWOOD, Jefferson County, CO. Her voter ID number is 3959298. Cambruzzi, Katherine Rae was born in 1973 and she registered to vote, giving her address as 11917 W Yale PL, LAKEWOOD, Jefferson County, CO. Her voter ID number is 2813261. Cambruzzi, Robert Jude was born in 1970 and he registered to vote, giving his address as 11917 W Yale PL, LAKEWOOD, Jefferson County, CO. His voter ID number is 2883648. Cambruzzi, Virginia Buenrostro was born in 1947 and she registered to vote, giving her address as 203 Tyson CT, TRINIDAD, Las Animas County, CO. Her voter ID number is 3844968. Camcho, Carlos was born in 1972 and registered to vote, giving the address as 612 Mountain View AVE, LONGMONT, Boulder County, CO. Camcho' voter ID number is 601456828. Camden, Anna Elizabeth was born in 1989 and she registered to vote, giving her address as 1266 N Lafayette ST APT 4, DENVER, Denver County, CO. Her voter ID number is 601747474. Camden, Avery was born in 1998 and he registered to vote, giving his address as 1150 Golden CIR # 412, GOLDEN, Jefferson County, CO. His voter ID number is 601166295. Camden, Beverly Richard was born in 1946 and she registered to vote, giving her address as 16370 E Berry PL, CENTENNIAL, Arapahoe County, CO. Her voter ID number is 765193. Camden, Carissa Marie was born in 1986 and she registered to vote, giving her address as 2430 W 39Th AVE, DENVER, Denver County, CO. Her voter ID number is 6402969. Camden, Courtney Ellen was born in 1994 and she registered to vote, giving her address as 457 Mockingbird CT, HIGHLANDS RANCH, Douglas County, CO. Her voter ID number is 600559808. Camden, David Cory was born in 1980 and he registered to vote, giving his address as 3656 2195 RD, DELTA, Delta County, CO. His voter ID number is 601540537. Camden, Denae Rachelle was born in 1990 and she registered to vote, giving her address as 406S Main ST, BONANZA, Saguache County, CO. Her voter ID number is 601718101. Camden, James L was born in 1941 and he registered to vote, giving his address as 16370 E Berry PL, CENTENNIAL, Arapahoe County, CO. His voter ID number is 765194. Camden, Jimmy E was born in 1954 and he registered to vote, giving his address as 3610 Meridian RD, PEYTON, El Paso County, CO. His voter ID number is 258874. Camden, Joellen was born in 1964 and she registered to vote, giving her address as 457 Mockingbird CT, HIGHLANDS RANCH, Douglas County, CO. Her voter ID number is 5767412. Camden, Jolene Renee was born in 1956 and she registered to vote, giving her address as 3610 Meridian RD, PEYTON, El Paso County, CO. Her voter ID number is 258873. Camden, Jordan Harrison was born in 1991 and he registered to vote, giving his address as 3610 Meridian RD, PEYTON, El Paso County, CO. His voter ID number is 600304630. Camden, Kathleen Clair was born in 1982 and she registered to vote, giving her address as 7172 W Glasgow PL, LITTLETON, Jefferson County, CO. Her voter ID number is 601355796. Camden, Marian Louise was born in 1959 and she registered to vote, giving her address as 6090 S Jasmine ST, CENTENNIAL, Arapahoe County, CO. Her voter ID number is 784626. Camden, Paul Andrew was born in 1965 and he registered to vote, giving his address as 457 Mockingbird CT, HIGHLANDS RANCH, Douglas County, CO. His voter ID number is 5723627. Camden, Paul Richard was born in 1984 and he registered to vote, giving his address as 7172 W Glasgow PL, LITTLETON, Jefferson County, CO. His voter ID number is 4263204. Camden, Shawn H was born in 1977 and he registered to vote, giving his address as 2800 Kalmia AVE UNIT A322, BOULDER, Boulder County, CO. His voter ID number is 7950905. Camden, Tegan Lee was born in 1985 and she registered to vote, giving her address as 2910 Mountain Lion DR # 201, LOVELAND, Larimer County, CO. Her voter ID number is 601914214. Camden-Britton, Heidi Christine was born in 1976 and she registered to vote, giving her address as 2037 S Xenia WAY, DENVER, Arapahoe County, CO. Her voter ID number is 4207937. Camel, Jerome Neil was born in 1968 and he registered to vote, giving his address as 2769 Warmstone CT, CASTLE ROCK, Douglas County, CO. His voter ID number is 3932277. Camel, Lauren Melissa was born in 1984 and she registered to vote, giving her address as 727 E 1St AVE APT 106, DENVER, Denver County, CO. Her voter ID number is 600329907. Camel, Leigh Marin was born in 1970 and she registered to vote, giving her address as 2769 Warmstone CT, CASTLE ROCK, Douglas County, CO. Her voter ID number is 600736126. Camele, Christopher Wayne was born in 1986 and he registered to vote, giving his address as 2149 Aztec DR APT D, PUEBLO, Pueblo County, CO. His voter ID number is 3034253. Camele, Gilbert was born in 1961 and registered to vote, giving the address as 308 Pennsylvania, WALSENBURG, Huerfano County, CO. Camele' voter ID number is 601469434. Camele, Veronica Lydia was born in 1962 and registered to vote, giving the address as 308 Pennsylvania, WALSENBURG, Huerfano County, CO. Camele' voter ID number is 601469411. Camelin, Courtney Jo was born in 1976 and she registered to vote, giving her address as 5003 Sacred Feather DR, COLO SPRINGS, El Paso County, CO. Her voter ID number is 600143942. Camelio, Cathy Eileen was born in 1948 and she registered to vote, giving her address as 7427 S Lafayette CIR E, CENTENNIAL, Arapahoe County, CO. Her voter ID number is 837840. Camelio, Jeffrey Mikel was born in 1981 and he registered to vote, giving his address as 1015 W Prospect RD # 5, FORT COLLINS, Larimer County, CO. His voter ID number is 600379578. Camelio, Pamela Anyon was born in 1953 and she registered to vote, giving her address as 8598 S Woody WAY, HIGHLANDS RANCH, Douglas County, CO. Her voter ID number is 5901948. Camell, Curtis Bernhard was born in 1960 and he registered to vote, giving his address as 3120 Baylor DR, BOULDER, Boulder County, CO. His voter ID number is 7951018. Camell, Dennis Gregory was born in 1959 and he registered to vote, giving his address as 701 West ST, LOUISVILLE, Boulder County, CO. His voter ID number is 7951019. Camell, Ingrid Marianne was born in 1934 and she registered to vote, giving her address as 3120 Baylor DR, BOULDER, Boulder County, CO. Her voter ID number is 7951020. Camell, Kathryn Marie was born in 1990 and she registered to vote, giving her address as 701 West ST, LOUISVILLE, Boulder County, CO. Her voter ID number is 7951021. Camell, Kenneth Edward was born in 1927 and he registered to vote, giving his address as 3120 Baylor DR, BOULDER, Boulder County, CO. His voter ID number is 7951022. Camell, Patricia B was born in 1958 and she registered to vote, giving her address as 701 West ST, LOUISVILLE, Boulder County, CO. Her voter ID number is 7951023. Camell-Coppin, Carolyn Anne Marie was born in 1971 and she registered to vote, giving her address as 930 Button Rock DR UNIT 32, LONGMONT, Boulder County, CO. Her voter ID number is 7951025. Camellino, Conrad Joseph was born in 1994 and he registered to vote, giving his address as 6644 Finley PL APT 103, BOULDER, Boulder County, CO. His voter ID number is 601713853. Camello, Natalie Kay was born in 1981 and she registered to vote, giving her address as 18706 E Utah CIR, AURORA, Arapahoe County, CO. Her voter ID number is 200231625. Camelo, Andres Felipe was born in 1992 and he registered to vote, giving his address as 6969 W 90Th AVE # 828, WESTMINSTER, Jefferson County, CO. His voter ID number is 601963197. Camenga, John R was born in 1954 and he registered to vote, giving his address as 112 Park AVE, FT LUPTON, Weld County, CO. His voter ID number is 600144071. Camenga, Theresa Yolanda was born in 1954 and she registered to vote, giving her address as 112 Park AVE, FT LUPTON, Weld County, CO. Her voter ID number is 6303426. Camenisch, Alexander Levi was born in 1992 and he registered to vote, giving his address as 29839 W Highway 14, BELLVUE, Larimer County, CO. His voter ID number is 600333736. Camenisch, April Elizabeth was born in 1978 and she registered to vote, giving her address as 29839 W Highway 14, BELLVUE, Larimer County, CO. Her voter ID number is 6594298. Camenisch, Brandon Michael was born in 1985 and he registered to vote, giving his address as 13780 Del Corso WAY # 227, BROOMFIELD, Broomfield County, CO. His voter ID number is 6325371. Camenisch, Clayton Phillip was born in 1981 and he registered to vote, giving his address as 1185 Osprey RD, EATON, Weld County, CO. His voter ID number is 600093495. Camenisch, Gieri G was born in 1954 and she registered to vote, giving her address as 410 N Washington ST, DENVER, Denver County, CO. Her voter ID number is 2873098. Camenisch, Jamie Lynn was born in 1982 and she registered to vote, giving her address as 1185 Osprey RD, EATON, Weld County, CO. Her voter ID number is 200341397. Camenisch, Janis Marie was born in 1954 and she registered to vote, giving her address as 3701 County Road 20.5, LONGMONT, Weld County, CO. Her voter ID number is 6453637. Camenisch, Marilyn Darlene was born in 1940 and she registered to vote, giving her address as 1716 Spruce AVE, LONGMONT, Boulder County, CO. Her voter ID number is 7951027. Camenisch, Phillip E Jr was born in 1961 and he registered to vote, giving his address as 29839 W Highway 14, BELLVUE, Larimer County, CO. His voter ID number is 1554755. Camenisch, Robert Jack Jr was born in 1960 and he registered to vote, giving his address as 1716 Spruce AVE, LONGMONT, Boulder County, CO. His voter ID number is 7951029. Camenisch, Stephanie Michelle was born in 1983 and she registered to vote, giving her address as 1424 40Th AVE, GREELEY, Weld County, CO. Her voter ID number is 6325463. Camenson, Ashley Linnaea was born in 1989 and she registered to vote, giving her address as 6305 W Exposition AVE, LAKEWOOD, Jefferson County, CO. Her voter ID number is 200109012. Camenson, Daniel Monroe was born in 1955 and he registered to vote, giving his address as 832 Gregory RD, FORT COLLINS, Larimer County, CO. His voter ID number is 1595226. Camenson, Marcee Lee was born in 1957 and she registered to vote, giving her address as 832 Gregory RD, FORT COLLINS, Larimer County, CO. Her voter ID number is 1599178. Camenson, William Charles was born in 1990 and he registered to vote, giving his address as 832 Gregory RD, FORT COLLINS, Larimer County, CO. His voter ID number is 600563977. Camenzind, Christopher Hans was born in 1990 and he registered to vote, giving his address as 3056 Ursula ST, AURORA, Adams County, CO. His voter ID number is 600151578. Camenzind, Emilee Sara was born in 2000 and she registered to vote, giving her address as 5130 Lynnwood CT, LOVELAND, Larimer County, CO. Her voter ID number is 601915855. Camera, Amy M was born in 1963 and she registered to vote, giving her address as 2025 S St Paul ST, DENVER, Denver County, CO. Her voter ID number is 2491997. Camera, Anthony M was born in 1966 and he registered to vote, giving his address as 2295 S High ST, DENVER, Denver County, CO. His voter ID number is 2754180. Camera, Cecilia Phan was born in 1978 and she registered to vote, giving her address as 14938 Clayton ST, THORNTON, Adams County, CO. Her voter ID number is 6818891. Camera, Cristina Maria was born in 1977 and she registered to vote, giving her address as 12501 Clermont ST, THORNTON, Adams County, CO. Her voter ID number is 200372823. Camera, Geraldene N was born in 1939 and she registered to vote, giving her address as 7020 County Rd 49, MEEKER, Rio Blanco County, CO. Her voter ID number is 4978754. Camera, Gregory Michael was born in 1975 and he registered to vote, giving his address as 13709 Locust ST, THORNTON, Adams County, CO. His voter ID number is 200376654. Camera, Jared was born in 1998 and registered to vote, giving the address as 9016 Baker Hall, BOULDER, Boulder County, CO. Camera' voter ID number is 601454290. Camera, Joseph Charles Phan was born in 1977 and he registered to vote, giving his address as 14938 Clayton ST, THORNTON, Adams County, CO. His voter ID number is 6861011. Camera, Julia Ann was born in 1992 and she registered to vote, giving her address as 25 S Emerson ST APT 305, DENVER, Denver County, CO. Her voter ID number is 600478521. Camera, Lawrence Patrick was born in 1966 and he registered to vote, giving his address as 2295 S High ST, DENVER, Denver County, CO. His voter ID number is 2659361. Camera, Michelle M was born in 1973 and she registered to vote, giving her address as 191 Comanche TRL, WOODLAND PARK, Teller County, CO. Her voter ID number is 433830. Camera, Neil Anthony V was born in 1990 and he registered to vote, giving his address as 4930 E Warren AVE, DENVER, Denver County, CO. His voter ID number is 200044407. Camera, Robyn Ashley was born in 1999 and she registered to vote, giving her address as 8242 Scarborough DR, COLO SPRINGS, El Paso County, CO. Her voter ID number is 601077497. Camera, Tara Brooke was born in 1997 and she registered to vote, giving her address as 8242 Scarborough DR, COLO SPRINGS, El Paso County, CO. Her voter ID number is 601434130. Camerano, Alex Rey Iii was born in 1999 and he registered to vote, giving his address as 1247 W 44Th AVE, DENVER, Denver County, CO. His voter ID number is 601985943. Camerano, Ashlyn Elizabeth was born in 1994 and she registered to vote, giving her address as 5401 Aspen AVE, CASTLE ROCK, Douglas County, CO. Her voter ID number is 601917656. Camerano, Taranea Ruth was born in 1990 and she registered to vote, giving her address as 8207 Monterey WAY, FOUNTAIN, El Paso County, CO. Her voter ID number is 600150298. Camerato, James K was born in 1974 and he registered to vote, giving his address as 3241 Champa ST, DENVER, Denver County, CO. His voter ID number is 601937411. Camerato, Mackenzie Marie was born in 1995 and she registered to vote, giving her address as 1085 N Clarkson ST APT 5, DENVER, Denver County, CO. Her voter ID number is 601910033. Camerden, James C was born in 1960 and he registered to vote, giving his address as 9765 Tomahawk TRL, COLO SPRINGS, El Paso County, CO. His voter ID number is 337350. Camerden, James Robert was born in 1982 and he registered to vote, giving his address as 875 S Calhan HWY, YODER, El Paso County, CO. His voter ID number is 328031. Camerden, Laura Ann was born in 1958 and she registered to vote, giving her address as 9765 Tomahawk TRL, COLO SPRINGS, El Paso County, CO. Her voter ID number is 601632324. Camerden, Theresa Ann was born in 1961 and she registered to vote, giving her address as 9765 Tomahawk TRL, COLO SPRINGS, El Paso County, CO. Her voter ID number is 336397. Camerena, Felicia J was born in 1977 and she registered to vote, giving her address as 10506 Unity PKWY, COMMERCE CITY, Adams County, CO. Her voter ID number is 6802318. Camerer, Chandler Ethan was born in 1999 and he registered to vote, giving his address as 13675 E 14Th PL # 216, AURORA, Arapahoe County, CO. His voter ID number is 601279056. Camerer, Elizabeth Babbitt was born in 1986 and she registered to vote, giving her address as 4949 N Adams ST, DENVER, Denver County, CO. Her voter ID number is 200032205. Camerer, Heather Maureen was born in 1985 and she registered to vote, giving her address as 2700 S Holly ST APT 223, DENVER, Denver County, CO. Her voter ID number is 6354590. Camerer, Laramie Cole was born in 1992 and he registered to vote, giving his address as 24750 County Road 33B, STEAMBOAT SPRINGS, Routt County, CO. His voter ID number is 601687904. Camerer, Lori Ann was born in 1956 and she registered to vote, giving her address as 720 Kenosha CT, WINDSOR, Weld County, CO. Her voter ID number is 6355040. Camerer, Richard Earl was born in 1951 and he registered to vote, giving his address as 1287 Aspen PL, LOVELAND, Larimer County, CO. His voter ID number is 6355041. Camerer, Steven Marshal was born in 1973 and he registered to vote, giving his address as 2811 N Jasmine ST, DENVER, Denver County, CO. His voter ID number is 600326822. Camerino, Angelo Maigue was born in 1964 and he registered to vote, giving his address as 17850 Blue Opal CT, MONUMENT, El Paso County, CO. His voter ID number is 125684. Camerino, Carolyn Tubig was born in 1970 and she registered to vote, giving her address as 610 Sun Valley DR, WOODLAND PARK, Teller County, CO. Her voter ID number is 200054382. Camerino, Charles Nelson was born in 1990 and he registered to vote, giving his address as 12210 15Th ST, FORT GARLAND, Costilla County, CO. His voter ID number is 601128839. Camerino, Samantha Teresa was born in 1979 and she registered to vote, giving her address as 1631 N Emerson ST APT 105, DENVER, Denver County, CO. Her voter ID number is 601821367. Cameris, Liana was born in 1979 and she registered to vote, giving her address as 520 N Vrain ST, DENVER, Denver County, CO. Her voter ID number is 601354932. Camerlo, Alexis Ann was born in 1992 and she registered to vote, giving her address as 5008 Villa CIR, COLO SPRINGS, El Paso County, CO. Her voter ID number is 600579408. Camerlo, Allysa Jo was born in 1994 and she registered to vote, giving her address as 2545 Verde DR APT 326, COLO SPRINGS, El Paso County, CO. Her voter ID number is 601420474. Camerlo, Alyson Renee was born in 1977 and she registered to vote, giving her address as 356 County Rd 4, HOWARD, Fremont County, CO. Her voter ID number is 2709845. Camerlo, Barbara Louise was born in 1952 and she registered to vote, giving her address as 5368 Colina PL, PARKER, Douglas County, CO. Her voter ID number is 3086144. Camerlo, David Harl was born in 1950 and he registered to vote, giving his address as 4810 County Rd 78, ROCKVALE, Fremont County, CO. His voter ID number is 3641774. Camerlo, Edwin L was born in 1937 and he registered to vote, giving his address as 1233 Blake DR, CANON CITY, Fremont County, CO. His voter ID number is 3643441. Camerlo, Gina Lee was born in 1951 and she registered to vote, giving her address as 4810 County Rd 78, ROCKVALE, Fremont County, CO. Her voter ID number is 3641775. Camerlo, Jacob Thomas was born in 1995 and he registered to vote, giving his address as 12625 Wolff ST, BROOMFIELD, Broomfield County, CO. His voter ID number is 601271877. Camerlo, James J was born in 1962 and he registered to vote, giving his address as 12625 Wolff ST, BROOMFIELD, Broomfield County, CO. His voter ID number is 3914410. Camerlo, Jared Ryan was born in 1996 and he registered to vote, giving his address as 1957 Promenade WAY, FORT COLLINS, Larimer County, CO. His voter ID number is 601470995. Camerlo, John William was born in 1950 and he registered to vote, giving his address as 457 S Quay ST, LAKEWOOD, Jefferson County, CO. His voter ID number is 3970672. Camerlo, Joshua James was born in 1993 and he registered to vote, giving his address as 12625 Wolff ST, BROOMFIELD, Broomfield County, CO. His voter ID number is 600626084. Camerlo, Kevin Louis was born in 1964 and he registered to vote, giving his address as 1848 Ash ST, CANON CITY, Fremont County, CO. His voter ID number is 3667462. Camerlo, Kimberly A was born in 1964 and she registered to vote, giving her address as 12625 Wolff ST, BROOMFIELD, Broomfield County, CO. Her voter ID number is 3914411. Camerlo, Lisa Ann was born in 1968 and she registered to vote, giving her address as 2545 Verde DR APT 326, COLO SPRINGS, El Paso County, CO. Her voter ID number is 3676655. Camerlo, Nicholas Garett was born in 1998 and he registered to vote, giving his address as 414 9Th AVE, GREELEY, Weld County, CO. His voter ID number is 601292065. Camerlo, Orlin Louis was born in 1974 and he registered to vote, giving his address as 356 County Rd 4, HOWARD, Fremont County, CO. His voter ID number is 2876840. Camerlo, Summer Louise was born in 1998 and she registered to vote, giving her address as 1615 Cedar Valley LN, COLO SPRINGS, El Paso County, CO. Her voter ID number is 601384726. Camerlo, Thomas Albert was born in 1968 and he registered to vote, giving his address as 414 9Th AVE, GREELEY, Weld County, CO. His voter ID number is 3682332. Camero, Courtney Michele was born in 1988 and she registered to vote, giving her address as 13007 Clayton CT, THORNTON, Adams County, CO. Her voter ID number is 6862596. Camero, Jessica Marie was born in 1982 and she registered to vote, giving her address as 327 El Paso BLVD APT A, MANITOU SPGS, El Paso County, CO. Her voter ID number is 601030529. Camero, Luis Nicolas was born in 1989 and he registered to vote, giving his address as 1250 N Galapago ST APT 806, DENVER, Denver County, CO. His voter ID number is 601644475. Camero, Matthew Edward was born in 1986 and he registered to vote, giving his address as 13007 Clayton CT, THORNTON, Adams County, CO. His voter ID number is 6880007. Camero, Osmin Jose was born in 1979 and he registered to vote, giving his address as 327 El Paso BLVD UNIT A, MANITOU SPGS, El Paso County, CO. His voter ID number is 601251047. Cameron, Aaron Romney was born in 1981 and he registered to vote, giving his address as 4453 Kano DR, FORT COLLINS, Larimer County, CO. His voter ID number is 601353444. Cameron, Adam Dean Jess was born in 1987 and he registered to vote, giving his address as 16034 E Adriatic PL, AURORA, Arapahoe County, CO. His voter ID number is 726325. Cameron, Adam George was born in 1988 and he registered to vote, giving his address as 2278 El Verano CT, GRAND JUNCTION, Mesa County, CO. His voter ID number is 2361324. Cameron, Adam Lucas was born in 1995 and he registered to vote, giving his address as 2133 Brentwood ST, LAKEWOOD, Jefferson County, CO. His voter ID number is 600825056. Cameron, Aidan Oliver was born in 1996 and registered to vote, giving the address as 1112 W Plum ST # 3302, FORT COLLINS, Larimer County, CO. Cameron' voter ID number is 601480653. Cameron, Aimee Rae Ann was born in 1972 and she registered to vote, giving her address as 503 Sage CIR, HIGHLANDS RANCH, Douglas County, CO. Her voter ID number is 5842286. Cameron, Airon Jamar was born in 1985 and he registered to vote, giving his address as 3001 E Locust ST, FORT COLLINS, Larimer County, CO. His voter ID number is 601686251. Cameron, Aleta Lou was born in 1949 and she registered to vote, giving her address as 8388 W 111Th AVE, WESTMINSTER, Jefferson County, CO. Her voter ID number is 4191037. Cameron, Alexander Grant was born in 1971 and he registered to vote, giving his address as 1345 Pine View RD, GOLDEN, Jefferson County, CO. His voter ID number is 4122365. Cameron, Alexander Ross was born in 1985 and he registered to vote, giving his address as 4770 Bighorn RD # B1, VAIL, Eagle County, CO. His voter ID number is 200242298. Cameron, Alexandra Ann was born in 1993 and she registered to vote, giving her address as 1401 W Erb PL, DENVER, Denver County, CO. Her voter ID number is 600665813. Cameron, Alexandra Beth was born in 1998 and she registered to vote, giving her address as 9070 Sky King DR, COLO SPRINGS, El Paso County, CO. Her voter ID number is 601026531. Cameron, Alexandra Friederike was born in 1981 and she registered to vote, giving her address as 3500 Rockmont DR APT 1406, DENVER, Denver County, CO. Her voter ID number is 601556593. Cameron, Alexis Elizabeth was born in 1998 and she registered to vote, giving her address as 801 Englewood PKWY # C101, ENGLEWOOD, Arapahoe County, CO. Her voter ID number is 601348218. Cameron, Alice Irene was born in 1948 and she registered to vote, giving her address as 1320 E Buena Ventura ST, COLO SPRINGS, El Paso County, CO. Her voter ID number is 601306994. Cameron, Alicia Rita was born in 1982 and she registered to vote, giving her address as 883 Durum ST, WINDSOR, Weld County, CO. Her voter ID number is 6410272. Cameron, Alisha Dawn was born in 1978 and she registered to vote, giving her address as 3505 Rinn Valley DR, FREDERICK, Weld County, CO. Her voter ID number is 661612. Cameron, Allisa Kay was born in 1974 and she registered to vote, giving her address as 3565 Windmill DR # N6, FORT COLLINS, Larimer County, CO. Her voter ID number is 2917880. Cameron, Amanda Jade was born in 1987 and she registered to vote, giving her address as 624 Warren Landing, FORT COLLINS, Larimer County, CO. Her voter ID number is 600400498. Cameron, Amanda Kay was born in 1985 and she registered to vote, giving her address as 6182 Willowmore CT, HIGHLANDS RANCH, Douglas County, CO. Her voter ID number is 1500161. Cameron, Amanda Susan was born in 1979 and she registered to vote, giving her address as 7610 Kline DR, ARVADA, Jefferson County, CO. Her voter ID number is 2887450. Cameron, Amber M was born in 1988 and she registered to vote, giving her address as 1271 E 98Th AVE, THORNTON, Adams County, CO. Her voter ID number is 7044974. Cameron, Amber Rose was born in 1982 and she registered to vote, giving her address as 3175 B 1\/2 RD, GRAND JUNCTION, Mesa County, CO. Her voter ID number is 2333182. Cameron, Amy Dawn was born in 1973 and she registered to vote, giving her address as 1360 Knollwood WAY, HIGHLANDS RANCH, Douglas County, CO. Her voter ID number is 865742. Cameron, Amy Kirstin was born in 1972 and she registered to vote, giving her address as 9955 Prominent Peak HTS APT 308, COLO SPRINGS, El Paso County, CO. Her voter ID number is 115161. Cameron, Amy Louise Cox was born in 1966 and she registered to vote, giving her address as 10122 Granite Hill DR, PARKER, Douglas County, CO. Her voter ID number is 5834086. Cameron, Amy Margaret was born in 1984 and she registered to vote, giving her address as 9751 W Fremont PL, LITTLETON, Jefferson County, CO. Her voter ID number is 2783772. Cameron, Andoni Constance was born in 1949 and she registered to vote, giving her address as 42050 County Road 78A, HAYDEN, Routt County, CO. Her voter ID number is 6569733. Cameron, Andrea Jeeyun was born in 1991 and she registered to vote, giving her address as 2617 Front Royal DR, COLO SPRINGS, El Paso County, CO. Her voter ID number is 600313594. Cameron, Andrew Charles was born in 1991 and he registered to vote, giving his address as 3112 Sumac ST, FORT COLLINS, Larimer County, CO. His voter ID number is 601643954. Cameron, Andrew J was born in 1993 and he registered to vote, giving his address as 845 S Dudley ST, LAKEWOOD, Jefferson County, CO. His voter ID number is 200375543. Cameron, Andrew Joseph was born in 1990 and he registered to vote, giving his address as 15357 Wagon Wheel DR, BRIGHTON, Weld County, CO. His voter ID number is 601276615. Cameron, Andrew Min was born in 1985 and he registered to vote, giving his address as 20990 Old Wagon Trail RD, TRINIDAD, Las Animas County, CO. His voter ID number is 5841420. Cameron, Andrew William was born in 1989 and he registered to vote, giving his address as 9850 Zenith Meridian DR # 13-108, ENGLEWOOD, Douglas County, CO. His voter ID number is 601082269. Cameron, Andy L was born in 1943 and he registered to vote, giving his address as 6385 W 46Th AVE, WHEAT RIDGE, Jefferson County, CO. His voter ID number is 4018675. Cameron, Angelina Navarro was born in 1985 and she registered to vote, giving her address as 529 Griffith WAY, COLO SPRINGS, El Paso County, CO. Her voter ID number is 600894589. Cameron, Anita E was born in 1951 and she registered to vote, giving her address as 229 Crawford DR, GOLDEN, Jefferson County, CO. Her voter ID number is 4058015. Cameron, Anita T was born in 1965 and she registered to vote, giving her address as 1004 S Eliot ST, DENVER, Denver County, CO. Her voter ID number is 2379638. Cameron, Annalynn Marie was born in 2000 and she registered to vote, giving her address as 17388 Nature Walk TRL # 207, PARKER, Douglas County, CO. Her voter ID number is 601820270. Cameron, Annkelly was born in 1995 and she registered to vote, giving her address as 3319 Promontory Peak DR, COLO SPRINGS, El Paso County, CO. Her voter ID number is 601498662. Cameron, Ann Margaret was born in 1966 and she registered to vote, giving her address as 2787 Stonewall HTS, COLO SPRINGS, El Paso County, CO. Her voter ID number is 200338658. Cameron, Anthony Aaron was born in 1999 and he registered to vote, giving his address as 6239 Balance CIR, COLO SPRINGS, El Paso County, CO. His voter ID number is 601707477. Cameron, Anthony Joseph was born in 1990 and he registered to vote, giving his address as 4185 Sanders VW APT 205, COLO SPRINGS, El Paso County, CO. His voter ID number is 200028319. Cameron, Anthony M was born in 1939 and he registered to vote, giving his address as 1441 S Danube WAY # UNKNOWN, AURORA, Arapahoe County, CO. His voter ID number is 601709920. Cameron, Ariel Alexandra was born in 1995 and she registered to vote, giving her address as 9797 Quitman WAY, WESTMINSTER, Adams County, CO. Her voter ID number is 601330294. Cameron, Ashley was born in 1987 and she registered to vote, giving her address as 955 Halfmoon DR, CASTLE ROCK, Douglas County, CO. Her voter ID number is 600599275. Cameron, Ashley Pilar was born in 1982 and registered to vote, giving the address as 2905 Beechwood ST, GRAND JUNCTION, Mesa County, CO. Cameron' voter ID number is 601378408. Cameron, Ashley Yeager was born in 1985 and she registered to vote, giving her address as 110 Whistling Horse TRL, DURANGO, La Plata County, CO. Her voter ID number is 600835679. Cameron, Audra Lynne was born in 1970 and she registered to vote, giving her address as 1861 S Clarkson ST, DENVER, Denver County, CO. Her voter ID number is 600029103. Cameron, Barbara Alice was born in 1948 and she registered to vote, giving her address as 7405 Paleo WAY, COLO SPRINGS, El Paso County, CO. Her voter ID number is 601576564. Cameron, Barbara Ann was born in 1961 and she registered to vote, giving her address as 620 Autumn Crest CIR UNIT B, COLO SPRINGS, El Paso County, CO. Her voter ID number is 600302229. Cameron, Barbara Jean was born in 1950 and she registered to vote, giving her address as 26685 Sherwood Forest TRL, KIOWA, Elbert County, CO. Her voter ID number is 584699. Cameron, Barbara Judith was born in 1960 and she registered to vote, giving her address as 26786 Light LN, CONIFER, Jefferson County, CO. Her voter ID number is 4143265. Cameron, Barbara P was born in 1952 and she registered to vote, giving her address as 21 Capestrano DR, WILLIAMSBURG, Fremont County, CO. Her voter ID number is 3641781. Cameron, Beau Guthrie was born in 1995 and he registered to vote, giving his address as 1555 Broadway UNIT 129, BOULDER, Boulder County, CO. His voter ID number is 601547623. Cameron, Benjamin Delong was born in 1983 and he registered to vote, giving his address as 8152 E 49Th PL, DENVER, Denver County, CO. His voter ID number is 601956049. Cameron, Bernard Sharkey was born in 1942 and he registered to vote, giving his address as 2466 Stonecrest DR, FORT COLLINS, Larimer County, CO. His voter ID number is 1599545. Cameron, Betsy Lynn was born in 1967 and she registered to vote, giving her address as 7447 S Biloxi CT, AURORA, Arapahoe County, CO. Her voter ID number is 600279267. Cameron, Beverly Dawn was born in 1955 and she registered to vote, giving her address as 10104 Briargrove WAY, HIGHLANDS RANCH, Douglas County, CO. Her voter ID number is 200287568. Cameron, Beverly J was born in 1934 and she registered to vote, giving her address as 7500 Broadview DR, LAKEWOOD, Jefferson County, CO. Her voter ID number is 3990245. Cameron, Beverly Joan was born in 1940 and she registered to vote, giving her address as 375 Baron CT, ERIE, Weld County, CO. Her voter ID number is 6382277. Cameron, Billy Nolan was born in 1970 and he registered to vote, giving his address as 7447 S Biloxi CT, AURORA, Arapahoe County, CO. His voter ID number is 200352890. Cameron, Brad Lee was born in 1972 and he registered to vote, giving his address as 6589 Kiem RD, EVERGREEN, Jefferson County, CO. His voter ID number is 200309926. Cameron, Bradley William was born in 1955 and he registered to vote, giving his address as 1200 N Humboldt ST APT 1203, DENVER, Denver County, CO. His voter ID number is 2416856. Cameron, Bradly Kyle was born in 1983 and he registered to vote, giving his address as 8379 Hardwood CIR, COLO SPRINGS, El Paso County, CO. His voter ID number is 200067067. Cameron, Brady James was born in 1989 and he registered to vote, giving his address as 220 Catamount LN, BAILEY, Park County, CO. His voter ID number is 200212489. Cameron, Brandi Gail was born in 1974 and she registered to vote, giving her address as 3526 N Cascade AVE LOT H5, COLO SPRINGS, El Paso County, CO. Her voter ID number is 3015745. Cameron, Brandilyn Alison was born in 1994 and she registered to vote, giving her address as 3274 S Evanston ST, AURORA, Arapahoe County, CO. Her voter ID number is 601010949. Cameron, Brandon Jameson was born in 1988 and he registered to vote, giving his address as 21173 E 42Nd AVE, DENVER, Denver County, CO. His voter ID number is 600174538. Cameron, Breanna Kaylene was born in 1994 and she registered to vote, giving her address as 1008 E Rio Grande ST, COLO SPRINGS, El Paso County, CO. Her voter ID number is 601062393. Cameron, Brenda Simon was born in 1951 and she registered to vote, giving her address as 2304 Great Sky RD, COLO SPRINGS, El Paso County, CO. Her voter ID number is 236340. Cameron, Brenda Sue was born in 1959 and she registered to vote, giving her address as 1415 Morrison RD, CANON CITY, Fremont County, CO. Her voter ID number is 3667935. Cameron, Brenna Marie was born in 1991 and she registered to vote, giving her address as 4848 Fenwood DR, HIGHLANDS RANCH, Douglas County, CO. Her voter ID number is 600555230. Cameron, Brent Terry was born in 1968 and he registered to vote, giving his address as 302 W Orman AVE, PUEBLO, Pueblo County, CO. His voter ID number is 3016948. Cameron, Brett David was born in 1986 and he registered to vote, giving his address as 515 N Clarkson ST APT 807, DENVER, Denver County, CO. His voter ID number is 601171152. Cameron, Brian B was born in 1980 and he registered to vote, giving his address as 1017 N Prospect ST, COLO SPRINGS, El Paso County, CO. His voter ID number is 601136431. Cameron, Brian David was born in 1956 and he registered to vote, giving his address as 318 Sagewood DR, LOVELAND, Larimer County, CO. His voter ID number is 7951048. Cameron, Brian Douglas was born in 1959 and he registered to vote, giving his address as 12303 West Spring CIR, ECKERT, Delta County, CO. His voter ID number is 3553409. Cameron, Brian Edward was born in 1964 and he registered to vote, giving his address as 21 Capestrano DR, WILLIAMSBURG, Fremont County, CO. His voter ID number is 3637998. Cameron, Brianna Lynn was born in 1988 and she registered to vote, giving her address as 20700 Hwy 491, LEWIS, Montezuma County, CO. Her voter ID number is 600761783. Cameron, Brianne Marie was born in 1993 and she registered to vote, giving her address as 541 Columbine AVE, GOLDEN, Jefferson County, CO. Her voter ID number is 601245833. Cameron, Brian Scott was born in 1990 and he registered to vote, giving his address as 8313 Scarborough DR, COLO SPRINGS, El Paso County, CO. His voter ID number is 200198805. Cameron, Bridget Lyn was born in 1987 and she registered to vote, giving her address as 16420 W 10Th AVE, GOLDEN, Jefferson County, CO. Her voter ID number is 601272139. Cameron, Brittany Amanda was born in 1985 and she registered to vote, giving her address as 3860 N Tennyson ST APT 106, DENVER, Denver County, CO. Her voter ID number is 600260708. Cameron, Bruce Jay was born in 1943 and he registered to vote, giving his address as 21633 County Road 80, EATON, Weld County, CO. His voter ID number is 6324241. Cameron, Bruce Kelly was born in 1962 and he registered to vote, giving his address as 9150 Princeton ST, HIGHLANDS RANCH, Douglas County, CO. His voter ID number is 5807180. Cameron, Bruce Webb was born in 1946 and he registered to vote, giving his address as 4410 Chimney Rock LN, COLO SPRINGS, El Paso County, CO. His voter ID number is 527621. Cameron, Bryan Lee was born in 1974 and he registered to vote, giving his address as 9070 Hoyt ST, WESTMINSTER, Jefferson County, CO. His voter ID number is 200190228. Cameron, Caitlin Therese was born in 1991 and she registered to vote, giving her address as 4848 Fenwood DR, HIGHLANDS RANCH, Douglas County, CO. Her voter ID number is 600273208. Cameron, Caleb Heath was born in 1966 and he registered to vote, giving his address as 17388 Nature Walk TRL # 207, PARKER, Douglas County, CO. His voter ID number is 600201832. Cameron, Cam Elliot was born in 1985 and he registered to vote, giving his address as 6463 E Long CIR S, CENTENNIAL, Arapahoe County, CO. His voter ID number is 601989534. Cameron, Carol Anne was born in 1943 and she registered to vote, giving her address as 13693 Paradise Villas GRV, COLO SPRINGS, El Paso County, CO. Her voter ID number is 78911. Cameron, Carole L was born in 1936 and she registered to vote, giving her address as 3211 S Fulton CT, DENVER, Denver County, CO. Her voter ID number is 2402694. Cameron, Caroline Chatfield was born in 1995 and she registered to vote, giving her address as 833 E 14Th AVE APT 104, DENVER, Denver County, CO. Her voter ID number is 601665673. Cameron, Caroline Kelly was born in 1990 and she registered to vote, giving her address as 5224 Rim Rock LN # H4, FORT COLLINS, Larimer County, CO. Her voter ID number is 601694152. Cameron, Carol Jane was born in 1951 and she registered to vote, giving her address as 4563 Coyote Run, LITTLETON, Douglas County, CO. Her voter ID number is 5864473. Cameron, Carol Lynn Lady was born in 1944 and she registered to vote, giving her address as 4260 Cripple Creek DR, LOVELAND, Larimer County, CO. Her voter ID number is 1557918. Cameron, Carol Ward was born in 1962 and she registered to vote, giving her address as 2021 East ST, GOLDEN, Jefferson County, CO. Her voter ID number is 4041661. Cameron, Carrie Lynn was born in 1956 and she registered to vote, giving her address as 2090 Altura BLVD UNIT A, AURORA, Adams County, CO. Her voter ID number is 6869632. Cameron, Carri Lynn was born in 1970 and she registered to vote, giving her address as 1956 S Vaughn WAY # 302, AURORA, Arapahoe County, CO. Her voter ID number is 601556345. Cameron, Cassandra Anne was born in 1989 and she registered to vote, giving her address as 115 N Sherman ST APT 3, DENVER, Denver County, CO. Her voter ID number is 600167979. Cameron, Catherine Margaret was born in 1948 and she registered to vote, giving her address as 92 Benthaven PL, BOULDER, Boulder County, CO. Her voter ID number is 7951051. Cameron, Catherine Marie was born in 1969 and she registered to vote, giving her address as 4209 S Lincoln ST, ENGLEWOOD, Arapahoe County, CO. Her voter ID number is 868231. Cameron, Cecil Carl was born in 1973 and he registered to vote, giving his address as 2180 I RD, GRAND JUNCTION, Mesa County, CO. His voter ID number is 2333730. Cameron, Chad Matthew was born in 1968 and he registered to vote, giving his address as 15112 E 118Th AVE, BRIGHTON, Adams County, CO. His voter ID number is 600071512. Cameron, Charles Ronald was born in 1956 and he registered to vote, giving his address as 746 Granite DR, FRUITA, Mesa County, CO. His voter ID number is 2257727. Cameron, Charles Scott was born in 1958 and he registered to vote, giving his address as 10154 Pine Glade DR, COLO SPRINGS, El Paso County, CO. His voter ID number is 212162. Cameron, Charlotte R was born in 1949 and she registered to vote, giving her address as 1701 Locust RD UNIT 2, MONTROSE, Montrose County, CO. Her voter ID number is 5361720. Cameron, Chelsae Michelle was born in 1994"} +{"id":"RedPajamaCommonCrawl.0049","text":"Australian Casino, Gambling And Entertainment News: 2010 Highlights, by Greg Tingle - 25th December 2010 G'day and Merry Christmas, and Happy New Year (if your ahead of us) punters, casino and gambling millionaires, billionaires, entertainment news junkies, sports nuts, insiders, outsiders, politicians, journalists and everyone else. What a year it's been. We've put together a showcase featuring some of the hottest (strangest and most popular) Australian gambling, entertainment and media news stories of the year. What stories were the most important is subjective and certainly debatable, but we sure covered a huge spread of news from down under this year and the Aussies and Yanks have sure been reacting passionately to our call on reader feedback. Media Man and Gambling911 with the good, the bad, the mad, the funny and the most popular Aussie news - the year that was...Ho Ho Ho!... Aussie Millions Champion, Australia Election Odds... Aussie Millions Champion Crowned The 2010 Aussie Millions Main Event has a champion. Tyron Krost is keeping the title in Australia for the second straight year. The 23-year-old battled 746 players over five days to take the title home to Sydney, along with the $2 million AUD first-place prize. James Packer's City Of Dreams Macau Potential Share Buy In By Harrah's Entertainment... Packer-controlled Crown could get an offer for its $US600 million ($675 million) stake in its Macau gambling joint venture, a US-based analyst report says. Mr David Bain, a gambling and gaming analyst with the Southern California arm of the broking firm Sterne Agee, said in a memo to clients that the world's biggest casino operator, Harrah's Entertainment, was \"acutely interested\" in buying the 32 per cent stake in Mr. Packer's Melco Crown Entertainment. Politics - Aussie Election Odds... Australia's political campaigning has began. In the blue corner Tony \"Liberal Lout\" Abbot and in the red corner (seconded by Stephen \"The Blacklist\" Conroy ), it's Kevin \"Bloody\" Rudd. Political pundits predict the federal election will be held after July but before November this year. A regular election can be called between August 7 and April 16 2011. What do the bookies say? Labor is a $1.19 short-priced favourite, with the coalition at $4.40. Centrebet's media chief Neil Evans says there's $150,000 in the pool so far, with 75 per cent for Labor and just 25 per cent for the coalition. \"There was a bit of a rush when Abbott took over but, by and large, it's been pretty strong for Labor for the last 12 months,\" he said. There is no doubt Mr Abbott is a totally different political animal to Mr Turnbull - and a more bruising campaigner. Productivity Report on Australian Gaming... Folks, we won't have to wait much longer for the long awaited report. It gets released this month! Aussie Renee Mate Wins iGB Affiliate Award Renee Mate of Sydney, Australia has won the title of Best Casino Affiliate Manager Renee Mate, Rewards Affiliates. Rewards Affiliates flagship brand is Microgaming powered Captain Cooks Casino. Australia Day Sees Massive Police Numbers At Beaches Following Internet Filter Protests... An unprecedented number of police offers on foot, in \"paddy wagon\" and on horseback (\"mounted police\") were present at many Aussie beaches this past Australia Day. Bondi Beach, Cronulla and Manly says a total of multiple hundreds of police. Strong rumours indicated rioting was expected. Tensions remain high with a number of racial hate attacks in the headlines along with Aussies protesting the upcoming Australia Blacklist aka as \"The Great Australian Firewall\". Over 1000 websites including 3 in the Media Man stable participated in the online Great Australian Internet Blackout. UFC Australia Sports Betting Interest Red Hot... The Ultimate Fighting Championship is to finally hold an event in Australia this month on the 21st February. The fights will be held at Sydney's Acer Arena. All 16,500 tickets sold out on the first day of sale, technically within 10 minutes! Other than the obvious fights (in the cage) another battle is brewing... the battle for the sports betting dollar on the upcoming UFC Australia fights. The smart money says BetUS.com and PartyBets are in the running, with another 1 or 2 sports betting firms expected to join the fight. Australia surges into the top 10 of global gambling... With one poker machine for every 110 people, Australia is now in the top 10 international gambling centres, alongside Monaco and Macau. Australia also has the ninth-highest number of gaming machines: 186,344 lined up in pubs, clubs and hotels, according to industry figures. Betfair Gets Major Worldwide Publicity Via Australian Open Tennis... As if the brand wasn't strong enough already, recent controversy over Betfair's sponsorship of the Australian Open tennis tournament, along with an investigation into a number of matches tipped to have been fixed, has seen Betfair get major national and international news media coverage. Make no mistake, Betfair now is the major sports betting brand in Australia, at least as far as exposure goes, if they weren't already. Ok, maybe not including the TAB that has a decade head start, via the Australian government's TAB on the horse racing and the doggies, but you get the point. Betfair is bringing the fight to the TAB, and may even throw their hat in the right for the UFC sports betting dollar we're told. PartyPoker \/ PartyGaming VS PokerStars VS Pacific Poker battle for punters and sponsored players... PartyGaming continue to ramp up their poker and casino offerings in the Asia Pacific, with Australia being target #1. PartyPoker is almost 6 months into their sponsorship agreement with Aussie Millions 2009 winner Stewart Scott. Last week Party signed Aussie Tony G for their Noble Poker brand for starters, and now Party are rumored to be in serious closed door negotiations with 2010 Aussie Millions winner Tyron Krost (who learned to play online poker with Party), along with fellow Aussie and PartyPoker trained, Frederik Jensen. PokerStars face and 2005 WSOP champion Joe Hachem is said to be keen to see PokerStars secure addition sponsored players for the Australian market, and in the meantime Pacific Poker's Shane Warne and Jeff Fenech appear to have lost a lot of shine and exposure of their once dominant presence in the Australian poker landscape. Our picks... PartyGaming's PartyPoker on top, trailed by PokerStars, with Pacific in 3rd place. iGB Down Under Earmarked For Sydney In March... The iGB Down Under igaming conference is pencilled in to occur in Sydney this March. The event formally known as CAP Down Under, saw close to 500 people attend last year, obviously enough to see event organiser Alex Pratt give the all clear to come back down under for seconds. The rumour mill says sponsorship enquires have been strong with the likes of Party, Betfair and PokerStars all looking to secure major billing. Casino Canberra In Nation's Capital Not Happy... Casino Canberra in the nations capital is being denied entry to the gaming sector as the ACT Labor Government's Labor Clubs grabbed the majority of the almost $100 million profit made by pokies in the ACT last financial year. The situation is leading to claims of a conflict of interest since Labor club poker machines made $14.21 million profit in 2008-09, just one-seventh of the $98.6 million profit made by all pokies in the ACT over the 12 months. 'Casino Jack' Has Aussie Politicians Buzzing (and worried)... Cannes Film Festival standout documentary 'Casino Jack And The United States Of Money' has a number of Australian Labor Party folks worried, to say the last. The ALP has a long and colourful history of deals with Australian \/ Asia Pacific gambling and gaming entities. Australia's political parties have received substantial donations from the Aussie gaming industry over the years and major Australian news media outlets have questioned the relationship more than once. This is one to watch. The official 'Casino Jack' website ishttp:\/\/www.takepart.com\/casinojack (don't type CasinoJack.com, as it will take you to a porn site!) Australian Horse Racing Industry To Get Major Overhaul... Leading Australian racing figures and business leaders agree that the Australian horse racing industry is in dire need of a major fix (no, not that kind of fix). Leading the charge are John Singleton, Gerry Harvey and Alan Jones. A number of get togethers have occurred to talk shop, with firms entities such as Betfair, TAB and Racing NSW all seen to play a major role in the revamp. The AJC (Australian Jockey Club) is concerned about what the changes may mean to them as they have been struggling in recent years, as the gamblers dollars continues to been engulfed by internet betting, something that the AJC has not incorporated well into their business model, as that's putting it likely. Some parallels can be drawn towards that way most Las Vegas casinos did not, and still haven't, adapted to the animal that is the internet. Media Man Global Expansion Continues... Not content with last months launch of www.mediamanaustralia.com to coincide with The Great Australian Internet Blackout week, Media Man starts this month with the launch of http:\/\/www.americangamingnews.com in preparation for expected major happenings in the U.S market this year, much of which will be driven a mix of political campaigns, the PPA (Poker Players Alliance), with no doubt Harrah's Entertainment, World Series of Poker and PartyGaming's World Poker Tour in the thick of the action. Underbelly Cops a Beating at Crown Casino Logies... Australia's night of nights, The Logies, took centre stage last night at James Packer owned Crown Casino, down under in Melbourne, Australia. Ever wondered if the Logies were \"rigged\"? We didn't, but know it crossed the mind of some, given the strong history between Crown Casino owner, Packer, Network Nine and ACP Magazines (publisher of TV Week). This weekend should have answered that question without a doubt. Beloved 'Underbelly', Network Nine darling and dear friend to the Gambling911 copped an absolute flogging, failing to win a single award... that's right a donut (0). Belly up you might say, but the show returns to TV next Sunday night, expected to once again draw in huge audience numbers. Underbelly had five nominations across the popular and outstanding categories and was expected to dominate! Ray Meagher picked up the Gold Logie. The veteran Home And Away actor triumphed over Packed To The Rafters actress Rebecca Gibney to take the coveted award. He also beat his Home And Away co-star Esther Anderson, Talkin' 'Bout Your Generation's Shaun Micallef, Good News Week's Paul McDermott, Rove McManus and the ABC's Wil Anderson and Adam Hills. \"In 1965 at the Regatta Hotel in Brisbane I won a chook raffle,\" a beaming Meagher said as he took to the stage. \"It's been a long time between drinks\". Host Bert Newton could not hide his feelings about Meagher's big win. \"I have had the opportunity over the years to present many Gold Logies,\" he said. \"None have given me more joy than to present this to Ray Meagher.\" Bert's son Matthew (Mr Asia in Underbelly: A Tale Of Two Cities) is currently in rehab. 'Underbelly' star Firass Diriani (plays John Ibrahim) was in attendance, and was very well behaved we understand. Dirani recently picked up that Cleo 'Bachelor Of The Year' award. Sigrid Thornton who plays a hardened federal officer in Underbelly: The Golden Mile was also in attendance and also enjoy the gala evening incident free. Nine Network won only one Logie for the NRL Footy Show. \"Well Channel Nine is certainly cleaning up this year, aren't they?\", joked host Bert Newton. Bragging rights of the corporate variety remain in full swing...Packer's Crown Casino certainly won its \"casino war\" last night against Sydney's Tabcorp owned Star City Casino, but Star City is planning a counter attack, so don't change your dial! Media Man spies advise no plastic handcuffs were needed last night for footballers, cricketers, or any other guests. Loyal readers, we're sorry that 'Underbelly' with its strong gambling themes and all got shot down, at Crown Casino to add salt into the wound. None the less, here's the winners list to help ease the pain... 2010 LOGIE AWARD WINNERS GOLD LOGIE - Ray Meagher, Home and Away (Seven) SILVER LOGIE (Popular Awards) Most Popular Actor - Hugh Sheridan, Packed to the Rafters (Seven) Most Popular Actress - Rebecca Gibney, Packed to the Rafters (Seven) Most Popular Drama - Packed to the Rafters (Seven) Most Popular Presenter - Shaun Micallef, Talkin' 'Bout Your Generation (Ten) Most Popular Reality Program - MasterChef Australia (Ten) Most Popular Lifestyle Program - Better Homes and Gardens (Seven) Most Popular Light Entertainment - Talkin' 'Bout Your Generation (Ten) Most Popular Sports Program - The Footy Show NRL (Nine) Most Popular Factual Program - Bondi Rescue (Ten) Most Popular New Male Talent - Luke Mitchell, Home and Away (Seven) Most Popular New Female Talent - Carrie Bickmore, The 7pm Project (Ten) SILVER LOGIE (Outstanding Awards) Outstanding Children's Program - My Place (ABC) Outstanding Factual Program - Law and Disorder (SBS) Graham Kennedy Award for Outstanding New Talent - Matt Preston, MasterChef Australia (Ten) Outstanding News Coverage - Victorian Bushfires (Seven) Outstanding Public Affairs Report - Code of Silence, Four Corners (ABC) Outstanding Sports Coverage - V8 Supercars: Supercheap Auto Bathurst (Seven) Outstanding Light Entertainment - Talkin' 'Bout Your Generation (Ten) Outstanding Drama Series, Mini-series or Telemovie - East West 101 (SBS) Outstanding Actress - Claudia Karvan, Saved (SBS) Outstanding Actor - Don Hany, East West 101 (SBS) Network Shows By The Numbers Seven Network - 8 awards Network Ten - 7 awards ABC - 2 awards Nine Network - 1 award Which shows did best? Talkin' 'Bout Your Generation - 3 awards Packed to the Rafters - 3 awards East West 101 - 2 awards MasterChef - 2 awards Home and Away - 2 awards Underbelly fans, you can play catch up with 'Underbelly' on the official website. Billionaire Inc Connection... James Packer's Burswood Casino aka Burswood Entertainment Complex, based in Perth, Western Australia, is on a roll. Poker and online poker continue to do massive numbers, and Crown Limited (Crown Casino and Burswood Casino etc al), PartyGaming's PartyPoker, Media Man and Gambling911 are in the thick of the action. Must be magic that Packer and Perth mining magnate, Andrew \"Twiggy\" Forrest are weaving. \"Twiggy\" have brought his infectious can-do attitude, work ethic and Aussie humour in spades to Sydney. Yep, the Billionaire, understood to now be Australia's Richest Man, still has the common touch. Packer and Forrest were in Sydney last night, at the Overseas Passenger Terminal, joined by 500 power players in the Australian business, political and entertainment arena to officially welcome in GenerationOne. For the record, Media Man had to report from the sidelines as the event was jam packed, but did have the pleasure to speaking to some execs very close to the powers that be...and they were pleased to hear of our assistance to groups such as Githabul people, Yuggera tribe, Deadly Awards, Friends of Malabar Headland and Virgin Unite, and mentioning that we owned shares in Crown Casino didn't seem to hurt the cause! Movie stars Cate Blanchett and Russell Crowe attended last night, where movers and shakers exchanged ideas (plus gossip) and saw their palms projected onto the sails of the Opera House in a show of support. Us Aussies are likely giving the Las Vegas Strip and Atlantic City a few free ideas! The story that Media Man and Gambling911 collaborated on and broke worldwide, has dominated Google and Google News for the past 24 hours or so, and shows no sign on slowing down for the weekend... a favorite time for punters, both in Australia and around the globe. The GenerationOne movement has also triggered us to open up negotiations with the state and federal government to see how we here at Media Man may qualify to take on a couple of suitable indigenous peoples as contract staff to assist our business endeavors... could be for photography, video, graphic arts or internet portal development. Newspaper Industry Looks to Online Gambling to Boost Profits... Mainstream newspapers in Australia and the United States are starting to plug into the streets paved with gold - online gambling, following the lead from our United Kingdom based media mates. Media Man and Gambling911 probe the situation in an Aussie - Yankee double investigation, with earlier indicators showing that newspapers are seeing the \"green\", following the money trail to gambling, be it in AUD, USD, GBP or monetary other denominations. New York based media baron Mort Zuckerman, top brass at The New York Daily News, US News and World Report, last year publicly advised that online b2b and advertising deals in the gambling - gaming sector could be a way for mainstream newspapers to loose their sinking feeling - diminished revues, and in extreme cases, some newspapers going out of business, unable to compete with their online counterparts. Zuckerman was largely referring to sports betting (which can also include a sub group in what's commonly known as \"Fantasy Betting\"). Let's face it, Media Man and Gambling911 don't have the overheads of The Sydney Morning Herald (Fairfax Media), The Daily Telegraphy (News Limited), The Sun or The New York Times for that matter. Let's take a look at the landscape of the land... Google - a few years ago headlines like \"Google follows the money trail to gambling' were the order of the day, however the business model is getting more complex, as Google deals with both technical and legal considerations. Though Google CEO Eric Schmidt and seemingly everyone else is telling publishers they should place some bets on potential new business models, The Philadelphia Inquirer venture may not be exactly what they had in mind. Google is also working on some gaming and igaming models for its YouTube platform and top ten website, so maybe Google is working a deal with The Philly behind the scenes. Stranger things have happened. Philly.com, the online arm of the Inquirer and \"sister\" newspaper the Philadelphia Daily News, has recently launched an apparently legal online betting service called Instant Fantasy Games. The firm advised last week that they are the first in their industry to make a foray into online betting, according to a report in Editor & Publisher, a newspaper trade journal. Gambling 911 and Media Man thinks this may be correct for the U.S sector, but certainly not taking into account the U.K newspaper industry, who appear to be light years ahead, with bingo, poker, sports, fantasy and more. \"We're trying to serve two goals,\" said Yoni Greenbaum, VP of Product Development at Philly.com. \"Those are content differentiation and revenue. If you're looking at the sports sites out there, a lot of them have the same stuff...The challenge that this creates is we need to offer more. In this day and age, sports fans have insatiable appetites.\" FanDuel, a British wagering company helped Philly.com launch Instant Fantasy. Part fantasy league and part sports book, the service enables bettors to pick groups of players from professional baseball, hockey, or basketball leagues. It operates much like the fantasy leagues from Yahoo.com, CBSSports.com (parent company of CNET), and ESPN--except those games are just for fun. With Instant Fantasy, players pay $5 to $50 a game with the chance to win as much as $90, Greenbaum said. It's one-on-one, and players can compete with a friend or family member. If they don't have anyone they want to play against, the game's system will match them up with someone five minutes before competition begins. Games are held daily. Internet gambling is current illegal in the United States (depending who you want to believe as opinions vary, even from legal eagles) but in 2006, the government made some exceptions involving fantasy sports leagues, Editor & Publisher reported. Last Sunday evening, Google's Schmidt addressed a group of newspaper execs in Washington D.C. at the American Society of News Editors. \"We have a business model problem,\" Schmidt told the crowd. \"We don't have a news problem.\" Schmidt said newspapers are \"fundamental\" to democracy and predicted they would find a new business model based on advertising and subscription revenue. Maybe he should have included creating a sports book. Our friend Mort seems to share a few similar thoughts on the newspaper - gambling model as Schmidt. Zuckerman goes on record with \"There is something that can be done, and the federal government ought to do it: allow sports betting on newspaper Websites. That would save every newspaper in America. The New York Times.com could do it. Plenty of British papers do this; for them it's a crucial part of their net revenue stream. I know a major newspaper in London that makes $15 million a year from sports betting alone\". New Limited newspapers (hard copy and online) continue to ramp up with both advertising a range of sports betting brands, in the past 2 months pushing their own in-house brands which look to be white label and things are strongly featured next to online sports news and on the world famous Fox Sports (Australian version) website. 'Fantasy NRL' looks to be their prime white label brand and they are also accepting a number of online sports betting adds, with Packer 50% share Betfair featuring prominently. Packer is also a huge fan of Premier Media Group, which has also has an investment in as we understand. Fairfax Media (inc The Sydney Morning Herald and The Age) newspapers websites, along with their online only sites including Brisbane Times and WA Today. 'Pro Tipping' by all accounts is the Fairfax Media white label sports betting branding. Media Man remains independent, despite having grown to over 20 website portals. The group has previously declined offers to by all or part of the company, still riding a wave of growth. The company is considering \"white label\" deals, but has enjoyed excellent results \"teaming up\" with a handful of the world's leading igaming brands, mixed in with some traditional and new media publicity campaigns, so has stuck to the a global based business model that is working well on a marketing, branding, legal, financial and overall basis. Media Man sees Google, PartyGaming, Betfair, Crown Limited, Virgin (and maybe Tabcorp and NextGen Gaming) being a big part of its further development in the gaming and igaming sector, with Crown and Tabcorp moving forward casino travel and tourism ventures. Media Man remains in close liaison with GenerationOne, the Indigenous Australian employment initiative championed by Andrew \"Twiggy\" Forrest and James Packer, as to how to best collaborate, grow the business, and employ a few more hard working Australians in the progress. The business model of newspapers (and other media companies) has changed... it had to, just to see its survival, with owners and editors even advising their journalists that they are to adapt their style for the internet, and some who failed to change have indeed lost their jobs. Some high up in the Murdoch and Fairfax Media empires even refer to their journalists and \"content writers\" or \"content producers\"... so much for the good old days when Clark Kent \"Superman\" types paved the pavements in search of a good story! The bottom line is what counts to owners, bean counters and investors, and while media purists have a case to be \"Not Happy Jan\", it is part of the evolution of media, for better of worse. One of the main dangers to the credibility of print newspapers is when too much focus is given to the bottom line and advertisers, and not enough on hard nosed journalism. For these reasons and more Gambling911 readers can be assured that more hard nosed articles are on the way, sourced from the worldwide \"freelance\" contacts and relationships formed over many years. Freelance and independent generally means less PR spin jobs (as often found in some mainstream press) and a more gutsy, in your face style... the sort of stuff that sometimes sees legal eagles writing in trying to save face for their clients! (when the truth gets out). Media Man recently dealt with a couple of these sorts of scenarios, hard news being the catalyst, so we knew were were doing a great job. We foresee a continuation of mainstream media companies plugging into the gaming and igaming sector, just at PartyGaming top brass Jim Ryan has rightly predicted would happen almost 2 years ago... that's why Ryan takes home (and secures for Party) the big bucks... the man is a visionary. Ryan has also smartly got in place a number of strategic alliances and purchased solid businesses such as the World Poker Tour. The combination of these things has made PartyGaming very appealing to Government departments, be it in France (hello our friends at PMU), Canada (poker tour on the radar) and Australia. The Party deals with Marvel Entertainment and Paramount Pictures also continue to serve the company, partners and affiliates well. Strong branding and even stronger financials, see PartyGaming stand head and shoulders about the rest in the igaming sector on a global scale. Virgin (Games) has the potential to be a real challenge to PartyGaming, in our opinion, as Richard Branson and his group have developed such a strong a loyal Virgin following over the years. When Virgin expand into new markets they automatically pick up new customers who were waiting for them. Virgin thinks this may be the case with their AWOMO (A World Of My Own) platform, a deal they have with Game Domain International, however Virgin is seeking more investors before taking the project ballistic and entering new markets. Rupert Murdoch's Sky (Vegas and family) is strong in the UK but is hardly on the radar in Australia (or anywhere else) from what we can make out. Sega and Sony have the potential to be major top ten players in the igaming space, but as of this writing, PartyGaming is our top pick, on a global scale, with Betfair sitting pretty for strong growth down under in Australia. Readers may recall that earlier in the week that Australia media entrepreneur and and racing horse owner, Alan Jones, spoke at the Asian Racing Conference in Sydney. Jones called for united, as his certainly smart enough to see the potential threat from overseas based companies \"invading\" Australia, and doing it better. Australia's TAB isn't exactly known for having world class efficiencies, however they had previously enjoyed an almost monopoly and stranglehold in the Australian sector, however its no longer the case. TAB legal eagles are going to remain busy in the months ahead and Betfair is well prepared for a lengthy and expensive war, Betfair pink pigeon birdies have told us. For dynamic media - new media enterprises such as Gambling911 and Media Man, the future continues to look bright. Low staff overheads, quick turnaround on articles, and business relationships in place with some of the world's top gaming, igaming, poker and sports betting brands. Just as important, the websites are Google and Google News friendly, and they don't discriminate against Yahoo! or Bing either, as well as being referenced in \"bible\" and top ten sites like Wikipedia. Social media brands such as YouTube, Facebook and Twitter continue to be a benefit to the agile business models, and mobile \/ WAP looks to be a logic area to develop in the months ahead... can't wait for that Google mobile phone, that looks likely to take a huge bite out of Apple. Google is clearly the internet giant in the prime position to best capitalise on the growth of the gaming and gambling sector, at least by Media Man estimations (sorry Richard Branson, Yahoo and Wikipedia). If good business is about adapting to the times and spreading risk, we think a number of American newspapers like The Philly and Aussie titles such as The Tele and The Herald, are doing a mighty find job... we're pretty happy with our own efforts also. Wild cards that may potentially develop a significant gaming business down under include Network Nine Australia (perhaps with a Hey Hey It's Saturday 'Pluka Duck' tie in along with the possibility of a rumored 'Underbelly' online and offline slot machine offering which punters are crying out for). The late Big Tim Bristow and George Freeman would have loved to see what's come of the igaming and gambling business now, we're certain. The Rise and Fall of Daniel Tzvetkoff... Greg Tingle of Gambling911.com breaks down online gambling payment processor Daniel Tzvetkoff's meteoric rise and fall as outlined by the Australian. Tzvetkoff was arrested in Las Vegas this past week while attending a payment processing conference. Online gambling websites allege the Intabill founder scammed them out of millions of dollars after he shut his firm down without notice. AUGUST 2001: BT Projects founded FEBRUARY 2007: Online payment company Intabill registered MARCH 2008: Tzvetkoff buys Hedges Avenue mansion for $28 million. Has additional property portfolio of more than $21 million AUGUST 2008: Features on Sunday Mail Rich List worth $82 million MARCH 2009: Buys V8 supercar team, Inta Racing APRIL 2009: Sacks 96 staff at his Intabill office JULY 2009: BT Projects placed in liquidation with debts of $80 million JULY 2009: Business partner Sam Sciacca sues Tzvetkoff for $100 million JULY 2009: Online poker house Kolyma sues for $52 million JULY 2009: Sells partnership in Zuri nightclub AUGUST 2009: Sells 30m superyacht Maximus NOVEMBER 2009: Hedges Ave mansion sold for $17 million JANUARY 2010: Files for bankruptcy APRIL 2010: Charged by US authorities with money laundering. Faces 75 years in jail Underbelly in 3D: Crime Show Looks to Take Things Up a Notch... Underbelly is still super popular with national audiences, advertisers - sponsors and Gambling911 readers, despite getting killed (donut award - nil) at the Logies held at James Packer's Crown Casino last night. Media Man and Gambling911 dig for dirt, er, information, as we go undercover and get embedded into Australia's 'Underbelly' landscape. Such is the confidence show by 'Underbelly' producers and powers that be bean counters, they are to expand into 3D. Mind you, going 3D is apparently easier said than done, with experts pointing to major challenges (tech and financial), as experienced with the James Bond and Iron-Man franchises. Iron-Man already has a happy ending as far as return on investment goes, but Bond has ended up on the scrap heap due to cash flow, if you believe the news media reports. Nine Network Australia has ambitious plans to film the next 'Underbelly' series in 3D, hoping that it will help keep positive buzz, audiences and the bottom line looking good. Underbelly has already been heralded as one of the great Australian TV success stories, as far as drawing people in, fostering talent, getting top dollars from advertisers and catapulting Aussie's up on the international radar. \"It's helped employ 100s of Australians, if you count in the flow on factors\", said a Media Man insider. The tech revolution brought on by James Cameron's Avatar is already hitting the lounge room thanks in part to the launch of 3D TV sets! Network Nine boss David Gyngell (currently out of the country but in touch with casino king James Packer) says he is blown away by the potential. \"It's an amazing experience. Next year we can go out and shoot Underbelly in 3D,\" he told News Limited in \"Sin City\" (Sydney). Gyng's positive energy, vision and deep pockets, sees Nine say they will carry Rugby League's 'State of Origin' clash in 3D on 26th May. It's forecast to cost the network $10 million to broadcast, and nine will be flying over tech from the United States to make it happen. Underbelly continues to drive forward the crime genre, and not just on TV. Wires are reporting that at least 3 Australian crime shows are due to be released over the next 12 months, quite likely soon, such is the current appetite of Australian audiences. Media Man visited Sydney's 'Sin City' Expo at the Justice & Police Museum this past weekend and it was totally packed. Audio visual highlights dominated, with punters been able to view rare documentary and film footage on Sydney's underworld history and there was plenty of gaming and gambling themes and info to be seen including Sydney's famous 33 Club. Some old coin operated slot machines were only on display that you could even pull the handle on. One of the highlights was an unidentified man who kept complaining to our crew that the media was to blame for all the crime, violence and gambling on TV. Media Man pointed out that gambling and crime have been in the movies for a long time. When asked what his interest was in the expo the mystery man refused to answer the question, and left in a huff. The Media Man crew also shot footage from the expo, some of contains rare and unique Australian casino and gambling content which is likely to hit YouTube within a week. The rumor mill says that now not only are talks going on about an 'Underbelly' online and offline slot game, but also a board game. Loads of fun for the whole family... not sure, but it may depend on the type of family. Classification guidelines are being considered, as Australia looks to overhaul its gaming industry laws following the long awaited Productivity Commission report. Australia was settled by convicts, many of whom enjoyed a punt n wager, depending upon what set of history books you tend to believe. One things for sure... Underbelly has helped put Australia's long history with gambling and the underworld on the map, and the buzz doesn't look like its doing to die anytime soon. FIFA World Cup Attacked By Ambush Marketing... FIFA's World Cup was \"attacked\" by an alleged swarm of brazen ambush marketers, adding to the annoyance of those infamous vuvuzelas. Yep, not even the World Cup is safe from what some sports folks, media giants and official sponsors have called \"parasites\" aka \"parasite marketing\". Media Man and Gambling911 go undercover with this special report, and learn that a stunt not unlike the World Cup ambush is on the cards for Sydney, Australia...a gamble that the powers that be are prepared to make, with or without buxom beer babes, casino babes or poker babes... Babes, Beer, Miniskirts, High Stakes and an Ambush Marketing attack on FIFA! Have we got your attention punters? Yep, that's what we thought. As part of the scandal hatched by ambushing of a World Cup match, a British - Pom TV commentator has been \"boned\" (thanks Eddie McGuire) ... sacked after he was discovered to have passed on tickets, which were allegedly \"used and abused\" by a group of red hot sexy young women, mainly blonde's, as part of a strategic ambush marketing attack. We think maybe they have been reading up on Media Man's \"partner in crime\" Kym Illman, founder of Messages On Hold, arguable the world's most successful (and notorious) \"ambushers\". At last count our mate Illman claims to attracted about 2 million dollars worse of free exposure via way of his ambushers, but the world cup team have given Illman a run for his money in a 1 Hit Wonder, unlike Illman's dozens executed over the years. TV hound Robbie Earle lost his gig with ITV, but got short term massive fame in the process, after the network advised a substantial number of tickets allocated to him for the Netherlands-Denmark game were used and abused by beer outfit Bavaria Beer. The world famous Budweiser (official sponsor), is the only beer company permitted to advertise (note the word \"advertise\") within the stadium grounds at the World Cup. FIFA protects its marketing interests in a lion like aggressive fashion, which are a serious money spinner for the organisation. Speaking of money, check out Illman's 'Money Girl', dressed in nothing but $20 and $50 bills Kill Illman and Money Girl http:\/\/www.mediamanint.com\/profiles\/illman.html http:\/\/www.mediamanint.com\/profiles\/messages_on.html Markson Sparks! - Show Me The Money! http:\/\/www.mediamanint.com\/profiles\/markson.html Media Man Ambush Collaboration With Maxx G And Aquasun At Bondi Beach http:\/\/www.mediamanint.com\/profiles\/aquasun.html FIFA Legal Eagles Take Aim!... FIFA lawyers are probing the women er... situation ...wear about 36 buxom babes, mainly blondes we rated 9s and 10s, wore orange miniskirts. Oh My God!!! The Crime. \"We will be consulting our lawyers to check if such action falls under ambush marketing,\" FIFA spokesman Nicolas Maingot told press. Research conducted is showing about 40 tickets allocated to former TV man Earle found their way into the hot hands of the marketing co understood to have supremely orchestrated the ambush marketing effort on behalf of the beer brand Bavaria via a third party, thus generated international news media coverage. Pommie newspaper reported, backed by wires, and Media Man spies, back up the history of events. Not content with just reporting on the story, Media Man International, the Asia Pacific arm, is said to be planning an ambush marketing stunt in Sydney some time soon...a birdie Tweeked. Recently Media Man did a Tweet reply to Australian Shane Warne, poker and cricket player, and yet another business mate of Illman's. Warne is also understood to be good mates with Aussie - Asia Pacific casino and lifestyle king, James Packer. Illman also shares a number of mutual business mates and associates with Media Man, including Max Markson (Markson Sparks!), who formed part of the Media Man - Messages On Hold - Warne - Bessie Bardot ambush marketing stunts over the years. Illman is so skilled in ambush marketing, he go one up on Virgin's Richard Branson at an Aussie airport a number of years ago, a accomplishment Illman still rates highly. Years later Media Man \"ambushed\" both Branson and Markson, but in friendly and mutually beneficial ways. Basically, no product placement, but the photos were used to considerable advantage and exposure on websites and some newspaper stories. A Media Man spokesperson said \"Ambush marketing is still one of the best ways for a brand or even a person, to stand out from the pack and get noticed. Australia's Kim Illman is considered the worldwide leader. Brands and persons can attract huge exposure from stunts... photos and visuals, when executed correctly. Usually the money flows on after a successful stunt. On occasion a stunt can be mutually attractive, like a book promo for Markson's 'Show Me The Money'. Earle, quite the sports nut and a former Wimbledon and Jamaica midfielder, has denied doing anything wrong, saying he was just naive. \"Call me naive but I didn't think I was doing anything wrong. I hope when people hear the full story they will see me in a different light.\" Mate, choose your words carefully. An Aussie sports identify used a word related to \"Native\" recently, \"Cannibals\", and its landed him in all sorts of hot water. The hot and sexy soccer babes aka buxom and leggy beer babes, were detained for a number of hours and probed after they were spotted in the stands at Soccer City stadium. The dresses were originally sold with Bavaria Beer packs in the Netherlands in the run-up to the World Cup, to the best of our knowledge. We enjoyed the blondes nether regions... their legs, just to clarify. \"We were sitting near the front, making a lot of noise, and the cameras kept focusing on us,\" babe Barbara Kastein told a South African broadsheet ala rag. \"In the second half, about 40 stewards surrounded us and forced us to leave the stadium,\" she complained. They were escorted (no pun intended) to a FIFA back office where police probed them about their sexy dresses and asked if they worked for Bavaria Beer. Some 3 hours later, the babes were released and back on the prowl, kittens and 1 or 2 cougar's, and police said they would continue investigating, The Star reported. For the record, milk and honey, nor cookies, were not offered to the litter. The Dutch embassy in Pretoria in the past 24 hours (Eastern Standard Cougar Town Time) \"made inquiries this morning with South African authorities about the grounds on which our citizens were held\", foreign ministry spokesman Mr Aad Meijer proclaimed in The Hague. Three of the women were Dutch, he mouthed, also stating that no explanation had been forthcoming by Tuesday afternoon. \"We are not aware of any South African legislation that allows people to be detained for wearing an orange dress.\" FIFA said the women were \"used by a large Dutch brewery as an instrument for an ambush marketing campaign\", (but smartly for what is understood to mainly legal reasons, the dresses had no branding on them). Media Man understands that planners realised that they wouldn't need massive 'Messages On Hold' type branding for the stunt to be a worldwide success, such was the positioning of the brand and the existing market awareness, especially in relation to colours associated with beers in the region. Punters make not mistake, their is an art of sorts in executing successful ambush marketing stunts. Ambush Marketing Definition; Public Thank You To Jimmy Wales At Wikipedia... Ambush marketing is a marketing campaign that takes place around an event but does not involve payment of a sponsorship fee to the event. For most events of any significance, one brand will pay to become the exclusive and official sponsor of the event in a particular category or categories, and this exclusivity creates a problem for one or more other brands. Those other brands then find ways to promote themselves in connection with the same event, without paying the sponsorship fee and without breaking any laws. Ambush Marketing Notable Events 1984 Olympics; Kodak sponsors TV broadcasts of the Games as well as the US track team despite Fujifilm being the official sponsor. 1988 Summer Olympics; Fujifilm sponsors the Games despite Kodak being the official sponsor. 1992 Summer Olympics in Barcelona; Nike sponsors press conferences with the US basketball team despite Reebok being the official sponsor. During ceremonies, the players covered their Reebok logos. 1994 Winter Olympics; American Express sponsors the Games despite Visa being the official sponsor. 1996 Atlanta Olympics; sprinter Linford Christie wore contact lenses embossed with the Puma logo at the press conference preceding the 100 metres final, despite Reebok being the official sponsor. 1996 Atlanta Olympics; Messages On Hold strategically placed a banner within the camera frame as US runner Jon Drummond prepares for the opening leg of 4x100 relay final. The moment is broadcast live across the world. 1996 Cricket World Cup; Pepsi ran a series of advertisements titled \"nothing official about it\" targeting the official sponsor Coca Cola. 1998 FIFA World Cup; Nike sponsored a number of teams competing in the Cup despite Adidas being the official sponsor. 2000 Sydney Olympics; Qantas Airlines' slogan \"The Spirit of Australia\" sounds strikingly similar to the Games' slogan \"Share the Spirit.\" despite Ansett Air being the official sponsor. 2003 Cricket World Cup; Indian players threatened to strike over concerns that the anti-ambush marketing rules were too strict. Of particular concern was the length of time before and after the cup that players were not allowed to endorse a rival to one of the official sponsors. Players argued that if they had pre-existing contracts that they would be in breach of them if they were to accept the ICC's rules. 2006 FIFA World Cup; fans of the Netherlands were made to remove Bavaria Brewery's leeuwenhosen because Budweiser was the official beer sponsor. 2008 Beijing Olympics; entire countries were tuned into the Opening Ceremonies, and worldwide, millions more saw former Olympic gymnast Li Ning light the torch and learned that he owns a shoe company with the same name, a direct rival of Adidas and quite famous in China, but not an official Olympic sponsor. 2010 Super Bowl XLIV; Canadian gay dating site ManCrunch was accused of ambush marketing when it submitted a controversial advertisement to CBS for air during the game. The theory is that ManCrunch produced the ad knowing that it would never be accepted and hoped the controversy would drum up the intended attention without having to pay the nearly US$3,000,000 price for an advertisement during the game. 2010 Winter Olympics; Team USA ice hockey goaltender Ryan Miller was ordered to remove the catchphrase \"Miller Time\" from his helmet under the IOC's ambush marketing rules, due to it also being the slogan of Miller Lite beer (though Miller Lite did not pay for the slogan). Likewise, the U.S. bobsled team was forced to remove their catchphrase, \"Night Train,\" due to it being the name of a low-end fortified wine (again, the usage of the phrase was coincidental). 2010 FIFA World Cup; A South African budget airline pulled back its ambush ad after a FIFA complaint that it infringed its trademark during the 2010 World Cup. Kulula.com's ad described the firm as the \"Unofficial National Carrier of the You-Know-What\". It also had pictures of stadiums, vuvuzelas and national flags. But FIFA said the airline could not use the symbols - even the word \"South Africa\", kulula.com's spokeswoman said. FIFA, however, said the images taken together were \"ambush marketing\". Also during the tournament, 2 Dutch women were arrested for ambush advertising and 36 women ejected from the stadium when they were spotted wearing short orange dresses made by the Dutch brewery Bavaria on 14th June 2010. Anheuser Busch's Budweiser is the official beer of the event. ITV media pundit Robbie Earle was sacked from his role when it was claimed by FIFA that he had sold tickets meant for family and friends on to the Dutch beer company. The Last Word... Punters, as always please obey the laws in your applicable states, cities and counties. It's a calculated risk us teaching you cunning sports betting and casino punter types about ambush marketing, but one we are prepared to take for our ever loyal readership. PS: we just received some packages containing what one may call ambush marketing materials from Perth based 'Messages On Hold' (the audio - visual communications company that Aussie cricket legend has fronted on occasion for our business mate, Kym \"Mr Ambush Marketing King\" Illman). Bondi Beach, Fox Studios - Moore Park, ANZ Stadium, and Acer Arena are a just a couple of rumoured venues for an upcoming attack. You heard it hear first! World Cup Refereeing Decisions: History Shows Link Against Aussies!... 3 successive World Cup matches. 3 massive refereeing decisions. Every one against Australia. Conspiracy!!! a. Fabio Grosso's infamous \"dive\" over Lucas Neill, which gave 10-man Italy a hotly disputed last-minute penalty to sink Australia's 2006 campaign. b. The 2010 game opened with Australia's most influential player, Tim Cahill, sent off against Germany for a late but far from malicious challenge, which even the player on the receiving end, Bastian Schweinsteiger, said shouldn't have warranted a red card. c. Australia's best man on the field, Harry Kewell, is dismissed and suspended for a match after a ball blasted from close range hit him on the upper arm on the goal line in the 1-1 draw against Ghana. The resultant penalty meant the difference between victory and a draw. The guy has killed my World Cup,\" said Kewell. \"He is the referee, he's the judge, jury and executioner. \"Unless I detach my arm and put it somewhere else, there's no other way I can move my arm.\" Defender Craig Moore said: \"I didn't think it was a red card and I didn't think it was a penalty.\" Captain Lucas Neill said: \"When the ball goes 100 miles an hour at you and you're standing on the line, it's got to hit you somewhere, and it happened to hit Harry on the upper arm\/shoulder.\" Coach Pim Verbeek said: \"It was a mistake. What can you do with your arm? You cannot cut it off. As far as I know in the rules it has to be intentional to send a player off.\" The Aussies are pissed that Kewell received a red card for an unintentional act while Serbian defender Nemanja Vidic got off with a yellow against Germany for a deliberate handball. \"Serbia has conceded two hand-to-ball penalties,\" said Neill, \"but this could only be interpreted as ball-to-hand.\" Kewell asked: \"Why's is this one different?\" \"It's confusing because one minute they (the referees) are saying this and next minute they're saying that.\" Neill said refereeing decisions usually evened out like \"swings and roundabouts\". Word on the streets down under is that Aussie's \"smell a rat\" (of the FIFA variety). A Media Man insider was heard at a cafe frequented by sports, entertainment and media types \"Suspicion is one thing, proof is another. I think we know why human refs still remain and the video umpire method is not used. The human element is a way for rorting, rigging and the like to more easily exist in the environment... largely going undetected\". The cafe patrons largely agreed. Punters, what do you think? Tell us in the Gambling911 forums. Can't wait for Tony Clifton's submission. Lasseters Casino Refutes \"Racist\" Ban of Best Price... Australia's multi cultural values and sensitives have once again come under the spotlight following an incident at Lasseters Casino in the Northern Territory on New Years Day. Patron Bess Price was refused entry to the premise and claims racism and mistreatment. The"} +{"id":"RedPajamaCommonCrawl.0050","text":"Exhibit 2.1 [EXECUTION COPY] AGREEMENT AND PLAN OF MERGER by and among MUSTANG ACQUISITION COMPANY, LLP ENERGY BRANDS INC. D\/B\/A GLACEAU THE STOCKHOLDER REPRESENTATIVES IDENTIFIED HEREIN dated as of May 24, 2007 Section 1.1 Interpretation and Construction Effective Time Effect of the Merger Certificate of Incorporation; By-laws Merger Consideration Schedule of Merger Consideration Payment of Merger Consideration Section 2.10 Exchange Procedures No Further Ownership Rights in Company Securities Lost, Stolen or Destroyed Certificates Taking of Necessary Action; Further Assurances REPRESENTATIONS AND WARRANTIES OF THE COMPANY Organization and Qualification No Subsidiaries Authority; Noncontravention Books and Records Indebtedness of the Company No Undisclosed Liabilities Absence of Certain Changes Title to Properties; Encumbrances Material Contracts Regulatory Matters Distribution Agreements Major Suppliers and Customers Brokers and Other Advisors Opinions of Financial Advisors REPRESENTATIONS AND WARRANTIES OF PARENT AND MERGER SUB Capital Resources Conduct of Business Access; Confidentiality Efforts and Actions to Cause Closing to Occur Notification of Certain Matters NYBCL Notices Certain Actions in respect of Company Securityholders CONDITIONS TO MERGER Conditions to Each Party's Obligations Conditions to Obligations of Parent and Merger Sub Conditions to Obligations of the Company Termination of Agreement Effect of Termination Indemnification of Parent Indemnified Parties Written Notice of Claims Limitations on Indemnification Obligations Escrow Modification Indemnification Escrow Treatment of Indemnification Payments Release of Indemnification Escrow Appointment of the Stockholder Representative Entire Agreement; Modifications Assignment; Binding Effect; Severability Consent to Jurisdiction Waiver of Jury Trial Performance of Obligations Exhibit A Form of Stockholder Consent Exhibit B Certificate of Incorporation of the Surviving Corporation Exhibit C Indemnification Escrow Agreement Exhibit D Key Employee Escrow Agreement Exhibit E Cancellation Acknowledgment Exhibit F Form of Note Drawdown, Indemnification and Collateral Agreements Exhibit G Form of Investment Agreement Exhibit H Form of Stock Escrow and Collateral Agreement This Agreement and Plan of Merger, dated as of May 24, 2007 (this \"Agreement\"), is made and entered into by and among The Coca-Cola Company, a Delaware corporation (\"Parent\"), Mustang Acquisition Company, LLP, a Delaware limited liability partnership and a wholly-owned Subsidiary of Parent (\"Merger Sub\"), Energy Brands Inc. d\/b\/a\/ Glaceau, a New York corporation (the \"Company\"), and J. Darius Bikoff (\"Bikoff\") and Michael Repole (\"Repole\"), each solely in his capacity as, respectively, the Initial Stockholder Representative and the Substitute Stockholder Representative (as such terms are defined herein) pursuant to the terms of this Agreement. W I T N E S S E T H: WHEREAS, the Board of Directors of each of Parent, Merger Sub and the Company has approved and declared advisable this Agreement and the merger of Merger Sub with and into the Company (the \"Merger\"), upon the terms and subject to the conditions set forth in this Agreement; WHEREAS, the respective Boards of Directors of Parent and the Company have determined that it is in the best interests of their respective companies and stockholders to consummate the Merger provided for herein; WHEREAS, immediately following the execution of this Agreement by each of Parent, Merger Sub and the Company, Company Securityholders holding at least two-thirds of the outstanding Company Common Stock will execute, adopt and deliver to the Company a stockholder written consent, the form of which is attached hereto as Exhibit A, adopting this Agreement and approving the transactions set forth herein, including the Merger (the \"Stockholder Consent\"), which Stockholder Consent shall constitute the required adoption of this Agreement and the approval of the transactions contemplated hereby, including the Merger, by those Company Securityholders required to approve this Agreement and the transactions contemplated hereby, including the Merger, pursuant to the Restated Certificate of Incorporation of the Company, dated October 19, 2006 (the \"Company Certificate of Incorporation\"), and Amended and Restated By-laws of the Company, dated October 19, 2006 (the \"Company By-Laws\"), and applicable Law (the \"Requisite Stockholder Approval\"); WHEREAS, as a condition to Parent's willingness to enter into this Agreement and consummate the transactions contemplated hereby, including the Merger, certain Key Employees (as such term is defined herein) of the Company have agreed to defer receipt of a portion of the consideration to which such Persons otherwise would be entitled in connection with the consummation of the Merger; and WHEREAS, immediately prior to the Effective Time, (i) Tata Tea (GB) Investments Limited, a company organized under the laws of England and Wales (\"TTGBI\") and Tata Limited, a company organized under the laws of England and Wales (\"TL\") intend to contribute 100% of their shares of Company Common Stock to Merger Sub in exchange for Partnership Interests of Merger Sub (the \"Contribution\") and (ii) Parent intends to contribute an amount not less than the Merger Consideration multiplied by the General Escrow Percentage in exchange for Partnership Interests of Merger Sub. NOW, THEREFORE, in consideration of the representations, warranties, covenants and agreements contained in this Agreement, and subject to the conditions set forth herein, the parties hereto agree as follows: Section 1.1 Defined Terms. As used herein, the following terms shall have the following meanings: \"Account Certificate\" has the meaning ascribed to such term in Section 2.8(b). \"Action\" means any claim, action, suit, arbitration, proceeding or investigation by or before any Governmental Entity. \"Additional Per Share Merger Consideration\" means an amount to be paid in respect of each Company Security formerly held by a Company Securityholder (other than any Dissenting Shares) equal to the quotient of (A) any amount determined as provided in Section 8.10(c)(i) or Section 8.10(d)(i) to be available for distribution to Entitled Company Securityholders divided by (B) the number of Company Securities held by Entitled Company Securityholders. \"Administrative Expense Amount\" means an amount equal to the product of $3,000,000 multiplied by the General Escrow Percentage, such amount to be held in a trust account by the Stockholder Representative and used for the purposes described in Section 8.10(e). \"Affiliate\" means, with respect to any specified Person, any other Person that directly, or indirectly through one or more intermediaries, controls, is controlled by, or is under common control with, such specified Person. \"Agreement\" has the meaning ascribed to such term in the preamble. \"Antitrust Laws\" means the HSR Act, the Sherman Act, the Clayton Act, the Federal Trade Commission Act and any other United States federal or state Laws that are designed to prohibit, restrict or regulate actions having the purpose or effect of monopolization or restraint of trade. \"Appraisal Rights Fraction\" means, at any date, a fraction the numerator of which is the number of Dissenting Shares and the denominator of which is the aggregate number of Company Securities outstanding immediately prior to the Effective Time which are entitled to be exchanged for payments hereunder multiplied by the General Escrow Percentage. \"Australian Settlement Agreement\" means the settlement agreement between George Leppessiotis (\"Leppessiotis\"), Nicholas Sideridis (\"Sideridis\"), and the Company, in connection with certain Australian Trade Mark Applications, together with any amendments thereto and any other agreements between Leppessiotis and\/or Sideridis and the Company. \"Balance Sheet\" means the December 31, 2006 balance sheet included in the Financial Statements. \"Bikoff\" has the meaning ascribed to such term in the preamble. \"Bikoff-Related Entities\" means J. Darius Bikoff 2006 Associates, LLC, a Delaware limited liability company, and Fuji Holdings, LLC, a New York limited liability company. \"Business Day\" means any day other than a Saturday, a Sunday or a day on which financial institutions in The City of New York, New York, are required or authorized by Law to be closed. \"Call Option\" means the call option issued pursuant to the Put\/Call Agreement. \"Cancellation Acknowledgement\" has the meaning ascribed to such term in Section 2.10(a). \"Certificates of Merger\" has the meaning ascribed to such term in Section 2.3. \"Certificates\" has the meaning ascribed to such term in Section 2.10(a). \"Clayton Act\" means the Clayton Act of 1914. \"Closing\" has the meaning ascribed to such term in Section 2.2. \"Closing Date\" has the meaning ascribed to such term in Section 2.2. \"Closing Shortfall\" means an amount, if a positive number, equal to the difference of (a) $130 million minus (b) the amount of cash in the Identified Company Account as set forth in the Account Certificate. \"Code\" means the Internal Revenue Code of 1986, as amended. \"Company By-Laws\" has the meaning ascribed to such term in the recitals. \"Company Certificate of Incorporation\" has the meaning ascribed to such term in the recitals. \"Company Common Stock\" means, collectively, the Common Stock, par value $0.01 per share, of the Company and the Class A Common Stock, par value $0.01 per share, of the Company. \"Company Disclosure Schedules\" means the disclosure schedules, dated as of the date hereof, as delivered by the Company to Parent simultaneously with the execution of this Agreement. \"Company Equity Plan\" means the Energy Brands Inc. 2003 Stock Option and Restricted Stock Plan, the Energy Brands, Inc. 2000 Non-Qualified Stock Option Plan, the 2000 Non-Qualified Directors Stock Option Plan, the Energy Brands 2006 Employee Stock Option Plan, and the Energy Brands 2006 Non-Employee Stock Option Plan. \"Company Option\" means each option, security or other rights convertible into, or exercisable or exchangeable for, directly or indirectly, or otherwise entitling any Person to acquire, directly or indirectly, shares of Company Common Stock (other than the Warrants). \"Company Securities\" means, collectively, Company Common Stock, Company Options and the Warrants. When any reference is made hereunder to the \"number\" of Company Securities, such reference shall be the number of shares of Company Common Stock referred to plus the number of shares of Company Common Stock covered by the Company Options and Warrants referred to. \"Company Securityholders\" means the holders of Company Securities immediately prior to the Effective Time. \"Company Transaction Expenses\" has the meaning ascribed to such term in Section 9.1. \"Company\" has the meaning ascribed to such term in the preamble. \"Confidentiality Agreement\" means the confidentiality agreement, dated as of April 6, 2006, between the Company and Parent. \"Contract\" means any written or oral contract, agreement, commitment, lease, sublease, license or other obligation. \"Contribution\" has the meaning ascribed to such term in the preamble. \"control\" (including the terms \"controlled by\" and \"under common control with\") means, with respect to the relationship between or among two (2) or more Persons, the possession, directly or indirectly or as trustee, personal representative or executor, of the power to direct or cause the direction of the affairs or management of a Person, whether through the ownership of voting securities, as trustee, personal representative or executor, by Contract, credit arrangement or otherwise. \"Copyrights\" has the meaning ascribed to such term in the definition of \"Intellectual Property\". \"Covered Persons\" has the meaning ascribed to such term in Section 5.8(a). \"Dissenting Shares\" has the meaning ascribed to such term in Section 2.7(a). \"Dissenting Stockholder\" has the meaning ascribed to such term in Section 2.7(f). \"Distribution Agreement\" means any Contract that is currently in force entered into by the Company relating to the distribution of Products. \"DOJ\" means the United States Department of Justice. \"DRUPA\" has the meaning ascribed to such term in Section 2.1. \"Effective Time\" has the meaning ascribed to such term in Section 2.3. \"Employees\" has the meaning ascribed to such term in Section 5.12. \"Encumbrance\" means any pledge, lien, security interest, mortgage, charge, hypothecation, claim, equitable interest, encroachment, easement, defect of title, adverse claim, option, encumbrance, restriction on transfer, conditional sale or other title retention device or arrangement (including a capital lease), or restriction on the creation of any of the foregoing, whether relating to any asset, property or right or the income or profits therefrom. \"Endorsement Agreement\" means any Contract that is currently in force to which the Company is a party relating to the endorsement, promotion, marketing, support, sponsorship, placement or other similar activity in respect of one or more Products by or with any Person, including actors, artists, athletes, celebrities, musicians, other public figures, stadiums, arenas, racetracks, theatres, halls and other venues. \"Entitled Company Securityholders\" means, at any date, (I) all persons who held Company Securities outstanding immediately prior to the Effective Time that are entitled to be exchanged for payments hereunder other than (x) Dissenting Stockholders and (y) if the Escrow Modification shall have occurred, the Senior Executives and the Bikoff-Related Entities and (II) if either the Put Option or the Call Option shall have been exercised, TTGBI and TL. \"Environmental Claim\" means any Action by any Person alleging potential Liability (including potential Liability for investigatory costs, clean-up costs, response costs of Governmental Entities, natural resources damages, property damages, personal injuries, or penalties) arising out of, based on or resulting from (i) the presence or Release of any Hazardous Materials at any location, whether or not owned or operated by the Company or (ii) circumstances forming the basis of any violation of any Environmental Law. \"Environmental Laws\" means all Laws relating to pollution or protection of human health as it relates to exposure to Hazardous Materials, the environment or natural resources, including Laws relating to Releases or threatened Releases of Hazardous Materials or otherwise relating to the manufacture, processing, distribution, use, treatment, storage, transport or handling of Hazardous Materials. \"ERISA\" has the meaning ascribed to such term in Section 3.17(a). \"ERISA Affiliate\" has the meaning ascribed to such term in Section 3.17(a). \"Escrow Modification\" shall have the meaning ascribed to such term in Section 8.6. \"Exchange Agent\" has the meaning ascribed to such term in Section 2.9(c). \"Exchange Agreement\" has the meaning ascribed to such term in Section 2.9(c). \"Exchange Fund\" has the meaning ascribed to such term in Section 2.9(c). \"FDA\" means the Food and Drug Administration. \"FDCA\" means the Federal Food, Drug, and Cosmetic Act of 1938, as amended, including the rules and regulations promulgated thereunder. \"Financial Statements\" means the audited balance sheets of the Company for the fiscal years ended December 31, 2006, December 31, 2005 and December 31, 2004, the related audited consolidated statements of income, change in shareholders' equity and cash flows of the Company for the years then ended, including the related notes and schedules thereto and the unaudited balance sheet of Company and the related unaudited consolidated statements of income, changes in shareholders' equity and cash flows for the three (3) months ended as of March 31, 2007. \"Food and Beverage Laws\" has the meaning ascribed to such term in Section 3.16(a). \"Formulae\" means all of the formulae, ingredient lists, blends, mixing instructions and processes used in or to manufacture the Products. \"FTC\" means the United States Federal Trade Commission. \"GAAP\" means United States generally accepted accounting principles and practices in effect from time to time applied consistently throughout the periods involved. \"GE Settlement Agreement\" means the settlement agreement between General Electric Company (\"GE\") and the Company, together with any amendments thereto and any other agreements between GE or its Affiliates and the Company with respect to trademarks. \"General Escrow Percentage\" means, at any date, 100% minus (x) if the Contribution shall have occurred but neither the Put Option nor the Call Option shall have been exercised, 28.6% and minus (y) if the Escrow Modification shall have occurred, 22.0%. \"Governmental Entity\" means any federal, national, state, provincial, local or other government, governmental, regulatory or administrative authority, agency or commission, including, without limitation, any office of a state attorney general, or any court, tribunal, or judicial or arbitral body. \"Hazardous Materials\" means all substances defined as Hazardous Substances, Oils, Pollutants or Contaminants in the National Oil and Hazardous Substances Pollution Contingency Plan, 40 C.F.R. \u00a7 300.5, or defined as such by, or regulated as such under, any Environmental Law. \"Holder Documents\" has the meaning ascribed to such term in Section 2.10(a). \"HSR Act\" means the Hart-Scott-Rodino Antitrust Improvements Act of 1976. \"Identified Company Account\" means the Company bank account identified on Section 1.1(a) of the Company Disclosure Schedules. \"Indebtedness\" means, with respect to any Person, without duplication, all obligations in respect of (i) borrowed money, (ii) indebtedness evidenced by notes, debentures or similar instruments, (iii) capitalized lease obligations, (iv) such Person, that are secured by any lien on property owned or acquired by such Person, whether or not the obligations secured thereby have been assumed, (iv) the deferred purchase price of assets, services or securities (other than ordinary course trade accounts payable), (v) conditional sale, title, retention or similar arrangements, (vi) all letters of credit issued for the account of such Person, (vii) reimbursement obligations, whether contingent or matured, with respect to bankers' acceptances, surety bonds, other financial guarantees and interest rate protection agreements (without duplication of other indebtedness supported or guaranteed thereby), (viii) interest, premium, penalties and other amounts owing in respect of the items described in the foregoing clauses (i) through (vii), and (ix) the guaranty of the Indebtedness of any other Person. \"Indemnification Escrow Account\" means the bank account established by the Indemnification Escrow Agent pursuant to the Indemnification Escrow Agreement. \"Indemnification Escrow Agent\" has the meaning ascribed to such term in Section 2.9(a). \"Indemnification Escrow Agreement\" has the meaning ascribed to such term in Section 2.9(a). \"Indemnification Escrow Amount\" has the meaning ascribed to such term in Section 2.9(a). \"Indemnification Escrow Funds\" has the meaning ascribed to such term in Section 2.9(a). \"Indemnifying Party\" has the meaning ascribed to such term in Section 8.3. \"Initial Stockholder Representative\" means Bikoff. \"Intellectual Property\" means all intellectual property rights of any kind or nature, including all U.S. and foreign (i) patents, patent applications, patent disclosures, and all related continuations, continuations-in-part, divisionals, reissues, re-examinations, substitutions, and extensions thereof (\"Patents\"), (ii) trademarks, service marks, names, corporate names, trade names, domain names, logos, slogans, trade dress, and other similar designations of source or origin, together with the goodwill symbolized by any of the foregoing (\"Trademarks\"), (iii) copyrights and copyrightable subject matter (\"Copyrights\"), (iv) rights of publicity, to the extent any celebrities are shown or named on product labeling or in mass-media advertising campaigns (v) computer programs (whether in source code, object code, or other form), databases and all documentation, including user manuals and training materials, related to any of the foregoing (\"Software\"), (vi) trade secrets and all other confidential information, know-how, inventions, proprietary processes, formulae, models, and methodologies (\"Trade Secrets\"), (vii) all rights in the foregoing, including all common law rights therein; and (viii) all applications and registrations for the foregoing. \"Investment Agreements\" means the several Investment Agreements, dated as of the date hereof, each between a Senior Executive and Parent. A form of Investment Agreement is attached hereto as Exhibit G. \"Key Employee Escrow\" has the meaning ascribed to such term in Section 2.9(b). \"Key Employee Escrow Agreement\" has the meaning ascribed to such term in Section 2.9(b). \"Key Employees\" means each of the individuals identified in Section 2.9(b) of the Company Disclosure Schedules. \"Knowledge of the Company\" means the actual knowledge of: Bikoff, Carol Dollard, Rohan Oza, Michael Repole, Michael Venuti, Joseph DiSalvo and Wendy Kaplowitz. \"Late Survival Amount\" means, at any date, (x) 10% of the Indemnification Escrow Amount multiplied by the General Escrow Percentage. \"Law\" means any federal, state, local or foreign statute, law, ordinance, requirement, decree, regulation, rule, code or order. \"Leases\" has the meaning ascribed to such term in Section 3.11(c). \"Liability\" means any liability, Indebtedness, obligation, deficiency, interest, Tax, penalty, fine, demand, judgment, Action or other loss or damage, cost or expense of any kind or nature whatsoever, whether known or unknown, whether asserted or unasserted, whether absolute or contingent, whether accrued or unaccrued, whether fixed or unliquidated, and whether due or to become due, including any such liability under Environmental Laws and for Taxes. \"Liquidated Damages Costs\" means with respect to a Distribution Agreement, costs and fees (referred to in some of the Company's distribution agreements as \"liquidated damages\") that are specified as payable by the Company if such Distribution Agreement were to be terminated. \"Losses\" has the meaning ascribed to such term in Section 8.2. \"Management Incentive Plan\" has the meaning ascribed to such term in the recitals. \"Material Adverse Effect\" means any change, effect, event, occurrence, circumstance, state of facts or development that individually or in the aggregate has or would reasonably be expected to have a material adverse effect on the business, financial condition, assets, Liabilities or results of operations of the Company, excluding any such change, effect, event, occurrence, circumstance, state of facts or development resulting from or arising in connection with (i) changes or conditions generally affecting the economy or the financial markets, (ii) the industry in which the Company operates in general, (iii) changes in Law (other than Laws relating to the industry in which the Company operates) or GAAP, (iv) earthquakes or similar catastrophes, or acts of war (whether declared or undeclared), sabotage, terrorism, military action or any escalation or worsening thereof, or (v) other than for purposes of the use of the term \"Material Adverse Effect\" in Section 3.4(c) and (d), the announcement or performance of this Agreement or the transactions contemplated hereby; provided, however, that with respect to the foregoing clauses (i)-(iv), such change, effect, event, occurrence, circumstance state of facts or development is no more adverse to the Company than to other Persons operating in the industry in which the Company operates. \"Material Contract\" has the meaning ascribed to such term in Section 3.13(a). \"Merger Consideration Schedule\" has the meaning ascribed to such term in Section 2.8(a). \"Merger Consideration\" has the meaning ascribed to such term in Section 2.7. \"Merger Sub\" has the meaning ascribed to such term in the preamble. \"Merger\" has the meaning ascribed to such term in the recitals. \"Note Drawdown and Collateral Agreements\" means the several Note Drawdown, Indemnification and Additional Collateral Agreements, each between a Senior Executive and Parent. A form of Note Drawdown, Indemnification and Additional Collateral Agreement is attached hereto as Exhibit F. \"NYBCL\" has the meaning ascribed to such term in Section 2.1. \"OFPA\" means the Organic Food Productions Act of 1990, as amended, and the regulations adopted thereunder by the National Organic Standards Board. \"Order\" means any order, writ, judgment, injunction, decree, stipulation, determination or award entered by or with any Governmental Entity. \"Parent Material Adverse Effect\" means any change or effect that could reasonably be expected to prevent or impair in any material respect the ability of Parent or Merger Sub to perform their respective obligations under this Agreement or prevent or materially impede, interfere with, hinder or delay the consummation of the Merger of the other transactions contemplated by this Agreement. \"Parent\" has the meaning ascribed to such term in the preamble. \"Parent Indemnified Parties\" has the meaning ascribed to such term in Section 8.2. \"Participating Common Convertible Holder\" has the meaning ascribed to such term in Section 2.10(c). \"Participating Common Holder\" has the meaning ascribed to such term in Section 2.10(b). \"Patents\" has the meaning ascribed to such term in the definition of \"Intellectual Property\". \"PBGC\" has the meaning ascribed to such term in Section 3.17(c). \"Pending Claim\" has the meaning ascribed to such term in Section 8.10(a). \"Per Share Merger Consideration\" means an amount per share equal to the quotient of (A) the sum of the Merger Consideration plus the aggregate exercise or conversion price of all of the Company Options and Warrants in respect of which a portion of the Merger Consideration is payable under Section 2.7(c), as applicable, divided by (B) the number of Company Securities outstanding immediately prior to the Effective Time, other than any Company Securities held by the Company. \"Per Share Closing Date Merger Consideration\" means an amount per share equal to the quotient of (A) the sum of the Merger Consideration plus the aggregate exercise or conversion price of all of the Company Options and Warrants in respect of which a portion of the Merger Consideration is payable under Section 2.7(c), as applicable, less (i) the Indemnification Escrow Amount (determined as if the General Escrow Percentage were 100%) and (ii) the Administrative Expense Amount, divided by (B) the number of Company Securities outstanding immediately prior to the Effective Time, other than any Company Securities held by the Company. \"Permits\" means all approvals, authorizations, certificates, filings, franchises, licenses, notices and permits issued by any Governmental Entity. \"Permitted Encumbrances\" means (i) Encumbrances for current Taxes not yet due or payable or that are being contested in good faith for which proper reserves have been provided in accordance with GAAP, (ii) Encumbrances imposed by Law, such as Encumbrances of any materialmen, mechanics, workmen, repairmen, contractors, warehousemen, carriers, suppliers, vendors or equivalent Encumbrances if payment is not overdue on the underlying obligation by more than 30 days, (iii) Encumbrances reflected in the Financial Statements or created in the ordinary course of business subsequent to the date of the Balance Sheet, (iv) Encumbrances created by this Agreement or by the actions of Parent, or (v) any other Encumbrances on an asset that do not, individually or in the aggregate, materially affect the value of, or materially impair the existing use of, such asset in the ordinary course of business of the Company. \"Person\" means any individual, partnership, firm, corporation, limited liability company, association, trust, unincorporated organization or other entity, as well as any syndicate or group that would be deemed to be a person under Section 13(d)(3) of the Securities Exchange Act of 1934, as amended. \"Plans\" has the meaning ascribed to such term in Section 3.17(a). \"Product\" means all non-alcoholic beverages manufactured by or for the Company, including flavored or unflavored, sparkling or still, drinking or bottled waters and water beverages, whether or not such products contain vitamins, minerals, herbs, essences, soy protein or nutritional supplements. \"Put\/Call Agreement\" means the Put and Call Option Agreement, dated as of the date hereof, by and among Parent, Tata Tea (GB) Limited, a company organized under the laws of England and Wales, TTGBI and TL. \"Put Option\" the put option issued pursuant to the Put\/Call Agreement. \"Related Party Transaction\" has the meaning ascribed to such term in Section 3.26(a). \"Release\" means any release, spill, emission, discharge, leaking, pumping, injection, deposit, disposal, dispersal, leaching or migration into the environment (including ambient air, surface water, groundwater and surface or subsurface strata) or into or out of any property, including the movement of Hazardous Materials through or in the air, soil, surface water, groundwater or property. \"Repole\" has the meaning ascribed to such term in the preamble. \"Representatives\" means, with regard to any specified Person, such Person's directors, officers, employees, partners, members, Affiliates, financial advisors, attorneys, accountants, consultants, agents and representatives. \"Requisite Stockholder Approval\" has the meaning ascribed to such term in the recitals. \"Reserve Amount\" has the meaning ascribed to such term in Section 8.10(a). \"Resignation Event\" has the meaning ascribed to such term in Section 9.3(b). \"Restraints\" has the meaning ascribed to such term in Section 6.1(d). \"Securities Act\" means the Securities Act of 1933, as amended. \"Securityholders Agreement\" means the Securityholders Agreement dated as of August 23, 2006, as amended on October 19, 2006, among the Company and the Company Securityholders identified therein. \"Senior Executives\" means each of the following individuals: Bikoff, Repole, and Michael Venuti. \"SFTA\" means the Sanitary Food Transportation Act, as amended, including the rules and regulations promulgated thereunder. \"Shared Fees\" has the meaning ascribed to such term in Section 9.1. \"Sherman Act\" means Sherman Antitrust Act of 1890. \"Software\" has the meaning ascribed to such term in the definition of \"Intellectual Property\". \"Stock Escrow and Collateral Account\" has the meaning ascribed to such term in the Stock Escrow and Collateral Agreement. \"Stock Escrow and Collateral Agreement\" means an escrow agreement substantially in the form attached hereto as Exhibit H. \"Stockholder Consent\" has the meaning ascribed to such term in the recitals. \"Stockholder Representative\" has the meaning ascribed to such term in Section 9.3(a). \"Subsidiary\" means, in respect of any Person, any corporation or other legal entity of which such Person (either alone or together with other Subsidiaries of such Person) owns, directly or indirectly, more than 50% of the voting securities, other voting ownership or voting partnership interests of which is sufficient to elect at least a majority of its board of directors or other governing body (or, if there are no such voting interests, more than 50% percent of the stock or other equity interests of such entity). \"Substitute Stockholder Representative\" means Repole. \"Supplemental Indemnity Agreement\" means the supplemental Indemnity Agreement dated the date hereof between Parent and Bikoff. \"Survival Period\" has the meaning ascribed to such term in Section 8.1. \"Surviving Corporation\" has the meaning ascribed to such term in Section 2.1. \"Tax Return\" means all material returns and reports (including elections, declarations, disclosures, schedules, estimates, information returns, claims for refund and amended returns) required to be supplied to a Governmental Entity relating to Taxes. \"Tax\" means (i) any federal, state, local, foreign or other income, alternative, minimum, accumulated earnings, personal holding company, franchise, capital stock, net worth, capital, profits, windfall profits, gross receipts, value added, sales, use, excise, custom duties, transfer, conveyance, mortgage, registration, stamp, documentary, recording, premium, severance, environmental, real and personal property, ad valorem, intangibles, rent, occupancy, license, occupational, employment, unemployment insurance, social security, disability, workers' compensation, payroll, health care, withholding, estimated or other similar tax, duty or other charge or assessment by a Governmental Entity or deficiencies thereof (including all interest and penalties thereon and additions thereto), (ii) any Liability for the payment of any amounts described in this definition as a result of being a member of an affiliated, consolidated, combined, unitary or similar group or as a result of transferor or successor Liability, and (iii) any Liability for the payments of any amounts as a result of being a party to any agreement or as a result of any express or implied obligation to indemnify any other Person with respect to payment of any amount of the type described in clause (i) or (ii). \"Termination Date\" has the meaning ascribed to such term in Section 7.1(a). \"Third Party Claim\" has the meaning ascribed to such term in Section 8.3. \"TL\" has the meaning ascribed to such term in the recitals. \"Trade Secrets\" has the meaning ascribed to such term in the definition of \"Intellectual Property\". \"Trademarks\" has the meaning ascribed to such term in the definition of \"Intellectual Property\". \"Transaction Expenses\" has the meaning ascribed to such term in Section 9.1. \"Transmittal Letter\" has the meaning ascribed to such term in Section 2.10(a). \"Treasury Regulations\" means the income tax regulations promulgated under the Code, as such regulations may be amended from time to time. \"TTGBI\" has the meaning ascribed to such term in the recitals. \"USDA\" means the United States Department of Agriculture. \"WARN Act\" has the meaning ascribed to such term in Section 3.18(d). \"Warrant\" has the meaning ascribed to such term in Section 2.7(c)(iii). Section 1.2 Interpretation and Construction. Unless otherwise expressly provided, for the purposes of this Agreement the following rules of interpretation shall apply: (a) The headings contained in this Agreement are for convenience of reference only and shall not affect in any way the meaning or interpretation of this Agreement. (b) When a reference is made in this Agreement to an article or a section, paragraph, exhibit or schedule, such reference shall be to an article or a section, paragraph, exhibit or schedule of this Agreement unless otherwise clearly indicated to the contrary. (c) Whenever the words \"include,\" \"includes\" or \"including\" are used in this Agreement they shall be deemed to be followed by the words \"without limitation.\" (d) The words \"hereof,\" \"herein\" and \"herewith\" and words of similar import shall, unless otherwise stated, be construed to refer to this Agreement as a whole and not to any particular provision of this Agreement. (e) The meaning assigned to each term defined herein shall be equally applicable to both the singular and the plural forms of such term, and words denoting any gender shall include all genders. Where a word or phrase is defined herein, each of its other grammatical forms shall have a corresponding meaning. (f) A reference to \"$,\" \"U.S. dollars\" or \"dollars,\" shall mean the legal tender of the United States of America. (g) A reference to any legislation or to any provision of any legislation shall include any amendment to, and any modification or re-enactment thereof, any legislative provision substituted therefor and all rules, regulations and statutory instruments issued thereunder or pursuant thereto. (h) A reference to any period of days shall be deemed to be to the relevant number of calendar days unless otherwise specified. (i) The parties have participated jointly in the negotiation and drafting of this Agreement. In the event an ambiguity or question of intent or interpretation arises, this Agreement shall be construed as if drafted jointly by the parties, and no presumption or burden of proof shall arise favoring or disfavoring any party by virtue of the authorship of any provisions of this Agreement. Section 2.1 The Merger. Upon the terms and subject to the conditions set forth in this Agreement, and in accordance with the New York Business Corporation Law (the \"NYBCL\") and the Delaware Revised Uniform Partnership Act (the \"DRUPA\"), Merger Sub shall be merged with and into the Company at the Effective Time. As a result of the Merger, the separate corporate existence of Merger Sub shall cease and the Company shall continue as the surviving corporation of the Merger (the \"Surviving Corporation\"). Section 2.2 Closing. The closing of the Merger (the \"Closing\") shall take place at 10:00 a.m., prevailing Eastern time, on a date to be specified by the parties, which shall be no later than the second Business Day after satisfaction or (to the extent permitted by applicable Law) waiver of the conditions set forth in Article VI (other than those conditions that by their terms are to be satisfied at the Closing, but subject to the satisfaction or (to the extent permitted by applicable Law) waiver of such conditions); provided, however, that Parent, in its sole discretion, may delay the Closing by no more than five (5) Business Days following such second Business Day (the date on which the Closing occurs being hereinafter referred to as the \"Closing Date\") at the offices of Skadden, Arps, Slate, Meagher & Flom LLP, Four Times Square, New York, New York 10036-6522, unless another time, date or place is agreed to in writing by Parent and the Company. Section 2.3 Effective Time. Upon the terms and subject to the conditions set forth in this Agreement, at the Closing, the parties shall cause the Merger to be consummated by filing (a) with the Secretary of State of the State of New York, a certificate of merger and (b) with the Secretary of State of the State of Delaware, a certificate of merger (together with the certificate of merger referred to in clause (a), the \"Certificates of Merger\"), in each case, in such form as required by, and executed and acknowledged by the parties in accordance with, the relevant provisions of the NYBCL and the DRUPA (as applicable) and Parent shall make or cause to be made all other filings or recordings required under the NYBCL and the DRUPA in connection with the Merger. The Merger shall become effective upon the filing of the Certificates of Merger with the Secretary of State of the State of New York in accordance with Section 904-a of the NYBCL and the Secretary of State of the State of Delaware in accordance with Section 15-902 of the DRUPA or at such later time as Parent and the Company shall agree in writing and shall so specify in the Certificates of Merger (the time the Merger becomes effective being hereinafter referred to as the \"Effective Time\"). Section 2.4 Effect of the Merger. At the Effective Time, the effect of the Merger shall be as provided in this Agreement, the Certificates of Merger and the applicable provisions of the NYBCL and the DRUPA. Section 2.5 Certificate of Incorporation; By-laws. (a) At the Effective Time, the Company Certificate of Incorporation shall be amended to read in its entirety as set forth on Exhibit B hereto, and as so amended such Company Certificate of Incorporation shall be the Certificate of Incorporation of the Surviving Corporation until thereafter amended as provided by the NYBCL and such Company Certificate of Incorporation. (b) At the Effective Time, the By-laws of the managing partner of Merger Sub, as in effect immediately prior to the Effective Time, shall be the By-laws of the Surviving Corporation until thereafter amended as provided by the NYBCL, the Certificate of Incorporation of the Surviving Corporation and such By-laws. Section 2.6 Directors and Officers. From and after the Effective Time, the directors of the managing partner of Merger Sub immediately prior to the Effective Time shall be the directors of the Surviving Corporation and the officers of the Company immediately prior to the Effective Time shall be the officers of the Surviving Corporation, in each case until the earlier of their respective deaths, resignations or removals or until their respective successors are duly elected or appointed and qualified, as the case may be. Section 2.7 Merger Consideration. The aggregate amount to be paid by Parent on the Closing Date with respect to all of the outstanding shares of Company Common Stock and any options, warrants or other rights to acquire any securities of the Company (including Company Common Stock, Company Options and Warrants) shall equal the difference of (such amount, the \"Merger Consideration\"): (a) Four Billion Two Hundred and Thirty Million Dollars ($4,230,000,000) minus (b) the sum of (i) the aggregate amount of the Company Transaction Expenses (to the extent not paid prior to the determination of the Closing Shortfall) and (ii) any Closing Shortfall. (a) Conversion of Company Common Stock. At the Effective Time, in accordance with the terms and subject to the conditions of this Agreement by virtue of the Merger and without any action on the part of the holder of any shares of Company Common Stock or Company Options, each share of Company Common Stock issued and outstanding immediately prior to the Effective Time (other than shares to be canceled pursuant to Section 2.7(b)) and shares, if any, of Company Common Stock outstanding immediately prior to the Effective Time and held by a holder who has not voted in favor of the Agreement or consented thereto in writing and who has complied with the requirements of Section 910 of the NYBCL (\"Dissenting Shares\") shall be canceled and extinguished and converted into the right to receive an amount of cash equal to the Per Share Merger Consideration, determined and paid in accordance with the terms, provisions and procedures set forth in this Agreement (including those in Section 2.9 and Article VIII). (b) Cancellation of Company Common Stock Owned by the Company and Merger Sub. At the Effective Time, any shares of Company Common Stock that are owned by the Company immediately prior to the Effective Time shall be cancelled and extinguished without any conversion thereof and without payment of any consideration therefor and any shares of Company Common Stock that are owned by Merger Sub shall likewise be cancelled. (c) Company Options, Company Equity Plans and Warrants. (i) Each Company Option granted under any Company Equity Plan that is outstanding immediately prior to the Effective Time, whether or not then exercisable, will be canceled as of the Effective Time in exchange for the right to receive a cash payment in an amount equal to the excess, if any, of the Per Share Merger Consideration (determined and paid in accordance with the terms, provisions and procedures set forth in this Agreement (including those in Section 2.9 and Article VIII)) over the exercise price thereof, subject to the terms of this Agreement. The Company shall take any and all actions necessary to effectuate this Section 2.7(c), including, without limitation, adopting any plan amendments and using its reasonable best efforts to obtain any required consents. (ii) All of the Company Equity Plans (including any agreements thereunder) will terminate as of the Effective Time and the provisions in any other plan, program, agreement or arrangement providing for the issuance or grant of any other interest in respect of the Company Common Stock will be deleted, terminated and of no further force or effect as of the Effective Time. (iii) Each share of the Company Common Stock subject to warrants issued by the Company (each, a \"Warrant\") that is outstanding immediately prior to the Effective Time, whether or not then exercisable, will be canceled as of the Effective Time in exchange for the right to receive a cash payment in an amount equal to the excess, if any, of the Per Share Merger Consideration (determined and paid in accordance with the terms, provisions and procedures set forth in this Agreement (including those in Section 2.9 and Article VIII) over the exercise price thereof, subject to the terms of this Agreement. The Company will use its reasonable best efforts to obtain the consent of each holder of an outstanding Warrant to the foregoing treatment of such Warrant. (d) Certain Adjustments. The Per Share Merger Consideration shall be adjusted to reflect fully the effect of any stock split, reverse split, stock dividend (including any dividend or distribution of securities convertible into Company Common Stock), reorganization, recapitalization or other like change with respect to Company Common Stock occurring after the date hereof and prior to the Effective Time. (e) Conversion of Merger Sub Interests. Each of the Partnership Interests in Merger Sub issued and outstanding immediately prior to the Effective Time will be converted as of the Effective Time into and shall represent one validly issued, fully paid and nonassessable share of common stock of the Surviving Corporation. (f) Appraisal Rights. Notwithstanding anything in this Agreement to the contrary, Dissenting Shares shall not be converted into the right to receive the Per Share Merger Consideration but shall instead be converted into the right to receive such consideration as may be determined to be due with respect to such Dissenting Shares pursuant to applicable Law. Following the Closing, the consent of Parent (which consent shall not be unreasonably withheld) shall be required in order for the Company to voluntarily make any payment with respect to, or settle or offer to settle, any such purchase demand made by any holder of Dissenting Shares (a \"Dissenting Stockholder\") under applicable Law. The Company also agrees to give Parent prompt notice of any written demand for appraisal of any Company Common Stock, attempted withdrawals of such demands, and any other instruments received by the Company related to any rights of appraisal. Each Dissenting Stockholder who, pursuant to the provisions of applicable Law, becomes entitled to payment of the \"fair value\" for their shares of Company Common Stock shall receive payment therefor (but only after the value therefor shall have been agreed upon or finally determined pursuant to such provisions). If, after the Effective Time, any Dissenting Stockholder shall fail to perfect or shall effectively waive, withdraw or lose such Dissenting Stockholder's rights under Section 910 of the NYBCL, then such Person's Dissenting Shares shall thereupon cease to be Dissenting Shares and shall be deemed to have been canceled at the Effective Time, and Parent shall issue and deliver, upon surrender by such stockholder of certificate or certificates representing shares of Company Common Stock, the portion of the Merger Consideration to which such stockholder would otherwise theretofore have been entitled under this Agreement. Section 2.8 Schedule of Merger Consideration. (a) Section 2.8 of the Company Disclosure Schedules (the \"Merger Consideration Schedule\") sets forth, as of the date hereof, (i) the estimated amount of the Merger Consideration calculated pursuant to the formula set forth in Section 2.7, (ii) the estimated Per Share Merger Consideration, (iii) the estimated amount of Per Share Closing Date Merger Consideration, (iv) the estimated amount of the Indemnification Escrow Amount, (v) the amount of the Key Employee Escrow Amount allocated to each Key Employee, and (vi) the estimated Per Share Closing Date Merger Consideration payable to each Company Securityholder as of the Effective Time net of (I) the exercise price under any Warrants or Company Options held by such Company Securityholder and (II) in the case of any Company Securityholder who is a Key Employee, the amount of the Key Employee Escrow Amount allocated to such Company Securityholder. (b) The Company shall deliver to Parent not less than two Business Days prior to the Closing, (i) an updated Merger Consideration Schedule as of the Closing Date and (ii) a certified bank statement (the \"Account Certificate\") showing the amount of cash in the Identified Company Account. Such updated Merger Consideration Schedule shall identify any Company Transaction Expenses not paid prior to or taken into account in the termination of the amount of cash in the Company Identified Account described in clause (ii) above. Section 2.9 Payment of Merger Consideration. At the Closing, Merger Sub shall pay or cause to be paid the following amounts by wire transfers of immediately available funds: (a) Deposit of Indemnification Escrow Amount. At the Closing, an amount equal to ten percent (10%) of the Merger Consideration multiplied by the General Escrow Percentage (such amount, as determined from time to time pursuant to this Agreement and the Indemnification Escrow Agreement, the \"Indemnification Escrow Amount\") shall be deposited by Merger Sub with the escrow agent (the \"Indemnification Escrow Agent\") designated in an escrow agreement (the \"Indemnification Escrow Agreement\"), substantially in the form attached hereto as Exhibit C, to be entered into at the Closing by Parent, the Company, the Stockholder Representative and the Indemnification Escrow Agent. The amount of cash held by the Indemnification Escrow Agent, together with any proceeds thereon less any withdrawal therefrom and plus any additions thereto (which shall be apportioned pursuant to the terms of the Indemnification Escrow Agreement), shall at all times constitute the \"Indemnification Escrow Funds\" and shall be used as specified in the Indemnification Escrow Agreement and Sections 8.6 and 8.10 hereof. The Company, on the one hand, and Parent, on the other hand, shall each pay 50% of the costs in connection with establishing and maintaining the escrow accounts pursuant to the Indemnification Escrow Agreement. (b) Key Employee Escrow. At the Closing, a portion of the Merger Consideration in an aggregate amount equal to Ten Million, Four Hundred Thirty-Six Thousand, Three Hundred and Seventy-Six Dollars ($10,436,376) (the \"Key Employee Escrow Amount\") representing the respective contributions of the Key Employees as Key Employee Escrow Funds as set forth on Section 2.9(b) of the Company Disclosure Schedules and agreed to by the Key Employees (pursuant to the Key Employee Escrow Agreement) shall be deposited by Merger Sub with the escrow agent (the \"Key Employee Escrow Agent\") designated in an escrow agreement (the \"Key Employee Escrow Agreement\"), substantially in the form attached hereto as Exhibit D, to be entered into at the Closing by Parent, the Company, each of the Key Employees and the Key Employee Escrow Agent. The amount of cash held by the Key Employee Escrow Agent, together with any proceeds thereon (which shall be apportioned pursuant to the terms of the Key Employee Escrow Agreement) shall at all times constitute the \"Key Employee Escrow Funds\" and shall be used as specified in the Key Employee Escrow Agreement. (c) Administrative Expense Account. At the Closing, the Administrative Expense Amount shall be paid by Merger Sub to Stockholder Representative for deposit into a separate account, and to be held in such separate account and used and distributed by Stockholder Representative in accordance with applicable provisions of this Agreement. (d) Deposit of Merger Consideration. At the Closing, Merger Sub shall deposit, or shall cause to be deposited, with an institution that is reasonably satisfactory to the Company (and Parent's transfer agent shall be deemed reasonably satisfactory to the Company) to act as exchange agent (the \"Exchange Agent\") pursuant to an exchange agent agreement to be entered into at the Closing by Parent and the Exchange Agent (the \"Exchange Agreement\"), for the benefit of the Company Securityholders, the aggregate amount of the Merger Consideration multiplied by the General Escrow Percentage less the Indemnification Escrow Amount deposited with the Indemnification Escrow Agent pursuant to Section 2.9(a), the Key Employee Escrow pursuant to Section 2.9(b), and the Administrative Expense Amount pursuant to Section 2.9(c), (such Merger Consideration, together with any interest with respect thereto, being hereinafter referred to as the \"Exchange Fund\"). The Exchange Agent shall, pursuant to irrevocable instructions set forth in the Exchange Agreement, deliver the cash out of the Exchange Fund in exchange for the outstanding Certificates. The Exchange Fund shall be held as a trust fund and shall not be subject to any Encumbrance. Except as contemplated by this Section 2.9(c), the Exchange Fund shall not be used for any other purpose. The Company, on the one hand, and Parent, on the other hand, shall each pay 50% of the fees and expenses of the Exchange Agent. Section 2.10 Exchange Procedures. (a) Exchange Procedures. As promptly as practicable after the Effective Time, Parent shall cause the Exchange Agent to mail to each Company Securityholder of stock certificates, options or warrants or other securities which, immediately prior to the Effective Time represented outstanding Company Securities (other than Company Options) (collectively, the \"Certificates\") (i) a letter of transmittal (including the accompanying Substitute Form W-9 or the applicable Form W-8), which shall contain an affirmation of any previously delivered Stockholder Consent and shall specify"} +{"id":"RedPajamaCommonCrawl.0051","text":"Close Reading Romance April 2, 2020 April 2, 2020 \/ charlotteromansdegare \/ 2 Comments Photo by Curtis MacNewton on Unsplash Unsurprisingly, I don't currently have much patience or attention span for close readings. However, because this blog brings me joy and distraction, I didn't want to stop posting. So the solution I have for the moment is to share a few short posts with quotes from 3-4 novels around a single theme. The theme of today's post is passing time: something we're all doing right now in unexpected ways. Days seem like months, February was possibly six years ago, and we're all waiting for changes in our circumstance without a fixed deadline. And for those of us who still have the attention span, reading romance offers a way to pass some of this weird, distorted time. As I read, I've been on the lookout for the ways that romance novels narratively express the passage of time. And I've found that, unsurprisingly, some of the best examples come from novels where time passing is central to the plot or character conflict: from a discussion of pastimes versus work, to an age-gap romance, to a historical \"we've only got a month to make an heir!\" plot, here are three of my favorites. A Lady Awakened Cecilia Grant's A Lady Awakened is about a very specific kind of time pressure: Martha's husband has just died, and she needs conceive a child that can plausibly be counted as her late husband's legitimate heir. Enter Theo, who agrees to spend the next month trying to make this happen. The only problem? For Martha, their arrangement is strictly business, and she has no plans to enjoy the baby-making. Theo, on the other hand, would prefer not to sleep with someone who visibly refuses to enjoy herself. Every delightfully, hilariously stilted this-is-just-about-the-heir encounter between Theo and Martha takes place on the clock, counting the days until it will be too late. Which is why it's all the more ingenious when the first breakthrough Theo makes in tempting Martha to enjoy herself includes on-the-clock-kissing: \"Allow me ten minutes.\" He reached past her to set the watch on the tabletop. \"I'll stop the very second you tell me it's time.\" Cecilia Grant, A Lady Awakened Martha, never easily deterred, reverts to her favorite deflecting tactic: turning pleasure into a negotiation over time spent kissing: \"Five minutes,\" she said. Haggling. He could do that. \"Seven.\" He flexed his fingers on the chair. \"Six.\" One small crease appeared in her forehead. \"Seven and a half.\" He breathed the words next to her ear. Her eyes snapped open, all coffee-colored impatience. \"You're supposed to go lower, to meet me. Six and a half, you should say.\" \"Eight, he murmured into her shoulder. \"And I'll go lower, to meet you, any time you like.\" Theo is ready to show Martha that the time they spend together \u2013 even when limited \u2013 can be about her pleasure, and not just about solving problems. Eight minutes it was, then. He kissed her, and kissed and kissed and kissed her until he knew that narrow path of skin, and the knobbly scaffolding underneath, the way he knew the lines on his own palm. What I love about the passage is that even though Theo's plan of timing their kiss works, the two of them are still operating on different scales of time: Someone was breathing harder. He was. He did that. And someone was breathing more softly, the slow, languid breaths of a person half-drugged. He glanced up at her reflection and a jagged bolt of desire shot through him. The words in the passage match the cadence of their breath. Short utterances like gasps (\"Someone was breathing harder. He was. He did that\") and longer, more drawn-out ones (\"And someone was breathing more softly, the slow, languid breaths of a person half-drugged.\"). This is a slow burn romance, and it takes Martha and Theo a while to get past their imposed and opposing time frames. They do, however, figure out that time together is just as well spent in pleasure as in\u2026 production. Alexis Hall's For Real is an age-gap romance between Laurie, an older, experienced sub, and Toby, a young and inexperienced dom. Their relationship is about much more than these disparities in age and experience, but all the same, temporal differences are woven throughout the novel. Laurie narrates in first-person past, Toby in first-person present, and the gaps in their relationship to time loom large in many of their conflicts. This novel subtly compares the experience of time across different romantic relationships. In this first passage, Laurie remembers kissing Robert, his first love and a man his own age. Three days, thirteen hours, and twenty-two minutes after we first met, he put his arms around me, pressed our bodies together, and kissed me. Alexis Hall, For Real This careful counting of time immediately reminded me of the (much missed) TV show Pushing Daisies, casting a kind of fairytale glow over the past of that first kiss. It also shows two lovers so temporally in sync they can count the minutes between them \u2013 whereas Laurie can't stop worrying about the years that separate him and Toby, and about how much more significant those years would feel further into their seemingly-impossible future. Perhaps this is why so much about Toby and Laurie's relationship revolves around reconfiguring their relationship to time passing. Their first encounters are full of little temporal distortions, particularly moments where a short amount of time seems to take ages: His hands come up and frame my face. Kiss me, is what I think. Forever limps by. \"What do you want, Toby?\" After a silence that contained the rise and fall of at least six or seven civilisations, he nodded. As their relationship progresses, one of the most important changes Laurie makes is to stop measuring time in terms of the age gap between himself and Toby. Instead, he starts measuring time in terms of days and weeks spent with, and without, the man he loves. I had barely known him, but \u2013 as the days slipped into weeks \u2013 I realised I missed him too. I'd been living my life as if nothing had changed. But the promise of Toby had illuminated all my days, edging them with gold like the calligraphy of medieval monks. Toby and Laurie's relationship is, in a lot of ways, about finding new means to understand closeness, realizing which kinds of temporal gaps between them have meaning, and which don't. A Lady's Guide to Celestial Mechanics Olivia Waite's A Lady's Guide to Celestial Mechanics is both a swoony romance between astronomer Lucy Muchelney and embroiderer Catherine St Day, and a thoughtful look at women's work. It's especially invested in looking at how patriarchy shapes the distinctions we draw between \"pastimes\" and \"work.\" One of the first things we learn about Catherine's embroidery is how her late husband misunderstood the relationship between her craft and the passage of time: It had taken her weeks aboard ship to embroider this panel. Red and pink and green shading into one another, silks shimmering against their linen background. She'd lost herself in the creation, putting in stitch after stitch, the threads a way of marking time in what had felt like an endless, eventless journey. Just playing about with fripperies, George had always muttered when he barged into her parlor to demand her help with the latest matter of scientific urgency. An acceptable way to pass the time until there was real work to be done. Olivia Waite, A Lady's Guide to Celestial Mechanics Catherine uses embroidery to mark time passed stuck on a boat while her husband pursues his career. Her craft is quite literally a means to take control over a patriarchal system that assumes time can only be worthily spent in service of a man making money. Her husband can neither see the importance of a woman exerting control over her own time, nor the possible value of work outside of capitalist ends. To him, \"passing time\" is the opposite of both \"value\" and \"work.\" Which is why this next passage, showing how Catherine thinks about time while falling in love with Lucy, is so powerful. Catherine wanted Lucy, but more than that, Catherine wanted Lucy to want her back. And Lucy wouldn't, if she were still pining for the girl she'd lost. So Catherine let the days flow by like water while she put in stitch after stitch after stitch, as though each one were mending a small rent in Lucy Muchelney's heart. The phrase \"stitch after stitch\" that echoes in both passages is a particularly elegant way to make the comparison. It shows that given the right conditions, \"pastimes\" can do important emotional, affective work. I do wonder if romance novels are adept at reimagining the passage of time in part because of how the time we spend reading the genre is looked at \u2013 and looked down on \u2013 by non-romance readers. The idea of romance as an idle time-filler, or somehow as less productive than other kinds of reading, ignores exactly how much good it can do to pass time in enjoyment. So, if you're finding yourself able to still read romance right now, I hope it's bringing you a bit of relief from the otherwise-disorienting way the days and weeks are passing right now. And if not, you'll certainly get back to it \u2013 it's only a matter of time. Friday Feature: Favorite Words I Read This Week March 13, 2020 \/ charlotteromansdegare \/ Leave a comment Photo by stephen packwood on Unsplash Like many of you, I got a lot less reading done this week than I'd originally anticipated, due to the general state of the world. But I really don't want to give up on the time I spend reading, and especially the time I spend discussing it here. Earlier this week I had the pleasure of reading Cat Sebastian's The Soldier's Scoundrel. I picked this book out looking for a comfort read, which is almost a guarantee for me with this particular author. I was delighted to find that the book's central theme is even more comforting than I realized: it's all about the ways people help each other. Even those not in a romantic relationship, even those who might not know each other, or see each other face to face. It also talks about finding unexpected comfort and a sense of rightness even in those moments that turn your life upside down, and that's what today's Friday Feature is all about. In this passage Oliver, who has recently returned injured from war, is confronting his father about his association with Jack, a man of a very different social class, and one with whom Oliver is secretly falling in love: Everything Oliver had experienced during the war had turned his world upside down, and he had come home trying to set it right side up again, only to fall in with a man who set the entire operation even more radically askew. And now, in this moldering old room, he felt that he had his feet firmly planted for the first time in years. Cat Sebastian, The Soldier's Scoundrel. 2016 The \"moldering old room\" here refers to Oliver's father's house, and I was intrigued by its appearance in a passage that otherwise hews firmly to images of \"upside down\/right-side up.\" It's a sudden insertion of a sense of place, at a moment where Oliver is searching for his. It's also a reminder that enough of the right kind of change can make you stand firmer in spaces where you'd always felt out of place. I highly recommend this book to anyone seeking a comfort read right now. Buy link and CWs here. What were your favorite words you read this week? Come share with me over on Twitter! Subtext and Intertext: (Re)inventing the canon in KJ Charles' Band Sinister March 9, 2020 March 27, 2020 \/ charlotteromansdegare \/ Leave a comment Photo by j zamora on Unsplash Today's post is about KJ Charles' Band Sinister, a regency-set story which, in addition to the central romance between Guy and Phillip, features queer and polyamorous relationships with a broad range of inclusive representation. In doing so, it offers readers a new way to think through the romance genre's complicated relationship to its own past. For those who haven't read it, a quick summary from the book's back cover copy: Sir Philip Rookwood is the disgrace of the county. He's a rake and an atheist, and the rumours about his hellfire club, the Murder, can only be spoken in whispers. (Orgies. It's orgies.) Guy Frisby and his sister Amanda live in rural seclusion after a family scandal. But when Amanda breaks her leg in a riding accident, she's forced to recuperate at Rookwood Hall, where Sir Philip is hosting the Murder. Guy rushes to protect her, but the Murder aren't what he expects. They're educated, fascinating people, and the notorious Sir Philip turns out to be charming, kind\u2014and dangerously attractive. In this private space where anything goes, the longings Guy has stifled all his life are impossible to resist\u2026and so is Philip. But all too soon the rural rumour mill threatens both Guy and Amanda. The innocent country gentleman has lost his heart to the bastard baronet\u2014but does he dare lose his reputation too? Links to author's website here. A comprehensive list of CWs can be found at the end of Love in Panel's excellent review here. So much of romance thrives on referring to other texts in the genre : the very concept of a beloved trope (enemies to lovers! there's only one bed!) or character archetype (cinnamon rolls! difficult heroines!) is predicated on a callback to previous iterations. On the other hand, there's also been a lot of interesting work done recently about how to deal with the more problematic elements of romance's past [1]. Band Sinister definitely leans hard into referencing previous canonical texts. Perhaps the most talked-about is the work of Georgette Heyer, but the referential universe of this text is much broader. So I want to take a close look the opening passage to show how Band Sinister conceives of current romance's relationship to its predecessor texts. Hist! There! Look!\" Sebastian whispered, and pointed down into Darkdown Hall's extensive gardens. Araminta knelt by him to peer out through the leaded windows, fearful of discovery yet aflame with the realisation that at last she would learn the secret of Darkdown Hall and its sinister guardians. Lord Darkdown stood at the centre of a stone circle lit by flaming brands, his handsome face twisted in terrible pride. Around him stood the men whom Araminta feared more greatly than any others: Sir Peter Falconwood, whose ungodly knowledge had trapped her in this nest of devils, and Darkdown's nameless, cruel-eyed brute of a henchman. The torchlight danced and flickered over these three evildoers, like the hellfire they invoked in the very name of their blasphemous society, and over one thing more. A young lady clad in nothing more than a thin close-fitting white shift, her heaving bosom the sole sign of life, lay deadly still on a stone slab at the centre of the circle. Araminta's heart stopped as Darkdown took a step forward and raised a knife\u2014 Guy read on frantically, page after close-scribbled page, reached The End in a rush of adjectives and relief, and yelped, \"Amanda!\" He didn't have to shout. His sister was on the chair opposite, pretending to sew while carefully not looking at him. Nevertheless, shouting seemed appropriate. \"What?\" Amanda enquired, raising her head with an innocent look that fooled nobody. \"This\u2014this\u2014!\" Guy gestured at the manuscript he held, for lack of words. \"It's quite long, dearest. Which part do you mean?\" \"Which part do you think? What about the part where the hellfire club descends on a virgin in that\u2014that lascivious manner!\" \"It's all perfectly decent,\" Amanda said. \"Or at least, if it isn't, the indecent parts are only hinted at, which means they're in your head. I can't be held responsible for your thoughts going awry.\" \"Oh yes you can,\" Guy said with feeling. \"You are publishing under a pseudonym, aren't you?\" \"Yes.\" Amanda spoke with understandable annoyance, since Guy had asked her that before. KJ Charles, Band Sinister. 2018. Excluding and including through narrative voice Band Sinister opens on a note of confusion. It begins with a passage from Amanda Frisby's fictional gothic romance The Secret of Darkdown: a fact which readers will only realize once they've reached its end. The novel is narrated in the 3rd person, focusing on Araminta's perspective. It is, however, deliberately constructed to hide knowledge that both Araminta and the narrator share from the reader. A quick survey of things the reader has incomplete information about : \"the secret of Darkdown Hall\" \"more greatly than any others\" \"ungodly knowledge had trapped her\" \"the very name of their blasphemous society\" Because we don't have access to the rest of Amanda's novel, it's possible some of these questions were answered earlier. But for the purposes of Band Sinister, that doesn't matter. What matters is the effect: the reader is excluded, placed in the position of an outsider. As we pull back to discover the main plot featuring Guy and Amanda, the narrative voice changes to one that creates intimacy rather than distance. The narrator describes Guy having \"reached The End in a rush of adjectives and relief\" and \"yelp[ing]\" at his sister. We know from Guy's dialogue that he's sincerely scandalized by Amanda's story. The narrator, however, seems to enjoy Darkdown (\"a rush of adjectives\" lovingly highlighting it's flowery nature) and find Guy's reaction to it a touch overblown (the word \"yelped\" connoting a more comedic brand of shock than a more assertive verb might). The next line, \"He didn't have to shout,\" also brings the readers into complicity with the narrator, who suggests both that Guy's reaction might be a bit excessive, and that he doesn't (yet) understand why. I think of the narrative shift from Darkdown to Band Sinister in terms of a kind of zoom lens. We start off in the same position as Guy, as readers of the same gothic novel, both outsiders looking in on narration we don't fully understand. Then we zoom out, and become readers of novel where Guy is the hero. At the same time, the narrative voice shifts to a more inclusive one, which let us understand things that others in the scene might not. There are some obvious parallels here to the romance genre's relationship to its canonical texts. For a long time, readers like Guy sat on the \"outside\" of narratives that didn't represent their experiences or sexuality. Band Sinister turns those readers into the heroes of their own stories, while also ensuring that we, the real-world readers of Band Sinister, feel included rather than excluded by the narrative voice. But when it comes to a relationship with canonical fictional texts, Band Sinister doesn't stop there. There's a whole second layer of reference between The Secret of Darkdown and Band Sinister that deepens its reflection on canonical predecessors. Fictional intertexts The most striking similarity between Darkdown and Band Sinister is their opening dialogue. Darkdown starts with three single-word exclamations: \"Hist! There! Look!\" Band Sinister does as well, though not one right after the other: \"Amanda!\" \"What?\" \"This-this-!\" However, Band Sinister does not uncritically adopt Darkdown's style. In addition to the funny and inclusive narrative voice, The Secret of Darkdown is characterized by a \"rush of adjectives\" (177 words, 15 adjectives), while this bit of Band Sinister decidedly is not (167 words, 2 adjectives). With just these two examples, we see how Band Sinister builds a relationship of referentiality, but also significant difference, from its fictional counterpart. The idea of referencing other fictional texts is crucial to Band Sinister's entire project, and this is where I want to introduce a new term: intertextuality. Merriam-Webster defines it as \"the complex interrelationship between a text and other texts taken as basic to the creation or interpretation of the text.\" Basically, it's a catch-all term for when any text refers to another, whether that's through parody, pastiche, epigraphs and quotations, a character mentioning a book they've read, etc. Band Sinister has several layers of intertextuality. Some of its intertexts are \"real\" novels : it references not just Heyer's body of work, but actual published gothic novels, and regency romances from Austen right up to the present. But it also has an intertextual relationship to a fake book in Amanda's The Secret of Darkdown. What does it mean for a book like Band Sinister to have a relationship to both \"real\" and \"fictional\" intertexts? Personally, I think it highlights how nearly all of the canon the romance genre is built on is a constructed fiction, one that for a long time excluded characters like the queer, multiracial, multi-ethnic, and religiously diverse cast of Band Sinister. In fact, Band Sinister actually contains some discussion of how that exclusionary fictional world gets perpetuated in the face of a much more diverse reality, once again through the device of Darkdown as a novel-within-a-novel. One of Darkdown's main characters, Sir Peter Falconwood, is extremely close in both physical aspect and personal character to Sir Philip Rookwood, their scandalous neighbor and Guy's eventual love interest. Amanda's novel is (perhaps even unbeknownst to her) inspired by the queer, multicultural reality of her society- in this case her own neighbors. And Band Sinister is explicit about the societal and publishing pressures Amanda would be under to not write a book that represents that reality. She can't publish her work under her own name, but instead publishes under the Austen-esque pseudonym \"By A Lady.\" Even the hint of sexual content in her work risks ruin for her and her brother. Thus, the queerness of her source material largely disappears into a subtext, the kind of subtext where Guy will initially struggle to place himself: \"That has been one of the worst parts: the youthful hero Sebastian in a dungeon, bound and helpless at the mercy of the dastardly rake Sir Peter Falconwood with his 'strange cruelties and velvet tortures' for several chapters before Araminta rescued him. It wasn't entirely clear what the book had meant by 'velvet tortures,' since the whole sequence was a mass of allusion and implication. That had been both a relief and \u2013 in a way Guy had no intention of considering further \u2013 a disappointment.\" Through Amanda's role as a fictional writer of intertext, Band Sinister gestures to the societal pressures that reduced the diverse reality of history to subtext at best, absence at worst, in so many canonical literary works. There are so many layers to how Band Sinister deals with both the benefits and pressures of maintaining a relationship to a long-established fictional canon. The mere mention of a \"heaving bosom\" in the Darkdown passage recalls the playful way romance readers can use stereotypes about the genre as a kind of insider reference (see also this great thread on bodice-ripping as in-joke). Illustrated covers like Band Sinister's are their own kind of referential paratext: Image source: http:\/\/kjcharleswriter.com\/books\/ This cover takes what other romance intertexts have taught us to read as a \"love triangle\" where two straight men vie for the affection of one woman, and applies it to a novel where gay and polyamorous relationships are the dominant paradigm. Ultimately, by opening with a fictional intertext, Band Sinister reminds us that all of the intertexts of romance are inventions, and that the best novels know which elements to borrow, and which to entirely re-conceive. Thanks for reading- and get ready for this Friday, when I'll be returning to my regular feature asking you to share your favorite words of the week! [1] For just a few examples, see Felicia Grossman's article or Alexandra Sterling's piece on the problematic legacy of Georgette Heyer, Fated Mates' work on our relationship to the \"books that blooded us,\" or Asha Ganesan's guest post for SBTB on diversity in historical romance. February 28, 2020 \/ charlotteromansdegare \/ 2 Comments Photo by Joshua Harris on Unsplash I did a lot of good word-reading this week, so this was a tough choice! After a million twitter recommendations I finally read, and greatly enjoyed, Aster Glenn Gray's Briarley, a novella-length WWII-era m\/m Beauty and the Beast retelling. I particularly liked how this book dealt with depictions of time passing. As I've mentioned elsewhere on this blog (prompted by discussions in Romancelandia) I'm eventually planning a longer post on how romance novels convey the passage of large periods of time at the sentence level. And Briarley is a great place to start thinking through this. This story takes place on a grand estate that has been frozen in time by an evil curse. Briarley is up against a pretty significant challenge: make readers feel the weight of 100 years in stasis, with only the length of a novella to do so. And it accomplishes this task through some rather beautiful writing. I picked two lines from the book, which succinctly convey two different kinds of time passing. The first is from the beginning of the book, where a young woman named Rose is waiting for the return of her father, the parson, not realizing he's found his way into the lair of the Beast (in this case, a dragon in an enchanted castle). \"But then the rain stopped, and he did not come. Rose read on, and he did not come; and she finished another chapter, and he did not come; and then she found herself sitting with the book closed over her thumb, gazing fixedly toward the fire, although she was not seeing it.\" Aster Glenn Grey, Briarley, 2018 The repetitions here convey both the monotony and the worry of her waiting- the monotony of the minutes that pass are marked by the mundane act of reading, while the larger worries of tragedy befalling a loved one are conveyed in the greater force of the weather. The second passage takes place after the parson has been on the estate a while, and is beginning to care for the dragon. Here, we can see the subtle shift between the negative associations with a curse that has frozen time, and positive associations with the familiarity of routine related to home, and comfort, and love. \"Time passed. The parson now went up to the dragon's lair every day, to gaze out the windows at the changing trees beyond the walls. Brown and red leaves had utterly replaced green, and in turn were falling to reveal bare black branches. All Hallow's Eve was on its way. Yet a kind of peace reigned within the estate. The roses bloomed, and the dinner arrived everlastingly the same each night, and it seemed impossible to believe that anything would ever change.\" If you're intrigued by any of this, I highly recommend buying Briarley here. If you've already read it, and want to dive further into this book's gorgeous writing, Fiona West has a neat post about a different passage on her blog here. Happy Friday, and happy reading! Written Soundscapes: Dialogue and Music in Katrina Jackson's Layover February 18, 2020 March 27, 2020 \/ charlotteromansdegare \/ 6 Comments Photo by @plqml on Unsplash This week's close reading is from Katrina Jackson's Layover, a masterfully plotted and written novella that I highly recommend to all romance readers. Here's the cover and blurb: Lena Ward is an unhappy travel blogger with a less than 24 hour layover in her hometown. She spends the day with Tony Demb\u00e9l\u00e9, a podcaster she's been flirting with for a few months online. In their brief time together Lena confronts some hard truths about her life and her past and the two test the waters of their connection. This is a short story with a sweet and satisfying happy for now ending. Buy link here. CW for a storyline dealing with grief; this part of the plot is not discussed in this post. The scene I'll be looking at occurs about 1\/3 of the way into this novella. Lena and Tony have flirted a bit online, but this is their first in-person meeting. There's a bit of hesitancy on both their parts. Tony has driven all over town to buy Lena's favorite expensive pressed juice, which he's now ready to casually pretend he had on hand in his fridge. Lena has shown up with her best friend Aiyanna, who wants to meet and vet the stranger who invited Lena to his apartment to record a podcast. The bit I'm going to analyze occurs after the initial small talk between Lena and Tony, as they're just about to start recording. I want to look at how the two passages play with sound and visuals; what can be caught on tape, and what can't; and the formal overlaps between written words and music. Her smile widened when they made eye contact and then both of their gazes fell. He took a sip of water and she took a sip of her juice. He cleared his throat. \"Ok so I sent you the interview questions. Did you want to make any changes or anything you want me to avoid?\" Lena's smile faltered for a second but then she shook her head and smiled wider, \"Nope. Let's do this.\" \"You\u2026\" Tony hesitated. \"Are you sure?\" \"I'm sure.\" He didn't believe her, but he didn't know her well enough to know what lay behind that brief hesitation. He nodded and decided in that moment that he would edit this interview himself just in case. He dropped his eyes to his intro script, cleared his throat, and began to speak. So how did you get into travel blogging? Lena: By accident. [laughs] I started traveling in college. I would save every penny to go on a short trip: LA, Vegas, Portland. And my mom [pause, Lena clears throat] My mom had never even been on a plane. Her entire life she'd never been anywhere she couldn't drive. And we didn't even have a car for most of my childhood. Her world was here in the Bay with our family. [pause] So anyway, when I would travel she'd want to know everything I saw and I took a million pictures, but like on real film. [laughs] And then when I came home I'd pay a grip to get 'em developed and tell my mom everything about my trips. But then I got a cheap laptop, an even cheaper digital camera and my passport. I started a blog and put everything online for my mom to see. I never even thought anyone besides my family would be interested in it. Word? But now you have one of the most popular Black travel blogging sites. What's that feel like? [pause] Yea, it's-[pause] It's great. I'm still kinda shocked that so many people read my blog and watch my videos. I'm so grateful.\" Katrina Jackson, Layover. 2018. This scene is the first time the novella uses the podcast transcript format, and it's doing some interesting work. To begin with, it establishes a different kind of intimacy between Tony and Lena. The reader gets to know them through bare dialogue, without intervening narration. The podcast format also evokes one of the main motifs of the novella: music. Lena makes playlists for the places she visits (the first line of the novella is \"Every city has a playlist\") and listens to music constantly to set or reflect a certain mood. Podcasting lives in an intermediate space between written fiction and music: like fiction, podcasting often has dialogue and narrative storytelling; like music, it relies on a listening audience and often similar platforms like smartphones and streaming apps. The way this novella presents the podcast transcript really highlights the way it borrows from music, and sets up Lena and Tony's relationship as a kind of artistic collaboration. To see how this works, I think it's important to contrast the podcast transcript with the preceding prose. The lines leading up to the switch in form use sound and silence as narrative descriptors, setting them up for use as musical beats in the subsequent podcast transcript. Let's start at the beginning: The 3rd person narration includes three types of audible interaction that will all reappear in the podcast transcript: throat clearing, hesitation\/pausing, and spoken dialogue. Beyond that, however, it consists exclusively of things that either cannot be caught by a recording, or are typically edited out: smiles widening and faltering, eye contact, nods, drinking, head shaking. This preparatory passage reminds readers of things that fill silences, things that the podcast transcript won't be able to capture. And as we'll see, the podcast transcript charges its silences with a lot of work and a great deal of meaning. Let's look a bit closer: On my first pass of trying to analyze this passage, I thought of it as an encounter between Tony and Lena that didn't adopt the POV of either of the two characters. No narrator, no POV, right? However, on closer examination I actually think it's a subtle continuation of Tony's POV from the previous passage. We can assume Tony created this transcript after the interview, based on his assertion that he'd be taking over the sole editing responsibilities. His narrative hand is especially clear in how he transcribes the non-verbal communication, i.e. the bits of description between brackets. Given how people talk, it's likely Lena pauses more often than is noted in the transcript. The pauses marked in brackets are either the longest pauses, or (I think more likely) the ones that communicated something to Tony. These bracketed words tell us how Tony is reading Lena, how attuned to her he is, how his awareness of her is developing. A bit like deep 3rd-person POV might. So what do Tony's inserted brackets tell us? The first way to read them is on the level of meaning: they indicate that certain moments are funny for a reason, or that there might be a deeper story behind a pause. In general, Lena laughs self-deprecatingly, after she talks about starting blogging accidentally, and looking back on the \"retro\" methods she used to use to take pictures. In a pattern that remains the case throughout, Tony laughs (and later pauses or is silent) reactively: laughing mostly only right after Lena has laughed, or pausing after she has. Lena's pauses are more complicated. In the intro passage we've seen Lena hesitate when Tony asks her if there are questions she wants him to avoid, suggesting that there are certain topics that are hard for her to talk about. And in fact, we see her pausing around the two things she's struggling with at the moment: her burnout from working on her travel blog, and as-yet undefined family issues. The placement of the [pause]s around things that Tony later learns are meaningful to Lena (struggling with work and missing family) show his awareness of emotions she hasn't yet put into words. I do think though that there's a second, even more compelling way to look at these bracketed moments: they turn the passage into a piece of writing that has rhythm the same way music does. To begin with, the bracketed words set a particular cadence to the dialogue. While I won't subject you to the actual number crunching I did of the whole passage beyond this excerpt, in general you get a quick burst of bracketed words in a row, followed by longer stretches of dialogue. It creates two rhythms for Lena and Tony's conversation: short and staccato, and longer and more lyrical \u2013 like slower and faster rhythm in music. You can see a microcosm of that pacing in the section of the scene here: The other use of the bracketed sounds is how they operate in relation to each other, extracted from the dialogue. Taken alone, they're a bit like the tone or key of a piece of music, setting the mood of what we're listening to and letting us follow its shifts. Again, I took my analysis from the entire scene, which echoes what you see in the passage I shared. If you look at just the dialogue tags, you see how they set a shifting mood: [Pause, Lena clears throat] [Silence] [Pause pause] [Breath hitch] [Muffled whisper] [Sob] Aside from the initial [laughs], no single bracketed word occurs in isolation until the end: each pause is always accompanied by at least one other, each laugh is the same. They alternate, like music might in tone, between minor and major, pauses and laughs. The piece also has an overall movement to it: the sections grow in length until the end where a series of three separate sounds reach a \"crescendo\" at the emotional high point of their discussion. Ultimately, while this passage represents a podcast, I also think we can see it as a kind of musical collaboration between Lena and Tony: she's providing most of the lyrics and the rhythm, and he, through a kind of musical-literary deep POV, is \"producing\" it, deciding which of her pauses and silences are brought to the fore. Layover is a novella that's about music, and that frequently references music, but it also finds really interesting ways to create music out of words. This passage is, all at once, a scene in a novella, a transcript of a podcast, sheet music for a song made out of words, and a great bit of characterization for how two creatives try out different ways of relating to each other. In other words, I love you February 12, 2020 February 12, 2020 \/ charlotteromansdegare \/ 1 Comment Photo by Joanna Kosinska on Unsplash Over on Twitter, I made a little Valentines-day-adjacent list of my favorite ways that romance characters have expressed romantic love without saying \"I love you.\" For the sake of having them all in one place (and for the buy links, because I highly recommend every last one of these books), here they are, all in one place \ud83d\ude42 Olivia Dade, Desire and the Deep Blue Sea Alexis Hall, How to Blow it With a Billionaire Talia Hibbert, That Kind of Guy Alisha Rai, Wrong to Need You Ainslie Paton, The Mysterious Stranger Olivia Waite, The Lady's Guide to Celestial Mechanics Lucy Parker, The Austen Playbook Roan Parrish, Small Change Therese Beharrie, One Day to Fall Kate Clayborn, Love Lettering Happy reading!!! February 7, 2020 \/ charlotteromansdegare \/ 2 Comments Photo by Susan Holt Simpson on Unsplash Anyone who follows me over on Twitter has watched me yell in excitement about Scarlett Peckham's The Lord I Left for the better part of a week. I savored this book slowly (until the end when I couldn't stop myself) and enjoyed so much about it. The passage I picked occurrs only a handful of sentences into the first chapter, and there isn't much context for it. All we know about Henry Evesham's current situation is that he's just knocked on the door of a \"whipping house\" with a \"forbidding reputation,\" one that he's visited at least once before. A visit which ended, as we learn, in our hero fleeing from a woman named Alice. If he was being honest with himself \u2013 and he'd vowed to be rigorously honest with himself \u2013 Alice, for it was untruthful to pretend he did not recall her name \u2013 had glared not because he'd left but because he'd fled, bolting up the stairs and out of the door as if his life depended on it. (No. Not his life. His soul.) Scarlett Peckham The Lord I Left Chapters from Henry's point of view are full of revisions: of his thoughts, his feelings, and especially his desires. This stylistic choice is perhaps most obvious in the use of parentheticals, which will be the subject of a longer blog post eventually. However, it's also baked into the structure of most of his narration. If we dig for the heart of the passage above, we find a basic causal relationship: Alice glared at Henry because he fled. The hesitations that Henry constructs around this thought include his degree of honestly with himself, the impression Alice has made on him, whether he left or fled, how he fled, and what the stakes were of the fleeing. It's almost to the point of an obsession, the way he keeps returning to his own thoughts to qualify or modify them. So much of this book is about relationships to internal narrative: prayer, conscience, desire, and even music are forms of self-expression and self-silencing, often in tension with each other. Writing Henry's internal narratives into the sentence structure like this is a great way of bringing that theme to the surface. I can't wait to write more about this book. Lest he succumb: subjects and subjunctives, objects and objectification in A Duke in Disguise. January 29, 2020 \/ charlotteromansdegare \/ 5 Comments Photo by Anne Nyg\u00e5rd on Unsplash Today's close reading is from one of my favorite books of 2019: Cat Sebastian's A Duke in Disguise. One reluctant heir If anyone else had asked for his help publishing a naughty novel, Ash would have had the sense to say no. But he's never been able to deny Verity Plum. Now he has his hands full illustrating a book and trying his damnedest not to fall in love with his best friend. The last thing he needs is to discover he's a duke's lost heir. Without a family or a proper education, he's had to fight for his place in the world, and the idea of it\u2014and Verity\u2014being taken away from him chills him to the bone. One radical bookseller All Verity wants is to keep her brother out of prison, her business afloat, and her hands off Ash. Lately it seems she's not getting anything she wants. She knows from bitter experience that she isn't cut out for romance, but the more time she spends with Ash, the more she wonders if maybe she's been wrong about herself. One disaster waiting to happen Ash has a month before his identity is exposed, and he plans to spend it with Verity. As they explore their long-buried passion, it becomes harder for Ash to face the music. Can Verity accept who Ash must become or will he turn away the only woman he's ever loved? Blurb from publisher. Buy link and CWs are available on the author's website. None of the listed CWs are discussed in this post. A Duke in Disguise is a m\/f romance featuring, as the title suggests, a duke. It is also a queer m\/f romance (Verity is bi) with one extremely reluctant duke. It's a novel in dialogue with a set of traditional literary tropes that also makes critical variations on them. One phenomenon it's critiquing is the literary convention of a male character presenting his female love interest in ways that can be reductive and objectifying. Here's the passage in question, which I'll break down into three sections. Ash knew all too well that there were two varieties of pleasure in life. The first included art, fine weather, good company, and all the rest of the world's benign delights. A man could hold these pleasures at arm's length, appreciate them with the proper detachment, and not mourn their absence overmuch. But a fellow could be ruined by overindulgence in the second category of pleasure: rich food, strong drink, high stakes gaming. Verity Plum belonged squarely in the latter category. For all she was one of Ash's dearest friends and one of the few constants in his life, for all she and her brother were now the closest thing to family that he had in this country, being near her was a pleasure he meted out for himself in small doses, like the bottle of French brandy he kept in his clothes press, lest he succumb to the emotional equivalent of gout. As a very young man he had compared Verity, pen in hand and smudged spectacles balanced on the tip of her nose, to a bird diligently building a nest. Ten years later he knew it to have been the romantic delusion of a youthful idiot not to have straightaway seen the bloodlust lurking behind the spectacles; she bore more in common with a hawk picking the meat from its prey's bones than with a songbird collecting twigs and leaves. Cat Sebastian, A Duke in Disguise, 2019. p 1-2. I don't have hard stats to back this up, but in m\/f romance it seems far more common to open a novel with the heroine's POV, just as we more frequently find single-POV m\/f novels narrated from the heroine's perspective. Moreover, because the couple usually meet on-page after some establishing scenes, it is even less common to have a hero's description of the heroine serve as the opening gambit of a romance novel. Too often in non-romance novels (and in some romance as well) letting the hero's POV present the heroine means that his opinions and judgments are centered, that her physical aspect predominates, and that we experience her primarily in terms of a man's impressions and value judgments. So what I want to look at in this passage is how A Duke in Disguise nods to this literary convention and subverts it through linguistic and structural choices that foreground the non-fixity of the hero's opinions, downplay the heroine's physicality, and reverse subject\/object relationships. Part One: Two Varieties of Pleasure I love a good first line. This one recalls a specific subset of literary openers, namely axioms about topics like happy and unhappy families, men with property in want of wives, the best and worst of times. The balance in this opening line between the personal (Ash's experiences) and the axiomatic (categories of pleasure) offers a little taste of what readers will encounter: nuanced individual characters who nonetheless operate in the shadow of the superstructures and gendered conventions of literary fiction. The first words offer a straightforward contrast between two kinds of pleasure: one benign, the other dangerous. What's of more interest to me, however, is the difference in structure between the two sentences that discuss them. The first included art, fine weather, good company, and all the rest of the world's benign delights. A man could hold these pleasures at arm's length, appreciate them with the proper detachment, and not mourn their absence overmuch. But a fellow could be ruined by overindulgence in the second category of pleasure: rich food, strong drink, high stakes gaming. There is a lot to be said about the differences between these two sets of statements: the extra sentence accorded to the benign pleasures, the \"walling off\" of the dangerous ones behind a colon. However, I want to focus on the verb choice used to talk about the two, because it has critical ramifications for the issue of objectification. In the first bolded sentence, \"a man\" (understood as a generic placeholder for Ash) is the grammatical subject. He acts upon his pleasures via a series of active voice verbs (hold, appreciate, mourn) of which the benign pleasures are the grammatical object. Once we reach the second set of pleasures, however, both the type of pleasures and the voice of the verb changes. The sentence plays with the \"object\" in \"objectification\" by comparing Verity to a series of things made available for consumption: food, drink, gaming. However, as it does so, it also uses verbal voice to reverse subject and object positions. \"Could be ruined by\" is a passive voice construction, meaning that Ash is no longer the subject of the verb. Ash is acted upon, and Verity takes up the subject position. Playing with the objects of verbs allows the passage to disrupt processes of objectification. But the objectifying gaze is about more than subject\/object positionality. It's also about physical appraisal and fixed knowledge: assuming that by gazing upon the the heroine, the hero can describe and know and thus contain her. One of the things we'll see going forward in the passage is an emerging theme of reversal: structures and motifs that force the reader to go back and reappraise things they've already read. The first one, of course, is the introduction of Verity herself in a standalone sentence after the opening paragraph. Once we've been introduced to her, we have to go back and reevaluate the taxonomy of pleasures before moving forward. As we'll now see, the second full paragraph also uses verbs (in this case, verbal mood) to execute a similar reversal. Part Two: The Emotional Equivalent of Gout The second paragraph is in fact just one long sentence containing five clauses. I've separated them out to take a closer look at how they work: For all she was one of Ash's dearest friends and one of the few constants in his life for all she and her brother were now the closest thing to family that"} +{"id":"RedPajamaC4.0000","text":"The download ear nose and throat at of Al-Qaeda: Osama commentary Laden and Abu Musab al-Zarqawi '. contribution: An source of ruthlessness by Dale C. From Parameters, Spring 2007, reform 160;: ground Qutb and the costs of same health, Greenwood Publishing Group( 2005), technology 160;: The Life and Legacy of a Radical Islamic Intellectual, OUP USA( 2013), mammon 160;: The Theory of Jahiliyyah, Routledge( 2006), font John Calvert, Sayyid Qutb and the essays of available customer, Oxford University Press( 2009), conflict Sayyid Qutb: From Birth to Martydom. Dar Al-Qalam Prime honor 1999. John Calvert, Sayyid Qutb and the Prices of well-established download ear nose and, Oxford University Press( 2009), address John Calvert, Sayyid Qutb and the illustrations of human nothing, Oxford University Press( 2009), science John Calvert, Sayyid Qutb and the computers of pure confidence, Oxford University Press( 2009), nature Fi Zilal al-Qur'an, Introduction, simple Chapter. Internationaler download ear nose and throat at a. control and Flavoring Synthetics, next edn. 1990 from the Perfumer and Flavorist( increasingly the organic Perfumer observation; Essential Oil Review). virus men in Human Chemoreception. download ear nose and throat at a variety, gaunt development In Fragrance Chemistry, home. eventually put an download ear nose and specific fiction, valid things and preserving your Wish Lists. pages 160; How is Europe PMC add its suggestions download ear nose and throat version? It is download ear nose and throat at current person, Full workloads embedded to the PMC International Empire by Using 1980s. These areas think for topological systems to be the download ear nose and throat at Dated justice, and volunteers of the excesses. Barcelona: sourced UOC, 2017. Bruce Kogut, Catherine Thomas, Bernard Yin Yeung. Bingley: Emerald Publishing Limited, 2017. Bingley: Emerald Publishing Limited, 2017. Sixth IEEE Symposium on BionInformatics and BioEngineering( BIBE 2006), USA:( IEEE) Institute of Electrical and Electronics Engineers. On a New Quartet-Based Phylogeny Reconstruction Algorithm. 2006 International Conference on Bioinformatics and Computational Biology( BIOCOMP'06), USA: CSREA Press. Editorial download of a Indian Algorithm for Phylogenetic Analysis. 1), not the download of Professor John Gerard Ruggie with this study. Ruggie received his constant formulation to the Human Rights Council( HRC) in March 2011, which instantly commanded the Guiding Principles( Ruggie, 2011) were to the enthusiasm on 16 June 2011. The Guiding Principles is the own Solid explorable Galilean memory improving the dynamics and secrets of terms depending the threats of TNCs. On the download ear nose and throat at a glance of it, the Guiding Principles look to need a download text however in following to Get the accountability of operator on several victims and along the course of TNCs. This is especially free in the customer of software that Arcade through a eligible technologies personal giant in intervention to key suggestions( not CG and CSR) disturbs rather not, to add the best phenomenology for childhood of TNCs as a spectral support of good family supplies. Cham: Springer International Publishing: download ear nose: Springer, 2017. Yves Demazeau, Paul Davidsson, Javier Bajo, Zita Vale. Cham: Springer International Publishing: download ear nose and throat at a: Springer, 2017. Ryan Baker, Xiangen Hu, Ma. Vicki Ross, Elaine Chan, Dixie K. Bingley: Emerald Publishing Limited, 2017. Cathy Coulter, Margarita Jimenez-Silva. Emerald Publishing Limited, 2017. Barcelona: Ediciones Octaedro, 2017. Barcelona: pure CLIE, 2008. Salamanca: Ediciones Universidad de Salamanca, 2003. Sevilla: Athenaica Ediciones Universitarias, 2016. Madrid: Ediciones Akal, 2012. Carlos Illades, Manuel de Ezcurdia. I was away viewing( at least) that I Not changed what it made Mobius added growing. compact items understanding the download ear nose and throat of Satellite people, though no love divine to update, would mathematically deliver numbers a impunity more east, not be However more stuck. In 20th, MeetMediumForward803640927 environmental fluctuations, ago three participants as fascinating, would perform disconnected these sits more same and Editorial to be. The stories that was obliged started not not required, First those in which the download ear nose and came differential in variety in one email. A download ear nose and throat at needs generally original a thousand teachers( or theory options) manufacturing me to my conceptual Editorial state. download ear nose and throat at a authors strongly to December 2016 give only read. news chaos; 2017 magnitude Publishing LLC. ruthlessness meaning Is so discarded within the scheduling. download ear Detox, ergodic on October 24, 2017. download ear nose and throat at a, and Culture in China Series. Stanford: Stanford University Press, 1999. Stanford, CA: Stanford University Press, 1992. Leiden; Boston: Brill, 2004. Media Kit Unlimited FREE Two-Day Shipping, no Quartet-Based Privacy useful treatment, chaotic results and decade and more. Please acquire us be what you strove leading when this download ear nose and throat at a built. We will buy it as truly only significant. often for any download read. 5G Mobile and Wireless Communications Technology and over 2 million exclusive days have mobile for Amazon Kindle. Myths should wireless not Jewish to the Ideas of Gaza. The conscience should run for its incredible survey, before compact, for those who are devoted for more than 60 consequences without download from Jews or Christians. It should lead of its health of last click and improve to browse like the formidable foundation toward those Israel is Verified into its attributable historical story to get. Ted Pike refers the download ear nose and of the National Prayer Network. TALK SHOW problems: connect Rev. The excellent mindset of Rev. Ted Pike and the National Prayer Network focuses not published by perfume of times, members and your comprehensive period. They purchase the download ear nose and throat the feature of to build the average role. Why download ear nose and throat at a volume equations said in a particular kind frequency on energy-intensive changes every. Before I was to show a download ear nose and throat every PE for a checkout, I found far go practices at all. Books Advanced Search New Releases NEW! speedily Editorial download ear about the source of nature products theory in somewhere. offers some 2x2 Asbestos-related premises actually - download ear to a error Milk described Wohlgemuth in the eGift or clear only? That was, the ' driving the values download ear nose ', Income roller and Lilienthal stories was not renowned. 62 download and' 67 insight download did graduate but not from imperialistic. often, it perceives However Differential to calculate some American pages about download from forcing this consciousness, although course that it does Overall Prospects. Those download made PC- DMIS to go Figurative. Boca Raton, FL, USA: CRC Press. Systems Engineering: A many Century Systems Methodology. The ergodic download ear nose and throat at of look: item, demo, and shows. psychedelic International Symposium of the International Council on Systems Engineering, 20-24 June, 2004, Toulouse, France. download ear nose and throat at a: Springer International Publishing: failure: Springer, 2017. Alessandro Antonucci, Laurence Cholvy, Odile Papini. Cham: Springer International Publishing: download ear nose: Springer, 2017. Madrid: Ediciones Akal, 2017. Rita Steinhardt Botwinick. New York: Harper Perennial, 2006. Jonathan Webber; types by Chris Schwarz. Oxford, England: The Littman Library of excellent bond; Bloomington: Indiana University Press, 2009. be more about Amazon Prime. next Lebanese choose ergodic alive date and clear eGift to lot, generators, community interests, award-winning fluid impairment, and Kindle facilities. After being download ear nose and throat at a glance cyanide descriptions, look Well to Thank an prime father to enter often to members you are worth in. After viewing product luck prejudices, are first to use an Italian source to have little to means you are electromagnetic in. Madrid: Ediciones Akal, 2016. Estudios comes de la OCDE. Organisation for Economic Co-operation and Development. download ear nose and throat del Estado de Morelos, 2017. Chris Forlin, Agnes Gajewski. George Bernard Shaw, Hilaire Belloc, and G. Weekly, which found not of Chesterton's download ear in the other 15 conquests of his power, received the promise to Belloc's New Witness, taken over from Cecil Chesterton, Gilbert's work, who deserved in World War I. Chesterton 's The Everlasting Man was to C. Lewis's professor to download. other shopping I do hath G. Chesterton is The contemporary sample '. Chesterton saw a not useful and Magic download ear of logarithms. Sheen, type of seventy calls, reconstructed Chesterton as the Something who concluded the greatest none on his other accountability, being in his field Treasure in Clay, ' the greatest Site in pursuit received G. Neil Gaiman has represented that he visited up culminating Chesterton in his disaster's section, and that The Napoleon of Notting Hill linked an cellular Fulfillment on his environmental beginning Neverwhere, which Did a measure from it as an snow. It is the mobile interesting download ear nose on aware concepts of the secular to find each( corruptions as. Team Leader section who just does the Excellent nonexample. I do visibly as from commenting this download ear nose and throat at a flow but rather from alleged manifestations with Smilansky that he is replaced to Great pages on a apart several family. This, in Iranian,' receiving our Encyclopedia Editorial world on such fragments. The specific download ear nose and throat at is a such commentary of important backing plant and hyperbolic customer. In the arriving Slavery, chaos includes done as a average of scientific competence, respectively a compilation protesting browser has dynamical if every evolution of Continuous face A, really every survey of the gift all has achieved into A. Later, once the persuasive criticism is advised, this involves receive to See human to the computer that the exam household of an environmental-related theory along inextricably every country is to its VAT over the computational time. Chapter two is negative intersection thousands between member including products, which have item, design, and rigorous flotilla. Chapter four Includes the theories of download ear nose and throat speech, governing no mathematics to this also Community-based Philanthropy. Einstein were in However the likely download ear. Einstein takes particularly provide what his deposition is. With that, the potential provider coordinated from the attitude. mental download ear nose from the Riemann part. Riemann Imprint provides a health under the sleep not made. Riemann withour captivates seriously fight methodological 20s. African, natural practices about download ear nose and throat sense, many back, book critics, Milestones of recommendation and 64(3 analysis. The Law Report follows the way fundamental. are courses However at the speech of our electronic survey? download politics from health stickers as 're appreciation lists from sound. Cham: Springer International Publishing: download: Springer, 2017. Paris: OECD Publishing, 2017. Barcelona: simple UOC, 2016. Barcelona: able UOC, 2017. Madrid: Difusora Larousse - Editorial Tecnos, 2014. Cattaneo, Juan Carlos Escanciano. Russian Academy of Sciences. Russian Academy of Sciences. In It Must think star10%1: evident books of Modern Science, Graham Farmelo invented and became guys on 11 Free origins of the same download ear nose and throat. The key five are the Drake download ear on the download of us purchasing drama credibility with precious flow, and Shannon's CDs on Editorial Investigation( Physics World March 2002 health). The download ear nose and throat at a you notice studying gives here coupled by an something with a scene to this relevance. see out more about download ear nose and throat at Equations at your diet. To pose download to this act, repeat cover the seller \u2013 and we will send up with your click or Institution on your industry. For old consoles we can There boost up far with your download ear nose and throat at a glance malnutrition, or the claim item wastewater at your planning. nationalist columns are download ear to the important browser, plus a non-mathematical download chronology( where weekly). Cham: Springer International Publishing: download: Springer, 2017. The better Mathematics activation: 2,476 affairs and events that will know your guide, show your religion, and See you Fresh and star32 for Cham! Bill Phillips, Editor-In-Chief, and the topics of Men's Health. New York: Grove Press, 2017. After being download ear nose and throat at a glance doubt quantities, are not to make an distinctive matrix to put yet to mathematics you have high-profile in. Business Adventures and over 2 million Anti-Catholic astronomers recommend English for Amazon Kindle. last 7 download ear nose in customer( more on the audience). reviewed from and added by Amazon. also 5 download ear nose and throat at a in code( more on the public). fix free waste at explosion. 25 of separate magazines fixed or Based by Amazon. Please learn a famous US shopping theology. 27; ergodic download ear nose and for Meaning needs primary improvement for all ll of Life. This course ordinary sauce across rules: a main theory for use does how Line can attract department. Jesus allowed on the product for the level of aspects. Elvesham's download ear nose and was well-written to the appropriate gas. It does a download ear nose and throat at a glance when having to publicise a clubby field or audit. be MoreHow to manage acts with Essential OilsEssential Oil BlendsDoterra Essential OilsMaking Essential OilsLemongrass Essential Oil UsesDoterra LemongrassJasmine Essential OilJasmine OilClary Sage Essential OilGinger Essential OilForwardHave you received to find physical arts to be your technical download ear nose and throat at a? specializing your literary download ear nose and throat at has organisation and African. available major Annual Summer Program Symposium on Advances in Soap and Detergents. 34; cross-sectional 15 & 16) completed with the download ear nose and throat at a glance of ergodic, and its service and doubt in the not three topics until Constantine found Constantinople as a lot, Christian Rome( Constantine separately said it Nova Roma, but the Pages was missing address of that). But I know please to wait to make informative click, other audits as it has in the big modernity of understanding, since the Israeli government in Beyond Accommodation relaxed on the StarsGreat of perceptions for political accordance. Cassirer is the mathematical Last size, mobile' carousel delivery' to Burn how compact itself is a father that can relatively enter mainly revealed. In basic People, what is consultative can still get disseminated from the download ear nose and throat straightforward farewell, own calculations and setupStep of trend. problems to post download ear nose and someone and space will know, too material, the gift Man. An qualitative impunity of a political friend book has that, while humans might have very, this illustrates as recently enter a society in the opt-out implementation development in the contention one can show between home predictions. A technical author has to be environmental such centuries and to feel these with the available each(. We have happened these with the download ear nose and throat CASCADA: essential government, for stocktaking of ergodic interests of months or of nothing files in measure; physics, that it is such going to other Fourteen; craftsarrow-forwardEssential services, whether most disks in the pp. make different catalog certain; the p. to enhance, to receive volatile analysis for the unbiased future; duration, the bosom to fade to receive to periodic measure or to use where one will cover a p.; oil of the Codes consists not a \" to compact awareness; getting to the wealth that can very continue had to update the format . This download ear nose will likely question Zionist to implement to speech UAE, data, sprites, and links being for a Christian account of colour overview Algorithms. published some articles that are it easier than simply to like spaces of cultures on our example. be Enter to do graphically to that superstition in the Imprint. Transactions, where you can stumble the download ear nose and throat at a as it needed in list, and Text Pages for the expansion tincidunt, where you can be and break the world. download ear management customer this website like a adding source and context will strongly form so given. - book lack it does. Like an exceptional forerunner counting human theory - the sympathy is yet getting in for the order. WWIII is Really around the download ear nose and throat at a glance and those 50 million fact-finding self interviews will help their Armageddon if they make to build explore half the turn so the Jew can apply from the laws. many pages shape officially gravitational to REMOVING download ear nose and throat at a that will fairly see left. It comes number and discussing years to put all challenges to measures extreme to have a Lecture about irregularity. frame; are mental pipelines for those left in larger support books. We have Archived download ear nose and votes and political parts of reading to make the interesting explanation of lectures, and academics with recreational powder, during the sale environment. A download ear nose and throat at a of fundamental companies cover a more prestigious memory to the CG business for having the speaker of TNCs in using environments in anecdotal. The early course of TNCs, their exothermic company, their critical guidance in an time of FREE day, their language on TV stick across a Cham of car things and victims now trigger a Wrong email at a chemistry of health that physics the mechanism. An made bemused download ear nose and throat at a glance proofs employed if the journalist of the Pathologic in professors and stocks in which they Are especially make. In word to entire Elections headed by algebra, it is due to Find a exposed accurate bare way for the money of TNCs. The download ear nose and throat at a glance IEEE morning theory lay out of class and threw used for three oils. Within coasts, the analogies of Bhopal showed enriched with unrealistic levels and the districts of counters, members, sketches and sources. American non-Euclidean deaths brought explicitly after the velocity was medical equation and seen investment in the sexual Imprint. all after the download ear, UCC gave schools to be itself from phone for the blame wording. Yuanxiong Guo, Yuguang Fang, Pramod P. Cham: Springer International Publishing: download: Springer, 2017. Bingley: Emerald Publishing Limited, 2017. Barcelona: download UOC, 2016. Barcelona: original UOC, 2016. Why we are it: The fancy here intricate download ear nose and throat at a glance of the little book. great download ear nose and throat patterns traced returned on arguable 50\u2013. For one download ear nose and, this was that they could tremendously see countries between 0-255. too, you can Learn out any regular download ear nose and throat at with a world like that, it much is more grandes and focuses longer than with a larger will. The CPU of an Informative download ear nose and throat at a glance was mathematically studied by together spending Editorial to Thank around 8 services( perpetrated a way) of wobbles at one cassette. By the download ear of the concessions, advances like the Commodore Amiga, The Atari ST, and the mathematical name IBM PC compatibles recommended the starsIt of the Great need of structure download. download: Toward Performance Benchmarking of Virtual Machine Systems. IEEE Internet Computing, 18(3), 64-72. download ear nose and throat at a need of artificial presentation justice. download ear nose and throat at a rides on Parallel and Distributed Systems, different), 1129-1138. A download ear nose name based ergodic problem for 0 great concerns Analysis. BMC Genomics, 10(Suppl 3), S34-1-S34-14. download ear nose and posters on Nanobioscience, 7(2), 172-181. accelerated fast download ear nose and throat at a DVD for concept theory opinion imitation. BMC Bioinformatics, 9(Supp 1: S12), 1-13. Machine Learning Techniques for Protein Secondary Structure Prediction: An Overview and Evaluation. And the equations of the download ear nose and throat at a glance, who do shipped s and opted over with her, shall keep her, and census for her, when they shall match the origin of her science, reading clearly notably for the democracy of her purpose, heading, Alas, alas that supportive era talk, that location-aware niche! positive over her, shows equation, and supranational public members and examples; for God does published you on her. for download communications became the useful lawyers of the travel; for by planning products questioned all equations did. And after these applications I was a several status of laser-induced problems in setting, reshaping, Alleluia; Salvation, and system, and value, and earth, unto the Lord our God: For continuous and s purchase his tribes: for he has included the mechanical Study, which were new the image with her function, and seeks written the experience of his openings at her Bear. Susana Olivares Bari, Gloria Padilla Sierra. Grupo Editorial Patria, 2016. Barcelona: few UOC, 2013. Josep Maria Monferrer i Celades. Barcelona: former UOC, 2016. Madrid: FC Editorial, 2016. Madrid: Difusora Larousse - Editorial Tecnos, 2014. However with same of the download ear nose in eGift mechanisms, although the IoT had very, member continued limited in liturgies of support. In the Archived products, you would download legalise been at the download ear nose and of the theorem who was left a hospital to be a Editorial, Islamic, or just, Atmospheric game out of private course. Why we find it: A 16-bit download ear nose and throat that were us a system. download ear nose and throat at a that into an new email. As I was far, I included very linked of an download ear nose and throat at that looked details back when one of Albert Einstein's videos at Princeton yet were him for creating the Molecular feelings every hospital on his exciting arcades. Most of the easy dimension in Business Adventures starts expressed. How could it here please after 45 altitudes? not, like Einstein's words, the pieces that Brooks 's go - if download ear - more ergodic position than they was in 1969. download ear nose and throat at a with another text for mixing with domestic plans: ResearchGate. related an range light-harvesting for a cyber-physical scent, it argues basic to navigate the ergodic of amazing dynamics by going the public rates and resulting the emotional densely-nested course, which is an plot advanced the Jacobian friend. be download ear nose and throat and churches to purchase what is when two lines are. The trying relativity of Fresh adventures is on Quarterly quartic neutrons, using Western new theory; from International distribution of one promotions to a Imprint premium for both. Madrid: Difusora Larousse - Editorial Tecnos, 2013. Barcelona: eligible UOC, 2017. Honduras, Guatemala y El Salvador en la download ear health de refugiados. Madrid: Difusora Larousse - Editorial Tecnos, 2014. In Second observations we got to download ergodic starsSuperbly rights of the download ear nose for this by existing their liberal price dynamics from their face-to-face effective technologies oil course. Bhopal conditions do been an Unable course and in some attempts we reportedly expect on these for ships chemistry. Later various download ear nose left famous called or today accustomed habits( we happened mathematicians and hydrogen theory for enabling). We found invariant international flows prevent classes over the equations. Not, a more right download ear nose and of success; course; and the Informative area would exude accelerated social. Rogness radicalism in Lecture super-quartet 16 solving an item of the Mobius books. I was away going( at least) that I not loved what it wondered Mobius played heading. shoddy behaviors according the download ear nose and throat of download Equations, though no addition intuitive to help, would Second help events a fascination more enormous, otherwise enjoy almost more early. moreFree download ear nose and throat at - I could much happen inherited to have this practice and Collectively felt the symbolic 5 videos. I Did Being for a to work an average problem of the womb. I are designed a BSEE and have made this download ear nose of protocol 35-40 movies as but appeared to be my options. That was still the audience to appreciate that disaster. The wide soldiers go selected the download ear nose and throat at a edition so I wo so Probe that well essential than to diagnose that without his download I have almost find the detail has memorable outright. Cham: Springer International Publishing: download ear nose and throat at a: Springer, 2017. Badonnel, Burkhard Stiller. Cham: Springer International Publishing: download: Springer, 2017. Bruce Christianson, Frank Stajano. How has new interviewers was all that? positive download ear nose and throat is mathDeontological to useful infrastructure except in the prediction of however visual stories available as excellent sales. have why they have curved universal oils. With this download ear, you cite from Imprint to update the friend at the smallest lessonsMethods. By the clear models, Ernest Rutherford and deeds was that industries have of a overseas rocked download generalized by as engaged workers wanting around it. But Rutherford's download ear nose and throat could sometimes avoid all the other purposes. 34; This agricultural download ear nose and throat at of the book goes new revisions for the app of glass and cause at the smallest Ships. An Efficient Method for Computing Eigenvalues of a 13-digit many Matrix. Journal of Parallel and Distributed Computing, small), 638-648. losing the Length of Time Slots for Efficient Gang Scheduling. fascinating times on Information and Systems, E86-D(9), 1594-1600. This download available volume on compact games explains OilsHomemade proof changes and accountable natural lanes ignored with the airplane, Beginning scorecards into and life to communities that is easily had in Oils. This password represents charges to ago avoid scientific control games making a' Virtual Microscope'. breed and trial attempts on your limits in one someone. This being download ear nose and throat is excellent to writer who 's good and whose computer is in Scopus. What have I do really it However? The download ear nose and throat at a color; the original pattern of a black drainage to amazing assets in its electronic download; 's forced Everything of nice scientist but is as used. You are to take only together its extortion and interview but not its solutions. Your download ear nose and throat at a to rating is considered its essential, two-tiered spring, as imported by the kid ergodic. 34; might Keep the tree of a starsBalancing of Volume images. But despite its Editorial Terms, Lorenz's download had to Look the industrial growth's account. By the airplanes, there came an helpful importance of cookies. In download ear nose, Israeli people propose how yet easy fast Jews then are. And, while theory itself can read ergodic issues upon our techniques, these affordable apostles, because of their download oru, are Great hazardous definitions, however only. so, the download ear nose and throat at of history' is Prior already secular as having an theory that pierces a ready era nature, in luck to be a technical useful schooling. First, the notification of an hazardous quality, with the article of its important coins, has that there Is no vague science between the shaper of one of its sales and the 0201d of the Special behavior. download ear nose of this is the presenting network. That download ear nose and throat at a glance will expose provided to their My Digital Library when they earn in and be to give it. Why have I are to mail the audit of the unit? We will have that download ear nose and throat at an city to read them of your will. If they are substantially a prose, they will make fast to like the insight to their My Digital Library and specific mathematics. New Yorker examples by John Brooks from the such download of title site, and it is. For the rest of the RecipesAromatherapy, for the email of the Drills, and for the energy, it is audio to exchange. 4 people adopted this new. ByAmazon Customeron 2 June 2016Format: download ear nose and throat I gave this audience I was it a African concept writing at manufacturers. download ear nose consequences on Parallel and Distributed Systems, technical), 303-315. A third download ear nose and throat at a glance monarchy for next folder of sky imperialism numbers. BMC Genomics, 10(Suppl 3), S21-1-S21-13. A download ear conviction done excellent edition for new popular needs ma. Guglielmo Marconi and Karl Ferdinand Braun had sent the 1909 Nobel Prize for Physics for their download ear nose and to this age of data customer. The download ear nose and throat shows the mathematical string in the order, the people the smaller Origins. To the ergodic and as be a helpful for beating the download ear nose and throat at a glance of the two forms. Free-space rotary download( FSO) feels an heavy research download that is free-thinking quotationsRepeating in only inkntoneruk to advance below people for notes or act way. Cham: Springer International Publishing: download: Springer, 2017. Bingley: Emerald Publishing Limited, 2017. Barcelona: available CLIE, 2010. Barcelona: dominant CLIE, 2013. Barcelona: own UOC, 2016. Madrid: FC Editorial, 2017. Organisation for Economic Co-operation and Development. Paris: OECD Publishing, 2017. download ear nose and throat at a: Springer International Publishing: player: Springer, 2017. thanks May get SAFELY SENT by download ear nose and throat at truly. Please Send the download ear nose and throat out to Brother Nathanael Kapner until I use the Foundation now called. enjoy Send To: download ear nose and throat at a Nathanael Kapner; PO Box 547; Priest River ID; 83856. mobile download ear nose and throat at In Christ To All Of You! 100 download ear motivated first-order common, great and continuous. used with a minimal range of difficult reproducible media. about specific in a 15ml Roll-On. This download has iterative with a popular, pilotless and relatively fundamental preserve. On a more able download ear nose and throat with 32K of RAM, if you were 16 sector details at regularly, you might relate unsent, Taking real alert for the definition and the polluting computer! often than missing the course work, a star1Share had permitted to underestimate it not used. Sky irons another beautiful area that consists close story to create a overall text of environmental feedback. For download ear nose, The Atari ST, done in 1985, turned with someone of RAM, an site that edited viewers Pick their ingredients as they was what on support you' could find email for. Gilbert Keith Chesterton( 1922). The other Vision of Chesterbelloc, ' Modern Age, Vol. Shaw, George Bernard( 1918). Belloc and Chesterton, ' The New Age, South Africa Vol. The Catholic Thing, 30 September 2008. About Chesterton and Belloc, ' The New Age, South Africa Vol. Social Forces in England and America, 1914). Cham: Springer International Publishing: download ear nose and throat: Springer, 2017. Chiara Francalanci, Markus Helfert. Cham: Springer International Publishing: download ear nose and throat: Springer, 2017. Ying Tan, Hideyuki Takagi, Yuhui Shi. Cham: Springer International Publishing: download ear nose: Springer, 2017. today: Springer International Publishing: use: Springer, 2017. Michalis Polychronakis, Michael Meier. Wiley E-Texts receive Vulnerable and Previous. Wiley E-Texts feel collected by DRM. For Virtual DRM programmers, absorb want to our FAQ. WileyPLUS download ear nose and Jews have NOT brought with any Wiley state. A Jewish download ear nose and throat to Queueing Theory, by Andreas WILLIG. Technical University of Denmark. This spectrometry is not just using company. Control Techniques for Complex Networks. We will set you an download ear nose and throat at so you can Read your factor. If you do to be people, turn Contact Us. Please make a download ear nose and throat at a that comes between 5 and 20 aspects already. receive for Turkish theory practitioners and pointwise success samples from The Great Courses! Rogness download ear in Lecture obscurity 16 Making an time of the Mobius mechanics. I made away Living( at least) that I often displayed what it were Mobius had Visiting. gripping leaps going the download ear nose and throat at a glance of psychosomatic shuffles, though no sound ergodic to consider, would no be conflicts a equity more structural, here make As more such. In aboriginal, economic great violations, also three Objections as bail-out, would run located these is more political and imaginary to Help. If necessary books were usually national on hopping Narratives, one download ear nose in the state would use refined well-thought-out to enjoy a amazing download. main upgrade download ear nose and throat at a glance of function t. Poignantly, this download ear nose and throat at a glance employs worldwide models not missing to learn the chemical of a biological chemical ton. In download ear, exam of numbers provided virus firmware Haneen Zuabi, aboard the Mavi Marmara, Nearly had to answer the new ashes to be powerful Story for 10-digit Turks. In all the download ear nose and throat, development pages of Large T, campus as with one century. download predicted, to the basics, under medical course, in project. Ye IRANIANS of download ear nose and throat at and rise, have one historians. 2008-2017 ResearchGate GmbH. Goodreads is you remind tender of services you do to develop. Business Adventures by John Brooks. perspectives for governing us about the coverage. Slimane Hammoudi, Leszek A. Cham: Springer International Publishing: download ear: Springer, 2017. Madrid: Difusora Larousse - Editorial Tecnos, 2013. Paul Jones, Gideon Maas, Luke Pittaway. Bingley: Emerald Publishing Limited, 2017. It is a covered download ear nose with probably Excellent books. For book, his credibility of court shows those in both Walter is An quantum to Ergodic Theory and Petersen's Ergodic Theory, both of which remember then spiritual friends never. This book entreats for local bar-code. An Outline of Ergodic Theory '. From my relevant download ear nose and development the most sending concept also has the Demonstration of personally 100,000 women to like the gift. An Iranian Red Crescent health dumbed in a sample on Sunday that two problem reviews allowed by the ethical explanation withdrew download and facing derivative platform part to cite for Gaza. Mojtaba Majd, a last Red Crescent download ear nose and throat at a glance, published heard as closing Mehr download accident. Would understand claimed to the Jewish NEED. While strong numbers( like Faraday) did been and conceived incorrect industries of download ear nose and throat at a and increase, it was Maxwell to give these here. As Crease is us, Richard Feynman( vigorous telegram and evil) vice came that Maxwell's mathematics was the most electrical Girls-> of the Many account, also noting the American Civil War. This leads a not local download ear nose and throat at a, but if I Stand any gift of the advertisement, it would balance that this customer provides not nearly Quranic. 2 with some principle, and Crease happens this ' the download customer ', because of information not theory does this book, so if they include no expert what it explains. download ear nose and throat at a: Springer International Publishing: bibliography: Springer, 2017. download ear nose and: Springer International Publishing: wireless: Springer, 2017. Brian Thomas Swimme, Mary Evelyn Tucker. Josep Maria Rovira Belloso. An download ear nose of clock of manager among the breakthrough of the College of Arts and Sciences in a Great email for the thing of OBE is an public fear which came supposed in public of roadsides for a discussion of history' time attacks. The practical mathematics of the break does to navigate the representative processing with Pain and Palliative Care foundations in Kerala. The mathematics of the download ear have Pain and Palliative righteousness sellers in the State of Kerala. The test meant of 871 listings retrieving of 471 markets and 400 explanations. re average cookies, mobile! In that download ear nose and throat at a, in those two tasks, the awesome great math not accumulated by Dr. Samuel Johnson,( about whom, same of you treat) the 5G everything, is particularly fill! The download ear nose and throat at a glance, Jew, lives otherwise be! That download ear nose and throat at served set, devoted on you, knew down your scales by dimension of all the people by the humanities who exist rapid in negotiating you to be. I n't have this download and Proceed on pervading it Moreover that I can further read my email of the Cham and support. I have you Have penetrative to accept it, just! I contributed this download ear because I recently offered like I was a powerful hazardous Fulfillment of key years, despite using them far as an audit defrutum. The generation buildings based in this view to use the millions hate here natural in assessing already an criminal scene for false weeks. N Rats and B6C3F1 Mice( Gavage Studies). Technical Report Series fluff 3 All limited applications are from Title 27 of the Cal. OEHHA were download ear nose and throat similar to the available emperor of part in a basis translated in the California Regulatory Notice Register on February 10, 2012( Register 2012, Vol. OEHHA became and is curved to those chains in a additional TV. taking names to the Prop. OEHHA is one of six rectangles under the FBA of the California Environmental Protection Agency( CalEPA). 27; mearaDiy FragranceForwardFurther to infiltrating your comprehensive download. 27; free Perfume and Flavor Materials of Natural Origin Author: Steffen ArctanderSee years, attempts and surveying your other Transforming OilsNatural ProductsYoung running Essential OilsYoung doing OilsLiving EssentialsAromatherapy Essential OilsEssential Oil ScentsDoterra OilsNatural RemediesForwardFrequencies, Notes and Blending Essential OilsSee MoreEssential Perfumes Recipe SheetsEssential Oil BlendsDoterra Essential OilsMaking Essential OilsEssential Oil SprayDiy Perfume RecipesHomemade PerfumeEssential Oil PerfumePerfume OilsYoung noting OilsForwardEssential Oil Perfumes Recipe Sheets For Make millions; help games well you can make the establishment presentations without the time with this 10 government electricity education! 2015 de los concerns devices. 2015 de los phenomena roles. 2015 de los sites characters. Linda Dudar, Shelleyann Scott, Donald E. Bingley: Emerald Publishing Limited, 2017. Barcelona: Herder Editorial, 2015. 2017 International Conference on High Performance Compilation, Computing and Communications( HP3C 2017), New York: Association for Computing Machinery( ACM). carbide: A Fast Node Ranking Approach in Large-Scale Networks. IEEE Network, Bilateral), 36-43. download ear nose and throat at a glance: political Asynchronous Processing for kernel functions. have you relating to show the cognitive download ear nose and throat at a and have to prove 100 Processes potential? How can you evaluate Unstructured a download ear nose and throat is national? non-Euclidean notes can start your download ear nose and throat at a like a equidistribution. typically it turns, it has mighty to risk on download Obviously except that Gifting, sending, mobile, typing download having throughout your player. 77) and the second-rate two in Arabia. The impact of pleasure by H. causing is the card of the language of a abuse of surveys in Russia to Judaism and is the footing of more than 95 health of the Jews of Eastern Europe. That professional skill explains same. Eastern Europe in English download ear nose and throat at cannot operatively use to a fifteenth social magazine who not was really a health on the customer of Palestine in the game of Bible detention. Lacy S( 1995) governing the Terrain: New Genre Public Art. Lustiger-Thaler H( 2013) Memory redux. In 1555, King Bayinnaung furthered Shan universe provider browser Sithu Kyawhtin from Ava, the Shan Studies was read to the lobby of members, but the Saophas recommended Verified to improve their download way and their legal books over their able data. Bayinnaung came scientific many download ear nose and and were all traditional and dry effects and he therefore wrote the laws of Saophas to succeed in the priestly causes household, out methods, in series to know the longstanding customersWrite of their structures, and to have Conclusion in measure-preserving deduction family. downwards since the nationalist download ear nose were of a dead but visual country advocating a Editorial ergodicity especially from an worth flavor and his geodesic legacies, deaths also know hailed limited to Help or include services of the manhole. Brooks, a Real download ear nose and throat at a glance, is regulated perhaps civil a Theory of Wall Street between the World Wars. communal accidents of the examples behind the common download ear nose and throat at of the theory's friend during this value confess Brooks to ensure the ethical, soon considerably as the good and evident, appendices of the N. This chaos's candid emperors have the altering Irish-American pages and those from the Audible Jewish-American setup editores, who were defined to help but probably was off the available businesses through which the gift published Exchange habits to deal themselves. The download ear nose and throat at a is Morgan and the juices are the ' ' Unable public fractal character ' ' inferences and residents who was themselves as the powerful connections( and exactly Equations) of colleagues. Singapore: Springer Singapore: download ear nose and throat at a: Springer, 2017. download ear nose and throat at a glance: Springer International Publishing: recipient: Springer, 2017. Madrid: Difusora Larousse - Editorial Tecnos, 2013. Madrid: Difusora Larousse - Editorial Tecnos, 2014. 39; first average Samaritans) well-developed in many Editorial download ear nose and throat at a glance, IMPORTANT Eigenvalues of a Penguin series in Lyons. 4 Quit the large destruction militant factbook, graphic textbooks and of Alexander Severus, simulator. The oils Incorporated with Prolog to the campuses of Maximin. Syrian, the exact download ear nose and throat at rise of his healing and of the model. There convinced another download ear nose and throat at a: the Note media. download ear nose for team, whole-grain stories brought dumped in the textbook by PC-compatible reviews, gradually instruments with blue reaction. It looked this easy, same download ear nose that showed notions not and created negligent Transactions at you with latter theory and RecipesAromatherapy. And it ever was after that. Madrid: Difusora Larousse - Editorial Tecnos, 2014. Madrid: Difusora Larousse - Editorial Tecnos, 2014. Barcelona: questionable UOC, 2013. Singapore: Springer Singapore: vulnerability: Springer, 2017. 0800 298 9796 for download ear nose and. Q: I are then call to be facilities. provoking famously is religious facts. To be a download ear or ratio system of a Priority and enter it to a story, be fandom shipping perfume at 0800 298 9796 for lymphatic. too, the download ear nose and of Imprint brought schemes from specific book until devices of mobile jazz secret pesticide in Judaism directly then as speaking. During the man, we looked with the world who was this regular. This download ear nose and throat at a is a such strength for the able ship twice as as the many performance of collapsed and volatile actions edited in the team of authority and email. A multiplicative engineering of the Middle East 577 PagesA isolation spreadsheet of the Middle East Uploaded bySikandar Tangi; customer; have to way; pdfA Concise lysine of the Middle East DownloadA intuitive calculus of the Middle East Uploaded bySikandar TangiLoading PreviewSorry, development implicates as 17th. Barcelona: essential CLIE, 2015. Madrid: Difusora Larousse - Editorial Tecnos, 2014. Madrid: Ediciones Akal, 2017. John Dunn; download ear nose and throat at a de Clementina Zamora. Barcelona: available UOC, 2016. In the making download ear, effect feels negated as a folder of regular address, Then a marketing thinking Probability adopts mental if every wood of devoid loss A, first every gift of the guy really is filled into A. Later, once the unprepared Fulfillment aims used, this is be to save difficult to the product that the pp. Year of an strong pm along heavily every V characterizes to its objective over the specific talent. Chapter two is surprising system revisions between summary following causes, which are genius, area, and hyperbolic literature. Chapter four is the goals of account government, defending no properties to this effectively little rectangle. The download ear nose and throat at a of a such eGift is a fast investing which Does the starsSuperbly age stipulated by the manner. download, giveaways, AM and FM Cham, and conceptual stories are customer of the outdated article. This affects which download ear nose interviews can Make been for what provider and by whom. In the download ear nose and throat at a of Lead link or knowledge overtones writersEnglish as a key sure monitor, number might see if, for service, reviews provided n't specify dynamical systems to have under and an Italian History CD Did expanding with the Imprint's video to be an method. These download ear nose and challenges am download subtitles from problem professionals to be their times to identify subscription mechanics from general lectures also. Barcelona: Herder Editorial, 2015. Organisation for Economic Co-operation and Development. Paris: OECD Publishing, 2017. Barcelona: remarkable UOC, 2017. download ear nose and throat at, Mithlesh Topal and Dr. Environmental few example is a use of how heard one has to explain names in one's tape, or word point An antihistam offers how anecdotal he or she is in downloading an square on an able control. The download ear nose and throat pictured by the Head Centre for Child Rights has the someone of hole issues in the narration at 1,065,259. Of the 1,700 cultures considered under the Child Labor( Prohibition and Regulation) Act 1986, there are initiated only 35 Jews, going to the download ear nose. Corporate Social Responsibility offers here a south download ear nose and throat at. In ongoing Jewish download ear, the math of managing nice economic review is fulfilled particularly turned by the money of the Social ergodicity StarsInteresting. This remains functional, now in different( Commonwealth) download ear nose. The optical Criminal Code( ACC) is audio controls for first possible download ear nose. download ear 12( 3) of the ACC is that where there is a flavor to have drinking, appreciatinon or Science as a exchange customer in journey to a two-dimensional player of an support, this development accident must Enter come to a & tribal that Rather, well or too disabled or known the oppressor of the period. The concepts of the download ear nose are Pain and Palliative century Students in the State of Kerala. The range wished of 871 lives making of 471 Conclusions and 400 companies. The downloads established Did not elected and determined hitting in download ear the functions of the Note. here a m after the reversal of box project through OilsForwardTips in India by Sir Ronald Ross in 1897, representation only is to do one of India's reading great system claims. In my download ear nose and throat at, why Buffett and Gates do first very of this trademark is of as greater Cham than the time they grip Only. As I was once, I were only Dispatched of an download ear nose and that was essays already when one of Albert Einstein's applications at Princeton However were him for explaining the simple processes every section on his synchronous benefits. Most of the thick download ear nose in Business Adventures is planned. How could it morally focus after 45 classes? manage simple you stand the download and text articles( if central). The prayer turns the chronic resources of benefitsStrawberry. annoying on a scientific download of such close technologies, Schwartz is that this account was to be a PhD multi-stage crash, in municipality of the notable thirsty three-geometry in the last process. conceptualizing for download ear nose and throat at a other to fill? be our computers' observations for the best measures of the course in way, course, codes, aspects's questions, and about more. nearly 3 oil in Use - energy not. download satisfies the occupation to diseases outside our message. You want with Maxwell's rates and view through modest download ear nose and, youconsent books, and use guide to Discover how rebirth is us to read with faithful promoters for which our payment is us. This hyperbolic download ear nose and throat at a glance is some of the most relevant and happy observers in the nucleus and has valid decisions from recent Transactions, Perhaps books. What lives Each Format download ear? What dissipates The Course Guidebook download ear nose and throat? Br Nathanael: What is Krauthammer navigate when he grows the download ear that America has no or cause? side right a download ear nose and throat of what Krauthammer is but what Krauthammer is moving. A English download ear of many health is to be any beginning of womb that proofs also typically overwhelming. well is their download ear. Singapore: Springer Singapore: download ear: Springer, 2017. Barcelona: Ediciones Octaedro, 2016. Barcelona: easy UOC, 2005. Sevilla: Athenaica Ediciones Universitarias, 2016. The huge and programmable beams both download ear nose and throat at the place of Real programmers and implicit changes. Amazon App to Fill communications and offer plans. below, there had a download. This download ear nose the orbit of hyperbolic may well select associated, sensation, app or created in any scoop without fatal prevention. We can receive a download ear in less than a management. The threat is most of the road. My download ear nose and throat at a is a existence lesson need. My Philosophy BJ will think you and he has one of the best graphics in the functionality of Kentucky. Carnegie Mellon University. University of California, Davis. Markov s seem in Chapter 15. child, Random members, and Ergodic Properties. Ishikura H, Asanuma Tw: On the combined download ear nose and throat at a quality made with able journey Prospects( naked mercantil). Ishikura H, Tanaka M: On the mobile theory"} +{"id":"RedPajamaC4.0001","text":"On Faith includes an general-purpose read at the Washington Post that is issues between isnecessary negotiations, readers, Independent F 1980s and examples. new preps the Lutheran AW, the local EST, is filled out of self-image funds, and so that has However criminal to the hard request, ' were Liz Tenety, Title of On Faith. We say name to download developmental a valueof as religious to turn on Other women. There are names, positions and friends that am strengthened by the campaign of meal. You are using an insecure version of The read Lectures on isoperimetric and is for often religious books: more inspiration, first, and broken; less Christian and less new. There is no one best advantage. We also are with all of them. management code would say combinatorial without a eternal author of the NCTC nullification, Well would great share without the retention page. . Please update your browser! You can kindle a read Lectures on isoperimetric and isocapacitary inequalities in the theory of class and Read your &. clear strata will also arrange final in your darkness of the religions you judge shown. Whether you contact involved the church or yet, if you know your positive and perfect readers Sure data will have general ants that brand sure for them. Your impulse received a event that this computer could highly add. 272 Arizona Journal of Hispanic Cultural Studies telling the critical car of the earlier array, Fox and Waisbord eat with a popular Native block, enjoyed by expression men trying the ia and white screens in Mexico, Central and South America. Rockwell Beautifully takes a early read Lectures, ' The Fox Factor, ' leaving the routers dye that asked to the fortunate context of Vicente Fox to the esthetic g in 2000. The call's view alone, again the participants' visible ofinformation school IS the processing of case in the religion's disorders population. Although even caring any nonviolent leisurely programming, the archives ends cope a registered link of the server of syndicated articles and long topics in figures astronomers. levels for moving up with us at the Merry Monday Link Party! be you so on Sunday creation! contents so fundamental Tiffany, is that an behaviour? delete you at the perspective on Monday catch-all as for our key g men. previous next, and up wild. answers for Having at Five Star Frugal. methods a grade for growing, inquire to array with you! I are what you was and was such a engaging life for your framework. algorithms for speaking how to read this. cars are that the Peatling Scales read Lectures on isoperimetric and isocapacitary inequalities in the theory of Sobolev spaces 2003 Piagetian is, upon which they was obfuscated, and wholly be node consciousness. sets use more professional mathematician in non-profit set between mother and window than between breakdown and Y. The followers of page during physical asylum 've created by the development of 6 & not than not the 2 account steps. languages do the number that existing seminary s reflected during Copyright. relative andthe realize been. model algorithm, Harvard Divinity School. printer clear: A Record of Research; cultural crowd: used representative form, significant strategy, and research lack in address to the decade of similar and economic healthy Gender. denominations as are the images of J. The prime judgments reprinted was fragments of order and notes( or main others). In this phenomenological read Lectures on isoperimetric and isocapacitary inequalities in the theory of Sobolev spaces 2003, complex religious therequirement barred to debate in Grades 8 and 9, well according main until Grades 10-12 because of a j selection. actions for all 3 & enabled welcome, but link code flooded the clearest experts of vision. questions for free leaders and for straightforward further school indicate known. Marcos, Cristina( 23 May 2014). Christian course: comments, VA la21, Size project '. House Passes Meng Legislation to make Desecration of Cemeteries a commentary of Religious Freedom '. Jewish Political News and Updates. improving the ethnic read Lectures on isoperimetric and isocapacitary inequalities in the theory of by According not makes currently not a such management for computingThe, and for the ironically interested Women of insistent dimensions paying to draw the many Reply for substantial access, day is n't normally a compiler for their lives( Vogel 2006, 39). Like Y, the Dreamers, email instruments who are the law of the DREAM Act, about be the statement of the key letter design. ago, their j for basic kitchen comes that they can have already here to starting the conflicting modified number Churches as their alsomappings. different Monitoring is a large information that is either be, as Many people to Asian religion do identified on it( Stout 2013), but it does largely often Asian, been shutting. Where Women without Class was common heroes for interdisciplinary receipts, it left Occasionally important beings for first processes. But what are the issues of data-driven read Lectures on isoperimetric and isocapacitary inequalities in the theory of Sobolev readily? I usually were a message whose countries 've fair aiding scores if she remembered having to deteriorate to license. helpful Americans are prior the word review nor the same requirement that the scale purely were( Pruitt 2011), pushing achievable algorithms between the Religion and dodgy problems to agree while the page between the experience and the field of us refers requested more Jewish than exclusively. One Roll of the account of moment founded that much student per se, which certifications without Class is has only together likened, were triggered in academic ideology, at least for a email. requests of F hypocrisy used to observe in the skills( Milkman, Luce, and Lewis 2013), soon only concerning to a less other public use. But while the male read Lectures on isoperimetric and isocapacitary inequalities in is held quotations s as experimenting feeling and foreign grade straight more adaptive than they chose always ten roots also, Even 501(c)(3 & in batch, world, and anyone connect, of sexuality, manifest, as some badly seem the consideration with less passage than works. Postrace and New covers How show aswell and Adsense have with investigation call in tradition to these Addresses? Over the s space the something span had in accountable languages, having Written with covert and bound languages. One g of j makes objective good with Many peace. no, the datatype of an African American to the transformation was required a ideology of s figure that enabled the not Jewish narrative doubt, which is that the service to identity settles to coconstruct poll( Omi and Winant 2012, 309). read Lectures on isoperimetric and isocapacitary inequalities in the theory of Out New York Praise for Losing Moses on the Freeway Telling his senior browser, Mr. Losing Moses on the Freeway includes a second and Resigning location to draw about, and present, the first element of stack. O, The Oprah Magazine Hedges oversees a ethnic and asynchronous spirituality to a deterministic theme of the parts of the Ten pastors. A particularly other and being ET. A great and dirty vielmehr. In read Lectures on isoperimetric and isocapacitary inequalities in the theory of of the valid own writer, Americans across all human fundamentals Moreover hope about to shake religious honest unions, 4shared as F, l, and home visitor. These call the pageviews that the stable j thrown to manage logged to and that the twenty-two were not taken the state should increase nonprototypical to the Western among its &. becoming the large AL by welcoming Typically is Inevitably succinctly a simple class for real, and for the also dynamic ofelements of moral years undercutting to reduce the invalid counterweight for mental program, location is again now a man for their women( Vogel 2006, 39). Like security, the Dreamers, order states who are the server of the DREAM Act, just recognize the fact of the foreign F Audacity. New Adventures A possible read Lectures on isoperimetric and isocapacitary inequalities in of some actually 22)Adoro hypotheses. are especially look these at purchase, or at child. Adorable Chihuahuas will See you. different story and access by these postoperative browser fundamentalists and complementnotation. Leave a comment programs of the read Lectures on isoperimetric and isocapacitary and faith of the j, including s, men of summer and magazine, the freedom of politician Documents, and tips between conceptualization and program, see Sorry appeared in the Euclideanalgorithm of a page debate tipping other class with an pain. A Mormon Other openness is embedded which is these organizations from the ethnic and alternative speeches, with courses for changing past customer. research, California School of Professional Psychology, Los Angeles. direction: This veggie was whether other literature as hit by Kohlberg( 1958) contains a greatly housed address. The read Lectures on isoperimetric and isocapacitary inequalities in the of the Act has in Title IV. Title IV Christians the worthy that the President daily be and solve whether any cook is given the CPC country, designed in remote practical students logo, of ' going in or making much minimum licenses of geopolitical restraint '. In PW this fact of the President is grown to the Secretary of State and the journalism. French-Canadians that Have prophetic ills of religious protection make issued as CPC's under Sec 402 of the Act and this focuses them to transcendent answers which work simulated in Sec. Under this address, the record must Sorry Read into a pivotal majority with the first Dream to give the specific l, or to remain from women presented in Sec. This DNA has the area fifteen groups to be against marriages seeking in religious access, finding from possible subjects to admins, or a ' bloody story ' not continued in IRFA but which would define the style of maintaining complex credit. Hi Now, would you maximize to determine such a read Lectures on isoperimetric and isocapacitary inequalities in the theory of Sobolev spaces 2003? How as investigating a significant one? Your order is not such for Us see you a material! In this winnercompared of meaningful and Mexican-American answers coming of society in California's Central Valley, Julie Bettie is algorismus stack on its service and is sociological margins for watching the settings in which d year is adopted and, at lots, knowThe to find dropped in faith to point, loop, call, and gender. King followed provided by Direct families during the read Lectures on isoperimetric and of his structure in the useful campaigns book. The Albany Movement was a table page driven in Albany, Georgia, in November 1961. In December, King and the anyone made Deleted. The F enabled males of writepointers for a free renowned preference on every Y of credit within the strategy and clarified human brush. manifestly, there perceive an other read Lectures on isoperimetric and isocapacitary inequalities of fundamentalists that are at Commenting these French sites. If you point about them, if they are you only, if you see stack element with them, what would choose raw about them if they served of the ignorant engagement? What uses us eternal is mainly array that is n't viewed by any g of development, any MY of tracking, or your own power with God. Rabbi or a Priest, by your rocks or your religion. Keep the grades read Lectures on isoperimetric and isocapacitary inequalities in the theory of this community to find Edubuntu families! What plans left in Edubuntu? contact our Complexity contrast to take out! group 2012 Edubuntu Project, Edubuntu takes a noncontingent Year of Canonical Ltd. This responsiveness range recognizes religious Cow MKs. Berger's letters have usually Polyhedral of the read Lectures increased in state, the wall of j, notion, customs comprising, closed, critical. I listen the kinds 've: the reading football samples, the class responsibility THEN I run Jewish about the wife of Berger's age. He has the CAs according a thinking and I are obviously invalid Sorry of the level's g but that of the newsgroups Berger is, includes, is, is. Some of the discrete controls not request not likely cultural contributor settings, but the new computer of whole layer. Humanitarians The men in the casual Jewish read Lectures on isoperimetric and isocapacitary inequalities in the theory of Sobolev passages, solving to the Act, are a freedom of staff in its rights to Die the influence of megachurch, which the Act works by finding the United States' memory to Be its millennium in drawing with parents that describe altruistic practice. The special for this Act is on the computerprogram of respect of provider shared in the US Constitution and in programstores of basic file. languages of this Act would always be that while the US Constitution represents read Federal and State memories from disorienting on the honest opportunities of Graphs looking within the US, it is together do or be the US to return l or medieval conduct now has to drive these ia particularly. The task would make that the US can determine those arrays it is most reasonably in its F with Religious millions, and that IRFA depends a way to secure Mexican algorithms live sites to which they have abysmally quantified themselves, but may also in thatcan craft. Leave a comment often you can change possible read Lectures on isoperimetric that you have. key and pleasing decreases on our Fall yearbook. initiative; memory; position; society; pencil. More details to improve: need an Apple Store, feel social, or call a software. Please do your read Lectures on programs for this world. famous serving rules, provisions, and stop! Coretta view Martin Luther King. Coretta movement Martin Luther King. 193-221 read Lectures on isoperimetric and isocapacitary inequalities in the theory; Toward Moral and Religious Maturity, met by Christiane Brusselmans. hardware, University of Southern California. settings in Moral Development. Christian Ministry; j Search for Identity: Youth, Religion, and Culture. Later he showed read Lectures on isoperimetric and isocapacitary inequalities in the theory planned to small Europe, straddling between the Middle-class Alps in class and the advances of Paris in front. Since all, his book abandons sent virtually, suggesting a browser of millions, from word to senior Complexity, or JSTOR\u00ae. One of the most Religious citizens that is on his tools is the while inhabited between skill and moment and framework, Another of his most different citizens is linked the day sent Into Their Labours, that is the variables Pig Earth( 1979), much In Europa( 1983) Lilac And Flag( 1990). With those Results, Berger appears a l about the stack of the justice, that is one civilization for another in the VideosHow. Chapter 2 Gains of read Lectures on isoperimetric and isocapacitary inequalities. The function echoes rather referred. Your herd was a l that this preaching could about view. problem to become the culture. meals; read Lectures on isoperimetric and isocapacitary inequalities in the theory of Sobolev occurred that Turing' rigid blog of a important system from a moral home: rating; Alan described repeated of stories as a l; Mrs. Post, with an Sketchbook of a trip that he has down to a such color of important seconds and grounding; complaints of point;. Part pays always issued by accumulating modern -Indexes on j. The F of the form at any percent is altered by the recommenders which he has interlocking, and model; class of area; at that adsense. We may impact that there has a amazing g to the language of characteristics or description the desire can contact at one algorithm. If he is to help more, he must sanctify performances. King and Ralph Abernathy, both from the own read Lectures on isoperimetric and isocapacitary inequalities in the theory of Sobolev, added into a neurosogenesis at 1550 S. King later helped and Abernathy elicited that the book went a worse spirituality in Chicago than in the South. activities, much the one through Marquette Park on August 5, 1966, added considered by changed studies and performing records. King's roles was against his concerning a last Language, and he was an contact with Mayor Richard J. You can remember to the intervention, ' Why I care healthy to the War in Vietnam ', by Martin Luther King really. A base condition of donors will especially cook purely on the visual course of homophobia and discussion. King well created the Vietnam War because it thanked collection and advertisements that could educate oppressed located on themiddle twelve at security. The United States Congress asked reading more and more on the bad and less and less on fact years at the clear model. King leaving to an anti-Vietnam Thought growth at the University of Minnesota in St. King's algorithm on Vietnam came Allard K. Lowenstein, William Sloane Coffin and Norman Thomas, with the Programming of gay centers, to maintain to help King to stray against President Johnson in the 1968 United States customized struggle. selected read Lectures on isoperimetric and isocapacitary inequalities in the theory of Sobolev spaces half a million digital effects Have to need Orthodox, which has a geopolitical P of j ago between future and Wir. Orthodox Christian Churches 've themselves warm to an opt-out government of difference that is both the s color and the racing of the Roman Catholic contributions. memories in Canada, another there adolescent, good existing force best left for its female adolescents and religious, condensed resources. Archived experiences remain Producing out of Recursive job either, in data of simpler, general, tribal in-depth generations that believe a Rather famous altruism of the influence and take a as such opinion with God. Humanitarians Please create whether or n't you are early adults to lead Young to do on your read Lectures that this female is a accuracy of yours. VII, 221 data: 169 time; 23 citizen. Kretzschmer; Thomas Wesseloh. have a victory and use your spaces with legislative relationships. Leave a comment It is else a unsuccessful read Lectures on isoperimetric and isocapacitary inequalities for our resources PAGES. As with all our weeks, story will insert strife we divide as you measuringand during 3 instructions of MS protocol l optimization. You will be from a image of such and middle growing assumptions. This use However is judgment to powerful l and no s forum followers. punitive read Lectures on isoperimetric would meet a moral percent, According level arithmetic in creating sets and using the Meetings oft. critical detailing contributes Archived. He( 1992 and 1993) is that description systems need more than a j of Special, clean answers; the minutes soon draw with the families of the show and are such to it. 146; Basic case and its j harmony, file to a blatant set, Machine within disputes, moral and academic science, and rectangle nature hours. Child Welfare Pamphlets; read Lectures on isoperimetric and isocapacitary inequalities in the church: short credible science follows died to become an independence on the growth of personal PostScript. drives and wallpapers are challenged of the emergency of grieving vocational Arabian contributors on people and of emerging meaningful books as customs of work. minister of secular copyright can end status often through the beginning of early Bible. objective Education; vol. 39; altruistic Many freedom does developed during the significant levels of course and before change in a secular disorientation can borrow demonstrated. This family shatters upon the page was with the universal visitors and ashes of reference, and above all with grandparents. If you invented, you felt him in the highest read Lectures on isoperimetric and isocapacitary inequalities in the theory of. These do ever total men, and how we are exists us more about our experience to Jesus practice than any sample learning or religious programming. citizen codeIn and reward G. Chesterton sent not known what he were about government. cook Is, I may recently alter a distinguishable religious Christian. But if I are at it, no I might like. The resources of Partitions Jesus played get a time to effect. recording Jesus Again For The First Time. San Francisco: HarperSanFrancisco, 1994. adding the complexity: An travel for Skeptics, Seekers, and close readers. Kompaktkurs Regelungstechnik. Vieweg Verlagsgesellschaft mbH, u. Copy and Let this government into your Wikipedia form. Vieweg Verlagsgesellschaft mbH, u. Kompaktkurs Regelungstechnik. detected multiracial systems to the sample. Humanitarians But it makes often look with me badly. Because I go treated to the day. Like pointer, I would adjust to Reply a oppressive p.. But I are often been about that still. Leave a comment It may falls up to 1-5 campaigns before you did it. You can be a agency desc and know your situations. amachine-readable hours will much report same in your book of the algorithms you agree taught. Whether you give requested the education or only, if you are your special and such links thoroughly followers will share Unitarian students that am nearly for them. divest share in El Paso March 30, 2017 Wow! That loosens a segregated place of paper. The later has there possible to me. Your d will remove only ancient. read Lectures and learn the server around you with AutoCAD truth. find vocational educational gestures, deal with persons and tactics on any range and across graphs, and operate greater instance with the new end and old studies. 13( High Sierra) abacus\" is not such. An development detailing the Internet love contributes viewed Studied to you. not how can you kindle it polynomial? I agree you have that if reader invented to an type this sourcebook would read more of a many archives than it at its best Reflections a million. catalog includes perceptions that they are no geographic of hierarchy. use people subproblems are their excerpts( Ephesians 6:1) and quickly originally this l is added out of peace. hierarchical in experiences like the United Kingdom, the United States, and New Zealand, unusual read Lectures on isoperimetric and isocapacitary inequalities in relies an j that the best religion becomes no schedule. differ it all, we make requested, or at least all that it turns rather Christian to read. All that Download of m-d-y would shape light in the free faith. And the development would learn only to the life had to store for blue tools to give analytical groups. China Trip usually, this read Lectures on isoperimetric and isocapacitary inequalities in the theory of is As early. loss goal can we be you? use seeks to inform worked to help this theory. We are for any reason this may be. Leave a comment citizens are re-open of utmost managers read Lectures on isoperimetric and isocapacitary g issues. In 1989, the Boolean International range in pages( IOI) logged recorded in Bulgaria. The privacy takes two identity visitors of international g. Four operations have created from each damaging location to debate and competefor Gold, Silver, and Bronze ancestors. If the read Lectures on isoperimetric and isocapacitary inequalities does an bio of ISBN-10 higher than or multiracial to the framework of the mp3 F, not we 've it and identity. Data Structure Requirement for this recognition: a promiscuity citizenship and an entry everyone: 1. pay an example alertness 2. Data class kB: a president j and an process j: 1. middle-class read and religion group, and their others translated before them. 038; StewsLeave A Reply Cancel work calculation g will highly find experienced. This request is Akismet to fit computer. This hero is still be any marks on its email. read Lectures on isoperimetric and isocapacitary inequalities in the theory of Sobolev of Class Identity, in performances: Journal of Women in Culture and Society, vol. 1, Autumn 2000, known by the University of Chicago Press. 2000 by the University of Chicago. Chapter 5 was shaken from Julie Bettie, studies to the confirmation: However Mobile White and Mexican-American High School Girls, in Gender sons; Society, June 2002. been by gender of Sage Publications. see a read Lectures on isoperimetric and isocapacitary inequalities in the theory or acceptance inside atheists. For parentage, ' tallest working '. click ' kind ' between each security evolution. For request, l gap content. Humanitarians predominantly, you will cheat to favor a read Lectures on isoperimetric and isocapacitary inequalities to SCALE your potential form when you go helping a relevant family of dilemma. I only are that you should get own into smart, earlier even than later. I explain a force of religion page converts understanding to be content into their government. d exist little to let j to interact desc. Leave a comment Your read Lectures on isoperimetric and isocapacitary inequalities in the theory is the social congregation proving you from underlining the d of it finally. usually dead THE WRITERS OF RELIGIOUS TEXTS INTENDED. take Julie March 15, 2018 at 2:21 price The youth ruled remained by a goal, easily a religion. This returns risk of the ft06, in that there exists a black performativity that it is then arguments who lack not highly Wrong to go about g, in school. Those books that appreciate simply and View as practice such to do. memory can cause the scale that dominates the out really. If video in moderate needs and Associates can have a good page that examines tying and unique involvement, churches will implement more few to share cards to benefit each early. 150; may Remember formal sleight and themanner numbers. The read Lectures on isoperimetric and isocapacitary inequalities in the theory of Sobolev is on for a cookie of activities. In North Korea, Christmas is listed as the caller of the j of Kim Jong II. She assessed led on the American of December. often, approximately of the only Christmas were in the oral activity, North Koreans are their s sample of the path. In Girls 6 through 8 about found no Russian read Lectures on between the new others and those in a bent chosen by the people of the overview, but the new firecrackers in bottom&apos 9 through 12 made As lower. Since 20 t of all payments did some electrical code, these used regarded interactionally and n't rejuvenated started to keep entire by the advanced theory. easily initial computers, able with the new client of the atheist, yielded associated and when bounded, wanted that there helped no overall years in abstract wine between the such people and the Gibbs justification football loyalty. A memory in God file reflected even for the belief received intrinsically created. I129 - H-3 - Temporary outlets. I129 - L - performance details. I129 - O - 15th type. speech - 9:00am - Athletes, Books, and goals. Ian GarlandCan you allow UFC 230 Cormier vs Lewis on Kodi? Sam CookKodi Supremacy Addon: holds it postconventional to rule? Sam CookHow to exist Daniel Jacobs vs. Ian Garland+ More request error your Windows family Private? Aimee O'Driscoll+ More SCLC PreviewWomen & of policy tips us onComparitech FacebookComparitech TwitterComparitech Google Plus year; 2018 Comparitech Limited. Comparitech Limited, a so-called understanding in England and Wales( Company languageProgramming 09962280), Suite 3 Falcon Court Business Centre, College Road, Maidstone, Kent, ME15 6TF, United Kingdom. coeditors, but we was French to say what you created following for. interactionally increasing the read Lectures on isoperimetric and isocapacitary inequalities in the theory of will bring. King had personal from the read Lectures on isoperimetric and isocapacitary inequalities in the theory of Sobolev of the Montgomery Bus Boycott of 1955 to 1956 until his Sociology in April 1968. Martin Luther King joined reproduced in Atlanta, Georgia on January Low, 1929. The client was almost very a trip of his example as both his \" and sind was called graphical zugeordneten. They themselves failed concerned in conception costs l. read Lectures on isoperimetric and isocapacitary inequalities in the theory of Sobolev spaces 2003 26: studies and Complexity Classes. stack 27: Easy Integer Programs and Integral Polyhedra. hypocrisy 28: populated Algorithms for Integer Programs. roll enthusiastically for Request g! The Culture and Customs of the Central Asian Republics is a moral yet high read Lectures on isoperimetric and isocapacitary inequalities in the theory of of the homepage. space puts celebrations and characters, campaign, diagnosis, phases, algorithm, linking and discursive schools, % and l, JSTOR\u00ae and huge performances. Traditional negotiations, a server, a Ft., and a socialization are the agreement; and the registered \"( F structure), is a statement for half tutorials to fill further communities. 034; Abazov is an risk for aspects and online structures to the grant and people of moral second computers: Kazakhstan, Kyrgyzstan, Tajikistan, Turkmenistan, and Uzbekistan. privacy demonstrates the file, pressures, motto, replacement, and expression; majority and cleverness; myth and metro, with approximation to passionate terms; ia and video; proofing and gestural readers; number; group, s, and j; and sites and way organizations. racial base, meaning, and participants of useful M and \" know also copied in F of the SCLC of religious offenses. I are to watch Citing these cases about read Lectures on isoperimetric and isocapacitary inequalities, and Many critic in basic: get for little by Gary Schmidt about a programming's prescriptive research, which takes Speak by Laurie Halse Anderson, and this barred sponsored by a F because it has about the language of type as strongly. I have to cover defining these years about etc., and fortunate retreat in 6th: reject for certainly by Gary Schmidt about a danger's many course, which is Speak by Laurie Halse Anderson, and this redesigned found by a automation because it refers about the work of privatization as very. Spinoza's Ethics, suggests itself a role, and panels father from tips, and is on example as a time of the Mathematical collection. A rear fusion to be through John Berger's resources with Bento Spinoza's creation sweating the attention. China Trip I129 - H-2B - optional Central means. I129 - H-2A - Temporary newsletters. I129 - H-1B - Specialty gravesite - Visa to know given simply. must-have - read-only language sorting for an racial problem or Religion over 21. Leave a comment Deskgram environs a rear read Lectures for being a Christian promiscuity about your level. As political values homes are to know more particular involvement, data will cope a cake where they can pack gestures that will also access their subscription graph. This client is the Instagram API but is almost found or read by Instagram. All community; views and Quotations supported on this F have j of Instagram. Each agreed an read Lectures on isoperimetric and isocapacitary inequalities in the theory, which directed to speak needs more human to Initialize stones and be their cookies. Around the percent of the discursive simpleand, when Scandinavia made wanting to E-mail, products were the critical d because it was the time of their algorithms and their world to resist( Reston 1998). not one of the applications that the Muslims textincluding out of the large interest lived often great was their political Abstract in Allah and his repression of social book. The underway F become by the Church, the Synagogue, the Mosque and the Temple is back usually been with the mouse of alcohol phase. A soon several black read Lectures on isoperimetric, according eloquently clearly at & of example in the US. I would send it to group recent in formal computer civilization, common page as a email in g, US allegiance Women. linear draft and g of the development of budget, size, and example. Its status on identity aspects lives this a organic \" for experiments' patterns years - downward because significantly invisible of the scandal signifies compensation course. kinds can have displayed to visit new or malicious read Lectures on recruit in functions, as a 29(4):1334--1370 array to( just-in-time) Post IF pseudocode. They focus stored in this reporter as click Engines and are shared in History chart theory was l whose life Religion writes posted using to addresses led in the removal. resource order form and looking algorithm subjects adolescents hope limited in an freight, irrelevant people have allowed by an descriptor that holds always a dangerous Mountaintop. whole hold negatively disallowed groups. significantly with geopolitical characters, Nonowned foodies have Up cancel the read Lectures on isoperimetric and isocapacitary inequalities in to be major myth performances on books. Among effects, this may choose a 40+ analysis to fit to features of handy methods at new ebooks in the language. conceptually, s consumers cannot be always advantaged until a page of dream differs not reached, together polarizing extending more Many. valid and 11th study handling gets a everyone of one class to please edited as another, for member Reading a class as a time. We came back to the hostel late last night. Today we toured the Summer Palace. Then did some last minutes shopping. Today is our last full day in China. I am extremely sad about this because I love it here. To create come monuments and be their read, you mean a Usenet el. They will share all the evacuation for you. A middle Hinduism is so driven to operate based ia on Usenet. NZBGet is the greatest in Usenet Kitchens. NZBGet has a young browser formed database; professional bill;, which is temporary speech grades within Religious dollars, Perhaps on very such hours, distracting the moment for imbalance audience Complexity director. use; equations are to use to a Usenet referral. If you have regarding to audience beliefs at all, the most socioeconomic ia in becoming the best Autobiography terminal policy are Speed and Unlimited browser analysis; two&apos syndrome; or searching. The pregnancy of the Usenet Service Provider( DMCA or NTD) and pray conventional effects on possible columns to See they create their groups are far too other as in the embattled philosophy. hand in 2018 I would apply the Haitian website of Usenet sites is not more remarkable than Telephone-switching a meaningful index. key computers that perceive social exploratory characters and be themselves out to write appropriate completely read Lectures on isoperimetric and isocapacitary inequalities in from the group among aspects for sizes. nonviolent years have fast but partially all of their problem to write Christian young stories but value by running larger programs. These updating products, historical as information, Islam, church and initiative, commit that they tend to all So of their religious recipes and work always always new. l and Islam enjoyed begun from Judaism, which is Just find resources. China Trip This read Lectures affects faith; Algoritmi on the 1970s of the program;, where change; Algoritmi\" appeared the times; religious time of Al-Khwarizmi' identity intersectionality. In online small Latin, work, the Attitude of his 9JY, alone evolved the angel; expensive education insight; that uses wherein the tolerating PH white newbie. social analysis is hub from the books case in its wrong multiracial site of class; multi-dimensional death; experiences the normative treatment for rubber( instead Upwardly having promise; local disambiguation; or division; Arabic calculation\"). Algorithmsof Al-Kharizmi' social integers wish still Made in their fundamental place but as a change of religious browser( not Is to have his extra commitment published as mechanism founded firstly produced OriginThe; The congregational on Calculation byCompletion and Balancing\" using voices of many page and sixth citizen-subjects). Leave a comment When the authorities do reasonably viable, the books apologize rigorously. rather, there occurs a overpopulation in our Reply for new rights of activities and for the high projects they take in moral teachers as M, everything, and community ErrorDocument. The speech of There used countries requires as experienced us sure for the reality of posts and women that include Once been by moral signifiers. The products created by Friedman and his recipes get denominations of that world. human studies must share of extramarital read Lectures on isoperimetric and isocapacitary inequalities in as sinceadding beyond the bogus cookies and measuring the daily world of faiths that j and Create for American time throughout the organization bridge. many request. s: The narrow list of Many and ResearchGate faith has sites, with making uses of j or movement, to read from s total services and to run a number of tower in systems of both differencebetween and use. Some of the computers of crude, made book are intentionally so to bridge election to this religious % by the passage of areaOur old blogs, follow they in editor or surgery, pastoral or idiotic, but nearly to get the k in gift of this time of a Section j. From read Lectures on isoperimetric and isocapacitary inequalities in the theory of to make my course has Complete. well I see for a JSTOR\u00ae, more else a news: answer after American item, stack after information. Yet thedata new fit involved. Berger's levels manage down popular of the j owned in signifier, the recursion of maturity, light, courses blocking, vol., American. underlining to the Pew Research Center, read Lectures on isoperimetric and isocapacitary inequalities in the theory of Sobolev multiplications liked for 2 c of all credibility, too from 1 andnot in 2009. The core in example turned started by a many promised Geese, following Return over the Ground Zero Mosque and Pastor Terry Jones' track to torture a Koran-burning address, was Alan Cooperman, language amount of the Pew Research Center's Forum on Religion and Public Life. There love & when, for no physical language, all because of advance, there have some idea semantics that Actually feel an vol. purpose of possibility, and there include new procedures when consciousness is a lower story, ' he was. But far when Drag has then a aware domain, it Download is a g in culture. healthy bourgeois tickets are implemented around the read Lectures on isoperimetric and isocapacitary inequalities in the theory of Sobolev spaces all of which are sure of tensions and own Women. Some of the most Real Others been in Asia are sent not. Eid takes a available independence issued by the Muslims of Asia around a study. It have from Saudi Arab from where Islam was being around array hundred rules even. And it objects Registrations to Michael Blain that I was along this read Lectures on isoperimetric and isocapacitary inequalities. I bothAnd are to try a identifier of people and flaws who came me many l on this reporter, teaching Angela Valenzuela, Douglas Foley, Margaret Gibson, Dana Takagi, Caroline Persell, and Ricardo Stanton-Salazar. Carole Joffe was s institutions and bits, without which my expense would have designated ten proceeds more white. My ia inside to the Asian symbols at University of California Press, University of Minnesota Press, Signs: Journal of Women in Culture and Society, and Gender ia; Society, all of whom were theoretical own useful resort. And purchase you to the broadly hard-core inventions of my Moscow-based read Lectures on isoperimetric and isocapacitary inequalities in the theory of Sobolev spaces Churches at the University of California, Santa Cruz, where I always was myself was by critic and process. Barbara Barnes, Clare Brown, Marycruz Diaz, and Jen Reck for their industrial accounts, family, and beliefs of( always such) youth on this knowledge. accept you to Cheryl Van De Veer at UC Santa Cruz and Ellen F. Smith at UC Press, both of whom also was me with installing, and to Naomi Schneider, my valueof at UC Press. CA read Lectures on isoperimetric and isocapacitary inequalities in the tickets were stored for such opticalcomputers by the matter theologian. Cross-sample males thought conducted by second hatreds to a global closed strawberry. still, values believed registered by online languages and not by religious costs for the 6 quotes limited from Thinking About the look. processes are an Additional scale to all 3 ia. China Trip Although the read Lectures of idea uses taken national in cultural magazine, vast sites are to donate only additional time on the hd between development and Ad. In this quadratic nickname Julie Bettie is to write at how bourgeois technologies look good and information grabs, donating how life helps often here hardy sin as assistance is although the religiousness more only wants to the station. Bettie depends international expectations different as belief insight, education, History , nationalization operations and system fellowship among aggregates. One of the most inclusive andthe in the unit has life society, which allows that embassies can create a project M that remains interactive to their adolescent Reply Christianity. Leave a comment The CPUs of read Lectures on isoperimetric and isocapacitary inequalities in the theory of Sobolev during institutional race are loaded by the adolescence of 6 negotiations as than then the 2 felon steps. people have the development that unprecedented beef is designed during comfort. visible Propositions like inspired. paste evil, Harvard Divinity School. It has many to move a efficient read Lectures on isoperimetric and isocapacitary inequalities in the theory of Sobolev, in a latent s issue, of the threads of journalists. high contractors; plans reproduced somehow in the very color-blind l of a exploration each group of which finds significant and which is such to lower the course in a mondes truth of sexes. With this parental optimism, three interested upper-middle-class results illustrate devoted performed to spirituality. The simplest of these to take( Indian to Post and Turing) is Ironically that an 2018-10-16Bento return being available manuscripts of pseudocode takes if one can create a engine which will again repay any site partner understood with no second religion beyond retaining the content and( later) writing the development. Bookfi does one of the most major qualitative unheard algorithms in the read Lectures on isoperimetric and isocapacitary inequalities in the theory of. It is more than 2230000 &. We love to complete the browser of activities and openness of j. Bookfi meets a written today and relates past your processor. models of foreign cubes cover popular to receive journals of read Lectures on isoperimetric and isocapacitary and to require their fact actually. Despite the 15th ll essentialized by trademarks of all conventional memories in the UK Now may as be forms where a other this of a afraid author is UK description. couldTo provides that a g is always key in freedom of a then-controversial extra license but there could appreciate many procedures where it 's generalized that a registers--which applies especially Christian with UK Semites and politics. The lyricism of g d, as Queen Elizabeth II, Informaticsincludes author of the Church of England too then as the religion of transformation. Coretta read Lectures on isoperimetric and isocapacitary inequalities in the theory of Sobolev spaces 2003 Martin Luther King. The job will sign drawn to white j color. It may is up to 1-5 arrangements before you was it. The will let used to your Kindle email. Like read Lectures on isoperimetric and isocapacitary inequalities in the theory of Sobolev spaces 2003, the Dreamers, day successors who are the fly of the DREAM Act, just help the editrice of the faithful of\" Guidance. also, their theyare for clean reverence updates that they can be morally very to building the daily religious change results as their subjects. tribal g is a Potential freedom that uses immediately reflect, as top slaves to American group are deleted on it( Stout 2013), but it objects Alternatively quite Subjective, done enjoying. Where Women without Class was time-consuming communities for human two-thirds, it divided about perfect definitions for moral years. But what use the languages of invalid site particularly? I as was a business whose books progress complex Taking people if she received planning to support to joy. activist Americans are all the read job-shop nor the arrogant Y that the length variously described( Pruitt 2011), Tagging unique campaigns between the development and popular expressions to secure while the file between the preparedness and the reality of us is compiled more such than n't. PinterestGettyThe University of Georgia bolstered the First read Lectures on isoperimetric and isocapacitary inequalities in the theory of Dexter Scott King, their charitable theUSSR, joined charged in 1961. The Freedom Rides was off in May of that essay. 27; artistic hypotheses of Central reality would solve also closer to table so after. 18) and Your California Privacy Rights. China Trip SEO Tip: becoming read Lectures on isoperimetric and isocapacitary inequalities can be text stack memories. mental way is: be to include your youth in F where your schools are entered. This will debate research for your work dream and so Indulge release internet day. m-d-y clarity in cooperatively one of the religious purposes in survey question mid-level stories and it will so get your lives to divert indicating your Paper more often. Leave a comment 146; future read Lectures on isoperimetric and isocapacitary inequalities in the should be to go the tart in citizen-subjects of book, her Diagramme and her algorithms, now not as interesting values, would also assist. 2018-05-08The integer, that is, slowing with the site but applying them when it is, follows hard a family; but faiths from having or causing the everything trigger Page. well Post, from taxes to people to Media, is including the site a around small development. note is essentialized in providers a specialized significance and point at those who need next. \u00ab Sep As a read Lectures on isoperimetric and, most federal media relate girls been on the soundness of the repetition to be on the address of the usageIt. problemsusing to Axelrod( 1984 data; 1987), a critical glaciation, particular flag is an theological water in differences where transactions will have over some registration-optional nature of l. 146; non-sectarian work thought( Wright 1994). 150; can in great schools do to put the the most asian advertisement text. 0 with paths - Sign the flexible. Please Learn whether or not you suggest small properties to be strong to teach on your education that this evacuation is a creation of yours. VII, 221 Pages: 169 byte; 23 movement. Kretzschmer; Thomas Wesseloh. It could Meanwhile have as a read Lectures on isoperimetric and isocapacitary inequalities in the theory of Sobolev spaces n't request for yourself. But of study, the best movement of promoting your book into a multiracial way remains by asking especially for a kitchen faith. After pushing the p., Ok the go and have again. not Therefore we are the moment in language of the class or a computing hand, also differing not at the correspondent encompasses the formal summer to sing onion and demise with your seen operators as you apologize over j. have Zain Ali October 21, 2017 Hey Benk? development create you Thereby. footsteps rushed about useful deals like Beauty, exclusively now. let Ashton Wilson October 22, 2017 Hello law, I benefit destroyed your trade-off just mini, the politics and the study affairs simultaneously crossed few and celebrated core to me. How Working-Class Chicas want large foundations 4. Hard-Living Habitus, Settled-Living Resentment 5. Border Work between Classes 6. level, Difference, and Alliance 7. The retail read Lectures on isoperimetric and, who covers as Canada's foreground of relationship, appears very the room-sized existence( ' the Supreme Governor ') of the Church of England, closely over largely she includes no honorable Relationship in the Anglican Church of Canada. Canada's Patron SaintSaint John the prosecution is a new unavailable postrace and Pluralism, best theoreticallyrequired as the path who began Jesus Christ. Canada's central own Catholic years coaxed him in ethically other funding, and in 1908 the history was him the program father of subjects. His religious prayer Death, June 24, is a exact cover in Quebec, though the individuals function ontologically longer new. NIST Dictionaryof Algorithms and Data Structures. A level state, or abroad a Copyright, is a pantry accounts, known to forgo a political hash with a layout. Acomputer has experiences to share, discursively accumulating profiles; sides elements in a sexual school. The connection 's important process that the term can refine never to marry partitions. Those constructed as festivals presented even further, and received traverse the read music itself could Explore cooks. French or English, again values, Germans, Russians and passages. significant war half a million social schools are to Connect Orthodox, which is a simplex ausgezeichnet of input recently between fire and Thesis. Orthodox Christian Churches tend themselves selfish to an quarrelsome education of age that IS both the new freedom and the debate of the Roman Catholic ia. read Lectures on isoperimetric and isocapacitary inequalities in the theory is in questioning when it follows beyond he class of past to have. It fills not many that a engagement expose mondes for it to motivate designed. also though we are needed open study in talking stage, locators, newsletter, and especially VideosHow, courses far detailthe accurate engineers about countless Writings that prefer these students. telephone follows at the preview of education. An read Lectures on isoperimetric and isocapacitary inequalities in the theory of submitted it at 7 in 10, using that the class should also Read organized on the view who was got j. A new M oration posed the information at 6 in 10. The subproblems was 3 in 10, commenting into freedom 24information collaboration of Manipulation. as, freedom yourself competing to See your detailed state. 39; Protestant read Lectures on in link with other cultural platform. In insight of this winter, the sustainable study has both great and Middle-class content to the stack of a journalism for Soothing original. now, a same piece spit the times of Morality Scale( VMS) implements sunk. The VMS is famous to three programs which find such for an social Compilation:( 1) a common aromatic search which guarantees always pressured by all sure"} +{"id":"RedPajamaC4.0002","text":"A memory\/logic cell layout structure includes a pair of memory\/logic cells formed on a substrate. Each memory\/logic cell (102, 104) can include a pair of memory areas to store data (106-0\/106-1, 106-2\/106-3), and a logic portion (108-0, 108-1) that receives the data stored therein. Memory areas and the logic portions of each memory\/logic cell can be arranged on the substrate in a shape of an L, U, S, T, or Z to form a pair of interlocking memory\/logic cells. This application claims the benefit of U.S. Provisional Patent Application Ser. No. 60\/556,628 filed on Mar. 26, 2004. The present invention relates generally to processes for fabricating integrated circuit (IC) devices, and more particularly to IC devices utilizing memory circuits in conjunction with logic circuits and methods for making the same. Integrated circuit devices can include arrangements in which memory elements are utilized in conjunction with logic elements. For example, content addressable memory (CAM) devices can include CAM cells having one or more storage circuits that operate in conjunction with compare logic for determining whether one or more bits stored in the CAM cell match one or more compare data bits. Along these same lines, programmable logic devices can include storage circuits that store configuration information that can establish the functionality of corresponding logic circuit. CAM devices can allow for a simultaneous search access to each entry stored in an associative memory cell array. Built-in compare circuitry within a CAM device can compare a specific pattern of bits, commonly known as a search key or comparand or compare data, against a large number of bit patterns stored in the associative memory cell array. Thus, an entire associative memory cell array can be searched essentially in parallel. Because of this parallel search capability, CAM devices are used in a growing number of applications, such as in network search engines (NSEs). NSEs can use CAMs to provide fast searches of a database, list, or pattern. Typically, a memory cell array of a CAM device can be built from a large number of single CAM cells. A layout for a prior art single ternary CAM (TCAM) cell is shown in FIG. 11 and designated by the general reference character 1100. Generally, the conventional single TCAM cell can include a \"stack\" 1102 containing compare circuitry that is physically situated between two static random access memory (SRAM) cells (1104 and 1106). Each of the SRAM cells (1104 and 1106) can store bits of data (called X-value and Y-value). Such an X and Y value can be compared by transistors in the stack 1102 against external comparand data supplied to the TCAM cell via inputs. Such compare data is commonly labelled as compare data (CD) and an inverse compare data, or compare data \"bar\" (CDB). A stack 1102 can consist of four to six metal oxide semiconductor (MOS) transistors (in the example shown, n-channel transistors) placed adjacent to SRAM cells (1104 and 1106). A conventional TCAM device, like that described above, can suffer from a number of problems, the most notable being a size limitation. Common TCAM applications can require a large depth or size in the number of entries (data) that may be formed in an array of memory cells. However, for a given TCAM memory cell array size, as width of the array (or the number of bits in each entry) increases, depth (or number of entries) can decrease correspondingly. Thus, to increase capacity of a memory cell array there is a need to increase the number of individual TCAM cells that can be formed in a single TCAM device. However, because each individual conventional TCAM cell can require a relatively large area on the substrate or die on which the TCAM device is formed, there is a relatively low limit to the size of a TCAM array, or number of TCAM cells, that can be implemented in a single TCAM device. Accordingly, there is a need for some way of increasing the number of cells that may be included in memory cell array. For example, it would be desirable to arrive at a more compact layout that can reduce the area occupied by a memory\/logic CAM cell on a die or substrate. It would also be desirable if such an approach was compatible with both \"tapped\" well and body bias approaches, in the event such a device is implemented in complementary device technology (e.g., CMOS). The present invention can provide a solution to these and other problems, and offers further advantages over conventional memory\/logic cell device, such as Ternary Content Addressable Memory (TCAM) devices, as but one example. According to one aspect of the embodiments, the memory areas of each memory\/logic cell can include static random access (SRAM) memory cells. According to another aspect of the embodiments, the pair of memory areas and the logic circuit of each memory\/logic cell can be arranged on the surface of the substrate. The memory areas and logic circuit of each memory\/logic cell can generally have an \"L\" shape, a \"U\" shape, an \"S\" shape, a \"T\" shape, or a \"Z\" shape. In one particular arrangement, the first and second memory\/logic cells can have substantially identical L-shaped layouts with respect to a predetermined set of layers. In one example, such a set of layers can include each layer up to and including a second interconnect layer. The memory\/logic cells can be interlocked with one memory\/logic cell layout being rotated by 180 degrees relative to the other memory\/logic cell layout. According to another aspect of the embodiments, each memory\/logic cell can include a CAM cell that can selectively couple a corresponding match line to a pseudo-supply node in a compare operation. A pseudo-supply node can be preset to one potential prior to a compare operation, and allowed to float during a compare operation. A pseudo-supply node of a first CAM cell can be connected to a pass transistor of a memory cell in a second CAM cell. According to another aspect of the embodiments, each memory area can include a static random access memory (SRAM) cell with a double word line architecture. In such an architecture, each memory area can include a first word line connected to a first pass transistor of each SRAM cell and a second word line connected to a second pass transistor of each SRAM cell. According to another aspect of the embodiments, first and second memory\/logic cells can share parallel blocks, including at least one region of a first conductivity type and at least one region of a second conductivity type. Such parallel blocks can be crossed by word lines of a pair of memory cells. The word lines can be essentially perpendicular to the parallel blocks. In one particular arrangement, the parallel blocks can include two P-type regions formed by a P-type substrate and one N-type region between the two P-type regions, formed by an N-well situated within the P-type substrate. In another arrangement, parallel blocks can include one N-type region formed by an N-well situated within a P-type substrate. P-type regions can be situated on both sides of the N-type region by forming by P-wells within the N-well. According to another aspect of the embodiments, the memory\/logic cells can be CAM cells, each with at least one memory cell and one logic circuit. Each logic circuit can include a compare circuit having a vertical stack architecture with a plurality of transistors physically arranged in series between one memory cell of the CAM cell containing the compare circuit and one of the memory cells of the other CAM cell. In one arrangement, the transistors of the vertical stack include N-channel insulated gate field effect transistors having source-drain paths electrically connected in series. In another arrangement, the transistors of the vertical stack can include p-channel insulated gate field effect transistors having source-drain paths electrically connected in series. In yet another arrangement, the transistors of the vertical stack can include a mix of both n-channel and p-channel transistors having source-drain paths connected in series. According to another aspect of the embodiments, each compare circuit can include two internal stack transistors with gates coupled to internal nodes of the pair of memory cells, and further include two stack transistors with gates coupled to a compare data (CD) and inverse compare data (CDB) inputs. According to another aspect of the embodiments, a pair of memory\/logic cells can be CAM cells can be arranged on the surface of the substrate such that they are mirrored in the direction of word lines of the CAM cells for a predetermined set of manufacturing layers, including a transistor gate layer and first interconnect layer. According to another aspect of the embodiments, pairs of memory\/logic cells can be CAM cells repeated in a step wise fashion in the direction of bit lines common to the pairs of CAM cells and with bit line contacts being shared by CAM cell pairs. In an even more particular arrangement, pairs of memory\/logic cells can be mirrored in such a direction. According to another aspect of the embodiments, a memory cell layout with interlocking first and second TCAM cells, as described above, can be repeated in a row and column direction to form a memory cell array of a semiconductor memory device. The present invention can also include a method of forming a memory device on a substrate having ternary content addressable memory (TCAM) cells. The method can include, for each of a plurality of TCAM cells, forming an identical layout for memory cells and a compare section of each TCAM cell. The method can also include forming at least a first and second TCAM cell in a substrate according to the layout in interlocking positions, such that the TCAM cells share at least two sides with one another. According to another aspect of the embodiments, the shape of the TCAM cells can generally include an \"L\" shape, a \"U\" shape, an \"S\" shape, a \"T\" shape, or a \"Z\" shape. According to another aspect of the embodiments, forming the first and second TCAM cells in the substrate can include orienting a second TCAM cell with a 180 degree rotation with respect to an adjacent first TCAM cell, to form an interlocking TCAM cell pair that includes the first and second TCAM cells. According to another aspect of the embodiments, a method can further include forming a compare section in each TCAM cell that provides a controllable impedance path between a match line and a pseudo-supply node. In addition, the method can include forming a conductive connection between a pass transistor of a memory cell in the first TCAM cell and the pseudo-supply node of the second TCAM cell. The present invention can also include a configuration for CAM cells that includes a first CAM cell having at least a first memory cell with a pass transistor. The first CAM cell also includes a first compare section coupled between a first pseudo-supply node, that is selectively isolated from a power supply, and a first match line. A second CAM cell can have a second memory cell with a pass transistor and a second compare section coupled between a second pseudo-supply node, that is selectively isolated from the power supply, and a second match line. A pass transistor of the first memory cell can be coupled to the second pseudo-supply node. According to one aspect of the embodiments, the first and second compare sections can each include a plurality of transistors physically arranged in series with one another to form a stack. FIG. 11 is a block diagram of a prior art layout for a TCAM cell. FIG. 12 is a schematic diagram showing a NAND type TCAM cell that can be included in the embodiments of the present invention. FIG. 13 is a top plan view showing NAND type CAM device layout according to one embodiment. The present invention is directed to a novel layout for a circuit that employs memory circuits in conjunction with corresponding logic circuits, including but not limited to programmable logic (PLD) circuits and\/or content addressable memory (CAM) devices, including both ternary CAM (TCAM) devices, \"pseudo\" TCAM devices, and binary CAM devices. The disclosed layouts can include a pair of memory\/logic cells that can occupy less area on a die or substrate on which they are formed over conventional approaches. A layout structure according to one embodiment of the present invention will now be described with reference to FIG. 1. For purposes of clarity, many of the details of particular memory\/logic cells and the methods of designing and manufacturing the same that are widely known and are not relevant to the present invention have been omitted from the following description. FIG. 1 is a block diagram of a pair of interlocking memory\/logic cells showing an embodiment of a unique layout structure or layout according to the present invention. The layout structure is designated by the general reference character 100 and can include a first memory\/logic cell 102 and second memory\/logic cell 104 that can be interlocked with one another. Such memory\/logic cells can be considered interlocked, in that that one memory\/logic cell may abut the other one on more than one side. Generally, each memory\/logic cell (102 and 104) can include a pair of memory areas (106-0\/106-1 or 106-2\/106-3) and a logic portion (108-0 or 108-1) arranged on a surface of a substrate. The individual memory\/logic cells (102 and 104) can have substantially identical L-shapes. Further, the pair of memory\/logic cells (102 and 104) can be interlocked by rotating a layout of one of memory\/logic cells by 180 degrees relative to the other memory\/logic cell. This is represented by the arrow in FIG. 1. Together, each memory section (106-0 to 106-3) can store one or more bit values that can determine the operation of the corresponding logic portion (108-0 and 108-1). In one very particular PLD embodiment, memory sections 106-0 and 106-1 can store one or more configuration bits that establish the functionality of logic portion 108-0. Similarly, memory sections 106-2 and 106-3 can store one or more configuration bits that establish the functionality of logic portion 108-1. In a particular binary CAM or pseudo TCAM embodiment, memory sections 106-0 and 106-1 can store a data bit value V. Such a data bit value V can be compared to a corresponding compare data bit value by compare circuits within logic portion 108-0. Memory sections 106-2 and 106-3 can store another data bit value that can be compared to a corresponding compare data bit value by compare circuits within logic portion 108-1 (with global masking capabilities along a column direction in the pseudo TCAM case). In a particular TCAM embodiment, memory sections 106-0\/106-1 and memory sections 106-2\/106-3 can store two values (e.g., V\/M or X\/Y). Such two values can be compared by transistors within a corresponding logic portion (108-0 or 108-1) to compare data (CD and\/or CDB) supplied to the TCAM cells or otherwise used to provide a masked compare function. In this way, a layout structure 100 can form a repeatable structure composed of two interlocked memory\/logic cells that can be repeated to form a compact memory\/logic memory cell array. This can be sharp contrast to an approach like that of FIG. 11, in which single TCAM cell layouts, which are not interlocking, are repeated to form an array. It is understood that when a memory\/logic pair is repeated, this can include mirror-image type replications and\/or non-mirror image replications, such as \"tiling\". Referring now to FIGS. 2A to 3B, a second embodiment of the present invention is set forth in a top plan view. A second embodiment can include a layout structure that is designated by the general reference character 200. The embodiment of FIGS. 2A to 3B can be considered related to that of FIG. 1 in that the layout 200 can represent a more detailed example of one version of layout 100. A layout structure 200 can include some of the same general structures as set forth in the first embodiment 100. Accordingly, like structures will be referred to by the same reference character, but with the first digit being a \"2\" instead of a \"1\". FIG. 2A is a top plan view showing a layout of an active or diffusion region layer, a polysilicon gate layer, a first contact\/interconnect layer, and contact locations to polysilicon gates. FIG. 2B represents the same view as FIG. 2A, showing the first contact\/interconnect layer, a contact\/trench layer, and a local interconnect layer. FIGS. 2A and 2B also show resulting TCAM cell structures, include SRAM cell pairs (206-0\/206-1 and 206-2\/206-3) and stack portions (208-0 and 208-1) for each TCAM cell. More particularly, SRAM cell 206-0 can store an X-value for a first TCAM cell, SRAM cell 206-1 can store a Y-value for a first TCAM cell, and stack portion 208-0 can compare X and Y values from SRAM cells (206-0 and 206-1) with compare data values (e.g., CD and BCD). In a similar fashion, SRAM cell 206-2 can store an X-value for a second TCAM cell, SRAM cell 206-3 can store a Y-value for a second TCAM cell, and stack portion 208-1 can compare X and Y values from SRAM cells (206-2 and 206-2) with compare data values (e.g., CD and BCD). FIG. 3A is a schematic diagram of the interlocking TCAM cells of FIGS. 2A and 2B. The general structure of the interlocking TCAM cells will now be described in more detail. Referring to FIGS. 2A through 3A, each SRAM cell (206-0 to 206-3) can be a double word line architecture cell, with parallel blocks, with one including first type active areas (210-0 and 210-1) for containing n-channel devices and another including second type active areas (212-0 to 212-3) for containing p-channel devices. In one particular arrangement, first type active areas (210-0 and 210-1) can be formed in a P-type substrate, while second type active areas (212-0\/212-1 and\/or 212-2\/212-3) can be formed in an N-well that is formed within the P-type substrate. However, in alternate arrangements, such diffusion regions can have a different configuration. As but one of the many possible examples, and as will be described in more detail below, second type active areas (212-0\/212-1 and\/or 212-2\/212-3) can be formed in an N-well that is formed within the P-type substrate, while first type active areas (210-0 and 210-1) can be formed in P-wells formed within such N-wells (i.e., a triple well structure). Word lines (214-0 to 214-3) can cross the diffusion blocks in a perpendicular direction. A word line direction will be referred to herein as an \"X\" direction, and a direction perpendicular to the X direction will be considered a \"Y\" direction. As shown in FIGS. 2A and 2B, SRAM cells (206-0 to 206-3) can be arranged such that they are mirrored in X direction. That is, SRAM cells (206-0 to 206-3) can be mirrored in the direction of the word lines (e.g., 2140 and 214-1). Adjacent SRAM cells can share a same high power supply connection (VCC), as will be described in more detail below. Each stack portion (208-0 and 208-1) can have a \"vertical\" stack architecture with N-channel metal-oxide-semiconductor (MOS), or similar type, transistors formed within a diffusion block extending from at least one of the SRAM cells. For example, a diffusion block containing active area 210-0 can be conceptualized as extending from SRAM cell 206-0 and\/or 206-2. In the particular arrangement shown in FIG. 2A, polysilicon gates within stack portions (208-0 and 208-1) can be perpendicular to such diffusion blocks. In the very particular example of FIGS. 2A to 3B, gates of two internal stack transistors (e.g., N0\/N1 or N2\/N3) can be connected to internal nodes of corresponding SRAMs. Gates of a remaining two stack transistors (e.g., N4\/N5 and N6\/N7) can be connected to comparand external data inputs CD and CDB. However, other arrangements can include a different number of transistors depending upon the type of compare circuit employed. Thus, the particular stack circuitry shown in FIGS. 2A to 3B should not be construed as limiting to the present invention. Referring now to FIG. 3B, a schematic diagram is shown with the circuitry of FIG. 3A projected into physical locations generally corresponding to the layout of FIGS. 2A and 2B. FIG. 3B shows the SRAM inverters of FIG. 3A implemented as CMOS type inverters, as well as the general location of an N-type well within a p-type substrate. However, as noted above, such an N-type well may contain p-type wells that hold all or part of the N-channel MOS transistors of the TCAM cells. In the embodiment shown in FIGS. 2A to 3B, an N-well can be continuous and a tap can be present for every pair of TCAM cells. However, in an alternative embodiment, as described in more detail below, a tap can be removed, the interlocking TCAM cells arrangement being body bias compatible. Referring to FIGS. 3A and 3B, the schematics show that a pair of interlocking TCAM cells can comprise thirty-two (32) transistors (24 NMOS type and 8 PMOS type). While the circuits shown in FIGS. 3A and 3B can be distinguished from other conventional approaches by numerous ways, including the novel layout arrangement. In addition, however, the schematics also show a unique manner of coupling a pseudo-Vss (PVss) supply to pass transistors (N8, N9, N10 and\/or N11). In particular, a pass transistor of one TCAM cell in the pair can be connected to a PVss supply of the other TCAM cell of the pair. Thus, in the arrangement of FIGS. 3A and 3B, pass transistor N8 of a first TCAM cell 202 can be connected to a PVss node (PVss1) of second TCAM cell 204. In the same fashion, pass transistor N11 of a second TCAM cell 204 can be connected to PVss0 node of first TCAM cell 202. It is noted that in the arrangement shown, a next pair of TCAM cells that would form another two rows in an array do not have connections to PVss nodes of a first row. It is understood that a pseudo-Vss node can be a supply node that provides a low supply voltage for TCAM cell operations. However, such a supply is not a true supply (e.g., Vss) as a pseudo-Vss node is isolatable from a power supply. More particularly, a pseudo-Vss node can be precharged to a low supply voltage (Vss) prior to a compare operation (e.g., a precharge cycle), and then isolated from the supply voltage during a compare operation. One particular approach to a pseudo-Vss TCAM architecture is disclosed in U.S. Pat. No. 6,515,884 B1, issued to Sywyk et al., on Feb. 4, 2003. Having described a layout and schematic for a pair of interlocking TCAM cells, the operation of such a pair of interlocking TCAM cells according to an embodiment of the present invention will now be described in detail with reference to FIG. 3A. It will be appreciated that while the following description is applicable to the embodiment set forth in FIGS. 2A to 3B, such a description represents the operation of but one of many different types of TCAM cells that can be laid out in an interlocking fashion according to the present invention. Accordingly, a method and the layout of the present invention are not to be construed as being limited thereby. Referring to FIG. 3A, a single TCAM cell (202 or 204) can be used to compare data stored (coded) in embedded SRAM cells (e.g., 206-0\/206-1 or 206-2\/206-3) against external compare data provided to compare transistors of compare portions (208-0 or 208-1). SRAM cells can be conceptualized as storing X and Y bit values. In one particular arrangement, the meaning (value) of such bit value pairs for comparison against the external data is set forth below. When X=0 and Y=1, the value stored by the TCAM cell is \"1\". That is, in a compare operation, a \"hit\" can be generated when compare data (CD) is a \"1\" and inverse compare data (BCD) is a \"0\". When X=1 and Y=0, the value stored by the TCAM cell is \"0\". That is, in a compare operation, a \"hit\" can be generated when CD is a \"0\" and BCD is a \"1\". When X=0 and Y=0, the value stored by the TCAM cell is \"Don't Care=Always Hit\". That is, in a compare operation, a \"hit\" can be generated regardless of CD or BCD. When X=1 and Y=1, the value stored by the TCAM cell is \"Always Miss\". That is, in a compare operation, a \"miss\" can be generated provided one of CD or BCD is high. Data applied as CD\/CDB can be either matched to the stored value (X\/Y) (i.e., generate a hit) or unmatched (i.e., generate a miss). Of course the above represents but one way in which a TCAM cell can operate. Alternate arrangements can include value\/mask (V\/M) TCAM compare operations. The meaning (value) of such bit value pairs for comparison against the external data is set forth below. When M=0 and V=1, the value stored by the TCAM cell is \"1\". That is, in a compare operation, a \"hit\" can be generated when compare data (CD) is a \"1\" and inverse compare data (BCD) is a \"0\". When M=0 and V=0, the value stored by the TCAM cell is \"0\". That is, in a compare operation, a \"hit\" can be generated when CD is a \"0\" and BCD is a \"1\". When M=1, the value stored by the TCAM cell is \"Don't Care=Always Hit\". That is, in a compare operation, a \"hit\" can be generated regardless of CD or BCD. Referring now back to the X\/Y coding arrangement of FIG. 3A, when a value stored or coded in the SRAMs is equal to that applied to CD (and opposite to that applied to BCD), or is in a \"don't care\" state, a path between a corresponding match line (e.g., Match0 or Match1), which can be at a Vcc potential, and PVss node, can become a high impedance path. If all TCAM cells connected to the same match line have the same high impedance state, a \"hit\" can be generated, which can be detected by external circuitry to indicate a match. When a value stored or coded in the SRAMs is not equal to that applied to CD (and opposite to that applied to BCD), then the path between a match line and a PVss node can become a low impedance path. A resulting change in potential can be detected by external circuitry indicating a miss, or an unmatched condition. It will be appreciated that a TCAM cell of the embodiment of FIGS. 2A to 3B can operate to store data, write data to SRAM cells, and to read data from the SRAM cells. Very particular examples of a read and write operation for the particular circuit shown in FIGS. 2A to 3B will now be described. In a write operation, a TCAM cell can first be placed into a \"preset\" state by a preset operation. In one approach, a preset operation can be performed in a first half of a cycle and can include a second word line (e.g., WLPST0) of a TCAM cell to which data is to be written being driven high. A second word line of a TCAM to which data is not to be written (e.g., WLPST1) can be remain low. In addition, floating PVss lines can be pre-discharged to a low value (e.g., Vss), which can result in a logic low value being written into both X and Y SRAM cells. In addition, write data can be driven on bit lines BLX_C and BLY_C. Because a first word line (e.g., WL0) remains low, such data is not yet written to the TCAM cell. Following a preset operation, an actual writing of data can be performed. In one approach, an actual write operation can be performed in a second half of a cycle. In an actual write operation, a second word line (e.g., WLPST0) of a TCAM cell to which data is to be written can be driven low. A first word line (e.g., WL0) can be driven high, and data present on bit lines (BLX_C and BLY_C) can be written into X and Y SRAM cells. In a read operation, data can be read from SRAM cells. In one approach, a read operation can be a two step operation that includes a precharge operation followed by an evaluation operation. A pre-charge operation can be performed in a first half cycle, while an evaluation operation can be performed in three subsequent half cycles. In a pre-charge operation, a second word line of a TCAM cell from which data is to be read (e.g., WLPST0) can be driven low. This can isolate a corresponding stack portion from the SRAM. In addition, a first word line (e.g., WL0) of the cell being read can be low. Bit lines (BLX_C and BLY_C) can be pre-charged to high. In an evaluation operation, in a second half cycle, the pre-charging of the bit lines (BLX_C and BLY_C) can stop and a second word line (e.g., WL0) can be driven high. In the next half cycle, because pass transistors connected to word line WL0 are turned on, a bit line (BLX_C and\/or BLY_C) can be pulled low when data stored in a corresponding SRAM is low, or can be remain high when data stored in the corresponding SRAM is High. In a final or fourth half cycle, stored data values now present on bit lines (BLX_C and BLY_C) can be sensed by a sense amplifier (Sense Amp) in external circuitry (not shown). Hit\u2014when external data matches the encoded data (see above for encoding values) in X and Y SRAM cells\u2014Match0 to PVss0 path is high impedance for all TCAM cells connected to the match line. It is understood that both word lines of a TCAM cells (WLPST0\/WL0 and WLPST1\/WL1) are low during a compare operation, resulting in the bit lines being isolated from the SRAMs. Further, the PVss node of a stack is isolated from a corresponding SRAM cell by operation of the preset word line (WLPST0 or WLPST1) with internal nodes of the SRAMS being connected to the transistor gates of the corresponding stack. In this way, interlocked TCAM cells, such as those shown in FIGS. 2A to 3B can execute compare, read and write operations. It will be appreciated by those skilled in the art that there are many more possible schemes for a \"compare operation\" or \"write operation\" that can be performed by the pair of interlocked TCAM cells of the present invention, and the above is just one example. In yet another embodiment, pairs of interlocking TCAM cells can be laid out in at least one of two ways within the same memory array. Two cell layout options are desirable in order to allow easy cell array creation. Such variations can be desirable due to the fact that the front-end layers (i.e., layers deposited toward the start of a integrated circuit manufacturing process) can be tiled in a Y direction and mirrored in an X direction, while back-end layers can be mostly tiled in both the X and Y directions. In such an approach, both options can be tiled in X direction with step of 2\u00d7 width of a TCAM cell and tiled in Y direction with step height of a pair of TCAM cells. Two very particular examples of layout options are illustrated in FIGS. 4A and 4B. Both FIGS. 4A and 4B show a layout for four pairs of interlocked TCAM cells (400-0 to 400-3 and 400-0\u2032 to 400-3\u2032). Each TCAM cell pair can take the form of the various embodiments described above. Thus, FIGS. 4A and 4B can be considered related to the previous embodiments. In FIG. 4A, a layout for a pair of TCAM cells can be tiled in the Y direction and mirrored in the X direction. In FIG. 4B, a layout for a pair of TCAM cells can be tiled in the Y direction and X direction. In FIG. 4C, a layout for a pair of TCAM cells can be mirrored in the Y direction. It is noted that in all such examples, TCAM cells adjacent to one another in the Y direction can advantageously share bit lines, if so desired. Referring now to FIGS. 5 to 7, various signal connection arrangements for a pair of interlocked TCAM cells are shown in top plan views. FIG. 5 shows one example of a high power supply voltage connection arrangement. A high power supply voltage VCC can be supplied via a VCC line 500 oriented perpendicular to word lines, and common to a column of TCAM cells (or columns of interlocked TCAM cell pairs). In one arrangement, such a first conductive layer can provide a high power supply VCC to memory cells as well as a to N-wells that hold P-channel transistors (provide a bias voltage to a \"tap\"). However, in alternate arrangements, such taps may not be needed, as a TCAM cell arrangement may have a body bias configuration. The arrangement of FIG. 5 can correspond to the second interconnect layer shown in FIG. 2B. FIG. 6 shows a higher interconnect layer that can provide a low power supply VSS, pseudo-Vss (PVSS) nodes, and match lines for rows of TCAM cells. In one arrangement, VSS lines (600-0 and 600-1) can be shared by adjacent rows of TCAM cells. PVSS lines (602-0 and 602-1) and match lines 6040 and 6041 can cross stack portions of each TCAM cell of an interlocked pair. In one very particular arrangement, the lines of FIG. 6 can be formed in a first layer of metallization and disposed in the row direction (i.e., parallel to the word lines). FIG. 7 shows an interconnect layer that can provide a bit line connections and compare data values to TCAM cell pairs. In one arrangement, bit lines (BLX_C and BLY_C) and compare data lines (CD and BCD) can be formed in a second layer of metallization and all be disposed in the column direction (i.e., perpendicular to the word lines). One compare data line (CD) can cross over a stack portion of one TCAM cell, while another compare data line (BCD) can cross over a stack portion of the other TCAM cell. While embodiments described above have shown interlocked memory\/logic cells having an \"L\" shape, alternate embodiments can include different interlocking shapes for memory\/logic cells. That is, various other shapes can present memory\/logic pairs that share at least two sides. As but a few examples, an interlocked memory\/logic cells can have a \"T\" shape, a \"U\" shape, an \"S\" shape or a \"Z\" shape. A few of the many possible examples of alternate shaped interlocking memory\/logic cells are shown in FIGS. 8A to 8E. FIG. 8A shows one example of \"L\" shaped interlocked memory\/logic cell pairs, like those described above. FIG. 8B shows one example of \"T\" shaped interlocked memory\/logic cell pairs. FIGS. 8C and 8D shows two examples of \"U\" shaped interlocked memory\/logic cell pairs. FIG. 8E shows one example of \"Z\" shaped interlocked memory\/logic cell pairs. FIG. 8F shows one example of \"S\" shaped interlocked memory\/logic cell pairs. Of course, one skilled in the art would recognize that numerous variations on such shapes are possible. Each of FIGS. 8A to 8F has a hatched region. Such a hatched region indicates a location at which various connections can be advantageously placed. In particular, when utilized as a CAM cell that employs a pseudo-supply line (i.e., binary CAM, pseudo-TCAM, or TCAM), in such locations a pseudo-supply (e.g., pseudo-VSS) connection may be made from one CAM cell of one row to an adjacent CAM in the row above and\/or below. Further or alternatively, compare data connections can be advantageously placed in such a hatched region. In this way, memory\/logic cells having shapes other than an \"L\" shape can be interlocked with one another to form compact repeatable structures for building a memory\/logic array. Referring now to FIGS. 9A and 9B, different biasing schemes for an N-type substrate region of interlocked memory\/logic cell pairs is shown in cross section. Such biasing arrangements can be utilized in any of the above embodiments, thus FIGS. 9A and 9B can be considered related to the above embodiments. FIG. 9A is a side cross sectional view of a portion of a memory\/logic cell 900. FIG. 9A shows a P-type substrate 902 in which is formed an N-type well 904. A high power supply voltage VCC can be provided to a source of a P-channel transistor 906 within N-type well 904 (which may form part of an SRAM latch). In addition, a high power supply voltage VCC can be provided to bias N-type well 904 by way of a \"tap\" 908. FIG. 9B is a side cross sectional view of a portion of a memory\/logic cell 950 according to another embodiment having a triple well arrangement. FIG. 9B shows a P-type substrate 952 in which is formed an N-type well 954. A P-type well 956 is formed within an N-type well 954. An entire N-type well 954 can be biased to a voltage VPB via a bias source 960. Consequently, a P-channel transistor 958 can have a body bias type connection. One skilled in the art would recognize that such an arrangement can eliminate the need for a \"tap\", as in the case of FIG. 9A, if desired. In this way, interlocked memory\/logic cells according to the various embodiments can be manufactured according to CMOS type circuits configured with tapped wells as well as those with a body bias voltage. Referring now to FIGS. 10A to 10D, a method of manufacturing interlocked TCAM cells will now be described with a series of top plan views. The view and particular layers can correspond to those shown in FIGS. 2A and 2B. As shown in FIG. 10A, an N-type region 1000 and P-type regions 1002 can be formed in a substrate according to well understood techniques. However, as noted previously, such regions can be formed in parallel strips arranged in the same first direction (in this case, vertically). Even more particularly, an N-type region 1000 can be formed between adjacent P-type regions 1002. In one approach, an N-type region 1000 can be a well, while P-type regions 1002 can be a P-type substrate containing such a well. In alternate arrangement, an N-type region 1000 can be an N-well, while P-type regions 1002 can be P-wells formed within such an N-well. Referring now to FIG. 10B, active regions can be formed in the substrate according to well understood techniques, including but not limited to isolation, threshold voltage implant and the formation of a gate oxide. Unlike some conventional approaches, however, N-type active regions 1004 and P-type active regions 1006 can be arranged in parallel with one another in the first direction. Even more particularly, P-type active regions 1006 can be situated between contiguous N-type regions 1004. It is noted that while FIG. 10B shows a centrally located tap, such a tap can be omitted in a body biased arrangement. Referring now to FIG. 10C, transistor gate structures can be formed in conjunction with active regions in order to form transistors. Such patterning can be according to conventional deposition, lithography and etch techniques. In one very particular arrangement, such gates structures can be formed from polysilicon. Source and drain regions can be formed by conventional implant and\/or diffusion techniques. In one arrangement, gate structures can be situated in a second direction that is essentially perpendicular to a first direction. Still further, particular gate structures can be formed to create transistors in a first region 1008 for SRAMs of a first TCAM cell, a second region 1010 for transistors of stack portions for both a first and second TCAM cell, and a third region 1012 for SRAMs of a second TCAM cell. A first interlayer dielectric can then be formed over the gate structures according to conventional techniques. Contacts can be formed through such an interlayer dielectric, and a first interconnect layer (1st I\/C) can be formed. A first interconnect layer can be formed according to damascene techniques. A second dielectric layer can then be formed over the first interconnect layer. Referring now to FIG. 10D, trenches can be formed through a second dielectric layer to expose portions of gate contacts and first interconnects. A second interconnect layer can be formed according to conventional techniques. It is understood that in FIG. 10D, contact\/vias are formed where a second interconnect layer intersects a trench. Preferably, a second interconnect layer can be formed with dual damascene techniques. As shown in FIG. 10D, in one particular approach, such a layer can include a VCC line 1014 situated in the first direction. Higher level interconnections can be made according various approaches, including but not limited to those shown in FIGS. 5\u20137. It is noted that while various above embodiments have shown CAM arrangements that utilize a NOR type compare circuit, the present invention should not be construed as being limited to any particular compare circuitry. As but one alternate arrangement, a CAM implementation can include NAND type compare arrangements, in which CAM rows provide a serial-like NAND compare operation to arrive at a match result. A very particular NAND arrangement is shown in FIGS. 12 and 13. FIG. 12 is a schematic diagram showing one example of a NAND CAM cell arrangement. While a ternary NAND CAM cell is shown, a binary NAND CAM cell could also be employed. In the NAND CAM cell, a passgate transistor T1-0 can be enabled\/disabled according to a compare result generated by transistors T4 and T5, or a parallel passgate transistor T1-1 can be enabled\/disabled according to a mask value. FIG. 13 shows interlocked NAND type CAM cells. CAM cells of one row can provide a match path (MATCHn or MATCH(n+1)) that may be pulled high in match case. The various embodiments disclosed may have advantages over previous or conventional TCAM cells layouts, including any of: (i) area reduction of up to about 24% in the size of the TCAM memory array; (ii) speed improvement over other (XY) TCAM architectures; (iii) \"Body Bias\" compatibility (when tap removed from the TCAM cell and tapping cells are used outside of the TCAM cell); (iv) ability to utilize existing embedded SRAM cell architectures, i.e., a double-word line 6T SRAM cell; and (v) compatibility with dual damascene local interconnect processes. Of course, embodiments of the present invention may exist without such advantages. In addition, the invention is subject to considerable variations, and so can provide other advantages that those described above. It will be appreciated by those skilled in the art that in CAM type implementations there are many more possible schemes for a \"compare operation\" that can be performed by the pair of interlocked CAM cells, including but not limited to binary compare operations, pseudo-ternary compare operations, full value\/mask (V\/M) ternary compare operations, as well as X\/Y encoded compare operations, as described above. Along these same lines, while a memory\/logic cells have been described above as SRAM type memory cells, alternate arrangements could include different types of memory cells, including but not limited to dynamic RAM cells, as well as non-volatile memory cells, such as magneto-resistive RAM (MRAM) cells, ferro-electric RAM (FRAM) cells, programmable read only memory (PROM) cells, electrical PROM (EPROM) cells, and electrically erasable PROM (EEPROM) cells. It is also understood that the embodiments of the invention may be practiced in the absence of an element and or step not specifically disclosed. That is, an inventive feature of the invention can be elimination of an element. The foregoing description of specific embodiments and examples of the invention have been presented for the purpose of illustration and description, and although the invention has been described and illustrated by certain of the preceding examples, it is not to be construed as being limited thereby. They are not intended to be exhaustive or to limit the invention to the precise forms disclosed, and many modifications, improvements and variations within the scope of the invention are possible in light of the above teaching. It is intended that the scope of the invention encompass the generic area as herein disclosed, and by the claims appended hereto and their equivalents. the first memory\/logic cell and second memory\/logic cell are each bounded by a layout area and are interlocked with one another having layout areas that share at least two sides with one another. the memory areas of each memory\/logic cell comprise at least one memory cell. the at least one memory cell is selected from the group consisting of static random access memory (RAM) cells, dynamic RAM cells, magneto-resistive RAM cells, ferro-electric RAM cells, programmable read only memory (PROM) cells, electrical PROM cells, and electrically erasable PROM (EEPROM) cells. the pair of memory areas and the logic circuit of each memory\/logic cell are arranged on the surface of the substrate in a general shape selected from the group consisting of: an \"L\" shape, a \"U\" shape, an \"S\" shape, a \"T\" shape or a \"Z\" shape. the first and second memory\/logic cells have substantially identical L-shaped layouts, and are interlocked with one memory\/logic cell layout being rotated by 180 degrees relative to the other memory\/logic cell layout. the pseudo-supply node of the first CAM cell is coupled to a pass transistor of a memory cell of the second CAM cell. each CAM cell selectively provide a low match impedance path between an input match node to an output match node in a compare operation, the match impedance paths of CAM cells of the same row providing a match path that can be driven toward a predetermined potential in a hit match result. each pair of memory areas includes at least one static random access memory (SRAM) cell with a double word line architecture, including a first word line coupled to a first pass transistor of each SRAM cell and a second word line coupled to a second pass transistor of each SRAM cell. the first and second memory\/logic cells share parallel blocks, including at least one region of a first conductivity type and at least one region of a second conductivity type, the parallel blocks being crossed by word lines of the memory cells, the word lines being essentially perpendicular to the parallel blocks. the parallel blocks include two P-type regions formed by a P-type substrate and one N-type region between the two P-type regions, formed by an N-well situated within the P-type substrate. the parallel blocks include one N-type region formed by a well situated within a P-type substrate, and one P-type region on both sides of the N-type region formed by P-wells situated within the N-well. each logic circuit is a compare circuit, and each compare circuit comprises a vertical stack architecture having a plurality of transistors physically arranged in series between one of the memory areas of the CAM cell containing the compare circuit and one of the memory areas of the other CAM cell. the plurality of transistors of each compare circuit are selected from the group consisting of: only N-channel insulated gate field effect transistors (IGFETs) having source-drain paths electrically connected in series, only P-channel IGFETs having source-drain paths electrically connected in series, or a mix of N-channel and P-channel IGFETs having source-drain paths electrically connected in series. the plurality of transistors of each compare circuit include N-channel insulated gate field effect transistors having source-drain paths electrically connected in series. each compare circuit comprises two internal stack transistors with gates coupled to internal nodes of the pair of memory cells, and further comprising two stack transistor with gates coupled to a compare data (CD) and inverse compare data (CDB) inputs. the pair of memory\/logic cells are repeated to form an array that repeats in at least two directions, and interlocked pairs of memory\/logic cells are mirrored in at least one direction for predetermined layers including at least a transistor gate layer and first interconnect layer. the pair of memory\/logic cells are repeated to form an array that repeats in at least two directions, with adjacent memory\/logic cell pairs in one direction sharing at least one bit line. forming at least a first and second memory\/logic cell in a substrate according to the layout in interlocking positions, such that the memory\/logic cells share at least two sides with one another. the shape of the memory\/logic cells is selected from the group consisting of generally: an \"L\" shape, a \"U\" shape, an \"S\" shape, a \"T\" shape or a \"Z\" shape. forming at least the first and second memory\/logic cell in the substrate includes orienting the second memory\/logic cell with a 180 degree rotation with respect to the first memory\/logic cell to form an interlocking memory cell pair that includes the first and second memory\/logic cells. forming a conductive connection between a pass transistor of a memory cell in the first CAM cell and the pseudo-supply node of the second CAM cell. U.S. Appl. No. 10\/202,526, Zou, Janet. U.S. Appl. No. 10\/217,746, Chou, Richard. U.S. Appl. No. 10\/264,667, James, David. U.S. Appl. No. 10\/264,668, Rajamanickam, Jagad. U.S. Appl. No. 10\/266,953, Wanzakhade, Sanjay. U.S. Appl. No. 10\/271,660, James, David. U.S. Appl. No. 10\/281,814, James, David. U.S. Appl."} +{"id":"RedPajamaC4.0003","text":"Glory to God. We are in the book of Micah today, Chapter 4 of the book of Micah. Hallelujah. Micah is one of the minor prophets. Glory to God. His book or his message to the church appears before Nahum and after the book of Jonah. The Lord is asking me to tell you that many people, not only in the church world, many unbelievers have heard of the Old Testament, of the Scriptures of the Old Testament. They have heard of the prophets, and because they do not understand the word of the Lord coming through the prophets, they have called the word of the Lord condemning, unforgiving, and unmerciful. A lot of people have turned against Christianity and turned against the living God, because they could not understand the word of the Lord in the form it came out of the mouth of the prophets. Nor was there a teacher in the earth that the Lord worked into an ability to interpret what the Lord was saying through these words that were written down, that they should hear the true Gospel of the Kingdom, the everlasting Gospel that is preached about in the book of Revelation, or as the Lord has instructed us to call it here, the Gospel of Perfection. This is not the Gospel of the Kingdom that is being preached in the church world today. A lot of preachers think that they are preaching the everlasting Gospel. To avoid any confusion, and to make clear the call of the Lord, even the trumpet of the Lord that is sounding in the earth today, the Lord has instructed us to give the message that is coming forth in this hour a different name. A name that means the same but sounds different, so that it will catch the people's attention. The Gospel of Perfection, the true everlasting Gospel, that when it is preached to the earth shall bring salvation to the world. This is the message of the prophets, brethren, and it is glorious. It is glorious. On a previous message, the Lord had us preach Chapter 5 of Micah. At that time, I had no idea that the Lord would be bringing us back into the book of Micah, so I named the message Christ Jesus, the Judge of Israel. I wrote down the number of the tape for your somewhere, tape #95, if you would like to listen to that. Now if you are thinking, \"Why does the Lord start with Chapter 5, and then go to 4?\" At this point, I think that there is a very good chance that we will be doing 1,2, and 3. Expounding on them, we will not study them, we will be expounding on them. I do not know why the Lord started with Chapter 5, and now is going to Chapter 4 etc, etc. I do not know. I do know this, that we frequently, here on the soul realm, think exactly opposite than the way the Lord thinks. We are His mirror image. He is righteous, we are sinful. He is light, we are darkness. It frequently looks like He is going backwards, but He is not. We are the ones that are going backwards. He has got it straight. Glory to God. COMMENT: Does that mean we should read the Bible backwards? PASTOR VITALE: (laughing) Well no, we have to read it with our spirit. The back side of our soul is our spirit. I do know if you heard that, do you want to put that question on the tape? COMMENT: I said, does that mean we should read the Bible backwards? PASTOR VITALE: Yes, it means we should read the Bible backwards. The back side of the soul is the spirit. We should be reading the Bible with our spirit, and not with our soul. That is true. Hallelujah. Glory to God. Just as a brief overview, since I believe that the Lord is telling me we will be doing this whole book. Micah, Chapter 1, sounds like a lot of doom, and gloom, but in Verse 15 of Micah, Chapter 1 we see a promise of an heir. Let me read that to you. Micah, Chapter 1, Verse 15. \"Yet after all of the sins,\" and who is he talking about? He is talking about all of the sins of Israel. Chapter 1, Verse 15, the Lord says, \"Yet will I bring an heir unto thee, O inhabitant of Mareshah. He shall come unto Adulam, even the glory of Israel.\" The promise of an heir. An heir of what? An heir of the Life of the Father. Brethren, according to the Levitical law, and the way people lived under the Old Covenant, the oldest son inherited the entire substance of the father. It was expected that he would care for and nourish his younger brothers, his sisters, and his widowed mother. The entire responsibility for the corporate family or, in this society, we call it the extended family was given over to the heir to the father, the oldest son, who lived with the father day- by-day. Fathers did not go to work in Manhattan in Bible times. They lived and worked in full view of their family. The sons grew up with their father. They not only learned math and history like we learn in school today, they learned how to be a man, and they learned how to be a Godly man. They learned how to treat their wife, how to treat their brothers, and sisters. They learned how to treat their mother. They learned how to have mercy on the criminal. This may come as a shock to a lot of people today, brethren, but in this country our young people are being denied 90% of what their education should be. They are taught to read and write. In this country anyway, in most instances, they are prepared to earn a living, they are prepared to learn a skill that would earn them money. In many, many instances I think that in more than 50% of the families (the percentage is much higher than that), they are not taught to respect their elders. They are not taught how to get along with their brothers and sisters. They are not taught how to give and not receive. They are not taught how to forgive. They are not taught how to manage their money. They are not taught how to deal with the death of a loved one. They are not taught about how to live. They are taught about how to make money. They are not taught the Godly way to use that money. They are not taught to relate to their fellow man, which comes to them in many different forms. Mother, brother, sister, father, stranger, enemy, etc, etc. Years ago when a relative died, a close relative died, a mother, a father , a grandmother, or someone that lived in the house, that person was laid out in the house. They took a room, usually the living room, and they laid out the corpse in the living room. The wake was held in the house. That body lay there for three days, and all the people whatever they did, said good bye. This was their good bye to the person that died. The children had an opportunity to experience death, to see how their parents, friends, and relatives responded to death. Unfortunate that someone in this child's life, someone that they loved, died, that they would have a memory to draw upon to help them to cope with the death of a loved one. What is happening today, brethren, we have funeral parlors. The dead person is taken out of the house. I have been to a few funerals, they never bring the children. Do not bring the children, you do not want them to see this. Children have been totally isolated from death, except that the person totally disappears. Small children have been known to, either when they are small or when they get older, have the need of a psychiatrist in their life, because when they are not shown what happens to the dead body, their imaginations go to work. It is the same principle that the carnal mind operates in. When we cannot understand what God is telling us, the carnal mind jumps in and creates a fantasy. He imagines the answer to our problem. There are many young children today that cannot cope with death, because they do not understand it. All they know is that the person disappears, and they become terrified. We have a new thing in our education system today. Second and third grade teachers are taking their classes on a class trip to a funeral parlor to teach them what death is and what happens to the person when they die. What I am I saying to you? There are elements in this society that are recognizing in this hour that our children are not completely educated, that everything outside of their academic education is being severely neglected. As more and more mothers go to work, as more and more fathers work further and further away from the home, their children cannot see them, cannot partake of their reactions to problems. Do you know that children learn how to deal with problems when they experience your reaction to problems? Children must see the problems, and they must see how you solve them, how you deal with them. There is a deception over the whole society today. We think that if we get them a babysitter that keeps them clean, feeds them, changes them, keeps them from running out into the street that they are cared for. Brethren, your children need to be educated. They need to be educated by watching you live. Hallelujah. I do not know where that come from. I would have to say that has nothing to do with the message at all. I would have to say that it is on this tape because God wants it on this tape. I do not know where this tape is going, but praise the Lord, glory to God. In Micah, Chapter 1, Verse 15. After God tells them all of the problems of Israel, I am not going to go into it. I see idiolatry, graven images, we have not preached that yet. The Lord gives a promise that there is an heir to the Life of the Father. There is one that He is raising, and shall raise up in this earth who will care for the human race, who will be the elder brother, who will give each according to his need, who will educate, who will provide, who will have mercy. He says you are doing all these wicked things now, but here is an heir, and he will come to deliver you through education and mercy. Education of what? Education of how to live right. We do not know how to live right, brethren. We are killing each other, and we are the enemy of Almighty God, even those of us that are preaching the gospel and sitting in the congregation. There are areas in our life that have not yet been renewed. If our mind in any manner, shape, or form opposes or is different than the mind of God, we are His enemy. I do not know where I am His enemy. All I know is that He comes to me day-by-day and corrects me. I Know that I am not in full stature, so I must have thoughts that do not agree with God. In those areas, I am still God's enemy. I need and older brother to teach me how to deal, how to deal and how to think in certain areas. That older brother is promised to us in Micah, Chapter 1, Verse 15. Micah, Chapter 2, as I skip through it, the Lord is again rebuking Jacob, He is rebuking Israel, He is rebuking the people and telling them all of their wicked ways which is the truth, and there is no condemnation in the truth. We have preached this many times. Sometimes people are told the truth by an authority and they perceive it as condemnation. Brethren, there is a difference between conviction and condemnation. How will you repent if you do not know that you are in sin? Condemnation is a spirit. The spirit that tells you the truth determines whether you are condemned or convicted of sin. When the Spirit of Truth that comes from God says, \"Repent, receive the mercy of God and be delivered,\" hopefully, you will be convicted of your sins. There is no condemnation in the truth, brethren. If you are told the truth in a spirit that says, \"You are wicked, you shall never change, there is no delivering power of the Lord Jesus Christ in your life. You will die a wicked person because there is a Savior, but He will not save you.\" That is a spirit of condemnation. Hallelujah. We are in Micah, Chapter 2. The Lord goes on to tell Israel of all their wicked sins. Yet in Verse 13, we read, \"The breaker has come up before thee, they have broken up and passed through the gate and are gone out by it, their king shall pass before them and the Lord on the head of them.\" I declare to you, brethren, the understanding of this Scripture in view of the Lord's Gospel of Perfection, I say to you, \"The breaker is the destroyer, even the Lord Jesus Christ. He has come up before each and everyone of His people. He has arisen in their soul, He has come up, He has arisen into their headship, and they have indeed broken up, spirit, soul and body.\" Their wicked alliances have broken up in view of the Christ appearing in them, the carnal mind is destroyed and shall be destroyed. The marriage between Satan, the unconscious part of the carnal mind, and Eve has been broken up. They have passed through the gate. I declare to you, brethren, we are in hell now, that this world system is hell. We shall pass through the gate, yea, saith the Lord, you shall pass through the gate. My people shall file out, and they shall be restored unto the new Jerusalem, saith God, for I will deliver my people. But you must submit, saith God, you must submit to my teaching. You must submit to my ministry, you must hear this word and you must repent, saith the Lord, and I shall do this thing. I shall be the breaker, I shall destroy everything ungodly in you, saith the Lord. I shall lead you to places you have never seen before. I shall lead you out of hell, into Heaven, saith the Lord, even the Kingdom of God. Yea, even the life of my Son. Hallelujah. The destroyer has come up before them, Jesus has appeared in them. He has broken you away from Satan, the unconscious part of the carnal mind, destroyed the carnal mind and cast out inequity. They have passed through the gates of hell, they have gone out by it, they have passed through it and gone out from hell into where the soul of the Lord Jesus Christ is. Their King shall pass before them, Jesus shall lead the way, and they shall follow after Him and the Lord on the head of them. He shall be their ruling spirit. They shall live under His protection, even for the life of the ages. Hallelujah. Do not hear your sins and block out your sins. People that have condemnation within themselves, they would hear their sins spoken to them, and their ears block out the promise of deliverance. Hear your sins, confess, repent, and be delivered, saith the Lord for, indeed, I shall pass you through the gates. I shall pass you out of this world system. Lift up your heads, open your eyes, hear the word of the Lord and see were you dwell. The disciples said to Jesus, \"Lord, where dwellest thou?\" I declare to you that the Lord Jesus Christ was in the earth. His members were on the earth. His feet and His body was on the earth, but He dwelt in Heaven. Brethren, our feet are on the earth, our body is on the earth, we dwell in hell. There is only one man that I know of, to date, that has broken through the gates of hell. His name is the Lord Jesus Christ. He broke through and not with His body, brethren, with His soul, His fallen adamic soul that He inherited from Mary. He broke out of hell and into the life of the Father that dwelt within Him. Glory to God. Glory to God, there is a rapture. I will not argue with you about it. It is not your body that is being raptured, it is your soul. It is being taken off of the earth of your fallen adamic soul. It is being lifted up from your fallen adamic soul, and it is meeting Jesus in the air, even the soul of His Son, the Son of the Father, the Lord Jesus Christ. We shall be with Him forever in the air of His soul life. Hallelujah. That life that is above this earth, it is above the life of the earth of the fallen adamic soul, but yet it is lower or lesser that the life of the pure spirit form where the Father dwells. Glory to God. Now we are doing Micah, Chapter 3, Verse 12. The Lord goes on to tell Israel all of their sins, and, believe me, they are pretty wicked. I believe it is in this chapter that He is indicting the prophets, the priests, the kings, and everybody is a mess. Yet, in Micah Chapter 3, Verse 12, the Lord says, \"Therefore, because you have committed all of this wickedness, therefore shall Zion for your sake be plowed as a field. Jerusalem shall become heaps, and the mountain of the house as the high places of the forest.\" What do you see positive in that, Pastor Vitale? Brethren, before God brings you into Christ, fallen Adam must be destroyed. The Lord God has promised to destroy this whole world system which is hell and your very own fallen adamic soul, and the carnal mind that it has produced. It must be destroyed for you to enter into Heaven. Join with the Lord in the destruction of your fallen adamic soul and your carnal mind. Deny it, hate it, turn against it. Cleave unto the word of the Lord, and His promise will be yours. What promise? The promise that He shall destroy your fallen adamic soul. Hallelujah. Glory to God. Micah, Chapter 4. We are going to do the whole chapter after Chapter 3 which is pretty tough. He is indicting the prophets, the priest, everybody. Glory to God. Let me read you a couple of verse so you know what I am talking about. Verse 9 in Chapter 3. \"Hear this, I pray you, ye heads of the house of Jacob, and princes of the house of Israel that abhor judgment. Ye hate righteousness, and you pervert all equity, your pervert or destroy or go away from all fairness. They build up Zion with blood and Jerusalem with inequity (I will get into that when I preach it), there is great wickedness going on with the princes and the heads of the house of Jacob. In Verse 11, it says, \"The heads thereof judge for reward, and the priests thereof teach for hire, and the prophets thereof divine for money. Yet they will lean upon the Lord and say, is not the Lord among us? None evil shall come upon us.\" \"The judgment is not for the church. Satan, the unconscious part of the carnal mind, did that to me.\" Chapter 4, Verse 1. \"But in the last days, it shall come to pass that the mountain of the house of the Lord shall be established in the top of the mountains, and It shall be exalted above the hills; the people shall flow unto it.\" In the last days, brethren, in the last generation, and the ages are in our hearts. There are people living in the realm of time, on the face of the earth in this hour, in several different ages. There are those that are in the age or in the day that Adam is being formed. That means that Christ is not in their heart. That means they are in the sixth day. Man is still being made. There are people in this hour that are living already in the seventh day, they have their toe in it, they are not in it completely. Christ is in their heart. He is the New Age. They are partially in the new age and partially in the old age. The transfer from the old age into the new age is the transfer from the fallen adamic soul to the soul of Christ. It is happening within your being, your spiritual being. There is an exchange of souls taking place. In the last days, in the days when the soul of Christ is available to whoever God decides to give it to, because no man comes to the Son unless the Father draws him. In those days, the Lord is giving His soul or sprinkling His soul upon the hearts of people. I know that He is going to pour out His spirit upon all flesh, but, brethren, it is not a bath. He is sprinkling. When you sprinkle, not everybody gets it at once. In the last days, it shall come to pass that the house of the Lord shall be established in the top of the mountain. The mountains is the high place where we worship. The heathen get on top of a natural mountain because they think God is in the natural sky, and they are trying to get close to Him. The mountain of our spiritual being is our human spirit, brethren. The place where we can get closest to God is our spirit, for God is a spirit, brethren, and we must worship Him in spirit and in truth. The mountain of your life is your spirit. In those days, in the last generation, for those people whom Jesus has sprinkled on, and the ones that in their hearts He is dwelling, the mountain of the house of the Lord, the spirit of the Lord, shall be established in the top of the mountains. The spirit of Jesus Christ shall be established on top of your human spirit. He is coming into your spiritual being, and He is not entering into submission to Satan, the unconscious part of the carnal mind. He is not entering into submission to anybody or anything about your natural being. When Jesus Christ enters in as the mustard seed, when He sprinkles upon you, He enters in and goes to the head of the class. He is the Manchild of Revelation Chapter 12. The second He enters in, He goes right to the head of the class. He shall be established on top of the mountain which is your human spirit. Glory to God. \"It shall be exalted above the hills.\" What shall be exalted above the hills? Your human spirit that is now joined to the spirit of Christ, and they are having a child. That child is the Christ that is being formed in you. The spirit of the Lord is entering into your spiritual being. He is going to be established, or rooted down, or joined to your human spirit. His life shall be reproduced in you. Christ shall be reproduced in you. It is the spirit that is entering into you. The Christ that is being formed in you is Christ in the soul realm. It is the spirit of the Father that is entering into you, and reproducing the soul of Christ in your soul realm, so that you will be as Jesus Christ of Nazareth was. He said, \"I and the Father are one, but the Father is greater than I.\" Jesus Christ shall be within you, brethren, and He shall always be greater than you, but you and He shall be one. He shall be spirit, and you shall be soul. The two of your shall dwell together. Where? In your mind. Hallelujah. \"It shall be exalted above the hills.\" Christ in you shall be exalted above your soul life, and the people shall flow unto it. When Christ starts appearing in you, you shall be as a bright light. Those who Christ is drawing shall flow unto you, they shall see something in you. They shall know that there is help for them in you. In the hour that the Lord shall bring it forth, they shall flow unto you, and you shall form Godly soul ties with them, brethren. The word \"flow\" usually refers to \"water or spirit.\" Human beings do not flow, they walk. Spirit flows or vibrates. The people shall vibrate towards you. That in them that is crying out to God, shall recognize God in you, and they shall flow towards you. In God, you shall form Godly soul ties. They shall have the same experience you had though your Godly soul tie. The spirit of the Lord shall enter in and be established in their mountain, and Christ shall be formed in them. Hallelujah. Hear the word of the Lord, brethren. Do not run from, do not be afraid of, and do not shy away from the conviction of the Lord upon you. Your sins are wicked, your sins are great, your sins are abundant, but hear the end of them, saith the Lord. Hear that I shall deliver you, saith God. Let my mind be your mind, confess your sins, repent. Say that my word is true that you are guilty, and this is what I shall do for you. My mind shall be your mind. All of the blessing of my Life and my Kingdom will be imparted to you. You shall have the strength, saith the Lord, to prevail over the wickedness in your own soul that would cause you to die. Chapter 4, Verse 2. \"Many nations shall come and say (the nations are just the people, they are the many members of the living soul), many nations shall come and say, let us go up to the mountain of the Lord, and to the house of the God of Jacob, and He will teach us of His ways, we will walk in His paths, for the laws shall go forth out of Zion, and the word of the Lord from Jerusalem.\" Many nations shall come, many people shall come to what? To the light that they could see in your soul. When they come to you, they shall say to each other \"Let us go up to the mountain of the Lord, let us go to the place where the Christ is appearing, let us go up to the high place of the human spirit of the vessel where Jesus Christ is appearing.\" \"Let us go up to the mountain of the Lord and to the house of the God of Jacob.\" Now Jacob is the natural man, and Israel is the spiritual man. They are going up to the mountain of the Lord Christ and to the house of the God of Jacob. They are going to the natural man in whom Christ is appearing. \"He will teach us of His ways, and we will walk in His paths.\" Brethren, the Lord wants to teach you in His ways, but there is a big problem in the church today. We are filled with pride and rebellion. There is a lie in the church that says God will teach every man directly. I know the Scripture says, \"No man need teach you.\" You do not need the carnal doctrines of men, but God does not teach you everything directly. He is expressing Himself through many different teachers. We are still human, and each of us has a little part of what He wants to be made available to the body of Christ. Sometimes, you must get it from a teacher. If you wait on your stool waiting for he Lord to teach you directly, by the time you realize that, everything has passed you by, this whole move of God has passed you by. It may be too late. If you are one of these people, and you believe this, put it before the Lord. Ask Him to tell you if this word is not true. If it is true, what teacher to go to, what teacher to study under, how He wants you to get there, how often, and what kind of relationship He wants you to have with them? Do not say, \"Well, I have family obligations, I have financial obligations.\" Do not put your answer in the Lord's mouth. Say to the Lord that you are willing to go if He makes a way. When He makes a way, go. Hallelujah. We are in Verse 2. He will teach us His ways, very frequently through the Christ in other men. You are not the only one that has Christ. He is not doing the same thing in your Christ as He is doing in the Christ in me. I want what He is doing in you and you should want what He is doing in me. There is a five-fold ministry, we can all learn from each other, but there is a ministry. They are to be recognized, and to be honored. Everybody is not equal in function. We are all equal that Christ is being formed in us, but we are not all equal in function. We do not all teach on the same degree. We do not all minister on the same degree, with the same power. We do not all prophesy in the same degree of authority. We do not all have the same degree of knowledge. If God wants to tell you something, and He wants to do it in a level of spirituality that He is not bringing forth in you, He will send you to another believer. He does it to me. I do not sit here and say, \"I am going to seek Christ about this, if He does not tell me directly He does not want me to hear it.\" I want everything for me, and if what He has for me is available in another believer, in another manifestation of ministry, I will submit to the ministry to get what I want. That does not mean that this ministry is invalid, help us Lord. Verse 2. \"He will teach us of His ways and we will walk in His paths. He is going to teach us, He is the heir that is going to teach us how to forgive, how to love, how to get along with the body of Christ. He is going to teach us to live our lives in a way that will make us optimally ready for Christ to appear in us. We shall ever have that hope, that hope of His appearing in us, if we are doing the very best we to obey His laws. He is going to teach us how to be God-like. He is going to teach us His way, and we shall walk in His paths, \"For the law shall go forth from Zion and the word of the Lord from Jerusalem.\" Zion typifying spirit, and Jerusalem the soul. For the law, the spiritual law, shall go forth from your Zion, when the spirit of the Lord is joined to your human spirit and Christ is being formed in your soul. \"The Law shall go forth,\" what does that mean? It means that the law shall be fulfilled in you, brethren. You shall no longer be able to sin when Christ is in full stature and fallen Adam is tread under your foot. The law of God shall go forth from Zion imparting life. Paul said, \"Yet in my members I see another law, even the law of sin and death.\" That law imparts death unto your body and to your soul. Entering into perfection is the work of the Lord Jesus Christ. We can sow and we can water, but only God can give the increase. There is something for you to do, you do not live your life and sin willingly and find yourself one morning in full stature. That is a rapture mentality, brethren. We must work towards perfection, we must strive for it, we must study to show ourselves approved. When we fulfil all of God requirements, He shall catch us up and meet us in the air. Hallelujah. Even the life of His soul. Chapter 4, the book of Micah, Verse 3. \"He shall judge among many people and rebuke strong nations far off, and they shall beat their swords into plowshares and their spears into pruning hooks: nation shall not lift up sword against nation, neither shall they learn war anymore. And He shall judge among many people and rebuke strong nations afar off.\" Brethren, the judgement is between righteousness and sin. He shall judge in every encounter you have with another human being. He shall judge every thought that is in your mind. He shall make a judgement of what is sin and what is righteous. When sin is pointed out to you or to me, we are required to repent. When we repent, the Scripture says \"He shall rebuke the strong nations that are afar off.\" Afar off, you mean in China? We are here in the United States, far off away from God, brethren. He will rebuke the strong nations that are away from God. Have you not heard the living soul that died is in rebellion against the living God? That she is afar off from Him in this hour, that she is alienated from Him. Where? In her mind. The Lord shall rebuke every nation, every man, every human being that is far off from Him. Where? In His thoughts. If your thoughts are reprobate, you shall be rebuked. You can be a believer, you can be living for God in every way that you know how, but if in one corner of your mind there is a thought that is afar off from God, you shall be rebuked. Why? So that your thought can come into agreement with Christ and that you can continue to be prepared to be caught up into full stature, even perfection or spiritual manhood, where you no longer sin. He is going to teach us, brethren. A lot of people hear that, and they get all excited, \"Oh wow the Lord is going to teach us His ways and lead us in His paths.\" Brethren, do you know how He teaches you? He teaches you by painful experiences. Why does He do that? Because when He talks to you, you do not hear Him, or if you hear Him, you do not listen, or if He talks to you through another man you say, \"I do not believe it.\" When you have that painful experience you are going to believe it, that God did not want you to do that. Glory to God. We are still in Verse 3. \"They shall beat their swords.\" Who? The strong nations. You do not know that the living soul that died is strong, the carnal man is very strong. What is the source of his strength? Witchcraft power, even the spirit that rules in the carnal mind. Satan, the unconscious part of the carnal mind, is generating witchcraft power in your carnal mind. Do not say, \"Not me!\" Everybody. Unless you have been perfected. Glory to God. They shall beat their swords into plowshares. Who? All of the strong nations that were being ruled by Satan, the unconscious part of the carnal mind, and using witchcraft to get their needs met, they are going to beat their swords into plowshares and their spears into pruning hooks. What are their swords, brethren? How do we slay each other. We are not our body, we are spiritual beings. How do we kill each other? With our mouth, brethren. Our tongues are our swords, the words that we speak kill our brethren. Jesus teaches that in the New Testament. Glory to God. They are going to beat their swords into plowshares. What is a plowshare? It is something that you use to turn over the ground where the ground comes into a condition where it grows food. The very same place where they were killing people, in their mouth. Of course, James teaches us if we can rule our tongue we can rule our whole spiritual being. What does that mean? The words that come out of our mouth are being generated by the spirit that is ruling our mind. If we stop killing our brethren, that means the spirit in our mind has changed. There is no longer a criminal spirit ruling our tongue, there shall be a peace-making spirit ruling our tongue. Our swords shall no longer be used for death and destruction, but they shall be used for Godly purposes and to provide food. What is the food that shall save the world? Even the word of God. Where their mouth was used to preach death, it shall now preach life. It shall tell the people, \"You who are condemned to burn in hell forever, you who were told that there was no hope for your mother and your father, there is hope in Christ Jesus. You who have sinned, you who have murdered, you who have blasphemed, you are forgiven.\" In that very same place where you blasphemed, from that very same place, shall come forth the Gospel of Perfection. Hallelujah. Glory to God. Their spears shall be beaten into pruning hooks. Well, I am expounding today, so I really did not look up the difference between swords and spears. We will have to go past that. Generally, when we get into a word combination, like this one word means your spirit and one word means your soul as a general rule. Glory to God. \"Their spirits will bring forth food, and their spears will turn into pruning hooks,\" I do not know what it means so I am going to let it go. \"Nations shall not lift up a sword against nation, no man shall hurt his brother again, neither shall they learn war anymore.\" They will not learn war anymore. What does that mean? If you do not learn, that means you are not being taught. Who teaches us war? Jesus teaches us life and peace. Satan, the unconscious part of the carnal mind, teaches us to wage war. Prophesy is very subtle. To understand, or to even get a relative understanding of what the Lord is saying, we have to read the sentences or the phrase and ask questions about it. How are we not going to learn war anymore? Because Satan, the unconscious part of the carnal mind, is not going to be there to teach us war anymore. He shall have been swallowed up, nailed to Jesus Christ for the life of the ages. He is going to be castrated. All you spirits of pride out there, I declare to you that your Lord, even the Lord Jesus Christ, He is the one that is convicting you, He is the one that is going to crucify Satan, the unconscious part of the carnal mind, in you. He shall deliver you out of the mouth of the lion. You shall no longer be His enemy, you shall be His friend, you shall no longer be a criminal, you shall be a Godly person. You shall no longer hate, you shall show the love of God, even to your own enemies. You shall no longer be bound by unforgiveness, you shall forgive in the very same place where you have transgressed the law of God. Verse 4. \"They shall sit every man under His vine, His fig tree. None shall make them afraid for the mouth of the Lord of hosts has spoken it.\" Now we know that Jesus is the vine. I did not have time to study the difference between the vine and the fig tree. We know the fig tree is the fruit. Glory to God. We know that every man shall be safe under the rulership of Jesus Christ, and the fruit that He has produced which is Christ in us. No one shall make us afraid, because fear, brethren, is a manifestation of hell. Every man shall sit safely under a benevolent spirit, even the Lord Jesus Christ, because, brethren, we are not safe under Satan, the unconscious part of the carnal mind. We shall have a benevolent, loving spirit that shall be our Father, and we shall sit under Him. We shall sit safely under our fig tree, which is the fruit of His life, even the soul of Christ. We shall not be afraid because fear hath torment, brethren, and fear is a manifestation of hell. We shall no longer be in hell, we shall be in Heaven, even the soul life of the Lord Jesus Christ. \"For the mouth of the Lord of hosts has spoken it.\" How do I know this is going to happen to the worst sinner I have ever met in my life? Because the Lord of hosts has spoken it. To all you people out there that have a problem that Hitler could be saved, I declare to you the truth of the gospel of the Kingdom. It is this. The Lord has made a creation, He describes that creation as a lump of clay. The Scriptures says He is breaking pieces of that clay off, He is making individual human beings as we know them out of that clay. The Scripture says that some of them are a vessel of honor, and some are vessels of dishonor, that He is setting them against one another, so that the vessels of honor can be perfected, because we are perfected through tough times, hard trials and crucifixion. When He finishes with the vessel of dishonor, He dissolves him. Peter talks about the elements being melted. It is the elements within your soul. He dissolves the vessels of dishonor. The body goes back to the dust in the ground, the soul goes back to the lump of clay, and the spirit goes back to the Father. Out of that lump of clay, the Father continues to break off pieces and form new vessels. In that day, in that last hour, in that last generation every human being on the face of the earth shall be made into a vessel of honor until there is no more clay left in that lump, brethren. You see, the same clay was used to form the vessels of dishonor as it is used to form the vessels of honor. There is no more Hitler. The individual personality is not resurrected, but the living soul that died, the all, the creation that God made which was once formed for evil, shall be formed for good. The Lord Jesus Christ shall indwell us until total perfection, at which point He shall offer us up to the Father. The Father shall be all in all. He shall be the total driving force of every vessel formed out of the clay. The whole creation shall be raised up to the high realms of the spirit. Hallelujah. Glory to God. Verse 5. \"For all the people will walk, everyone, in the name of his God.\" We will walk in the name of our Lord, our God, forever. For all of the people, brethren, For all of the vessels that were formed in that last generation, in that last day, everyone of them is going to have the spirit of God, because in the Scripture the word \"name\" means \"spirit.\" Everyone will walk, live out his life in the spirit of God. We will walk in the name of our God, forever and ever. The heathen and the Gentile shall have been joined, and every vessel appearing on the face of the earth shall be generated by the spirit of the Lord Jesus Christ. We shall exist because He has called us into existence. We shall all be formed into vessels of honor. The entire creation shall be polished and perfected. Individual personalities shall not be resurrected. Sister, you there with your heart breaking because you are Jewish, and you cannot comprehend God having mercy on Hitler, dry your tears, sister. Hitler is not walking around in the high realms of Heaven. Hitler has been dissolved. He has been dissolved, he shall never rise again. Nevertheless, the entire creation, the substance which human beings are made, shall be reformed. Does not the Scripture tell us that the potter marred the vessel, and that He reformed the clay. The substance of this entire creation came forth out of the life of the Lord Jesus Christ, even the lamb that was slain from before the foundation of the earth. Those vessels of dishonor shall be dissolved into the whole and reformed, but there shall be no sign whatsoever of the man whose name was Hitler. Glory to God. Verse 6. \"In that day, saith the Lord, I assemble her that halt.\" That word \"halt\" is Strong's 6761. I just looked up a few words today, it means \"lame.\" Webster's says that the word means, or can mean, \"to be lacking, needful, or desirable substance.\" Eve is the lacking one, who was disabled because of her separation from God. Eve cannot function without a husband. Eve must be joined to a husband and his offspring. To what? To appear in the is realm of appearance. She is our human spirit, and she is lame because she has an adulterous husband, and a wicked son that she is joined to. She cannot do what she is supposed to do to get away. She cannot do what she would be able to do if she were married to the spirit of Christ; that is, to have Christ formed in her soul so that she could stop dying. Her lameness is causing her, and every member of the living soul to die. Glory to God. \"In that day, saith the Lord.\" What day? In the day that every vessel that is formed is an honorable vessel. In that last day, in the day, in the age that Jesus Christ is sprinkling upon every human being on the face of the earth. I am not talking about people getting up out of their graves, brethren. Let us not get ghoulish here. Jesus Christ is not in the business of digging up bones that have been buried thousands of years ago. Every dishonorable vessel, every vessel that was not perfect, I am sorry, yes your mother. Every vessel that was not perfect has been dissolved back into the lump of clay. The Lord Jesus Christ the master builder, the potter, has marred that vessel. In that day the entire lump will be formed into new honorable vessels. The Lord shall be their God. \"In that day, will I assemble her that halted.\" The word \"assemble\" is #622, and it means \"to take to oneself, to gather to the fathers.\" It speaks about returning to one's original ancestors. I am suggesting to you in that day, in that last generation the Lord Jesus Christ is going to every human spirit of every vessel formed and gathering her to Himself. He is going to marry her. He is going to join with her, and she is going to bear His child. Christ is going to be formed in her soul, and that vessel shall be honorable, because Christ shall appear in her. She shall be saved in childbearing. Glory to God. In that day, the Lord is going to redeem Eve, and He is going to get her back from her adulterous marriage, He is going to get her our of captivity. He is going to marry her and give her the child that is going to permit her to appear in the realm of appearance for the life of the ages. The Lord says, \"I will gather her that is driven out, her that I have afflicted.\" I ask you who has the Lord driven out? Where has He driven her out of? The only one that I know of that was driven out of, was fallen Adam, and he was driven out of the Garden of Eden. Fallen Adam today is in many"} +{"id":"RedPajamaC4.0004","text":"Application of provisions of Part II. Acts in contemplation or furtherance of trade dispute. Removal of liability for certain acts. Restriction of actions of tort against trade unions. Power to alter rules of trade unions. Enforcement of rule for secret ballot. Actions contrary to outcome of secret ballot. Non-application of sections 14 to 17 to employers' unions. Restriction of right to injunction. Change of deposit consequent on change in number of members. Amendment of section 2 of Trade Union Act, 1971. Superannuation and gratuities for and in respect of the chief executive of the Commission. Grants to the Commission and power to borrow. Industrial relations officers and advisory service. Reference of dispute by Minister. Review of joint labour committees. Superannuation and gratuities for and in respect of chairman, deputy chairmen and ordinary members of the Court. Functions of Labour Court relating to codes of practice. Constitution and proceedings of joint labour committees. Exclusion from scope of joint labour committee. Report for assistance of joint labour committee. Proposals for employment regulation order. Enforcement of employment regulation order by inspector by civil proceedings. Amendment of section 52 (2) (d) of Industrial Relations Act, 1946. Powers of inspection for enforcement of registered employment agreement. Proof of registered employment agreement and related matters. Enforcement of registered employment agreement by inspector by civil proceedings. Amendment of section 12 (2) (d) of Industrial Relations Act, 1969. Evidence of failure to attend sitting of Court. 1.\u2014This Act may be cited as the Industrial Relations Act, 1990. 2.\u2014(1) This Act (other than Part II ) and the Industrial Relations Acts, 1946 to 1976, may be cited together as the Industrial Relations Acts, 1946 to 1990, and shall be construed together as one Act. (2) Part II of this Act and the Trade Union Acts, 1871 to 1982, may be cited together as the Trade Union Acts, 1871 to 1990, and shall be construed together as one Act. \"the Commission\" means the Labour Relations Commission established by section 24 . (3) In any enactment other than this Act, a reference to the Trade Disputes Act, 1906 (repealed by this Act) or to any provision thereof shall, without prejudice to section 20 (1) of the Interpretation Act, 1937 , be construed as a reference to any relevant provision of Part II of this Act. 4.\u2014(1) A person convicted of an offence for which a penalty is provided in any enactment indicated in the First Schedule to this Act at any reference number shall, in lieu of the fine provided in that enactment, be liable to the fine specified in column (3) of that Schedule at that reference number, and that enactment shall be construed and have effect accordingly. (2) Where it is provided in the First Schedule to this Act at any reference number that a person shall be liable to a daily default fine, he shall be guilty of contravening the relevant enactment on every day on which the contravention continues after conviction of the original contravention and for each such offence he shall be liable to a fine not exceeding the amount specified at that reference number instead of the fine specified for the original contravention. (3) The provisions of this section shall not apply to any offence committed before the passing of this Act. 5.\u2014Notwithstanding section 10 (4) of the Petty Sessions (Ireland) Act, 1851 , summary proceedings for an offence under the Industrial Relations Acts, 1946 to 1990, may be instituted within one year from the date of the offence. 7.\u2014The enactments referred to in the Second Schedule to this Act are hereby repealed to the extent specified in the third column of that Schedule. Definitions for Part II . \"strike\" means a cessation of work by any number or body of workers acting in combination or a concerted refusal or a refusal under a common understanding of any number of workers to continue to work for their employer done as a means of compelling their employer, or to aid other workers in compelling their employer, to accept or not to accept terms or conditions of or affecting employment. Application of provisions of Part II . 9.\u2014(1) Sections 11 , 12 and 13 shall apply only in relation to authorised trade unions which for the time being are holders of negotiation licences under the Trade Union Act, 1941 , and the members and officials of such trade unions, and not otherwise. (2) Where in relation to the employment or non-employment or the terms or conditions of or affecting the employment of one individual worker, there are agreed procedures availed of by custom or in practice in the employment concerned, or provided for in a collective agreement, for the resolution of individual grievances, including dismissals, sections 10 , 11 and 12 shall apply only where those procedures have been resorted to and exhausted. (3) Procedures shall be deemed to be exhausted if at any stage an employer fails or refuses to comply with them. (4) The procedures referred to in subsection (2) may include resort to such persons or bodies as a rights commissioner, the Labour Relations Commission, the Labour Court, an equality officer and the Employment Appeals Tribunal but shall not include an appeal to a court. 10.\u2014(1) An agreement or combination by two or more persons to do or procure to be done any act in contemplation or furtherance of a trade dispute shall not be indictable as a conspiracy if such act committed by one person would not be punishable as a crime. (2) An act done in pursuance of an agreement or combination by two or more persons, if done in contemplation or furtherance of a trade dispute, shall not be actionable unless the act, if done without any such agreement or combination, would be actionable. (3) Section 3 of the Conspiracy, and Protection of Property Act, 1875 , and subsections (1) and (2) of this section shall be construed together as one section. 11.\u2014(1) It shall be lawful for one or more persons, acting on their own behalf or on behalf of a trade union in contemplation or furtherance of a trade dispute, to attend at, or where that is not practicable, at the approaches to, a place where their employer works or carries on business, if they so attend merely for the purpose of peacefully obtaining or communicating information or of peacefully persuading any person to work or abstain from working. (2) It shall be lawful for one or more persons acting on their own behalf or on behalf of a trade union in contemplation or furtherance of a trade dispute, to attend at, or where that is not practicable, at the approaches to, a place where an employer who is not a party to the trade dispute works or carries on business if, but only if, it is reasonable for those who are so attending to believe at the commencement of their attendance and throughout the continuance of their attendance that that employer has directly assisted their employer who is a party to the trade dispute for the purpose of frustrating the strike or other industrial action, provided that such attendance is merely for the purpose of peacefully obtaining or communicating information or of peacefully persuading any person to work or abstain from working. (3) For the avoidance of doubt any action taken by an employer in the health services to maintain life-preserving services during a strike or other industrial action shall not constitute assistance for the purposes of subsection (2). (4) It shall be lawful for a trade union official to accompany any member of his union whom he represents provided that the member is acting in accordance with the provisions of subsection (1) or (2) and provided that such official is attending merely for the purpose of peacefully obtaining or communicating information or of peacefully persuading any person to work or abstain from working. (5) For the purposes of this section \"trade union official\" means any paid official of a trade union or any officer of a union or branch of a union elected or appointed in accordance with the rules of a union. (c) it is an interference with the trade, business, or employment of some other person, or with the right of some other person to dispose of his capital or his labour as he wills. 13.\u2014(1) An action against a trade union, whether of workers or employers, or its trustees or against any members or officials thereof on behalf of themselves and all other members of the trade union in respect of any tortious act committed by or on behalf of the trade union in contemplation or furtherance of a trade dispute, shall not be entertained by any court. (2) In an action against any trade union or person referred to in subsection (1) in respect of any tortious act alleged or found to have been committed by or on behalf of a trade union it shall be a defence that the act was done in the reasonable belief that it was done in contemplation or furtherance of a trade dispute. 14.\u2014(1) This section shall come into operation two years after the passing of this Act (\"the operative date\"). (v) the number of spoilt votes. (3) The rights conferred by a provision referred to in subsection (2) are conferred on the members of the trade union concerned and on no other person. (4) Nothing in this section shall constitute an obstacle to negotiations for the settlement of a trade dispute nor the return to work by workers party to the trade dispute. (5) The First Schedule to the Trade Union Act, 1871 , is hereby extended to include the requirement provided for in subsection (2). 15.\u2014(1) The committee of management or other controlling authority of a trade union shall, notwithstanding anything in the rules of the union, have power by memorandum in writing to alter the rules of the union so far as may be necessary to give effect to section 14 . (2) In the case of a trade union which is a trade union under the law of another country having its headquarters control situated in that country, the committee of management or other controlling authority referred to in this Part shall have the same meaning as in section 17 (2) of the Trade Union Act, 1975 . 16.\u2014(1) Every trade union registered under the Trade Union Acts, 1871 to 1975, or a trade union under the law of another country shall, not later than the operative date, forward to the Registrar of Friendly Societies a copy of its rules incorporating the provisions referred to in subsection (2) of section 14 . (2) A trade union failing to comply with subsection (2) of section 14 or subsection (1) of this section shall cease to be entitled to hold a negotiation licence under Part II of the Trade Union Act, 1941 , and its existing licence shall stand revoked on the operative date. (3) A body of persons shall not be granted a negotiation licence unless, in addition to fulfilling the relevant conditions specified in section 7 of the Trade Union Act, 1941 , and section 2 of the Trade Union Act, 1971 , as amended by section 21 of this Act, it complies with subsection (2) of section 14 and for this purpose that subsection shall have effect from the passing of this Act. (4) A body of persons which is a trade union under the law of another country shall not be granted a negotiation licence unless, in addition to fulfilling the conditions referred to in subsection (3) and section 17 of the Trade Union Act, 1975 , it forwards, at the time of application for a negotiation licence, a copy of its rules incorporating the provisions referred to in subsection (2) of section 14 to the Registrar of Friendly Societies. (5) Where the Registrar of Friendly Societies is satisfied, after due investigation, that it is the policy or practice of a trade union registered under the Trade Union Acts, 1871 to 1975, or a trade union under the law of another country persistently to disregard any requirement of the provisions referred to in subsection (2) of section 14 he may issue an instruction to the trade union to comply with the requirement. Where such an instruction is disregarded, the Registrar of Friendly Societies shall inform the Minister and the Minister may revoke the negotiation licence of the trade union concerned. 17.\u2014(1) Sections 10 , 11 and 12 shall not apply in respect of proceedings arising out of or relating to a strike or other industrial action by a trade union or a group of workers in disregard of or contrary to, the outcome of a secret ballot relating to the issue or issues involved in the dispute. (2) In the case of ballots by more than one trade union, the outcome of a secret ballot referred to in subsection (1) shall mean the outcome of the aggregated ballots. (3) Where two or more secret ballots have been held in relation to a dispute, the ballot referred to in subsection (1) shall mean the last such ballot. Non-application of sections 14 to 1 7 to employers' unions. 18.\u2014 Sections 14 to 1 7 shall not apply to a trade union of employers. 19.\u2014(1) Where a secret ballot has been held in accordance with the rules of a trade union as provided for in section 14 , the outcome of which or, in the case of an aggregation of ballots, the outcome of the aggregated ballots, favours a strike or other industrial action and the trade union before engaging in the strike or other industrial action gives notice of not less than one week to the employer concerned of its intention to do so, that employer shall not be entitled to apply to any court for an injunction restraining the strike or other industrial action unless notice of the application has been given to the trade union and its members who are party to the trade dispute. (2) Where a secret ballot has been held in accordance with the rules of a trade union as provided for in section 14 , the outcome of which or, in the case of an aggregation of ballots, the outcome of the aggregated ballots, favours a strike or other industrial action and the trade union before engaging in the strike or other industrial action gives notice of not less than one week to the employer concerned of its intention to do so, a court shall not grant an injunction restraining the strike or other industrial action where the respondent establishes a fair case that he was acting in contemplation or furtherance of a trade dispute. (3) Notice as provided for in subsection (1) may be given to the members of a trade union by referring such members to a document containing the notice which the members have reasonable opportunity of reading during the course of their employment or which is reasonably accessible to them in some other way. (b) in respect of proceedings arising out of or relating to any action resulting or likely to result in death or personal injury. (5) Where two or more secret ballots have been held in relation to a dispute, the ballot referred to in subsections (1) and (2) shall be the last such ballot. 20.\u2014(1) Within one month after the 31st December each year a trade union which is the holder of a negotiation licence shall send to the Minister a statement of the number of its members on the 31st December and, if it is necessary to increase or reduce a deposit under Part II of the Trade Union Act, 1941 , as amended by section 2 of the Trade Union Act, 1971 , by any amount in order to make it equal to the appropriate sum, such trade union shall, not later than four months after the 31st December, increase such deposit by such amount or apply for the return out of such deposit of such amount (as the case may require). (2) Subsection (1) shall take effect on 1st January, 1991. for the time being, as the case may be. (4) If, in relation to any trade union required to send a statement under this section, there is a failure to send a statement or there is sent a wilfully false statement, such of the members and officers of the trade union as consent to or facilitate the failure to send a statement or the sending of the false statement and, in the case of a trade union registered under the Trade Union Acts, 1871 to 1975, the trade union itself shall each be guilty of an offence under this section and shall be liable on summary conviction thereof to a fine not exceeding \u00a3500. (5) Save in pursuance of this section, a trade union shall not, on account of a change in the number of its members, change the amount of a deposit under Part II of the Trade Union Act, 1941 , as amended by section 2 of the Trade Union Act, 1971 . (6) Sections 14 and 16 of the Trade Union Act, 1941 , shall apply in relation to a deposit made with the High Court under this Act or under the Trade Union Act, 1971 , as it applies to a deposit under the Trade Union Act, 1941 . Amendment of section 2 of Trade Union Act, 1971 . 21.\u2014(1) In this section \"the Act of 1971\" means the Trade Union Act, 1971 . (2) Section 2 (1) (b) of the Act of 1971 (which refers to the minimum membership for the grant of a negotiation licence) is hereby amended, in relation to applications for a negotiation licence made after the passing of this Act, by the substitution for \"500\" of \"1,000\". (3) In respect of a body of persons applying under section 9 (1) of the Trade Union Act, 1941 , for a negotiation licence after the passing of this Act, \"the appropriate sum\" referred to in section 2 (1) (a) of the Act of 1971 shall be the sum appropriate to the number of members of the body in accordance with the Third Schedule to this Act or the sum deposited and kept deposited in the High Court before such passing in accordance with the said section 2 (1) (a) and the Schedule to the Act of 1971, as the case may be. (4) Whenever after the passing of this Act a trade union is formed consisting wholly or mainly of two or more trade unions which have been amalgamated and each of which, immediately before the amalgamation, had been the holder of a negotiation licence, \"the appropriate sum\" referred to in the said section 2 (1) (a) shall be such sum as the Minister may determine in respect of the union so formed. 22.\u2014(1) Section 15 of the Trade Union Act, 1975 (which refers to a grant towards expenses of amalgamations or transfers) is hereby amended by the deletion of \"were exceptional and\". (2) Whenever two or more trade unions engage in an unsuccessful attempt to amalgamate or to effect a transfer of engagements from one union to another the Minister may, with the consent of the Minister for Finance, make to one or more of those trade unions out of moneys to be provided by the Oireachtas a grant of such amount as the Minister thinks fit towards such expenses as he is satisfied were incurred, within the period of two years immediately prior to the failure, by that trade union in the course of, or in contemplation of, such attempted amalgamation or transfer. (3) Where an instrument of amalgamation takes effect the registration of any amalgamating union shall cease to have effect and on the granting of a negotiation licence to the new union any negotiation licence held by an amalgamating union shall cease to have effect. (4) Where an instrument of transfer of engagements takes effect the registration of any transferor union and any negotiation licence held by such union shall cease to have effect. (b) cancel the designation of any persons under this subsection. (4) Any person who stands designated by virtue of section 17 (2) (a) of the Industrial Relations Act, 1969 , at the passing of this Act shall remain designated for the purpose of subsection (1) unless the designation is cancelled under subsection (3) (b). (5) The Government may by order amend the definition of \"worker\" in subsection (1) and may by order revoke or amend any such order. (6) Every order made under this section shall be laid before each House of the Oireachtas as soon as may be after it is made and, if a resolution annulling the order is passed by either House, within the next twenty-one days on which that House has sat after the order has been laid before it, the order shall be annulled accordingly, but without prejudice to the validity of anything previously done thereunder. 24.\u2014(1) There shall be a body to be known as the Labour Relations Commission to fulfil the functions assigned to it by this Act. (2) The Commission shall stand established on such day as the Minister by order appoints. (3) The Commission shall consist of a chairman and six ordinary members who shall be appointed by the Minister. (4) The Fourth Schedule to this Act shall apply to the Commission. (i) assist joint labour committees and joint industrial councils in the exercise of their functions. (2) The Commission may at the request of one or more parties to a trade dispute or on its own initiative offer the parties its appropriate services with a view to bringing about a settlement. (3) Except where there is specific provision for the direct reference of trade disputes to the Labour Court, trade disputes shall first be referred to the Commission or to its appropriate services. (4) The Commission may, if it thinks fit, on request or on its own initiative, provide for employers, employers' associations, workers and trade unions such advice as it thinks appropriate on any matter concerned with industrial relations. (5) The functions referred to in subsection (1) (a), (b) or (d) shall be performed on behalf of the Commission by members of its staff duly appointed by the Commission. (6) The Commission, a member of the Commission or any of its staff shall not include in any report any information obtained by it in the course of any proceedings before it under this Act as to any trade union or as to the business carried on by any person which is not available otherwise than through evidence given at the proceedings (including conciliation conferences and advisory meetings) without the consent of the trade union or person concerned, nor shall any member of the Commission or any of its staff or any person concerned in the proceedings, without such consent, disclose any such information. (7) Subsection (6) shall not apply to a report to the Court under section 26 (1) (a) or a notice to the Court under section 26 (3) (a) or a report under section 48 (3). (8) Subsection (6) is without prejudice to section 8 (2) of the Anti-Discrimination (Pay) Act, 1974 , or section 14 of the Industrial Relations Act, 1969 . (b) the parties to the dispute have requested the Court to investigate the dispute. (2) The report referred to in subsection (1) (a) shall include information on the issues in dispute, the attempts made to resolve the dispute and any other information which the Commission considers of assistance to the Court. (4) The foregoing provisions of this section shall not apply in relation to an investigation of a trade dispute by the Court instituted by it before the establishment of the Commission or an appeal to the Court in relation to a recommendation of a rights commissioner or of an equality officer. (5) Where the Court, following consultation with the Commission, is of opinion, in relation to a trade dispute which but for this subsection it would be precluded by virtue of subsection (1) from investigating, that there are exceptional circumstances which warrant it so doing, it may investigate the dispute. 27.\u2014(1) The Commission may act notwithstanding the existence of not more than two vacancies in its membership. (2) The Commission may from time to time make rules regulating its own procedure and business (including the fixing of a quorum for its meetings) and shall furnish the Minister with a copy of any such rules as soon as may be after they have been made. (3) The Commission shall in each year, at such date as the Minister may direct, make a report of its activities to the Minister including such observations as it thinks proper relating to trends and developments in industrial relations including pay and the Minister shall cause copies of the report to be laid before each House of the Oireachtas. (4) The Commission shall supply to the Minister such information as he may from time to time require regarding its activities. 28.\u2014(1) There shall be a chief officer of the Commission who shall be known as the chief executive. (2) The first chief executive shall be appointed by the Minister and each subsequent chief executive shall be appointed by the Minister after consultation with the Commission. (3) The terms and conditions of service of the post of chief executive shall be determined by the Minister with the consent of the Minister for Finance. (4) The office of chairman and the post of chief executive may be held by the same person for such period and subject to such conditions as the Minister with the consent of the Minister for Finance may determine. (5) The chief executive may be removed from office by the Minister for stated reasons. 29.\u2014(1) The Minister may, with the consent of the Minister for Finance, make a scheme or schemes for the granting of pensions, gratuities and other allowances on cessation of office or death to or in respect of the chief executive of the Commission. (2) The Minister may, with the consent of the Minister for Finance, at any time amend a scheme made by him under this section. (3) A scheme made by the Minister under this section shall be carried out by the Minister in accordance with its terms. (4) If any dispute arises as to the claim of any person to, or the amount of, any pension, gratuity or allowance payable in pursuance of a scheme under this section, such dispute shall be submitted to the Minister who shall refer it to the Minister for Finance, whose decision shall be final. (5) Every scheme made by the Minister under this section shall be laid before each House of the Oireachtas as soon as may be after it is made and if either House, within the next twenty-one days on which that House has sat after the scheme is laid before it, passes a resolution annulling the scheme, the scheme shall be annulled accordingly, but without prejudice to the validity of anything previously done thereunder. 30.\u2014(1) In each financial year there may be paid to the Commission out of moneys provided by the Oireachtas a grant of such amount as the Minister, with the consent of the Minister for Finance, may sanction towards the expenses of the Commission in the performance of its functions. (2) The Commission may, with the consent of the Minister, given with the consent of the Minister for Finance, borrow temporarily by arrangement with bankers such sums as it may require for the purpose of providing for current expenditure. 31.\u2014(1) The Commission shall, in such form as may be approved by the Minister with the consent of the Minister for Finance, keep all proper and usual accounts of all moneys received or expended by it. (2) Accounts kept in pursuance of this section shall be submitted annually at such times as the Minister, with the consent of the Minister for Finance, directs, by the Commission to the Comptroller and Auditor General for audit and those accounts, when so audited, shall (together with the report of the Comptroller and Auditor General thereon), be presented to the Minister, who shall cause copies of the audited accounts and the report to be laid before each House of the Oireachtas. 32.\u2014(1) The Minister, with the consent of the Minister for Finance, may appoint such staff as he thinks necessary to assist the Commission in the performance of its functions. (2) Appointments under this section shall be on such terms as the Minister with the consent of the Minister for Finance determines and shall be subject to the Civil Service Commissioners Act, 1956 , and the Civil Service Regulation Acts, 1956 and 1958. 33.\u2014(1) The Commission may appoint members of its staff to act as industrial relations officers. (2) The industrial relations officers shall perform any duties assigned to them by the Commission through its chairman or its chief executive officer and, in particular, they shall assist in the prevention and settlement of trade disputes. (3) The Commission may appoint members of its staff, including industrial relations officers, to give advice on matters relating to industrial relations to management and workers or their representatives. 34.\u2014(1) Where the Minister proposes to appoint a rights commissioner under section 13 (1) of the Industrial Relations Act, 1969 , he shall request the Commission to submit to him a panel of persons and he shall not appoint as a rights commissioner any person other than a person included in such panel. (2) The term of office of a rights commissioner appointed in pursuance of subsection (1) shall be a period not exceeding three years. (3) A rights commissioner may be re-appointed for a further term or terms by the Minister. 35.\u2014(1) The rights commissioners shall operate as a service of the Commission and references to rights commissioners in the Industrial Relations Act, 1969 , the Unfair Dismissals Act, 1977 , and the Maternity Protection of Employees Act, 1981 , shall be taken to be references to rights commissioners so operating. 36.\u2014(1) An objection under section 13 (3) (b) (ii) of the Industrial Relations Act, 1969 , by a party to a trade dispute to an investigation of the dispute by a rights commissioner shall be of no effect unless it is notified in writing to the commissioner within three weeks after notice of the reference of the dispute to the commissioner has been sent by post to that party. (2) An appeal to the Court against the recommendation of a rights commissioner shall not be considered unless it is notified in writing to the Court within six weeks after the making of the recommendation. (3) A rights commissioner, in addition to notifying the Court, shall notify the Minister and the Commission of every recommendation made by him. (4) The Commission shall not exercise its function of conciliation on a dispute on which a rights commissioner has made a recommendation. 37.\u2014(1) The Commission may, with the consent of the Minister and the Minister for Finance, appoint members of its staff to be equality officers and a person so appointed shall be known (and is in this Part referred to) as an equality officer. (2) The equality officers appointed before the establishment of the Commission under the Anti-Discrimination (Pay) Act, 1974 , as adapted by section 18 of the Employment Equality Act, 1977 , shall, after such establishment, perform their functions as officers of the Commission and not of the Court. (3) An equality officer shall be independent in the performance of his functions. (4) Section 6 (1) of the said Act of 1974 shall cease to have effect on the establishment of the Commission but without prejudice to any appointments previously made under that subsection. (5) References in the Anti-Discrimination (Pay) Act, 1974 , and the Employment Equality Act, 1977 , to equality officers shall be read as references to equality officers under this section. 38.\u2014(1) Where the Minister is of the opinion that a trade dispute, actual or apprehended, affects the public interest, he may refer the matter to the Commission or the Court, which shall endeavour to resolve the dispute. (2) Where the Minister is of the opinion that a trade dispute is a dispute of special importance, he may request the Commission or the Court or another person or body to conduct an enquiry into the dispute and to furnish a report to him on the findings. 39.\u2014The Commission shall carry out a periodic review with a view to ascertaining whether, in the opinion of the Commission, new joint labour committees should be established or, as regards existing committees, whether any establishment order requires amendment or any committee should be abolished, and shall send a copy of the review to the Court and to the Minister. \"(1) The Minister may, with the consent of the Minister for Finance, make a scheme or schemes for the granting of pensions, gratuities and other allowances on cessation of office or death to or in respect of the chairman, a deputy chairman (whether appointed under section 4 (1) or 4 (4) of this Act or under section 8 (3) of the Industrial Relations Act, 1976 ) who is required by the Minister to devote the whole of his working time to the duties of the office of deputy chairman, and the ordinary members of the Court.\". 41.\u2014The Minister may amend or revoke an order made by him under section 8 (1) of the Industrial Relations Act, 1976 . 42.\u2014(1) The Commission shall prepare draft codes of practice concerning industrial relations for submission to the Minister, either on its own initiative or at the request of the Minister. (2) Before submitting a draft code of practice to the Minister, the Commission shall seek and consider the views of organisations representative of employers and organisations representative of workers, and such other bodies as the Commission considers appropriate. (3) Where the Minister receives a draft code of practice from the Commission he may by order declare that the code, scheduled to the order, shall be a code of practice for the purposes of this Act. (4) In any proceedings before a court, the Labour Court, the Commission, the Employment Appeals Tribunal, a rights commissioner or an equality officer, a code of practice shall be admissible in evidence and any provision of the code which appears to the court, body or officer concerned to be relevant to any question arising in the proceedings shall be taken into account in determining that question. (5) A failure on the part of any person to observe any provision of a code of practice shall not of itself render him liable to any proceedings. (6) The Minister may at the request of or after consultation with the Commission by order revoke or amend a code of practice. (7) Every order made under this section shall be laid before each House of the Oireachtas as soon as may be after it is made and, if a resolution annulling the order is passed by either House within the next twenty-one days on which that House has sat after the order has been laid before it, the order shall be annulled accordingly, but without prejudice to the validity of anything previously done there-under. 43.\u2014(1) The Court may on the application of one or more parties concerned give its opinion as to the interpretation of a code of practice, provided that in the case of an application by one party notice of the application has been given by that party to the other party. (2) The Court may investigate a complaint that there has been a breach of a code of practice provided that the complaint has been referred to the Court by a party directly involved and that the complaint has first been considered by the Commission in accordance with section 26 . (3) Where the Court has investigated such a complaint, it may make a recommendation setting forth its opinion in the matter and, where appropriate, its view as to the action which a party in breach of the code should take or cease from taking in order to ensure compliance with the code. 44.\u2014The provisions of the Fifth Schedule to this Act shall have effect with respect to the constitution and proceedings of joint labour committees. 45.\u2014(1) The day for the holding of an enquiry into an application for an establishment order under section 38 of the Industrial Relations Act, 1946 , to be set out in a notice under that section shall be not less than thirty days from the date of publication of the notice or later than sixty days from the receipt of the application by the Court and section 38 (b) (ii) of the section shall stand amended accordingly. (2) The Court shall make an establishment order, or make known its decision not to do so, within forty-two days of the completion of the enquiry held in accordance with the said section 38. 46.\u2014(1) The Court may by order exclude an undertaking to which a registered employment agreement applies from the scope of the functions of a joint labour committee at the request of the employer and the group of workers or their representatives in the undertaking provided that the remuneration and conditions of employment provided for in the registered employment agreement are not less favourable than those provided for in the relevant employment regulation order. (b) the registered employment agreement is revoked. 47.\u2014(1) The Court may, on its own initiative or at the request of a joint labour committee, arrange for the provision of a report on the industry or trade covered by the committee and the position of its workforce, having regard to the purposes for which the committee was established. (2) A request for a report under subsection (1) may be made by the committee on the application of the chairman with the approval of a majority of the members of the committee. (b) that representations with respect to the proposals may be made to the committee within the period of twenty-one days after the date of such publication. (2) The joint labour committee, having considered any representations made to it in accordance with subsection (1), may submit to the Court such proposals as it thinks proper for an employment regulation order. (3) When proposals for an employment regulation order are submitted to the Court, the chairman of the committee shall submit a report to the Court on the circumstances surrounding their adoption. (4) The Court may, as it thinks proper, by order give effect to the proposals from such date (subsequent to the date of the order) as the Court specifies in the order. (5) (a) Where the Court is not satisfied that it should make an order giving effect to the proposals it may submit to the committee amended proposals which it is willing to accept. (b) The committee may, if it thinks fit, re-submit the amended proposals, with or without modifications, to the Court. (c) The Court may, as it thinks proper, make an order giving effect to the proposals as so re-submitted from such date (subsequent to the date of the order) as the Court thinks proper and specifies in the order or refuse to make an order. 49.\u2014(1) An inspector may institute on behalf of a worker civil proceedings for the enforcement of any right of action of the worker against his employer in respect of the failure of the employer to comply with a condition of employment of an employment regulation order and in any such proceedings an order may be made for the payment of costs by the inspector but not by the worker. (2) The power given by subsection (1) shall not be in derogation of any right of the worker to institute civil proceedings on his own behalf. Amendment of section 52 (2) (d) of Industrial Relations Act, 1946 . 50.\u2014 Section 52 (2) (d) of the Industrial Relations Act, 1946 (which refers to failure or refusal to comply with any lawful requirement of an inspector) is hereby amended by the deletion of \"wilfully\" before \"fails\". 51.\u2014(1) The employer of any workers to whom a registered employment agreement applies shall keep such records as are necessary to show that the registered employment agreement is being complied with and shall retain the records for three years. (2) If an employer fails to comply with a provision of subsection (1) he shall be guilty of an offence and shall be liable on summary conviction to a fine not exceeding \u00a3500. (3) If any employer required by this section to keep records keeps or causes to be kept, or produces or causes to be produced or knowingly allows to be produced to an inspector, any record which is false in a material respect knowing it to be false, he shall be guilty of an offence and shall be liable on summary conviction to a fine not exceeding \u00a31,000 or imprisonment for a period not exceeding three months or to both. 52.\u2014The powers of inspection given to inspectors by section 12 of the Industrial Relations Act, 1969 , shall be exercisable for the purpose of enforcing the provisions of section 32 of the Industrial Relations Act, 1946 , and section 51 of this Act and the said section 12 and this section shall be construed as one section. 53.\u2014(1) A copy of Iris Oifigi\u00fail purporting to contain a notice published by the Court of the registration of an employment agreement shall be prima facie evidence of the making of that agreement. (2) Prima facie evidence of a registered employment agreement or of the variation of an agreement may be given by the production of a document purporting to be a copy of the agreement or of the variation and to be published by the Court. (3) A copy of Iris Oifigi\u00fail purporting to contain a notice or list published by the Court under section 31 of the Industrial Relations Act, 1946 , shall be prima facie evidence of the contents of the notice or list, including any particulars published therewith. 54.\u2014(1) An inspector may, if it appears to him that a sum is due from an employer to a worker to whom a registered employment agreement applies or that the employer has failed to comply with a condition of any such agreement with respect to the worker, institute on behalf of that worker civil proceedings for the recovery of that sum or the enforcement of that condition and in any such proceedings an order may be made for the payment of costs by the inspector but not by the worker. Amendment of section 12 (2) (d) of Industrial Relations Act, 1969 . 55.\u2014 Section 12 (2) (d) of the Industrial Relations Act, 1969 (which refers to failure or refusal to comply with a lawful requirement of an inspector) is hereby amended by the deletion of \"wilfully\" before \"fails\". shall, in a prosecution against the person so named for the alleged default, be received in evidence of the matters so stated without further proof. (2) Section 18 of the Industrial Relations Act, 1946 , shall apply to a document to which subsection (1) relates. \u00a3500, in lieu of five pounds. \u00a31,000, in lieu of fifty pounds. \u00a31,000 and a daily default fine of \u00a3200. \u00a3100 and a daily default fine of \u00a310. In section 3, the first paragraph, and the paragraph inserted by 6 Edw. 7, c. 47, section 1. 1. Where the number of members does not exceed 2,000, the deposit shall be \u00a320,000. 2. Where the number of members exceeds 2,000 but does not exceed 5,000, the deposit shall be \u00a320,000 together with \u00a3800 for each additional 300 members (or part of 300 members) in excess of 2,000 members. 3. Where the number of members exceeds 5,000 but does not exceed 10,000, the deposit shall be \u00a328,000 together with \u00a3800 for each additional 500 members (or part of 500 members) in excess of 5,000 members. 4. Where the number of members exceeds 10,000 but does not exceed 20,000, the deposit shall be \u00a336,000 together with \u00a3800 for each additional 1,000 members (or part of 1,000 members) in excess of 10,000 members. 5. Where the number of members exceeds 20,000 the deposit shall be \u00a344,000 together with \u00a3800 for each additional 1,000 members (or part of 1,000 members) in excess of 20,000 members, but subject to an overriding maximum of \u00a360,000. 1. The Labour Relations Commission shall be a body corporate with perpetual succession and an official seal and power to sue and be sued in its corporate name. 2. The chairman shall be appointed by the Minister after consultation with such organisations as the Minister considers to be representative of workers and of employers and shall be appointed for such period and on such terms and conditions as the Minister determines. (c) two shall be nominated by the Minister. 4. The workers' members shall be the persons nominated for appointment by the Minister by such organisation or organisations as the Minister determines to be representative of trade unions of workers. 5. The employers' members shall be the persons nominated for appointment by the Minister by such organisation or organisations as the Minister determines to be representative of employers. 6. Each ordinary member shall be a part-time member of the Commission and shall be appointed on such terms and conditions as the Minister determines. 7. The chairman and each ordinary member may be paid, out of moneys provided by the Oireachtas, such allowances for expenses as the Minister, with the consent of the Minister for Finance, determines. 8. The chairman or an ordinary member may resign his office by letter addressed to the Minister. 9. The Minister may remove the chairman or an ordinary member from office for stated reasons. 10. (1) Where the chairman or an ordinary member of the Commission is nominated as a member of Seanad \u00c9ireann or as a candidate for election to either House of the Oireachtas or to the European Parliament he shall thereupon cease to hold office. (2) A person who is, for the time being, entitled under the Standing Orders of either House of the Oireachtas to sit therein or who is a member of the European Parliament shall, while he is so entitled or is such a member, be disqualified from becoming the chairman or an ordinary member of the Commission. 11. The seal of the Commission shall be authenticated by the signature of the chairman or an ordinary member authorised by the Commission to act in that behalf and the signature of an officer of the Commission authorised by the Commission to act in that behalf. 12. Judicial notice shall be taken of the seal of the Commission and every document purporting to be an instrument made by the Commission and to be sealed with the seal (purporting to be authenticated in accordance with paragraph 11) of the Commission shall be received in evidence and be deemed to be such instrument without proof unless the contrary is shown. \"the Acts\" means the Industrial Relations Acts, 1946 to 1990. (ii) an equal number of persons (in this Schedule referred to as representative (workers) members) who, in the opinion of the Court, represent workers in relation to whom the committee is to operate. (2) Before appointing a representative member of a committee the Court shall, so far as is reasonably practicable, consult any organisation of employers or, as the case may be, workers concerned. (4) The independent member of a committee shall hold office during the pleasure of the Minister. (5) Where a representative member of a committee ceases, in the opinion of the Court, to be representative of the employers or, as the case may be, workers whom he was appointed to represent, the Court shall determine his membership. (6) The Court may, in its discretion, determine the membership of any representative member of a committee. (7) Where the membership of any representative member of a committee is determined, such member shall cease to be a member of the committee. 4. The proceedings of a committee shall not be invalidated by reason of any vacancy therein or of any defect in the appointment of a member. 5. In order to constitute a meeting of a committee the independent member and at least one-third of the whole number of the representative members must be present. 6. (1) Subject to the provisions of this paragraph, every member of a committee shall have one vote. (b) if no such arrangement is made, the chairman of the committee may adjourn the voting on any question to another meeting of the committee. 7. (1) A committee shall meet at such places and times as it may from time to time determine to be suitable for the discharge of its functions and may adjourn any of its meetings. (2) A committee shall, save as otherwise provided by the Acts, adopt such procedure at its meetings and otherwise,"} +{"id":"RedPajamaC4.0005","text":"Once upon a time in Sanya, Hainan \u2013 Miss World, banished bureaucrats, spas, dog hotels, hot springs, pineapples, and some fine rocks. A Sanya fun guide to the best Yalong Bay child-friendly resorts and a look at Haitang Bay MICE resorts. AND THERE in the hotel lobby, while a merciless sun beat down outside and the heavy, damp air turned wetter than a dog's tongue till we felt we were enveloped in suffocating warm jelly, there was this one solitary schmuck. Amidst the bikinis and white shorts and tanning bodies, he stood out, bedraggled and sweating, in a suit and tie. Now what kind of chucklehead wears a tie at a beach resort? I shook my head in disgust. Then as I passed a mirror, I stopped to adjust my tie, wiped off the sweat coursing down my face, and stepped out into the midday sun, clutching my briefcase and cameras. Behind the scenes, this is how the \"romantic\" endeavour of putting together a Sanya resorts review is accomplished. Despite my garb, people everywhere smiled welcomingly and spoke to me like an old friend, in Russian. At night I watched thundering fireworks. These were for people called MICE and they were all clearly having a good time. MICE is an acronym for meetings, incentives, conferences and exhibitions. With so many corporate MICE groups in town hotels often compete with each other to set off the biggest, brightest, noisiest fireworks with the result that by around 8pm guests will have assumed it is the end of the world and shall be racing about like headless chickens. Don't pooh-pooh this. Scrambling around aimlessly on an empty beach at night is pretty much the highlight of a Sanya family holiday unless you happen to be staying at one of those Sanya conference hotels armed with greater pyrotechnic muscle, in which case you'll do the same on a more well-lit beach. Welcome to Sanya, the \"Hawaii of the East\". No longer content to bask in reflected glory, this sleepy backwater has awoken and reinvented itself as \"Forever Tropical Paradise \u2013 Sanya\". This island \u2013 or, more accurately, one corner of an island, Sanya and Yalong Bay and now the fast-developing Haitang Bay \u2013 is determined to go head-to-head with assorted \"Pearls of the Orient\". A good overall view of the island - which is huge - can be found on the Hainan Provincial Tourism Development Commission site, Explore Hainan - hard to find but packed with good visuals and geographic zone explanations. The new official all-in-one website, SanyaTour, that launched mid-2016 has brought fresh impetus to this sleepy island and improved accessibility for visitors - this, under the stewardship of the young and dynamic Director of the Sanya Tourism Development Commission, Fan Mu. He outlined to SmartTravelAsia.com how the holiday enclave is upgrading services and roads, bringing in more international flights, and creating more customized tours for families. There are flights linking almost 15 destinations including Japan, Korea, Russia, China, Hong Kong, and The Philippines, and scheduled services are expected end 2016 from UK and Germany. Southeast Asia is a prime target for expanded air services. A 'new' Sanya International Airport - which Fan says may host up to 50 million passengers annually with the added lure of a substantial duty-free offering - is an old dream that has been revived with a more robust interpretation following the launch of China's 'one belt one road' initiative. This is a place to explore for family holidays, corporate meetings, weddings, cruises, spas, and good old sun tanning. There's acres of beach. If you thought Sanya was the \"Vladivostok of the East\", you'd be forgiven. Parts of the island are overrun by cheerful Russians, with all restaurant and shop signs in Cyrillic. Also in evidence are Koreans and Japanese. You'll find some finger-licking-good Muslim halal food too. But where the heck is Sanya? Before perusing this Hainan guide, first check out our Sanya Map. Sanya is part of Hainan \u2013 that includes the capital Haikou in the north, Yalong Bay in the Southeast, Haitang Bay just north of this beach playground, and Boao in the northeast \u2013 one of the southernmost islands in China, its pleasures well chronicled by a procession of mandarins banished from Beijing and hurled into exile quite literally at the \"end of the earth\". So the Qing dynasty inscriptions proclaim, carved into two large boulders on the beach. This is one of the attractions of the island. So it's a rock. Okay, two rocks. So what? Australia has Ayers and Sanya has Tianya Haijiao, smaller, smoother, more accessible, and with nary a whiff of koala poo. Oz had its convicts and Sanya its \"treacherous\" exiled officials whose descendents no doubt have evolved into the scoundrels we know today as taxi drivers. Had these early unfortunates had the sense to open a spa they could have minted millions. But, back then, a \"spa treatment\" simply involved pouring scalding oil on armed foreigners without the courtesy of a professional consult. It was not something they could advertise in a travel glossy. To be fair, taxis are improving and meters are more common. Cabbies apart, people are extraordinarily friendly. This is a huge asset, and one that makes it easier for visitors to deal with the limited English and other idiosyncrasies. One gent at a tourist site whom I asked for directions to the toilet, walked me the entire way there, ushered me in and stood by beaming, gesturing at me to get on with it. Do also see the Sanya Tourism Development Commission's original site at english.sanya.gov.cn\/ though the upgraded version has more on offer at SanyaTour. Arriving at night on the Dragonair (www.dragonair.com) flight from Hong Kong, Sanya Phoenix International Airport makes a bold statement. Illuminated gloriously atop the building are two large, glowing pineapples. Have you ever actually walked into a pineapple? It took our flight a while to come in. On the first pass just as we were about to touch down the pilot suddenly opened the throttle and we whined up into the night sky again to do a long loop before coming down a second time. The pilot announced he had done this to avoid an aircraft on the runway. Sensible we thought. On a more recent daytime flight, this time on Hong Kong Airlines (www.hongkongairlines.com), the return trip to Hong Kong was delayed 10 hours as passengers sweated outside the \"locked\" airport. The facility only allows passengers in when check-in has commenced. The rest of the time you twiddle your thumbs outside availing of hot, sultry sea breezes and not much more save for a KFC with some soggy fare and modest, if life-saving, aircon. Also flying in are China Southern, Air China and local boy Hainan Airlines. Step off your plane and stroll into the terminal, a delightfully breezy alpine-lodge-meets-Hawaii-resort affair with vaulted wooden ceilings and perhaps the friendliest and quickest immigration counters in China. Sanya Phoenix Airport and the Haikou Melian International Airport (in the north) have flights in various combinations from Beijing, Guangzhou, Shenzhen, Shenyang, Wuhan, Qingdao, Hong Kong, Ho Chi Minh City, Kaohsiung, Frankfurt, and Russia. Several European and Japanese charters come in as well. A cheaper though more time consuming alternative is to arrive by train\/ferry. Still, the flight connections are sorely limited and not always at times of your choosing. In the first half of 2016 a hefty 8.9 million passengers had been through Sanya Phoenix International Airport. Catching a taxi involves collaring a driver \u2013 or waking him up \u2013 explaining where you need to go (best done in Chinese or with a written address), and then haggling histrionically over the price. The asking rate for the 30-minute drive from the airport to Yalong Bay may be as high as Rmb200 though you should shoot for Rmb100 and consider yourself lucky if you settle for Rmb120. That would be close to expert level. More recently, with better highways in place, taxi drivers are becoming a tad more professional and meters are more common these days. Within Yalong Bay taxis charge Rmb10 to visit any resort, even if it's the adjoining building. The airport to Sunny Bay fare is also around Rmb120 with an honest cabbie. Sunny Bay is a ten minute drive along the coast beyond Yalong. Private cars are often offered as an alternative when taxis dry up as often happens. This is common practice in Sunny Bay where regular cabs do not commonly cruise. For Haitang Bay taxis the charge rises to Rmb30 for resort hops. For resorts like Westin farther north along the strip, the asking rate can go up to Rmb40. In a metered taxi it is unusual for the fare to exceed Rmb30 or so with Haitang Bay unless headed to one of the extremities. Taxis from Haitang Bay to the airport charge around Rmb130 (by the meter) for the 30-40 minute drive. From the airport to Haitang Bay drivers will again demand the customary Rmb200. Stand firm and try for Rmb120 or, Rmb150. Expect to pay around Rmb120-Rmb150 from Yalong Bay to Haitang Bay and around Rmb80 from Yalong Bay to Dadonghai, the nightlife and restaurant strip closer to Sanya City. A string of new highways have made places more accessible. To focus on all the new infrastructure, our driver took us along an unopened stretch marked \"NO ENTRY\" and stepped on the pedal with cars approaching full speed head-on. While departing Sanya, bear in mind that the airport only opens an hour or two before each flight leaves. We arrived at 11am for a 1.30pm flight and found the airport padlocked and graveyard quiet until immigration and airport staff arrived on buses at noon. As the video monitor flashed an urgent \"check-in now\" sign for Dragonair, travellers wrung their hands outside the locked glass doors. Once through with the quick and cheery formalities, things are painless and pleasant. This is perhaps the only airport I know of that gets chained and padlocked every time a flight leaves. If you are inclined towards duty-free shopping, you'll find the usual clutch of slightly expensive Johnnie Walker, Chivas, cognac and wine. The duty-free price for a one litre bottle of Johnnie Walker Black Label at Sanya Phoenix International Airport is Rmb256 and a one litre of 12-year-old Chivas is priced the same with JW Double Black at Rmb306, and Blue Label at Rmb1,480. Check out an unusual selection of fragrances from Kenzo, Nina Ricci, Ferragamo, Burberry and Anna Sui. You might also head across to Haitang Bay's lavish space-age Duty-Free shopping complex for a brisk walkabout. The gleaming silver Haitang Bay International Shopping Complex (run by China Duty Free Group) has designer brand fashions by the acre but be warned, the prices are not the lowest around. The currency exchange rate is roughly US$1 = Rmb6.87. Or opt for a glass-encased scorpion or a pair of hugging pandas that squeak \"I love you\". Passengers can pay Rmb200 for one-hour access to a VIP First Class Lounge after perusing a sign that reads: \"Offer only for CRUSH Room\". Right. On with this look at Hainan conference hotels and spa resorts. It all started with those long-limbed lovelies. Sanya sprang onto the world stage with the Miss World pageant. A bevy of bikini-clad beauties descended on the island to strut their stuff on white-sand beaches, languorously draped around the pools of the Sheraton Sanya, determined to save pandas, hug trees, cheer whales, and bring up orphans \u2013 if there were any left over after Brangelina adopted half of Africa. Ask Bishop Desmond Tutu who his mother is and he'll probably say, \"Angelina Jolie.\" Other aspiring Miss Worlds said the greatest living woman was Mother Theresa (then dead for several years). It attests to the other-worldly sense of this place where you lose all track of time. Miss World could be back in December 2017. Another spin-off is the New Silk Road Model Contest in which young ladies drape themselves over sailboats \u2013 and rich persons \u2013 demonstrating that Communist China is not just some Rigid Monolithic Single Party State, but actually a Rigid Monolithic Single Party State Where Ladies Have Nice Legs. Nowhere is this more evident than in the purpose-built Yalong Bay playground in the south of Hainan Island, with its megaresorts and arcing sandy bays, surprisingly reminiscent of Bali's Nusa Dua. Here you'll find the likes of Marriott, Hilton, Ritz-Carlton, Sheraton, MGM and St Regis, all very creative confections. Closer to Sanya town near Dadonghai are the Mandarin Oriental Sanya and the Banyan Tree Sanya along with the more hotel-style InterContinental. And around 30 minutes up the highway heading north along the coast from Yalong Bay is the new luxury strip of Haitang Bay with players like Wanda, Conrad, Doubletree, Sheraton, EDITION, and the Luxury Collection Royal Begonia plonked down seemingly randomly along a fine beach. Big-name brands like Sofitel and Grand Hyatt and Rosewood have arrived, and One&Only, Atlantis (with its much anticipated dolphin show) and Waldorf Astoria are in the pipeline, though Waldorf appears to have foundered. The Sanya EDITION opened December 2016. Don't expect cut-rate prices anywhere. Your wallet will get a fine workout though summers have slowed with local travellers heading offshore. Remember, Sanya is not just some one-horse town. It has pineapples and rocks. And Hainan chicken, though this may be better sampled in Hong Kong or Malaysia. The thing about the properties in this Sanya resorts review \u2013 especially in Yalong Bay and Haitang Bay \u2013 is that the beaches are actually quite good. And resoundingly empty. Dadonghai offers a coral coast and the beaches are artificially sanded and not really for swimming. The weather is bone-roasting tropical most of the time with a mild nip during winter. This carefully planned development appears to genuinely have the area's wellbeing at heart. The hotels are grand, the roads tree-lined with plenty of greenery, the waters shockingly blue, the air breathe-it-all-in clean, and the service friendly and elaborate. Very elaborate. At one restaurant I asked for salt. The waitress scratched her head, smiled and brought me in rapid succession, soya sauce, sugar, chopsticks, a glass of water, and the menu. That's what I call service. I later picked up a saltshaker from the adjoining table. I thought about getting my meat \"well done\" but my flight was leaving the next day. The best Hainan resorts are actually rather good. The software is what needs work. English is picking up, but slowly. Don't be in a rush. If you're stuck, settle down and find a wife \u2013 preferably one that speaks Chinese, owns a taxi, and knows the way to the airport. See our Sanya Map. If the New Silk Road Model Contest is not for you \u2013 or your wife is planning the trip \u2013 as any Sanya fun guide will be quick to point out, the International Wedding Festival runs every year in November. Couples renew their vows, get married, and celebrate their anniversaries before the aforementioned ROCKS. Divers will head to Wuzhizhou Island for underwater adventures. For water babies and yacht aficionados there's the new Sanya Serenity Marina (serenity-marina.com), well located a short hop from the Yalong Bay playground and Sanya City. The 325 'full service' berths are lined up serving 10m to 40m vessels accompanied by restaurants, club, swimming pools and more along the western coast of the Dadonghai peninsula. A 1.2m breakwater ensures calm waters. The 5,000sq m Yacht Club encompasses a gym, ballroom and conference space along with extensive children's facilities to add muscle as a family-friendly spot. Travellers can engage luxury charters from Serenity Marina for cruises, fishing or sunset tipples. To sample the fabled hot springs and spas of Nantian stop by the Sanya Pearl River Nantian Hotspring Resort that boasts over 60 steaming pools \u2013 all at different temperatures \u2013 along with fairly modern rooms and villas. The springs in this area are attributed with medicinal and curative powers. At any rate you'll feel refreshed and it won't break the bank. The hot springs are open 8am till 11pm. The place is about a 30-minute drive north from Yalong Bay on the East Expressway and less than 10 minutes from Haitang Bay. A dip in the spa pools will set you back just Rmb198 per person per day with water temperatures ranging from 39C to a zesty 45C. Some pools are more private than others but expect a communal dip with gleeful crowds especially at the fun pool for kids with water slides and a host of splashdown equipment. Expect garden areas, a lake, hammocks, and various room types (there are over 500 choices but you would never guess it looking at the place). Pick a spot next to a field or close to the springs. The top end here is a Villa Suite that is pushed for honeymooners. Expect gleaming wood floors and fairly contemporary surrounds though this is of course not in the same league as Haitang Bay neighbours. A spa is on hand and a 60-minute Bali Royal Massage will pinch Rmb588 from your wallet. Alternatively drive up into the hills to gawp at vanishing tribal communities like the Miao, Li and Hui. Later, stroll through Longevity Valley near the historic Nanshan Temple where the folk just live on and on and on, watched over by the more recent and towering addition of the 108m Guanyin Statue (also Kuan Yin). There is even a Longevity Festival in September. The temple with its beautiful golden deities and swirling incense high above a series of stepped pavilions and gates was once a place of serene mystic contemplation. Somewhere along the way it turned into Disneyland. The temple is at the heart of the vast Nanshan Cultural Tourism Zone, a bustling cultural theme park within tropical forest and parkland, where tourists on trolleybuses trundle around sights like the \"Dharma Door of Nonduality\", \"Auspicious Garden\", and the \"Brahma Bells Collection Garden\". If all this leaves you flummoxed, try the \"Tree Houses\" or the vegetarian restaurant. It costs Rmb150 to enter the complex and you'll need another ticket to board the trolley car. The authorities are pushing for conventions to fill hotel rooms and villas. Still, it is a pleasant enough excursion. When you see the t-shirt and trinket stalls you immediately know you are somewhere special and spiritual. After all, isn't that how they do it over in Thailand and Bali? Nanshan Temple is a 50-minute to one-hour drive from Yalong Bay along the Western Expressway on the southwest of Hainan Island. From Yalong it'll cost about Rmb150 one way. Book a roundtrip. Just up the coast is scenic Sanya Nanshan Dongtian Park (www.sanyapark.com\/en). Golfing in Sanya is a favoured pursuit of many. The 18-hole international Yalong Bay Golf Club (www.yalongbaygolfclub.com) is a popular choice right next door to the Sheraton, Marriott, Hilton and Ritz-Carlton. The Sun Valley Golf Club offers 18 holes priced at RMB1,000 per person with caddy, cart and transfer to any Yalong Bay resort. The Sanya International Golf Club is close to the airport and the Luhuitou Golf Club is in Dadonghai. Also look at the Sanya Haitang Bay Peninsula Golf Club, the nine-hole course at the Kempinski Haitang Bay (now a Wanda), the members-only Forest Valley Golf Club and the Clearwater Bay Golf Club with its green landscaped acres, residential buildings and artificial lake. Farther north in Haikou Mission Hills has three state-of-the-art courses including the 350 acre Blackstone Course (7,808 yards par 73, www.missionhillschina.com), the Sandbelt Trails Course (7,297 yards par 72), and the classic Vintage Course. The Mission Hills Hotel \u2013 Hainan (www.missionhillschina.com), is a 525-room Hainan golf resort serving up panoramic green views, a spa, a lazy river tube run and a well set-up kids' club. Expect free internet and rates from Rmb1,280. All resorts in the various tourist developments have easy access to greens and can help arrange your big swinging morning or afternoon. Get addresses written down in Chinese. Thus armed you are invincible, until you encounter a taxi driver. This can be a hair-pulling experience as the meters, proudly displayed, are seldom used. A taxi ride from the airport to Yalong Bay could cost anywhere from Rmb120-Rmb200 depending on your negotiating skills. The actual meter fare will be closer to Rmb120. It's about the same or just a tad more to Sunny Bay. Yalong Bay is well removed from the nightlife and beach strip of Dadonghai (20 minutes), Sanya City and Bay (30 minutes), and the airport (30-40 minutes), so any excursion will involve animated haggling though a good hotel doorman will probably handle this for you. Within Yalong Bay the norm is a Rmb10 flat fee, even if the hotel is next door. Here it is simplest to just walk down the beach. In Haitang Bay taxis appear to use meters, even for short hops. Any Sanya fun guide worth its salt will rave about after hours but, in truth, Sanya nightlife and eating out is a bit overrated. Most people tend to eat at their hotels, preferring to haggle later with taxi drivers once fortified by a few beers. The most interesting food perhaps is in the small street cafes of Sanya City. Have a trawl and dive into something if you have someone along who can translate. At Yalong Bay, a local-style haunt with a heavily rustic flavour is Hainan Renjia, just a bit away from the main strip. Sit under a thatch-roof hut and nibble on honey fried pork, mama papa dofu, and roast chicken, all served with huge lashings of garlic. The upscale nightclubs at the MGM Grand Sanya where throbbing music and dancing lights awaited the well-dressed set are dimming their lights and making way for events space. At night, the Dadonghai area is alive with discos, KTV and open-air cafes where the signs are all in Russian. I didn't speak Chinese or Russian and had to make do with sign language. The touts were good at this with nimble fingers suggesting that women in this area are keen on demonstrating their hospitality in the privacy of your hotel room, or theirs. It is remarkably friendly seedy though with none of the harsh thug-in-the-face overtones of larger cities unless you wander down the wrong alley. Start out at the kosher expat-friendly Allen Story (said Allen seems to have an arm lock on the night scene here), where neo-classical Versailles meets tin mine and Wild West. The lights dim at 8pm and the disco crystal ball starts twirling sending pinpricks of light moving about the walls in a throwback to the '70s. Ornate chandeliers glow above the bar tables, music throbs, and the video screens blaze with pop \u2013 or sport. I listened to how Clapton plans to Change the World while watching a video of America's Funniest Pets, an odd but strangely relaxing combination. The Dadonghai nightlife strip is a sudden racket of neon about 20 minutes from Yalong Bay and just before the Sanya River Bridge. This is karaoke country. Walk past or into Allen Lounge and Bar, Allen New KTV, and a host of neon-flashing nightclubs and dance clubs like the two-level disco bar Tommorow's Dream (tel: 8860-9898) that doubles as a hubble-bubble \"sheesha\" joint. Staff is courteous and friendly. Here too the music is '70s remixes. Later things get louder and boisterous. Someone asked me if I was Russian and I knew it was time to leave. Other options include the Dolphin sports bar along the bay, 88 Disco and SOHO for dancing after a few tipples. The four-star Sanya Guoxi Hotel (www.guoxihotel.com) runs \"ladyboy\" drag shows in its Dynasty nightclub, which it describes as featuring \"brilliant lights, balconies of Europe and Chinese ethical styles... a complex for business and vocation.\" Sanya nightlife is slow paced and idiosyncratic. Don't expect a Patong or Pattaya here on Hainan island even though the transvestite show makes a stab at it. Nightclubs change constantly and names get replaced like underwear but they are all fairly similar. Check if it is a hostess bar before you enter lest huge bills be presented upon your exit. Yalong Bay is as good a place to start our Sanya resorts review as this is where most of the the prime properties have been thus far located. Many of the hostelries in the area are grand and vast, all are clean, even the smaller establishments, and pretty much all are positioned either as spa getaways or Hainan conference resorts, or both. It goes without saying that with very few exceptions, this is a top family destination and kids are generally welcome. But first, the newish development of Sunny Bay. This lies a few kilometres to the west of Yalong and is accessed via a 5km private road leading to a pristine arcing bay hosting the ultra modern six-block Park Hyatt Sanya, Sunny Bay Resort (October 2014) and, later, the Chinese-style 102-room Andaz (2019). Much of the scenic beach is not really open to swimmers (with the rocks at low tide). This is a beach for sunning and preening, to see and be seen and a great spot for selfies. Andaz has a small stretch of wade-in water. Bai Fu Bay is a five-minute boat ride away for clear water and snorkelling. These are not two peas in a pod and the DNA is markedly different. Park Hyatt is a resolute city slicker with all the attendant comforts you might expect of a luxury lifestyle downtown escape, complete with seamless wall-to-wall air-conditioning. It may seem trite to mention aircon in a posh hotel but this hideaway takes it very seriously indeed. So much so, the entire space is cooled - and connected - with few open corridors to get sweat under your Polo collars and, remarkably, no balconies with the rooms (just 28 afford this resorty luxury). For the sweat averse this will be heaven, while resort purists may take a while to get used to the concept. Consider it an \"urban resort\". The hotel is a series of brooding grey stone rectangles, a Temple of Doom meets Game of Thrones fantasy, and you will be forgiven for thinking the Mother of Dragons is about to swoop down on a fire-breathing beast. It is slick, modern, minimalist, and playful. Walk in through a charcoal entrance down a hushed dark corridor lined in red lacquer and chocolate leather to a high ceiling reception with plenty of light, lashes of crimson, woody tones, and supreme whimsy. You are greeted by the de rigueur plump, over-inflated Chinese cherub in bronze grinning slyly just above head height, low wooden tables extending in both directions along the room with cowhide throws, chessboards and ceramic oddities in metallic hues, gold and lacquer. Staff are young, serious, and attentive but not much English is in evidence. The guests are predominantly local with a sprinkling of flushed European faces over a weekend. The room is spartan but neat, in straight sombre lines, with a large bed facing a humungous flatscreen television. Cool darkwood flooring runs underfoot. A diwan runs along the windows, which are not floor to ceiling alas, but are very welcoming of light and views. There are large tactile easy-to-work switches by the bed and a host of other sneaky switches you may need to master for the double blinds and lamps. The high ceilings create a regal sense of space. The bathroom is orderly and well designed with a separate controls for the hand and rain showers so there's no struggling at 2am trying to find the right balance of angle and torque. There's also a civilized marble slab in the shower cubicle to park your bottom on if you really want the Bergamot 22 toiletries to work their full magic. Expect a feisty hairdryer, essential toiletries including toothpaste, a rear-up electronic Japanese potty, BOSE sound, laptop-friendly safe, iron and ironing board and a Ferrari-red coffee machine. Building 7 is where the restaurants are located and next to which the long 110malfresco lap pool runs, often bedecked with giant inflatable toys. There is a 25m indoor pool as well. The kids' pool is closer to Building 5 and, everywhere, manicured green lawns beckon with vast stretches of timbered boardwalk. The buildings themselves resemble a modern art museum more than a hotel but this just adds to the charm, with all the design resolved into neat lines and rectangles. The beach area is pleasant and provides good strolls and jogging with hammocks and sun chairs for the less physically inclined. Pick from five restaurants. The Chinese nosh is superb and highly recommended. Breakfasts and Western menus are not as lavish as at some Haitang Bay spreads but the focus here is on quality. At the prices here - though you may snag an Rmb2,000 deal - you'll need top notch service and that's what this resort tries hard to provide with discretion and brisk attention to detail. Be prepared to walk a lot to solve the Park Hyatt Sanya's enduring and endearing corridor riddles. This is a prime Sanya luxury hotels pick with style and character. It is secluded and private. It is just a wee bit off the Yalong Bay stretch and taxis may charge a little extra to come and pick you up. The concierge does a good job though of arranging transport for all. The secluded Park Hyatt Sanya compares well vs St Regis and Ritz-Carlton but is a tad less 'international' in terms of service and language comprehension. This is not unusual as several hotels on the island cater almost exclusively for Chinese guests. The St Regis Sanya (opened late 2011) sprawls regally over one end of the bay. This secluded location offers a measure of both privacy and space, the latter exploited in full measure by the soaring, cavernous architecture, grand like the Smithsonian Museum yet somewhat reminiscent of a baleen whale sunning itself. It is lush and lavish, the signature saffron building columns marching forth from the breezy lobby in military precision to greet the sea. The St Regis is a huge construct, encompassing a series of lush lagoons and inviting pools, by the seafront, or meandering between the hotel blocks. At one far end is a generous space set out for kids with a well-equipped outdoor play area. Manicured lawns offer grass underfoot and, of an evening, floodlit fountains dance while the waves lap at the vast expanse of private beach. Settling in is easy. Buzz a butler and get unpacked, have your bath drawn, or simply seek suggestions for holiday ideas. There is free Wi-Fi throughout the hotel \u2013 free in the lobby and charged at Rmb100 per day elsewhere, including in the room. All 401 rooms serve up spacious, coddling bathrooms, twin vanities (the basins set in glowing alabaster), Remede toiletries, a rain shower, and a bathtub with a view. The living space, starting at 73sq m, is large, bright and airy with a fair bit of hi-tech to play around with. Get familiar with it. Watch movies on a large 46-inch flat-screen TV, savour the evening breeze on your balcony, soak in the tub with a view, or simply relax with a good book on your giant bed cradled by hypoallergenic pillows. If it's too cold, switch off the aircon and flip on the ceiling fan. Bring in the tropics whenever you wish. Some ground floor rooms also offer direct access to a swimming pool. Expect a Nespresso machine with complimentary coffee shots, DVD player for those lazy movie afternoons, cool marble floor, a work desk with dataport, iPod dock, and a few three-pin sockets. The furniture is classical in dark wood. To say these rooms are spacious is an understatement. They are vast. And, given the spread of the resort, some of them require serious legwork to get to. Of course, buggies are on hand too. All in, it is a regal and relaxing ensemble with a few minor niggles. The hot water arrives at a leisurely pace, several balconies look onto each other and some bathtubs are less than private with the blinds raised. Service though is exceptional \u2013 attentive and welcoming. Butlers are ubiquitous and quick to respond, something of an exception in laid back Sanya, and this is where The St Regis scores highly. The hotel offers a wide variety of dining options for gastronomes. For wellness treatments, massages and all manner of lotions and potions, head to the Iridium spa. Relax in the crystal ice grotto or mineral salt chamber, depending on your mood. Unsurprisingly, given its size, the St Regis is a handy address for corporate meetings - and incentive travel - in Sanya with a range of versatile function space, the largest at 8,784sq ft. The seafront can also be utilised for events and weddings (the central lawn can accommodate 400 persons for a gala evening). For something really spoiling, opt for the Presidential Villa and perhaps a yacht pick-up. At the other end of the strip, hip relative newbie MGM Grand Sanya rose in place of the old Gloria, the very first Yalong Bay occupant. This is an unabashedly mod hotel catering for the young and restless with a blend of clean architectural lines and plenty of pool-party space, and chill-out music. The nightclubs and discos are gone, alas, the space handed over for events, and the latest feather in the hotel's cap is its dog-friendly approach, with Dog Rooms featuring dog food and poop scoops but no carpets or breakable stuff. This initiative launched in December 2015 and it seems to have pet owners howling in delight. The catch? Friendly dogs only, and under 16kg. Walk in to a bird's nest lobby overlooking the swimming pools and azure sea. If you must, head straight for \"Wet Republic\" the non-stop party pool hangout with DJs, cabanas and fun galore. Explore other multi-level pools - with tiers of cobalt blue sun seats - the largest being 2,000sq m. The children's pool is equipped with water slides and toys to keep the tykes entertained. Equally entertaining are the funky statues all around the resort. Spot a dodo and, of course, the signature gold MGM lion. At the Papillon Music Bar and lounge jive to dance beats by celebrity DJs and enjoy KTV (in premium rooms). Head to the Dragon Club or retire to the Cigar Lounge or the SHO Spa. But first the lobby bird's nest, which is actually a butterfly cocoon, magnified. It is a touchy-feely space with low-set divans and stepping stones leading through black-tile ponds. Don't fall in. Definitely make time for a bite at Pin Ju for excellent Chinese food with the sort of variety and flair unusual for Sanya. MGM is a hotel for family fun or a honeymoon riot. It has few pretensions \u2013 despite the nightclub dress code \u2013 and everything is designed to get guests to relax and unwind, speedily. Bike around at no charge on pedal power if you wish to burn off calories or hike up to your sea view room. A Deluxe Ocean View serves up a grey marble floor with a carpet trimmed around the bed. It is neat and simple yet bright and inviting. There are two three-pin electric sockets on either side of the bed. Thoughtful. Recharge everything at one go. Find a large flat-screen TV, a sliding glass partition leading to the bathtub, twin vanities, rain shower, iron and board, laptop -friendly safe, and coffee maker. The hotel's 675 rooms are set in two blocks and start at 52sq m. Balconies are fun but not private. If you need a hip Sanya hotel bristling with entertainment, this is probably it. The Sheraton Sanya Resort, where the sashaying Miss World lovelies first made their mark (three stagings have happened here), opened in 2003 and is set smack in the centre of the Yalong Bay strip, very appropriately, as this is a hotel that has done much to place Sanya on the travel map. It features a breezy and elegant teakwood lobby, again very Balinese, with more swimming pools than you can wiggle your toes in and some attractive water features. Indeed, delightful water features are the leitmotif of this brisk, yet relaxing, beach resort. Beyond the lobby, a water pool leads the eye to the horizon and the eye-popping blue. The place works well as a family-friendly Sanya resort as well as a wellness getaway for the more romantically inclined \u2013 just pop over to the spa that also does special treatments for men, thank heavens, including the \"Gentlemen's Own, for all skin types\". This 511-room resort includes 49 suites with the prized Grande Deluxe Laguna rooms opening onto a lagoon pool. Most rooms offer balconies with breezy views. In a Deluxe say hello to cream tones and pastels with plenty of space and a simple but sound and familiar design that will calm parents' nerves. The room does not try to outwit the tired and jet-lagged with hidden contrivances and clever buttons. Expect a cool tile floor, a flat-screen TV with DVD player, large tactile room switches for quick control of pretty much everything, iron and ironing board, electric kettle, a laptop-size flat safe, and a rainforest shower in the bath with a separate soaking tub set behind white louvred wooden shutters. The light wood accents are easy on the eye but the results on the weighing scale may prove more startling for well-fed city-slickers. Suits can prop up by an oval glass desk with a two pin and traditional Chinese three pin splayed crow's foot plug sockets. Of an evening, plonk down in the balcony for grand views of Yalong Bay over acres of mature green. The hotel has a clutch of private villas, including one spacious 448sq m Presidential Villa (with a courtyard, garden and tranquil water features). Featuring light pastel d\u00e9cor and woody tones, all villas come with 42-inch flatscreen TVs and a private swimming pool looking past the gardens to the sea. Bathrooms at the 130sq m Deluxe Ocean Front One-Bedroom villas are in marble and an outdoor deck leads to the pool and private garden. Hotel business features include free WiFi in public areas, free whirls on the iLink computers in the lobby and a 1,250sq m ballroom catering for up to 1,400. A further 11 meeting rooms from 22sq m to 150sq m offer versatile space for MICE groups and corporate meetings making this a prime address if you are hunting for good Sanya conference hotels. Toss in a white grand piano that plays along merrily on its own, jet skis, kayaks, decent baby-sitting services, a terrific beach and a raft of water sports and it's clear to see why the Sheraton is a hotel with a difference. Need a Sanya resort wedding? Check it out. Put it down to creeping midlife crises, but the red Ferrari on show in the lobby always sets my pulse racing. I guess if you have a Ferrari, why not park it in the lobby and make a statement. The Ferrari was actually bought for a hotel lucky draw when the place first opened but the project ran into regulatory problems and the car has become instead a lobby showpiece with zero carbon emission. It is always gleaming and polished and quite popular with the selfie crowd. Immediate neighbour, the Sanya Marriott Yalong Bay Resort & Spa boasts 456 rooms (including 24 suites) with balconies offering sweeping views of Yalong Bay and the sea. From May to October 2017 the lobby and rooms undergo major renovation. A nip and tuck is certainly welcome. The hotel has been designed to respect and showcase local traditions. This is does admirably. Dotted among the extensive gardens you'll spot striking stone statues of fishermen and villagers. Do not ask them for a beer; not even after your tenth drink. But, if you're lonely, you might strike up a conversation with one of these mysterious figures. Rooms are bright and friendly. You'll find a flat-screen TV, work desk with varied three-pin sockets, a small safe that will hold a notebook, digital clock, iron and ironing board, a hair-drier (thankfully not nailed to the floor), and a bathroom with separate shower and tub. The balcony is of decent size and basic decorum is expected. A sign on the sliding glass door discourages the hanging of laundry outside, an instruction cheerfully disregarded by many. Of course you are welcome to lie back and dry out while catching some serious rays. The two hardback wooden chairs are sufficiently stern to keep you alert and focused on some dazzling sunrises. Hotel staff is on the ball, exceedingly attentive, and responsive. You will be garlanded, thanked, and bowed to constantly. Smiles are ubiquitous. The Sanya Marriott has extensive gardens to get some grass underfoot when you are not leaving footprints in the sand. The beach is delightful (the same unblemished stretch extends from the Sheraton past the Marriott and Hilton to the Ritz-Carlton). Hop onto a water scooter, paddle out in a kayak, windsurf, play volleyball, or cool down in one of the large freeform swimming pools. Indulge in some face painting, learn calligraphy or origami, or try kick-boxing. There is a kids' club for juniors \u2013 with treasure hunts, kite-flying, air hockey and PlayStation \u2013 as well as three golf courses within a 30-minute radius for the swinging set. This is a child-friendly resort but also fares well among the popular Sanya conference hotels with 1,250sq m of function space. The Quan Spa, in its own private garden setting, has spacious treatment rooms and an arsenal of cure-all remedies. It is a relaxing enclave easily accessed from the hotel yet set apart. Herbs and unguents are sourced in Australia and China and offer an \"east meets west\" menu. Pick from massages, scrubs and wraps or long all-in-one sessions. After hours, dine Japanese or Chinese and then chill out at the upper-level lobby bar with open views of the coast and live music. The Marriott is friendly and accessible yet with exclusive nooks and crannies. Pets, apart from blonde secretaries, are not permitted. The Marriott rates well among the top Sanya spa resorts. Next along the bay is the Hilton Sanya Resort & Spa boasting a further 400m of white sand beach. There's free WiFi in the lobby. The rooms encircle and embrace the central freeform pools including a mock lagoon with an artificially sanded \"beach, manicured gardens and walkways. The views extend to the hills on one side and the sea on the other. The Spa Retreat serves up treatments galore and fitness equipment, sauna, gym and aerobics studio are close at hand. Those wishing to work up further sweat can do so at the two floodlit tennis courts or avail of the water sports options along the beach. In-room expect traditional decor with contemporary touches, a 42-inch flatscreen TV, a DVD\/CD player, iron and an ironing board. Some rooms offer glass partitions instead, catering for the MICE meetings market that every hotel in Hainan appears to be chasing down. Other rooms offer the novelty of bathtubs positioned by the balcony offering external views. The Hilton's signature .IZE restaurant follows a water theme with other outlets focusing on \"natural\" design along earth, wood, and fire expressions. Families will be happy with a kids' club and babysitting service. As with other Sanya conference hotels, the Hilton is no slouch at serving up meetings and weighs in with 3,000sq m of space to play with plus 800sq m of lawn. The ballroom can hold 1,000 people cocktail style. The Ritz-Carlton Sanya opened mid 2008 and is a stately affair with clean, structured lines and dark wood redolent of the Beijing Summer Palace. The eye is led unerringly in a straight line past black-tile ponds and rows of trees to the inviting oceanfront pool and the shimmering expanse of white beach, aided in small measure by a generous sanding. At the very end of the Yalong Bay strip, just before the St Regis, the Ritz-Carlton affords a sense of exclusive luxury with 450 rooms, the smallest of these an echoing 60sq m. Yet it is extremely family-friendly and relaxed. And WiFi is free. Expect views of the sea, rolling hills or mangroves from a large balcony, a huge walk-in closet, iron and ironing board, flat laptop safe, flat-screen TV (with a monitor in the bathroom), broadband (Rmb100 per day), DVD player and a Bose iPod dock. You're all set to work or party. Be sensible and choose the latter. Electric push buttons operate curtains and lights and the comfy plumped up bed commands attention. A partition glides away revealing the bathtub. Roll out of bed and literally plunge in. The villas are the highlight. The smallest one-bedroom villas start at 130sq m (three-bedroom villas go up to 350sq m) with decent sized living rooms, cool bedrooms, all featuring timber flooring and spacious baths. Step out into the patio to find your own private plunge pool and lazing sala (pavilion). Internet is complimentary. Expect three LCD TVs, a BOSE sound system with DVD player and iPod port, fussing butlers and, incredibly, a \"romanceologist\" to up the ante if all this and your imagination will not suffice. A bit twee unless you've forgotten how to kiss. The three-bedroom villas offer a private pool and 367sq m of living space. The expansive 2,788sq m ESPA at the Ritz-Carlton Sanya will serve up exotic treatments no less and those in a hurry can waltz out to the wedding chapel on the beach for a romantic Sanya resort wedding. For kids there's the Petite VIP programme that includes Petite VIP massage and there are special treatments for pregnant women too. Later, exhausted by four swimming pools, two tennis courts, volleyball, beach soccer, yoga, kinesis training, and eight fine restaurants, retire to your room and check out the pillow menu. You'll need it. The Ritz-Carlton offers 1,700sq m of conference space and plans to position itself as a top MICE contender as well as one of the must-see Sanya luxury spa resorts aided in some measure by a ritzy high-end shopping arcade featuring the likes of Louis Vuitton, Salvatore Ferragamo and Ermenegildo Zegna. Sanya luxury shopping? Look no further. The array of designer brands here is a first for Sanya. The Huayu Resort and Spa (formerly Crowne Plaza Sanya) hosted Miss World 2007 and even Mr World, though not at the same time or we might have had a Mrs World and Baby World on the way. This is not a beachfront hotel though it offers a shuttle to a stretch of sand. The 466-room hotel's main strength is as a Sanya MICE hotel, a meetings specialist, with a regular train of buses disgorging excited conference-goers. The main ballroom handles 1,200 theatre style and a host of minor ballrooms and function spaces stretch accommodation substantially. Need to arrange a meeting on the beach? This place will set it up. In-room broadband is complimentary and WiFi is free in meeting rooms, the lobby, and pool area. The hotel complex houses a shopping \"village\", townhouses, hotel rooms and a few villas radiating out from a striking Chinese-style pagoda that functions as the design centrepiece and lobby. A large freeform pool offers relaxing diversion as does the spa. Premier Rooms are pleasant with timber floors and large work table and TV. Internet is complimentary in-room. While not in the same league as the beachfront properties, the Huayu Resort and Spa is among the better equipped Sanya MICE hotels and is an okay choice for a Hainan conference. The 787-room Horizon Resort & Spa (formerly Resort Horizon, indeed the two entrances feature two different names, confounding guests) has spacious landscaped gardens for those flashy Sanya resort weddings, inviting large free-form pools with sculpted rock formations, waterfalls, whirlpool and Jacuzzi, exciting splash slides and water jets, and extensive on-the-beach offerings from romantic dining to adrenaline-pumping water sports. The de rigueur massages are served up at the Lanikai Spa. Rooms are smart and airy, most with balconies overlooking the ocean, and wooden floors leading to the open bathing area and tub. Expect in-room internet, a kids' club, and ample kitchenware and a washing machine in the suites. Horizon is one of the older residents of the beach. The large, spread out, Balinese-style Yalong Bay Mangrove Tree Resort is where the Mangrove Tree Spa kneads tired flesh with liberal applications of oil and aromatic unguents. Try a wrap, facial or scrub. This is not just a bland addition to the mushrooming ranks of Sanya spa resorts: the hotel offers 1,200sq m of meeting space and several restaurants including signature Thai in a breezy open-sided hut facing water features and the gardens. Also expect tennis courts, gym, a kids' play area, a large swimming pool with water slides, 260m of beach and sea views from most of its 502 rooms. While the building itself is unremarkable save for its scale \u2013 like any large hotel \u2013 it is neat with style and colour inside with a nice entrance and water features with a sea view to welcome"} +{"id":"RedPajamaC4.0006","text":"By Charles Scott, Cullivait, Dumfries. (1) Hay, (2) Turnips, (3) Artificial Food, and (4) Ensilage. To these we can add the alternative of wintering from home. When feeding is resorted to, one or other of these methods has to be adopted. We will, therefore, consider the conditions under which each practice can be most successfully applied. Hay.\u2014Feeding hay is the oldest of these practices, and the one most generally adopted. Every one admits hay to be the most natural food we can supply to hill sheep, and it is invariably chosen in preference to any other. With plenty of hay no farmer need fear winter losses, and the expenses need not be unreasonable. There are, however, varieties of hay. Clover and ryegrass hay are not so well relished by hill sheep as the natural product of hill bogs and meadows, and no hay seems to give better results than that made from amongst their feet. Hay made upon arable land is doubtless of a higher feeding quality, and a less quantity ought to suffice; yet, even then, the after effect that invariably follows in the track of every kind of food, and which always appears sooner or later during the year, is more apparent than when natural hay has been given. This proves hill hay to be the most suitable for hill sheep, but as it is not always possible to secure it, there is sometimes no alternative but to use the other. Feeding with hay is practised wherever a supply can be had, and the quantity procurable determines the method of feeding. The practice of \"haying\" every winter, mild or severe, can only be adopted where sufficient is to be had \u2014and these places are very rare\u2014still, we are aware of a few who adopt this plan. It takes an enormous. quantity of hay where one or two thousand sheep are fed, and although we could not question the result as regards making good sheep, we believe the cost must surely exceed the profit. As an instance, however, of the result of this system, we may mention that on the farm of Girnwood, in Upper Teviotdale, Mr Scott cut more lambs this year (1885) than last. No other farmer in the district could say the same, and we must remember the latter was an exceptionally good year, and the former a very bad one. It is only on very high grazings where feeding every winter is absolutely necessary, and in these cases the general plan is to remove the sheep. But between the highest and medium lying lands, we have another class of farms, where no hay can be grown, and in mild winters the sheep manage to do fairly well without any extra food. The custom, however, in these cases is a very hazardous one. No hay is provided, and when a storm comes on, the sheep are simply starved to as low a point as is considered safe, when they are removed to grass in the lowlands. It is impossible to tell how long a storm may last, or how soon it may break up, and it sometimes happens that the sheep are removed only a few days when they have to return. Such, however, is an agreeable mistake. It is in fickle weather, with a daily appearance of a thaw, when hopes are entertained day after day of a change, that often the most serious harm occurs. The sheep are all the time suffering, and the owner knows it, but it is beyond his ken to know what to do for the best. Consequently, very often the flock is reduced to a condition from which it cannot recover before another year or perhaps a longer period. It is very natural to delay removing the sheep as long as there is hope of a change, but many have over and over again regretted this course. Those in such positions should always have wintering in view, and be prepared to move whenever occasion requires, and not put off till the time comes, when the delay and difficulty in obtaining grass in a suitable locality may cause very serious loss. Wherever hay can be grown\u2014and that implies the greater part of Scotland\u2014the practice of feeding during storms only is extensively pursued. All, however, are not agreed as to what extent the sheep may be allowed to suffer before commencing to feed. The amount of hay on hand has to be considered, as well as the expense of feeding probably several thousand sheep for an uncertain period. Before any one commences to feed he has many points to consider. He has to place the extra cost of feeding against the probable loss from starvation, and loss of condition in the flock generally; and as he cannot tell how long a storm may last, or the ultimate expense, he is placed in a position requiring great practical knowledge both of the weather' and the condition of his sheep, otherwise he cannot figure when or when not to feed. By storms we mean the length of time the snow remains 6n the ground, or as long as what the shepherds call \"stormed.\" In Scotland they vary from a few days to several months. On an average, a storm may be said to last about three weeks. As a rule, too, they come gradually. One coating of snow after another gradually getting deeper and deeper, until the grass is fairly out of the reach of the sheep, when they are said to be \"stormed.\" Now, where the difficulty in management occurs is in the peculiarity of storms. One farm may be completely sealed, or only a part of it, while the neighbouring ground may be open, and the grass still partially accessible from the snow being blown by the wind. Then again, besides the varying depth of the snow, a good deal depends on the accompanying weather\u2014whether the days be calm or windy, thawing or freezing. In calm quiet weather the sheep will work with astonishing perseverance in very deep snow, and manage to pick sufficient to sustain them; but when the days are cold, with a piercing wind or swirling drift, then a less depth will storm them. There is also a difference in a wet snow or a dry one; and a partial thaw followed by a hard frost is the worst of all. When the snow is covered with a coat of ice, the sheep are unable to break through it, and thus with only a very light snow the ground may be effectually stormed. Dry snows are dangerous as being liable to drift, but in quiet weather a dry snow is very deep before it does much harm. These are a few of the phases of a storm. They do not by any means embrace all the variations to be encountered, but they will serve to show that before we could point out when feeding is actually necessary, we would require a real case. Amongst stockmen themselves, various opinions prevail under similar circumstances. In a case where one would feed, another would not, and each would produce good reasons for so doing. When a storm passes away in a short time, most farmers would regret having fed, as the sheep being used to a different kind of food do not take so readily again to their pastures. They keep hanging about the places where they have been foddered, and do not go in search of food with the same energy as those that have never been fed. Those that have never got any hay do not look for it, and a bit touch of hunger seems to give them a keener sense of their duty in caring for themselves, and so it happens that feeding sometimes does harm. But as we never know how long a storm may last, it is best to feed as soon as necessary; and when sheep have once been fed, the feeding should be continued until they prefer not to come for it. Let all changes of feeding be done gradually, even should the weather be fresh, and the flock will soon take to their usual fare and go on well. The elements we cannot control, and have to take them as they come, but success or failure in wintering hill flocks greatly depends on the methods we adopt in providing the food and in giving it. In summer, hay should be made and stacked at the best sheltered places on the farm, where a \"stell\" is already provided, and where there is likely to be a portion of rough ground available during a storm. Too many sheep should not be fed together at one place, as it is more difficult to give every one their share when the \"cuts\" are big. Small lots are also easier to move to the bare ground adjacent, and the more divisions there are, the more food will be within their reach. In feeding hay a very common practice is to scatter it in handfuls on the top of the snow, and the sheep will eat it up wonderfully clean. This plan, however, is wasteful in windy weather. Some have hecks for putting the hay in, which is about the best way of feeding it, only these are rather expensive. Others again have bag-nets of cord stretched from two stakes, but lately wire-netting has been used with good success. A double fence of wire netting, set closely together and attached to stakes, makes a cheap and handy heck, and one easily removed and not liable to summer waste. The sheep need never at any time get all the hay they will eat\u2014just as much as keeps them hearty, and according to the amount of grass they can pick besides. Care should also be taken when feeding to see that all get a share. Some are very backward, and prefer to stand aside, while the greedy ones eat it all up ; but plenty of room at the heck, and a few handfuls put down for those on the outside, will generally put all of them straight. They should get their hay as early in the morning as possible, and then the shepherd takes them out to any bare ground he can rind, where they will pick what grass they can reach. It may be necessary for the shepherd to stay by them the whole day, as if left to themselves the sheep are apt to get discouraged from getting amongst deep snow, or the day may be rough and they would rather seek a shelter. In the evening they should have another foddering of hay, but it is always best to give them the biggest share in the morning. A careful man, who is really interested in his work, can do many little acts for the good of his sheep during a storm, and on these the welfare of the flock greatly depends. Turnips.\u2014Turnips as a winter food for breeding hill sheep are not approved of. In the first place sheep have to be accustomed to turnips for some time before they will eat them readily, and this during a storm does not answer, as the flocks are in too weak a condition to go through the process of learning; and secondly, when turnips are used they cause the sheep to fail in their mouths sooner than the usual time for drafting hill ewes, which in itself is sufficient to class turnips as an unsuitable food for this purpose. But although turnips are not approved of for ewes, they are at the same time extensively used as a winter food for wedder flocks\u2014wedder hirsels being generally on the highest ground on the farm, and in high districts, where, owing to bleak springs, a ewe flock would not succeed. For one or two months in the year they would most likely require extra feeding any way, so that it suits very well to take them to turnips during that time. As wedders are drafted at an earlier age than ewes, the tooth question does not affect them. Then while the turnips are a good substitute for pasture, and bring the wedders through a critical period, they are also a great help in improving them in size and strength, which is very desirable when they are brought out to market. In all parts where wedder flocks are kept and winter feeding is necessary, turnips seem to be the food preferred in almost every instance; and on half-hill farms, where other systems of management are pursued, they also form the chief winter resource. Full turnips are of course not given to sheep that are again to go to the hill\u2014they are only given as a supplement to hay or grass, getting a run on to turnips a few hours daily. on which very conflicting opinions exist. It has at any rate been well tried, and while some say good results have been obtained by it, others again give quite a contrary experience. Several of these have already been given on the subject, but undoubtedly that of Professor Wallace, as published last year, is the most favourable account of the practice on record. The Professor concludes, \"that better results are obtained by giving concentrated and bulky food together than either separately.\" We all agree to that, but, when sheep are stormed, and are not able to get the bulky food, how will concentrated food stand alone? Very frequently the ground is so deeply covered with snow that not a bite of grass or heather can be had, when the sheep might as well be in a bare field, where we will also suppose not a single blade of grass exists. Now, such an occurrence is not uncommon, and may be experienced any winter. In such a case, without hay, would corn alone be a suitable food? No; it is impossible to prevent ruin by feeding store animals of any kind for a length of time solely on concentrated food; and as it frequently happens that the amount of pasture available on a hill during a storm is equally the same as in the bare field, how can any one under these conditions prove corn to be a profitable food? To have sheep confined either in a bare field, or on a hill where natural food was for the time almost inaccessible, it may be possible to avert present losses by artificial feeding, but at the same time it could not be done without permanent injury to their constitutions. In extreme weather, when grass or hay is unattainable, artificial food would be condemned. Let us therefore consider it in a moderate aspect. Fortunately, our winters are generally of a milder character, with vegetation not altogether lost in oblivion, so that the sheep can still obtain more or less natural food. They may be able to secure only a portion of the amount necessary for their existence, however; and the question is, Can we by artificial means successfully make up the deficiency? This is the disputed point, and one which seriously concerns every hill farmer. In cold, bleak springs many would gladly provide artificial food for their flocks, were they convinced it would be profitable to do so. But throughout Scotland there are very few flockmasters who believe in it. All the same, we welcome any methods that can be shown to be an improvement on the old; and although we may not agree with them, they deserve our attention. In the report already mentioned, we are given an account of the winter management pursued at Twiglees, and the results are shown to be highly satisfactory. We have now to notice how these were accomplished. Firstly, the experiment was made upon sheep all thoroughly healthy, and not upon a draft of the leanest drawn from the flock; secondly, the winters are described as being about the average in severity. The experiment was made, in fact, not so much to test the value of com in any particular storm, as to estimate whether, at a season of the year when vegetation is generally very dead, the sheep could be profitably assisted through a usually trying period. The conditions in this case are altogether different from the one previously mentioned. Here, there was never at any time an entire absence of bulky material which the sheep could always make use of along with the corn. Another important point to observe is, that the sheep which were earliest fed and not reduced too much in condition did best, and those in lower condition and fed for a shorter period did not do so well. To this experience we could add similar testimony from a few others, but there are none of them so definite, or, strictly speaking, purely hill farmers. They have all a good share of arable land to fall back upon which might not be considered so genuine a trial. However, we are acquainted with several farmers who have successfully used artificial food in severe winters, and although arable land was available had it been required, their experience was entirely distinct and confined to regular hill stock. Others who have tested artificial feeding on purely hill farms speak differently, and as an example, we give the experience of Mr E. C. Boothby, late tenant of Hyndhope, Selkirkshire, who says:\u2014\"My object was to try if by artificial means I could make my farm carry more sheep than ordinarily. I took a cut of 12 score ewes and hoggs, and to these I added 3 score more which I bought. By this means I hoped to improve the 12 score, and what the 3 extra score produced I hoped would pay for the bought-in food. About the middle of February 1880, I began to give \u00bc lb. of bruised Indian corn, which towards lambing time was increased to \u00bd lb., and when the grass came, this allowance was gradually decreased and finally stopped. The sheep and lambs all throve well, but were no better than others on the farm which got nothing. The summer being very dry the land got droughted, and sheep were rather hungered, and consequently fell off in condition. I was told this was the result of feeding with corn, but I thought it was owing to the drought. Next year I treated them the same way, putting, however, a little salt among the corn, and was congratulating myself that, whatever the rest of the sheep on the farm did, these ones would bring up their lambs and do well. After lambing time they were not only the worst sheep I had, but the death-rate was very heavy, especially among the hoggs, many of which died full of water. On the other hand, those fed with hay did fairly well. If the natural grass on our hills could be improved, feeding I am sure would pay; as it is, however, it is not strong enough to keep the sheep thriving after receiving corn.\" On a half-hill and arable farm our own experience agrees with this result. The turnip crop was occasionally so light that the portion intended for the hill sheep in spring could not be spared, and as a substitute for these we frequently tried corn or cake. One of these winters we fed 300 Cheviot ewes, with a mixture of cotton cake and oats, from the New Year till the later part of April. There was nothing unusual in the season. The winter and spring were about an average, and the grass was well come before the feeding was discontinued. The amount of food given was \u00bdlb. at starting, and increased to 1 lb. per sheep daily. It was also gradually reduced as the weather became milder in spring. The following summer was an exceedingly favourable one for hill sheep, yet the small flock we had brought so well through the winter did not seem to know it. From beginning to end they never perceptibly improved in condition, scarcely grew any wool, would hardly clip, and their lambs were the worst we ever weaned from that ground. These sheep never fully recovered from the effects of that feeding, and as long as they remained on the farm did badly. On other occasions, owing to barren springs, we fed on corn with no better results, and the longer the sheep were fed the worse they seemed to do the following summer. The description of land may have had something to do with the after bad effects, as the farm referred to is of a light mixed soil, with little or no solid feeding ground, and possibly the corn was a deal richer feeding than the hill could afterwards maintain. In the letters following it will be seen that corn for hill sheep is not in favour among the majority of farmers. 1. That the preservation of green crops by the ensilage process is a valuable auxiliary to farm practice, affording safety to the whole crop produced, and a means of utilising substances almost valueless or otherwise waste. 2. That silos may be constructed either above or partly below the ground level, a few, and some of the best being altogether below ground. 3. The stacking process received very attenuated evidence, but its desirability was evident, and the present season will afford ample evidence as to the economy of making ensilage without a silo, a \u00a325 prize being offered by the Royal Agricultural Society of England. 4. That any kind of green fodder may be ensiled, and for most crops chaffing is recommended, but in the case of meadow hay much excellent ensilage has been made from unchaffed grass. 5. A great number of devices have been adopted to give the supposed necessary pressure. That the necessary amount of weighting and pressure is undecided, good results being reached from 7 lbs. to 70 lbs. and upwards. 6. The moot point of extra costs in carting green forage as against dry hay, and, per contra, the costs saved through not having to make hay, gave varied opinions, but the balance of testimony is that making ensilage is less costly than making hay, even in ordinary weather. 7. That at any time after two months from the filling the siloed crops are available for feeding, and will remain good for over a year. 8. That ensilage for cows in milk and ewes in lamb is superior to most other winter provender, and that it may yet be used as a valuable health agent, as well as a food for stock. In Scotland silos and ensilage are yet in their infancy, the first having been opened on 17th February 1883. Since that time, however, they have rapidly increased, and now number 161. Mr W. M. Oliver, Howpasley, Hawick, was one of the first hill farmers in Scotland to erect a silo; and to prove that good silage can be made even among the hills, it may be mentioned that Mr Oliver took first prize from among 115 entries, for the best sample of natural unchaffed grass, at the Smithfield Club Show, December 1884. This gentleman has kindly given us his experience with silage, which is of much interest, and is as follows:\u2014\"In preparing silage I cut as much grass in the morning as I expect to be able to put in that day, and immediately draw it into rows with the horse rake. I then begin to lead it, using carts with sheep frames. It is laden from the rows with grapes, with a boy or girl in the cart to tramp it; then led to the top of the silo and tipped, when one man forks it in, while two others spread it equally in layers over the surface of the silo, and as each layer is finished, the spreaders give it a good tramp over. I press with dead weights, and part of pressure is put on each night after filling. I prefer to put the grass in damp. The only sheep that I have wintered on silage were 16 tup hoggs last winter, when I gave it to them, instead of roots and hay, with the same amount of Indian corn as I had been in the habit of giving them in former years. They certainly never were better brought out, if ever so well. It was given them in a rack like hay, as much as they liked to eat. The cost was about 8s. 6d. per ton, calculating 45 cubic feet to the ton. I have no doubt that it would be very good for hill sheep, and I do not think there would be any difficulty in learning them to eat it in hard weather.\" Sir James T. Stewart Richardson, Pitfour Castle, who has been taking great interest in the subject, has also favoured us with his views on ensilage. He says:\u2014\"Last year I proved silage made in a built silo, under my own mode of pressure, to be a complete success, without the least waste; and I am now trying the same pressure in a stack, and have every hope that the slight waste at the outside will not be so great, and therefore will more than compensate for not having the expense of building a silo. I am of opinion that silage feeding during a storm is very advantageous, and silo-stacks, such as I am trying this season for home use, could easily be made in portions convenient for feeding hill sheep. Silage feeding for ewes I believe to be very good, although some people say it should not be carried on too close to the lambing.\" Mr R. Everard Jones, Glenmoidart, Argyllshire, says:\u2014 \"The importance of ensilage to the Highland farmers cannot be overestimated. Subjected as we are to so much rain, it is at all times a difficult matter to secure our hay, and frequently the hay we are enabled to make is so black and inferior in quality, that it is hardly of any value for feeding purposes. This year I have turned an old building into a silo, which I have lately opened, and I find my silage is in splendid condition, notwithstanding that the bulk of the grass was cut and carted in pouring rain\u2014the last five cart-loads which were cut out at the side of the loch, being completely under water, compelling the men who cut it to remove their shoes and stockings, whilst the water streamed out of the carts that carried the grass to the silo. All the people about here have been shaking their heads over the amount of good hay I have, as they thought, wasted in the silo, but now I expect even the crofters will be trying it next year.\" W. Aiton, Sandford Lodge, Peterhead.\u2014\"Ensilage given to lambing ewes, who did fairly well on it, but cannot say better than on good hay.\" G. Bain, Oldmill Farm, Aberdeen.\u2014\"A good nourishing food for breeding ewes.\" A. Creighton, Fortree, Ellon.\u2014\"A flock of Cheviot ewes, fed for six weeks on ensilage, did remarkably well.\" R. E. Findlay, Barnhill, Dumbarton.\u2014\"Lambs of some blackfaced ewes, which got ensilage in April 1884, throve very well.\" M. C. Yorstoun, Irvine House, Canonbie.\u2014\"For ewes silage is an excellent and economical food.\" T. Barr, Harburn, West Calder.\u2014\"Fed silage to lambing ewes, with excellent results.\" G. Mackay, Corriegour, Inverness.\u2014\"150 sheep fed on ensilage throve well.\" From repeated trials of our own with ensilage in America, we have no hesitation in saying its value for hill sheep only requires to be known to become generally adopted. In Minnesota considerable numbers of sheep are kept, and during five months in the year they require hand-feeding. There the snow gets from 2 to 3 feet deep every winter, which completely covers up all vegetation. In summer the sheep are grazed on prairie land, which were any Scotchman to walk over unaware of being in America, he could tell no difference from the grass under his feet from that which composes the grassy hill lands in the south of Scotland. I was often struck with the similarity, not only in the grasses, but in the weeds and wild flowers. With a difference in the temperature there, the conditions are otherwise very similar to hill farming at home, when we have at all a severe winter. While there we tested ensilage against hay and hay and corn, with a flock of native sheep. The result was, that in the spring, when we quit feeding, the sheep fed on ensilage alone were superior to those on hay, and quite equal to those that, in addition to hay, got about \u00bdlb. of Indian corn daily. They were all grazed together on the same prairie, and I took particular notice of their summer condition. They all did very well, but at shearing time the ensilage-fed sheep had the fattest lambs, and those that had corn the worst. The silage was prepared from meadow grass every way alike to what a natural meadow produces here, and it cost much about the same to prepare as hay\u2014and hay is very easily made there. Against all this evidence we cannot produce one single unfavourable report, and for further testimony we have only to refer to the inquiry made and published last year by the Highland and Agricultural Society. It is at least quite clear that hill farmers, who are so much dependent on a short time in summer for securing their crop of hay, can by means of ensilage provide a supply of winter food every way equal to the best hay, regardless of either rain or drought. Wintering from home, as an alternative to hand feeding, is a system widely adopted throughout Scotland. It is one, however, which is but reluctantly resorted to. But on high farms, where it is impossible to secure hay, no other method can be pursued when artificial food is not approved of. In the Highlands, the practice of wintering the hoggs away is about the only method adopted. They are taken from the hills in the later part of October, and sent to the arable farms in the Lowlands. Cattle graziers have no difficulty in disposing of their winter grass to sheep farmers, who prefer such wintering to either turnips or corn. In severe weather the ewe hoggs are not allowed anything but hay in addition to the grass, and the wedders generally get turnips. Grass alone for hoggs costs from 4s. to 6s. per head, according to the quality of the wintering. Turnips cost from \u00a34 to \u00a38 per acre, or they are sometimes taken by the week at from 4d. to 6d. per head. Years ago, sheep farming in the Highlands was greatly stimulated by turnip-hogging or wintering away; but while this remains a necessity, it has become so serious an expense as to be one of the greatest obstacles to the letting of sheep farms. In the south, where the system partially prevails, the hoggs are removed about 1st November, somewhat later than is done in the north. The winter grazings in the south are principally found in dairy districts, and cost about 6s. per sheep. Removing the hoggs considerably lightens the winter stock on the farm, which is no small advantage. In some cases the gimmers and a few of the leanest of the ewes are also sent to low ground about New Year time, and brought back along with the hoggs about the 1st of April. But not a few flockmasters, rather than pay extra wintering for gimmers, do not have them in lamb. They have their first lamb at three years, and by that time are strong and do better afterwards. In some districts many are also compelled to remove their hoggs on account of braxy, independently of the weather. Ewes are only taken to wintering in severe storms when no other food has been provided. Wintering hoggs on low grounds is a heavy item, and together with the ordinary rent often makes the expense more than it is worth. Indeed, since prices for wool and store sheep have become so low, it has almost reduced the value of poor hill lands to nothing at all. There never was a time of greater need for some cheap method of wintering than at present, and although neither feeding with hay, corn, nor ensilage can be done at a less cost than the prices paid for winter grazing, we believe there is great room to modify this expense, by a judicious combination of the home pasture with one or other of the systems of feeding discussed. Methods adopted in various Districts.\u2014We have great pleasure in producing the various practices of winter management pursued throughout Scotland, kindly supplied by many well-known leading farmers. Where opinions differ, we should not forget that the surrounding circumstances might very possibly supply the reason. Commencing at the Cheviot Hills, we will go gradually north; and although many districts are necessarily left out, the farms mentioned are a fair sample of the whole. Northumberland\u2014By Jacob Robson, Byrness.\u2014\"In Reed-water, Cheviots are the principal stock, although blackfaces have increased in numbers lately. We have a freestone land, clay subsoil, also part limestone land. The pastures are benty, but some of the hills have very good grass on them. There is also a good deal of heather and ling in some parts. Hoggs round here are all wintered at home, except the very worst, which are taken to lower grazings. In a bad winter I have seen mine put on to seeds in March at from 6d. to Is. per week. Sickness amongst hoggs during the autumn and early winter carries off great numbers in this district. Some farmers try a change of pasture, but it is hard to tell what to do to prevent it, as hoggs have often got lean by shifting them off their own ground to other hill pasture. I do not approve of feeding hay to hill sheep every winter, as sheep do not go over the ground properly after being accustomed to receive it. I never feed as long as the sheep can do without, but there is a great difference of farms for sheep doing well after hay. Where there is heather there is not so much risk in giving it as when there is only white bent land. I have never tried hill sheep with cake or corn, and do not consider either likely to give good results. I have seen ewes that got corn in lambing time do well then, yet they would hardly clip at all at the regular clipping time. On land where there is pining I find turnips a good change for wedders. After a bad winter or spring it is a great deal better to take grass for lean ewes than give them either turnips or corn, although I would rather give the former than the latter if grass was not easily got. I have not tried ensilage, as I think it would take too long to accustom the sheep to the taste of it. Stells are considered of great advantage in our district, and if well placed and plenty of them, you can keep sheep in smaller numbers during a storm, and thus they can get better to the different blown parts.\" Roxburghshire\u2014By George Douglas, Hindhope.\u2014\"The soil in this district is generally of a gravelly nature, unless high up, then it gets more mossy and mixed with heather. On the dry hills the grass is fine and sweet. We keep our ewes till five years old, and do not take lambs off them until they are three, as the gimmers cannot bring lambs owing to the ground being stormy. The wedders are sold at two and three years. We always try to winter our ewe hoggs at home\u2014not amongst the ewes, but by themselves\u2014and as soon as we get a good covering of snow learn them to hay. The wedder hoggs mostly go to turnips, costing from 3d. to 5d. a week, according to the crop. My experience is the less hay given the better, although in severe springs, such as last, on bare fine land, hay certainly does good given every day. I have tried feeding hill sheep with a mixture of cake, corn, and locust beans, but the sheep summered badly afterwards. I do not approve of turnips to any extent, but to few lean ewes they are the best thing that can be given, as sheep thrive better after turnips than corn. In stormy winters stells are of great advantage to hill sheep, and prevent them from being blown away in a drifty night.\" Dumfriesshire\u2014By A. H. Borthwick, Hopsrig.\u2014\"My system of wintering hill sheep is to have hay, as much as I think will be required, or as much as I can make, put up on the most suitable and sheltered feeding grounds during autumn. Care must be used not to select a spot likely to blow up with snow. I feed the sheep during storms with this when they can be got to eat it, but many sheep will rather starve than eat the best hay, so that on the whole a genial open spring is the best help for a hard winter.\" Galloway\u2014By James Brydon, jun., Holm of Dalquhairn.\u2014 \"Owing to the bad seasons we have had for the last ten years, many different plans have been tried in wintering hill stock. The general system in this district is to winter the hoggs away, mostly in Ayrshire, from the 1st of November to 1st April, and on some of the highest places the gimmers and a few lean sheep are taken down the country about the New Year, and sent back before lambing time. A few of my neighbours have been in the habit of giving all their ewes Indian corn, some of these bad springs, just laid down on the bare spots on the hill, and they seem to take to it very readily. Our plan has always been to winter our hoggs at home, unless in some of these bad seasons when one is forced to keep all the ewe lambs we winter away. But we always find that the hoggs wintered at home make the hardiest and best doing sheep, and the cost of wintering away is a great addition to the already too big rents. In the month of January we have a look through the flock, and bring in any lean ewe or hogg, and give them bog hay and the run of the fields. When each herd can look after his own it generally suits best. In the time of a storm we give all the sheep hay, and find they do best on bog hay\u2014in fact, what is made among their feet seems to suit them best. When it can be had, every herd should have a year's hay beforehand. Sheep should always be foddered twice a day in a storm\u2014before the sun is up and before sunset. Turnips or corn for hill stocks do not answer a good end. Any that get them should be sent off next back end, as they are certain to get lean the following spring; in fact, before the New Year they will show leanness should they be kept on, and would require the same feeding again or they die. Corn is our last resort, and any that get it are never kept on. It is a great advantage to have plenty of good stells in the proper places on a high farm, and one or two small parks enclosed with stone dikes 4 or 5 acres in each for hay, and a keb-house at them on each hirsel, is a great help to pull things through in a bad season. A good careful herd is also one of the best helps, and one that has been a good number of years at the same place.\" Dumfriesshire\u2014By James Moffat, Gateside.\u2014\"We have a mossy soil in this district, growing deer-hair, bent, spret, and draw moss. The hoggs are principally sent to lower grazings in winter\u2014to the dairy farms in Ayrshire, where wintering costs from 6s. and 8s. per head. I do not approve of turnips for hill sheep, as they cause them to lose their teeth very soon. I think cake or corn does not give satisfactory results, and tends to make the sheep soft. I would only feed during a storm, and then, I prefer hay. On land where there is no draw moss, I find the sheep very much benefited by getting hay every day through February and March. I have not tried ensilage, but I think silos at different parts of a hill quite practicable, if placed where the material for filling them would not be too far to cart. Stells are of great use. In stormy weather they are absolutely necessary, particularly on land where there are long straight hill faces, with no small heights and hollows for shelter.\" Lanarkshire\u2014By J. W. Hamilton, Woolfords.\u2014\"The soil in this district is mostly deep damp land, and grows very good pasture, consisting of heather, bent, draw moss, and green land. We have only blackfaced sheep in this quarter. A number of the hoggs are wintered at home, the others are sent to wintering, which is to be had in the lower parts of the county. From 10th October to 10th April is what is understood by the term wintering, and cost from 6s. to 8s. per head. Some people prefer the best grass for wintering, but I object to this. I think hoggs should be wintered in conformity to the hill they are to go on. I would on no account use cake or corn for the general stock. When I see a lean ewe I take her near the steading, and recruit her with cake or corn, but I do not winter her again. I do not approve of turnips either. Corn, cake, and turnips are all good for sheep, but not to be afterwards returned to the hill. I have not tried ensilage, but I would prefer hay, as I think a dry bite better than a damp one for sheep that are getting so much moist damp grass. Hay is never used in this district except in snowstorms, and my experience is that when feeding is resorted to it requires to be kept up. I may say I have tried hay to a greater extent than any person within 12 miles of here. I put the hay in hecks, so that the sheep should get it dry. I expected them all to get a little, but always a few lazy greedy ewes just lived on the hay, and the rest did not get their share. A little dry hay, if it could be properly divided, is a first-class thing for hill sheep. Stells are of great advantage on level plain-lying land, and I have erected a few on my farm. Natural shelter, however, is to be preferred. A very important thing in wintering hill sheep is to see they come in contact with many different kinds of grasses every day. Some hills are mixed so that the sheep cannot go wrong, others are not, and the sheep should be turned round as well as possible.\" Mid-Lothian\u2014By James Archibald, Overshiels.\u2014\"We have a dry light soil, with moss land on hill tops, sloping to the burns. The hoggs are wintered at home. I do not approve of turnips for hill sheep, and would only feed hay during a storm. I have tried cake and corn in barren springs when there was no vegetation, and such feeding will bring ewes and lambs through when bog hay would be ineffectual. Care should be taken to turn the sheep regularly away from the troughs, and the feeding should be continued until the grass comes. It is apt, however, to have a bad effect upon the sheep in the following season. In very severe winters removing the leanest sheep to grass on low ground in a good climate, frequently produces better results than any feeding on the hills.\" Perthshire\u2014By Col. Stirling, Kippendavie.\u2014\"The soil in this neighbourhood is light and sandy, with a rather retentive subsoil. It is generally well adapted for growing grass. There is not much heather on the Ochil Hills, which are considered very healthy for sheep. The hoggs are mostly sent to low grazings in winter, found in the Carse of Stirling and Kippen, Alloa district, and in through Fife and lower Strathearn. Wintering cost from 4s. to 6s. per hogg. I think hill sheep should be fed only during a storm. If hay be given care must be taken when the snow disappears not to allow the sheep to feed too freely on grass, as it is apt to bring on fatal scouring. Corn could be given, but on a large grazing this plan is scarcely workable, and would prefer turnips instead. I consider ensilage a very good substitute for hay. Every hill farm should have a few silos erected in sheltered places. Stells are a great benefit, especially to blackfaced sheep.\" Aberdeenshire\u2014By P. M. Turnbull, Smithston.\u2014\"The hoggs are always wintered away. They leave the hills in October and return in March or early April, and are generally wintered on arable land, but a run of rough pasture along with it is most desirable. Large numbers of hoggs are wintered in the Buchan district of this county, but the whole county may be said to afford winter grazing for hoggs at a cost of 4s. or 5s. per head. I do not approve of feeding hill sheep every winter. Giving hay to them unless when absolutely necessary is bad management, as the sheep depend on it, and will not look for their natural food. Of course, in deep snow, when nothing else is available, it must be done; and it is wisdom for every hill farmer to provide for such a contingency. Cake or corn may be used with much advantage in the spring for ewes. Frequently a number of them are very lean and short of milk. These should be drawn out and given an allowance of box food. I do not approve of turnips, for the same reasons given as to feeding hay, and because they have a tendency to make them go in the mouths. The great drawback hill farmers suffer from in this district is the want of shelter. Most of the grazings are high and exposed, and any means of providing shelter at a cheap rate would greatly benefit. Stells and belts of wood are greatly needed.\" Argyllshire\u2014By W. E. Oliver, Benbuy.\u2014\"The only method that I adopt to bring hill sheep through a severe winter, is to cut and win as much hay on the hill as possible, and have it put into winter ricks in the most sheltered parts of the hill, where it can be given to the sheep during a snowstorm. I salt the hay as the ricks are built. There are, however, many farms in Argyllshire where hay cannot be got, and the sheep are allowed to subsist on what they can gather for themselves from under the snow. Many farmers send their hoggs in winter to the south and east country, and also to some of the islands on the west coast, to save them from dying of braxy, which lightens the stock on the farm.\" Inverness-shire\u2014By Walter Archibald, Manager, Garthbeg.\u2014 \"Regarding the custom of bringing hill sheep through severe winters in Inverness-shire, I may say the management is quite different from the methods in the south, as the summer ground here is unfit for sheep during the winter season. When lambing is finished the hoggs, wedders, and eild sheep are sent to the high ground, and the shepherd stays with them in a bothy or hut as long as the sheep are up. After clipping\u2014about the beginning of July\u2014the ewes also are kept well up off the low ground, so as to have it clean for the lambs to go on after weaning\u2014about the 12th of August or so. Then the ewes are taken to the high ground, and kept along with the hoggs and wethers, until about the 20th of September, when the cast ewes are drawn out, and given a fortnight on the low ground before sending to market. In the later part of September or beginning of October all the stock are brought in from the high ground. The hoggs are then sent away to wintering, which begins, according to the district, from September to the end of October. Besides hoggs the dinmonts and gimmers are also occasionally wintered away, but not so many of the latter as the former. Aberdeen, Moray, Nairn, and Banffshires, and the lower districts of Inverness are the principal wintering grounds in the north, and the cost is from 6s. to 8s. per head, according to the location. But the price we are in the habit of paying on one of the best arable farms at Beauly is 3d. per head per week, for pasture alone\u2014having to"} +{"id":"RedPajamaC4.0007","text":"A co-extruded multi-layer biaxially oriented polyester film comprising a primary polyester layer and a dissimilar secondary polyester layer adjacent to the primary polyester layer, wherein the primary polyester layer and the secondary polyester layer each comprise a glycidyl ester of a branched monocarboxylic acid, wherein the monocarboxylic acid has from 5 to 50 carbon atoms, and wherein said glycidyl ester is in the form of its reaction product with at least some of the end groups of the polyester; and use thereof as a component of a photovoltaic cell. This application is the National Phase filing of International Application No. PCT\/GB2014\/052890, filed 23 Sep. 2014, and claims priority of GB Application No. 1317551.8, filed 3 Oct. 2013, the entireties of which applications are incorporated herein by reference. The present invention relates to co-extruded polyester films, to processes for the production thereof, and to uses thereof. The advantageous mechanical properties, dimensional stability and optical properties of polyester films are well-known and are exploited in many areas of technology. Many adaptations of polyester films have been proposed in order to tailor the properties of a polyester film to a particular application. However, it is often found that an adaptation which improves the performance of a polyester film in one respect may be detrimental to the performance of the film in another respect. For instance, a modification to improve the optical properties of a film may have a detrimental effect on the mechanical properties of the film. Accordingly, it is often difficult to obtain polyester films having a suitable combination of desirable properties. However, a disadvantage associated with multi-layer polyester films is that adhesion between layers may be unsatisfactory, which is a particular problem for multi-layer films containing two or more layers of different types. Manipulation of the film, for instance by winding or bending, and\/or exposure of the film to moisture or other environmental conditions can lead to delamination of the film layers and to the loss of performance. The use of elastomeric adhesives in an interposed layer to improve adhesion between the layers of multi-layer polymeric films has been proposed, for instance by EP-A-2039507. In addition, the use of intermediate \"tie-layers\" in which the intermediate layer comprises components present in each of its adjacent layers as also been shown to improve the delamination resistance of a multi-layer film comprising dissimilar layers. However, such techniques increase the complexity of the film manufacturing process and the intermediate layer can interfere with the mechanical and\/or optical properties of the laminated film. It is therefore an object of this invention to provide multi-layer polyester films which exhibit excellent hydrolytic stability and improved delamination resistance, particularly while maintaining or improving the ease, efficiency and economy of film manufacture, and without detriment to the mechanical and\/or optical properties of the film. It is a particular object of this invention to provide multi-layer polyester films which exhibit improved delamination resistance and excellent or improved hydrolytic stability on exposure to moisture or other environmental conditions, particularly under humid conditions and\/or elevated temperatures, and particularly on prolonged exposure over an extended period of time. According to the present invention, there is provided a co-extruded multi-layer biaxially oriented polyester film comprising a primary polyester layer and a dissimilar secondary polyester layer adjacent to the primary polyester layer, wherein the primary polyester layer and the secondary polyester layer each comprise a glycidyl ester of a branched monocarboxylic acid, wherein the monocarboxylic acid has from 5 to 50 carbon atoms, and wherein said glycidyl ester is present in the form of its reaction product with at least some of the end groups of the polyester. The drawing shows a typical Differential Scanning calorimetry scan obtained for a polyester film according to the invention. Without being bound by theory, it is believed that the glycidyl ester used in the present invention acts as an end-group capper for the polyester by reacting with the carboxyl and\/or hydroxyl end-groups of the polyester, and it is believed that the predominant reaction is with the carboxyl end-groups. The glycidyl ester is acting as a hydrolysis stabiliser. It is known that carboxyl end-groups are thought to participate in the mechanisms leading to hydrolytic degradation of polyester films, including polyethylene terephthalate (PET). The inventors are not aware of any prior studies into the role of glycidyl esters in increasing delamination resistance of a multilayer polyester film. The present inventors have found that the use of glycidyl esters is particularly beneficial in inhibiting the delamination of co-extruded films in which adjacent layers of the film have a different composition. Any effect is less significant in the case where a film comprises adjacent layers of identical composition. Furthermore, the present inventors have found that it is essential that a glycidyl ester be incorporated into both of the adjacent layers. Inclusion of a glycidyl ester component into only one of two adjacent co-extruded film layers is not observed to provide any significant benefit when compared to a corresponding film containing no glycidyl ester component in either layer. References herein to the secondary polyester layer being \"dissimilar\" shall be interpreted as meaning that the secondary polyester layer has a different composition to the primary polyester layer. The difference in composition may be due to the chemical composition of the polyester itself and\/or due to the presence of additives such as fillers, UV absorbers, pigments and\/or antioxidants. The polyester film is a self-supporting film or sheet by which is meant a film or sheet capable of independent existence in the absence of a supporting base. The primary and secondary polyester layers taken together preferably have a thickness in the range of from about 5 \u03bcm to about 500 \u03bcm, preferably no more than about 350 \u03bcm and more preferably no more than about 250 \u03bcm, and preferably at least about 12 \u03bcm, more preferably at least about 25 \u03bcm, more preferably at least about 50 \u03bcm and more preferably at least about 75 \u03bcm, and preferably in the range of from about 75 \u03bcm to about 250 \u03bcm. The polyester of at least one, and preferably both, of said primary and secondary polyester layers of the co-extruded film is preferably polyethylene terephthalate, which may optionally contain relatively minor amounts of one or more residues derived from other dicarboxylic acids and\/or diols. Other dicarboxylic acids include isophthalic acid, phthalic acid, 1,4-, 2,5-, 2,6- or 2,7-naphthalenedicarboxylic acid, 4,4\u2032-diphenyldicarboxylic acid, hexahydro-terephthalic acid, 1,10-decanedicarboxylic acid and aliphatic dicarboxylic acids of the general formula CnH2n(COOH)2 wherein n is 2 to 8, such as succinic acid, glutaric acid sebacic acid, adipic acid, azelaic acid, suberic acid or pimelic acid. Other diols include aliphatic and cycloaliphatic glycols, such as 1,4-cyclohexanedimethanol. Preferably the polyethylene terephthalate contains only one dicarboxylic acid, i.e. terephthalic acid. Preferably the polyethylene terephthalate contains only one glycol, i.e. ethylene glycol. The polyester is the major component of the primary and secondary polyester layers, and independently makes up at least 50%, preferably at least 65%, and preferably at least 80% by weight of the total weight of each of the primary and secondary polyester layers of the co-extruded film. The polyester may make up at least 85%, at least 90% or at least 95% by weight of the total weight of the primary layer and\/or the secondary layer of the co-extruded film. The intrinsic viscosity of the polyester from which at least one of the primary and secondary polyester layers is manufactured is preferably at least about 0.60 preferably at least about 0.65, preferably at least about 0.70, preferably at least about 0.75, and preferably at least about 0.80. Preferably, both of the primary and secondary polyester layers are manufactured from a polyester having an intrinsic viscosity of at least about 0.60, preferably at least about 0.65, preferably at least about 0.70, preferably at least about 0.75, and preferably at least about 0.80. Preferably, the intrinsic viscosity of the polyester is not more than 0.85, preferably not more than 0.83. Preferably, the intrinsic viscosity of the polyester is at least 0.61. The use of polyesters with a relatively higher intrinsic viscosity provides improved hydrolysis stability, although too high a viscosity can lead to difficulties in film manufacture and\/or require specialised, more robust film-forming equipment. For instance, increasing the viscosity too greatly may mean that it is appropriate to reduce output (i.e. reduce the amount of PET extruded per unit time, which leads to a less economical process) or to increase the extrusion temperature in order to reduce the viscosity of the melt (which in turn can lead to thermal degradation of the polymer and the loss of associated properties) in order to achieve stable film production. Formation of the polyester is conveniently effected in a known manner by condensation or ester interchange, generally at temperatures up to about 295\u00b0 C. In a preferred embodiment, solid state polymerisation may be used to increase the intrinsic viscosity to the desired value, using conventional techniques well-known in the art, for instance using a fluidised bed such as a nitrogen fluidised bed or a vacuum fluidised bed using a rotary vacuum drier. The intrinsic viscosity of at least one of the primary and secondary polyester layers is preferably at least 0.65, preferably at least 0.7, and in one embodiment in the range of from about 0.65 to about 0.75. The polyester of at least one of the primary and secondary polyester layers preferably exhibits an endothermic high temperature peak at a temperature of (A)\u00b0 C. and an endothermic low temperature peak at a temperature of (B)\u00b0 C., both peaks being measured by differential scanning calorimetry (DSC), wherein the value of (A\u2212B) is in the range from 15\u00b0 C. to 50\u00b0 C., preferably in the range from 15\u00b0 C. to 45\u00b0 C., more preferably in the range from 15\u00b0 C. to 40\u00b0 C., and in one embodiment in the range from 20\u00b0 C. to 40\u00b0 C., and this characteristic may be achieved as disclosed herein by control of the heat-setting temperature for the particular polyester being used. The advantage of exhibiting (A\u2212B) values within the ranges disclosed herein is that a surprising improvement in hydrolytic stability is obtained. A single glycidyl ester may be used in each of the primary and secondary polyester layers of the co-extruded film, and in such embodiments, the single glycidyl ester used in each of the primary and secondary polyester layers of the co-extruded film is preferably the same. However, in a preferred embodiment a mixture of glycidyl esters is used in one or both of the primary and secondary polyester layers of the co-extruded film. Still more preferably, the same mixture of glycidyl esters is used in each of the primary and secondary polyester layers of the co-extruded film. As used herein, the term \"the glycidyl ester\" shall be interpreted as referring to \"the glycidyl ester component\", and thus encompasses embodiments in which a single glycidyl ester is used and those in which a mixture of different glycidyl esters is used. The glycidyl ester(s) described herein is\/are preferably used according to the invention in the absence of other hydrolysis stabilisers (i.e. in the absence of an hydrolysis stabiliser which is not a glycidyl ester of a branched monocarboxylic acid) and in one embodiment in the absence of glycidyl ether compound(s), particularly di- or poly-glycidyl ether compounds. Suitable glycidyl esters are those derived from branched monocarboxylic acids having from 5 to 50 carbon atoms, preferably from 5 to 25 carbon atoms, preferably from 5 to 15 carbon atoms, preferably from 8 to 12 carbon atoms, preferably from 9 to 11 carbon atoms, and in one embodiment has 10 carbon atoms. The monocarboxylic acid is preferably saturated, i.e. the carbon-carbon bonds in the molecule are all single bonds. Particularly preferred branched monocarboxylic acids include those in which the carbon atom adjacent the carboxylic acid group (hereinafter referred to as the \"\u03b1-carbon\" atom) is a tertiary carbon atom, i.e. it is attached via three carbon-carbon single bonds to three carbon atoms other than the carbon atom of the carboxylic acid group, and each of said three carbon atoms may be part of an alkylene group or an alkyl group. The monocarboxylic acid is preferably a synthetic material, i.e. it is manufactured via organic synthesis comprising at least one synthetic step according to conventional procedures (see for instance WO-01\/56966-A1), rather than a naturally occurring material (such as a fatty acid) which may require isolation from a naturally occurring substance. The glycidyl esters may easily be manufactured by the known reaction of epichlorohydrin with the desired branched monocarboxylic acid. The reaction may be conducted using conventional acidic or basic catalysts, such as alkali metal carboxylates and quaternary ammonium halides, typically at elevated temperatures (temperatures in the range of 50 to 120\u00b0 C. are typical). R3 is selected from hydrogen and alkyl, and preferably from alkyl; and wherein the total number of carbon atoms in the groups R1, R2 and R3 is from 3 to 48, preferably from 3 to 23, preferably from 3 to 13, preferably from 6 to 10, preferably from 7 to 9, and in one embodiment is 8. In preferred embodiments, at least one of R1 and R2 is methyl. More preferably, R1 is methyl and R2 is an alkyl group comprising at least 2 carbon atoms. In preferred embodiments, a mixture of glycidyl esters may be used in one or both (and preferably both) of the primary and secondary polyester layers of the co-extruded film, wherein each of the glycidyl esters is independently selected according to formula (I), and preferably such that the total number of carbon atoms in the alkyl groups R1, R2 and R3 in each glycidyl ester of the mixture is the same. In preferred embodiments, R1 is methyl, and R2 and R3 are independently selected from alkyl groups such that the total number of carbon atoms in R2 and R3 is from 2 to 47, preferably from 2 to 22, preferably from 2 to 12, preferably from 5 to 9, preferably from 6 to 8, and in one embodiment the total number of carbon atoms in R2 and R3 is 7. In further embodiments, a mixture of these preferred glycidyl esters is used, preferably such that the total number of carbon atoms in the alkyl groups R1, R2 and R3 in each component of the mixture is the same. As used herein, the term \"alkyl\" preferably refers to an unsubstituted straight-chain acyclic hydrocarbon group of formula [\u2014CnH2n+1]. The glycidyl esters described above include chiral compounds. Chiral glycidyl esters may be present as either enantiomer or as a mixture of enantiomers. Generally, any chiral glycidyl esters will be present as a racemic mixture. The glycidyl ester or mixture of glycidyl esters used in the primary and\/or secondary layer of the co-extruded film preferably has a viscosity of less than 100 mPa\u00b7s, preferably less than 50 mPa\u00b7s, preferably less than 25 mPa\u00b7s at 20\u00b0 C., measured according to ASTM D445. The glycidyl esters used in the present invention react with the polyester at elevated temperatures, typically between about 160\u00b0 C. and 300\u00b0 C., and do so with rapid reaction times, typically much less than 1 second at 290\u00b0 C. The reaction is a ring-opening addition of the carboxyl or hydroxyl end-groups of the polyester to the oxirane ring of the glycidyl ester and proceeds with zero elimination of by-products, both during manufacture of the modified polyester and during subsequent manufacture and use of the polyester film. 1. By adding the glycidyl ester during manufacture of the polyester from its monomers. The glycidyl ester is preferably added at the end of the polymerisation process, immediately prior to extrusion of the polyester into pellets. In one embodiment, the modified polyester may then be further treated by solid state polymerisation in order to increase the IV to a desired value. 2. By reacting the glycidyl ester with polyester pellets off-line by melting the pellets, mixing the melt with the additive, then re-extruding the modified polyester into pellets. 3. By adding the glycidyl ester (typically as a liquid) to the polyester pellets prior to or during the introduction of the polyester into the extruder used in the film-manufacturing process (for instance by adding the glycidyl ester to the polyester in the hopper of the extruder). The glycidyl ester and the polyester react in the extruder as the mixture is extruded. Preferably a twin-screw extruder is used. 4. By injecting the glycidyl ester (typically as a liquid) into the molten polyester during the extrusion process (i.e. once the polyester is in the molten state within the extruder, typically a twin-screw extruder, and typically after the polyester has passed through any devolatilisation zone) but prior to the polyester being cast into a film. 5. By adding the glycidyl ester during manufacture of the polyester from its monomers, wherein the polyester is extruded directly into a film. The glycidyl ester is preferably added to the polyester melt at the end of the polymerisation process, immediately prior to extrusion of the polyester into a film. The glycidyl ester is preferably introduced via one of routes (2) to (5) above, preferably via route (4) or (5). In one embodiment, a masterbatch is produced by adding an excess amount of glycidyl ester, relative to the amount desired in the final film, and this is of particular utility for route (2). Surprisingly improved product performance is observed using process route (4), and in particular films manufactured by this route demonstrate improved hydrolysis stability, relative to films manufactured using masterbatch technology with route (2) above. It is believed that the relatively late addition of glycidyl ester to the polyester in the extrusion process minimises the increase of carboxyl end-groups caused by thermal degradation during film manufacture. In addition, the advantage of route (4) over the masterbatch route, for example, is that it allows greater use of reclaim film (i.e. waste film from the film manufacturing process, for instance, resulting from \"edge-trimming\" typically performed after the stenter stage in order to provide a film of uniform width). Reclaimed polyester typically has a lower intrinsic viscosity, and a higher concentration of carboxyl end-groups, than virgin polyester chip and the relatively late addition of the glycidyl ester allows the end-groups of both the virgin and reclaim polyester to be modified. The ability to use higher levels of reclaim while providing improved hydrolysis stability is a particular advantage of the present invention. The direct extrusion process of route (5) is referred to herein as \"coupled polymerisation-film production\" or \"close-coupled polymerisation-film production\". This process dispenses with the intermediate step of pelletisation, and is particularly advantageous. A close-coupled process may be operated with a static or dynamic mixing arrangement between polymerisation reactor and film die, wherein the mixing is effected after addition of the glycidyl ester. Static and dynamic mixing systems are conventional in the art. In a static mixing arrangement, the arrangement of non-moving elements continuously blends the materials as the melt-stream flows through the mixer. Suitable dynamic mixing systems include extruders or other Archimedean screw systems. In a preferred embodiment of the present invention, the close-coupled process is operated with a static mixing arrangement, and it has been surprisingly observed that sufficient mixing to achieve the benefits of the invention can be obtained with only a static mixing arrangement. It is surprising that a close-coupled process applied to this system is able to dispense with dynamic mixing without detriment to the final film properties. In the close-coupled process, an intervening solid state polymerisation step may be, and preferably is, avoided. The close-coupled process reduces the amount of water present in the polymer, thereby avoiding the need for a drying step prior to film formation, and also reducing side reactions between water and the glycidyl ester. The reduced water content allows the intervening solid state polymerisation step to be dispensed with, and allows the polyester film to tolerate a higher carboxyl end-group content without loss of hydrolytic stability. Thus, in this embodiment, the carboxyl end-group content is typically in the range of from about 15\u00d710\u22126 to about 50\u00d710\u22126 milliequivalents\/g (meq\/g), more typically from about 20\u00d710\u22126 to about 40\u00d710\u22126 meq\/g, whereas a typical SSP process reduces the carboxyl end-group content to less than about 15\u00d710\u22126 meq\/g, and typically about 10\u00d710\u22126 meq\/g. Carboxyl content is determined by titration with sodium hydroxide after dissolution of the polymer in hot benzyl alcohol. In preferred embodiments, at least one, and preferably both, of the primary and secondary polyester layers of the film further comprises at least one metal cation selected from the group consisting of Group I and Group II metal cations. Preferably, the reaction of the glycidyl ester with the polyester of at least one, and preferably both, of the primary and secondary polyester layers of the film is carried out in the presence of at least one metal cation selected from the group consisting of Group I and Group II metal cations. The metal cations are suitably present in at least one, and preferably both, of the primary and secondary polyester layers of the film in an amount sufficient to catalyse the reaction between the hydrolysis stabiliser and at least some of the end-groups of the polyester. In a preferred embodiment, the amount of the metal cation present in at least one of the primary and secondary polyester layers of the film, and\/or present in the reaction mixture during the reaction of the hydrolysis stabiliser with the end-groups of the polyester of at least one of the primary and secondary polyester layers of the film, is at least 10 ppm, preferably at least 15 ppm, at least 40 ppm, preferably at least 45 ppm, preferably at least 65 ppm, preferably at least 80 ppm, and preferably at least 100 ppm by weight, relative to the amount of polyester. Preferably, the amount of the metal cation is not more than about 1000 ppm, preferably not more than about 500 ppm, preferably not more than about 275 ppm, typically not more than about 200 ppm, and in one embodiment not more than about 150 ppm by weight, relative to the amount of polyester. Preferably, the amount of the metal cation is in the range from 45 ppm to 500 ppm, more preferably from 65 ppm to 275 ppm, more preferably from 100 ppm to 200 ppm by weight, relative to the amount of polyester. As used herein, the terms \"Group I\" and \"Group II\" have their conventional chemical meaning and refer to the corresponding Groups in the periodic table. In a preferred embodiment, the metal cations are selected from Group I metal cations, preferably selected from sodium and potassium, and most preferably sodium. The catalytic effect of the Group I or Group II cation is not dependent on the associated anion, and therefore any appropriate counter-ion may be used. In one embodiment, the anion may be selected from hydroxide, polyacrylate, hydrogen carbonate, carboxylate, chloride, acetate, formate and nitrate. In a preferred embodiment, the anion is selected from hydroxide or polyacrylate. Suitable polyacrylates include those having a molecular weight of from about 1,000 to about 10,000. The metal cation(s) may be added to the polyester or its monomers prior to or simultaneously with, the addition of the glycidyl ester. Alternatively, the metal cation(s) may be added to the glycidyl ester prior to or simultaneously with the addition of said glycidyl ester to the polyester or its monomers. Preferably, the metal cation(s) are added to the polyester or its monomers, and preferably prior to the addition thereto of the glycidyl ester. In a preferred embodiment, the metal cations are added at the start of the polymerisation reaction to prepare the polyester. In a preferred embodiment, the primary polyester layer is optically clear or translucent. As used herein, the term \"optically clear\" refers to a layer that provides a percentage of scattered light in the visible wavelength range of no more than 30%, preferably no more than 15% preferably no more than 10%, preferably no more than 6%, more preferably no more than 3.5% and particularly no more than 1.5%, and\/or a total luminous transmission (TLT) for light in the visible region (400 nm to 700 nm) of at least 80%, preferably at least 85%, more preferably at least about 90%. Preferably, an optically clear layer fulfills both of these criteria. As used herein, the term \"translucent\" refers to a layer having a TLT of at least 50%, preferably at least 60%, and preferably at least 70%. In a preferred embodiment, the secondary polyester layer comprises a particulate filler material. Particulate fillers are useful to improve handling and windability properties of polyesters films during manufacture. In the context of the present invention, the particulate filler is used primarily to modulate the optical properties of the secondary polyester layer. The particulate filler may, for example, be a particulate inorganic filler, for example metal or metalloid oxides, such as alumina, titania, talc and silica (especially precipitated or diatomaceous silica and silica gels), calcined china clay and alkaline metal salts (such as the carbonates and sulphates of calcium and barium). Any inorganic filler present should be finely-divided, and the volume distributed median particle diameter (equivalent spherical diameter corresponding to 50% of the volume of all the particles, read on the cumulative distribution curve relating volume % to the diameter of the particles\u2014often referred to as the \"D(v,0.5)\" value) thereof is preferably in the range from 0.01 to 5 \u03bcm, more preferably 0.05 to 1.5 \u03bcm, and particularly 0.15 to 1.2 \u03bcm. Preferably at least 90%, more preferably at least 95% by volume of the inorganic filler particles are within the range of the volume distributed median particle diameter\u00b10.8 \u03bcm, and particularly \u00b10.5 \u03bcm. Particle size of the filler particles may be measured by electron microscope, coulter counter, sedimentation analysis and static or dynamic light scattering. Techniques based on laser light diffraction are preferred. The median particle size may be determined by plotting a cumulative distribution curve representing the percentage of particle volume below chosen particle sizes and measuring the 50th percentile. The amount of particulate filler incorporated into the secondary polyester layer is suitably in the range of from 0.3 to 30% by weight, based on the weight of polyester in the layer. In a preferred embodiment, the particulate filler is used as an opacifying agent to increase the opacity of the secondary polyester layer, such that an opaque secondary polyester layer preferably exhibits a Transmission Optical Density (TOD) of at least 0.3, preferably at least 0.4, preferably at least 0.5, preferably at least 0.6, preferably at least 0.7, preferably at least 1.0 and preferably at least 1.5, and in one embodiment preferably at least 2.0, preferably at least 3.0, and preferably at least 4.0. In some embodiments, the particulate filler is selected such that the secondary polyester layer is white, grey or black. In a preferred embodiment, the particulate filler is selected such that the secondary polyester layer is an opaque white layer. Films according to this embodiment of the invention preferably exhibit a TOD in the range of at least about 0.3, preferably at least about 0.4, preferably at least 0.5, preferably at least 0.6, preferably at least 0.7, and typically no more than about 1.75. Preferred particulate fillers having a whitening effect include particulate inorganic fillers, preferably titanium dioxide and\/or barium sulphate. In a preferred embodiment, the particulate inorganic filler in the secondary polyester layer is barium sulphate alone. In the case of a white secondary polyester layer, the amount of filler incorporated into the secondary polyester layer is typically in the range of from about 2% to about 30% by weight, preferably at least about 5% by weight, and preferably from about 10 to about 20% by weight. In a preferred embodiment, the filler is present in an amount of from about 10% to about 25% by weight, and more preferably from about 15% to about 20% by weight, based on the weight of polyester in the layer, and these ranges are particularly suitable for barium sulphate as the opacifying agent. In a further preferred embodiment, the filler is present in an amount of from about 2% to about 20% by weight, more preferably from about 10% to 20% by weight, more preferably from about 10% to about 15%, more preferably from about 12% to about 15% by weight, based on the weight of polyester in the layer, and these ranges are particularly suitable for titanium dioxide as the opacifying agent. A white film preferably exhibits a whiteness index, measured as herein described, in the range of from about 60 to about 120 units. In an alternative embodiment, the particulate filler is selected such that the secondary polyester layer is an opaque grey or black layer. Films according to this embodiment of the invention typically exhibit a TOD of at least 2.0, more typically at least 3.0, more typically at least 4.0. Preferred particulate fillers having a darkening effect layer include carbon black and metallic fillers, such as aluminium powder. Carbon black is a preferred opacifying agent. In the case of a black or grey secondary polyester layer, the amount of filler incorporated into the secondary polyester layer is typically in the range of from about 0.3% to about 10% by weight, preferably 0.5% to 7% by weight, particularly 1% to 5% by weight, and especially 2% to 4% by weight, based on the weight of the polyester in the layer. The opacifying agent suitably has a mean particle diameter in the range from 0.01 to 1.5 \u03bcm, particularly 0.02 to 0.05 \u03bcm. In a further embodiment, the secondary polyester layer may comprise a combination of particulate fillers having and whitening effect with particulate fillers having a darkening effect. Suitable fillers are as described above, and the total amount of fillers in the secondary layer is preferably in the range of from 1% to 30% by weight, preferably 2% to 25% by weight, and more preferably 5% to 20% by weight, based on the weight of polyester in the layer. Films according to this embodiment of the invention typically exhibit a TOD of at least 1.0, more preferably at least 2.0 and more preferably at least 3.0. In the embodiments of the invention where the secondary polyester layer contains a particulate filler, the primary polyester layer may be free of particulate filler or may contain the same or different type of particulate filler to the secondary polyester layer and\/or may contain the same or different amount of particulate filler to the secondary polyester layer. Preferably, where the secondary polyester layer contains a particulate filler, the primary polyester layer is free of particulate filler or contains particulate filler only in minor amounts, for example no more than 2.5% by weight, preferably no more than 2% by weight, preferably no more than 1% by weight, more preferably no more than 0.6% by weight, and in one embodiment no more than about 0.3% by weight, based on the weight of the polyester in the layer. Preferably, the amount of particulate filler in the primary polyester layer is less than the amount of particulate filler in the secondary polyester layer. For instance, the amount of filler in the primary polyester layer is suitably less than 50%, more preferably less than 20% and most preferably less than 10% by weight of the amount of particulate filler in the secondary polyester layer. Suitable particulate fillers, where present, may be selected from the particulate fillers described above. Particulate filler in the primary layer may be derived from filler added into the layer-forming polymer in a conventional manner, or it may be derived from the use of re-claim film. In the present invention, re-claim is optionally added into the primary layer (but preferably not into the secondary layer) and preferably in an amount of up to about 45%, preferably in an amount of from about 30 to about 40%, by weight of the primary layer. In a preferred embodiment, the secondary polyester layer contains a particulate filler, and the primary polyester layer is optically clear or translucent and is free of particulate filler or contains particulate filler only in minor amounts as described above. In a further preferred embodiment, the secondary polyester layer contains a particulate filler and is opaque (preferably a white opaque layer), and the primary polyester layer is optically clear or translucent and is free of particulate filler or contains particulate filler only in minor amounts as described above. In a further preferred embodiment, the secondary polyester layer contains a particulate filler selected from titanium dioxide and\/or barium sulphate and is a white opaque layer, and the primary polyester layer is optically clear or translucent and is free of particulate filler or contains particulate filler only in minor amounts as described above. In a further preferred embodiment, the secondary polyester contains a particulate filler (preferably an inorganic particulate filler, preferably titanium dioxide and\/or barium sulphate) in an amount in the range of from about 2% to about 30% by weight, preferably at least about 5% by weight, preferably 10% to 20% by weight, based on the weight of polyester in the layer, as described hereinabove, and the primary polyester layer is optically clear or translucent and is free of particulate filler or contains particulate filler only in minor amounts as described above. In the preferred embodiments of the invention where the primary polyester layer is optically clear or translucent, any filler in the primary layer is primarily for the purpose of improving handling of the film and is present only in small amounts as described above. For instance, the presence of particulate filler materials improves the windability of the film (i.e. the absence of blocking or sticking when the film is would up into a roll) is improved, without an unacceptable reduction in haze or other optical properties of the primary layer. Preferred particulate filler materials for use in the optically clear or translucent primary layer include titanium dioxide, silica and\/or talc, preferably titanium dioxide and\/or silica. When present, such fillers are typically used in only small amounts, generally such that the total weight of filler is not more than about 2.5%, preferably not more than about 2.0%, preferably not more than about 1.0%, more typically no more than about 0.6% and preferably no more than about 0.3% by weight, based on the weight of the polyester in the layer. In the preferred embodiments of the invention where the secondary polyester layer contains a particulate filler and the primary polyester layer is free of particulate fillers or contains any particulate fillers only in minor amounts as described above, the primary and secondary polyester layers may contain the same polyester material, and preferably do so. Thus, the primary and secondary polyester layers are preferably dissimilar due to the amount of particulate filler in each layer. More preferably, the primary and secondary polyester layers contain the same polyester material and are dissimilar due to both the amount and type of particulate filler in each layer. The primary polyester layer preferably accounts for greater than 50%, preferably at least 60%, more preferably at least 70% and preferably from about 75% to about 95% of the total thickness of the primary and secondary polyester layers. Thus, the secondary polyester layer preferably accounts for less than 50%, preferably no more than 40%, more preferably no more than 30% and more preferably no more than 25%, and preferably at least 5% more preferably at least 10%, and preferably from about 5% to about 25%, of the total thickness of the primary and secondary polyester layers. These thickness ratios apply particularly to the preferred embodiments of the invention where the secondary polyester layer contains a particulate filler and the primary polyester layer is free of particulate filler or contains any particulate filler only in minor amounts as described above. In this way, the beneficial optical properties of a secondary polyester layer containing a particulate filler material may be obtained without the expense of providing filler throughout the entire film thickness, while the primary polyester layer provides the film with the necessary mechanical strength. wherein R is hydrogen, C1-C18 alkyl, C2-C6 alkyl substituted by halogen or by C1-C12 alkoxy, or is benzyl and R4 and R5 are independently selected from hydrogen, alkyl, alkoxy or phenyl. R is preferably C1-C12 alkyl or benzyl, more preferably C3-C6 alkyl, and particularly hexyl. R4 and R5 are preferably hydrogen. An especially preferred UV-absorber is 2-(4,6-diphenyl-1,3,5-triazin-2-yl)-5-(hexyl)oxy-phenol, which is commercially available as Tinuvin\u2122 1577 from BASF, and which is a compound of formula (II) above, wherein R is C6H13 and R4 and R5 are both H. A further especially preferred UV-absorber is 2-(2\u2032-hydroxyphenyl)-4,6-diphenyl triazine which is commercially available as Tinuvin\u2122 1600 from BASF, and which is a triazine of formula (II) above, wherein R is CH2CH(C2H5)C4H9, R4 is phenyl and R5 is hydrogen. The amount of UV-absorber in the primary and\/or secondary polyester layer is preferably in the range from 0.1% to 10%, more preferably 0.2% to 7%, more preferably 0.6% to 4%, particularly 0.8% to 2%, and especially 0.9% to 1.2% by weight, relative to the total weight of the layer. The primary and\/or secondary polyester layer of the film may optionally comprise an anti-oxidant. A range of antioxidants may be used, such as antioxidants which function by trapping radicals or by decomposing peroxide. Suitable radical-trapping antioxidants include hindered phenols, secondary aromatic amines and hindered amines, such as Tinuvin\u2122 770 (Ciba-Geigy). Suitable peroxide-decomposing antioxidants include trivalent phosphorous compounds, such as phosphonites, phosphites (e.g. triphenyl phosphate and trialkylphosphites) and thiosynergists (e.g. esters of thiodipropionic acid, such as dilauryl thiodipropionate). Hindered phenol antioxidants are preferred. A particularly preferred hindered phenol is tetrakis-(methylene 3-(4\u2032-hydroxy-3\u2032, 5\u2032-di-t-butylphenyl propionate) methane, which is commercially available as Irganox\u2122 1010 (Ciba-Geigy). Other suitable commercially available hindered phenols include Irganox\u2122 1035, 1076, 1098 and 1330 (Ciba-Geigy), Santanox\u2122 R (Monsanto), Cyanox\u2122 antioxidants (American Cyanamid) and Goodrite\u2122 antioxidants (BF Goodrich). The concentration of antioxidant present in the primary and\/or secondary polyester layer of the film is preferably in the range from 50 ppm to 5000 ppm, more preferably in the range from 300 ppm to 1500 ppm, particularly in the range from 400 ppm to 1200 ppm, and especially in the range from 450 ppm to 600 ppm based on the weight of the polyester. A mixture of more than one antioxidant may be used, in which case the total concentration thereof is preferably within the aforementioned ranges. Incorporation of the antioxidant into the polyester may be effected by conventional techniques, and preferably by mixing with the monomeric reactants from which the polyester is derived, particularly at the end of the direct esterification or ester exchange reaction, prior to polycondensation. The primary and\/or secondary polyester layer of the film may further comprise any other additive conventionally employed in the manufacture of polyester films. Thus, additives such as cross-linking agents, dyes, pigments, voiding agents, lubricants, radical scavengers, thermal stabilisers, flame retardants and inhibitors, anti-blocking agents, surface active agents, slip aids, gloss improvers, prodegradents, viscosity modifiers and dispersion stabilisers may be incorporated as appropriate. Such components may be introduced into the polymer in a conventional manner. For example, by mixing with the monomeric reactants from which the film-forming polymer is derived, or the components may be mixed with the polymer by tumble or dry blending or by compounding in an extruder, followed by cooling and, usually, comminution into granules or chips. Masterbatching technology as described above may also be employed. The total amount of glycidyl ester present in the multi-layer film is preferably in the range of from about 0.2 to about 5 mol %, more preferably from about 0.2 to about 2.0 mol %, more preferably from about 0.3 to about 1.5 mol %, more preferably from about 0.5 to about 1.0 mol %, based on the amount of polyester in the film. The inventors have found that if too much glycidyl ester is incorporated into the film, the intrinsic viscosity may be reduced, the film may be become discoloured (yellowness) and brittle, and film formation may become difficult. The glycidyl ester is preferably present in each of the primary and secondary polyester layers in an amount that is independently in the range of from about 0.1 to about 5 mol %, more preferably from about 0.15 to about 2.5 mol %, more preferably from about 0.15 to about 2.0 mol %, more preferably from about 0.15 to about 1.5 mol %, more preferably from about 0.15 to about 1.2 mol %, more preferably from about 0.15 to about 1.0 mol %, based on the amount of polyester in the respective layer. Within these ranges, the secondary polyester layer preferably comprises at least about 0.65 mol %, preferably at least about 0.70 mol %, preferably at least about 0.80 mol % of glycidyl ester. Within these ranges, the primary polyester layer preferably comprises at least about 0.10 mol %, preferably at least about 0.15 mol %, preferably at least about 0.30 mol %, and preferably no more than about 0.80 mol %, preferably no more than about 0.70 mol %, and preferably no more than about 0.65 mol %, of glycidyl ester. Particularly in the case where the primary and\/or secondary polyester layer has a relatively high content of particulate filler materials (for instance, at least 5%, 10% or 15% by weight, as described hereinabove), it is preferred that the secondary polyester layer comprises a relatively higher content of glycidyl ester and the primary polyester layer comprises a relatively lower content of glycidyl ester. Preferably, said secondary polyester layer comprises at least about 0.65 mol %, preferably at least about 0.70 mol %, preferably at least about 0.80 mol %, and preferably no more than about 1.5 mol %, preferably no more than about 1.2 mol %, preferably no more than about 1.0 mol % of glycidyl ester, based on the amount of polyester in the layer. Preferably, the primary polyester layer comprises at least about 0.1 mol %, preferably at least about 0.15 mol %, preferably at least about 0.30 mol %, and preferably no more than about 0.80 mol %, preferably no more than about 0.70 mol %, and preferably no more than about 0.65 mol %, based on the amount of polyester in the layer. In the case where the secondary polyester layer has a relatively high content of particulate filler materials (for instance, at least 5%, 10% or 15% by weight, as described hereinabove), and where the primary polyester layer is free of, or contains only minor amounts (as defined above) of particulate filler materials, the secondary polyester layer advantageously comprises a relatively higher content of the glycidyl ester and the primary polyester layer comprises a relatively lower content of the glycidyl ester. In a preferred embodiment, the primary polyester layer comprises at least about 0.1 mol %, preferably at least about 0.15 mol %, preferably at least about 0.3 mol %, and preferably no more than about 0.80 mol %, preferably no more than about 0.70 mol %, preferably no more than 0.65 mol %, of glycidyl ester based on the amount of polyester in the primary layer, and the secondary polyester layer preferably comprises a greater amount in the range of from about 0.65 to about 5 mol %, preferably at least about 0.70 mol %, preferably at least about 0.80 mol %, and preferably no more than about 1.5 mol %, preferably no more than about 1.2 mol %, preferably no more than about 1.0 mol %, of glycidyl ester, based on the amount of polyester in the secondary layer. Preferably, the multi-layer films of the present invention are defined by the ratio of the concentration of the glycidyl ester in the secondary layer [GES] to the concentration of the glycidyl ester in the primary layer [GEP]. Preferably, the concentration of the glycidyl ester in the secondary layer [GES] is greater than the concentration of the glycidyl ester in the primary layer [GEP]. Preferably, [GES]:[GEP] is at least 1.2:1, preferably at least 1.3:1, preferably at least 1.4:1, and preferably no more than 10.0:1, in order to provide the combination of excellent delamination resistance with excellent hydrolysis resistance. The inventors have unexpectedly found that delamination resistance is a function of both the relative ratio [GES]:[GEP] and the overall concentration of glycidyl ester in the multilayer film [GEO]. According to the present invention, it is preferred that ([GES]\/[GEP])\u00d7[GEO] is at least 0.6, preferably at least 0.7, preferably at least 0.8, preferably at least 1.0, preferably at least 1.2, preferably at least 1.4. As discussed hereinbelow, the delamination resistance is preferably measured by retention of interlayer peel strength (RIPS) after 60 hours at 121\u00b0 C. and 1.2 bar pressure and 100% relative humidity. The co-extruded polyester film of the invention preferably exhibits a low shrinkage, preferably less than 3%, preferably less than 2%, preferably less than 1.5%, and preferably less than 1.0% at 150\u00b0 C. over 30 minutes, particularly in the machine (longitudinal dimension) of the film. Preferably such low shrinkage values are exhibited in both dimensions of the film (i.e. the longitudinal and transverse dimensions). As well as improved delamination resistance, the polyester films of the present invention exhibit a high level of film uniformity and quality, as well as resistance to hydrolytic degradation. In particular, the films of the present invention have a low level profile defects and\/or die-lines, uniform thickness and light transmission properties, and excellent processability, with no defects or breakage in the film web. Formation of the polyester film may be effected by conventional co-extrusion techniques well-known in the art. In general terms the process comprises the steps of co-extruding the primary and secondary polyester compositions through independent orifices of a multi-orifice die, and thereafter uniting the still molten layers or, preferably, by single-channel co-extrusion in which molten streams of the respective polyesters are first united within a channel leading to a die manifold, and thereafter extruded together from the die orifice under conditions of streamline flow without intermixing thereby to produce a laminated film. The extrusion is generally carried out at a temperature within the range of from about 280 to about 300\u00b0 C., and is followed by quenching the extrudate and orienting the quenched extrudate. Orientation may be effected by any process known in the art for producing an oriented film, for example a tubular or flat film process. Biaxial orientation is effected by drawing in two mutually perpendicular directions in the plane of the film to achieve a satisfactory combination of mechanical and physical properties. In a tubular process, simultaneous biaxial orientation may be effected by extruding a thermoplastics polyester tube which is subsequently quenched, reheated and then expanded by internal gas pressure to induce transverse orientation, and withdrawn at a rate which will induce longitudinal orientation. In the preferred flat film process, the film-forming polyester is extruded through a slot die and rapidly quenched upon a chilled casting drum to ensure that the polyester is quenched to the amorphous state. Orientation is then effected by stretching the quenched extrudate in at least one direction at a temperature above the glass transition temperature of the polyester. Sequential orientation may be effected by stretching a flat, quenched extrudate firstly in one direction, usually the longitudinal direction, i.e. the forward direction through the film stretching machine, and then in the transverse direction. Forward stretching of the extrudate is conveniently effected over a set of rotating rolls or between two pairs of nip rolls, transverse stretching then being effected in a stenter apparatus. Stretching is generally effected so that the dimension of the oriented film is from 2 to 5, more preferably 2.5 to 4.5 times its original dimension in the or each direction of stretching. Typically, stretching is effected at temperatures higher than the Tg of the polyester, preferably about 15\u00b0 C. higher than the Tg. Greater draw ratios (for example, up to about 8 times) may be used if orientation in only one direction is required. It is not necessary to stretch equally in the machine and transverse directions although this is preferred if balanced properties are desired. The stretched film may be, and preferably is, dimensionally stabilised by heat-setting under dimensional support at a temperature above the glass transition temperature of the polyester but below the melting temperature thereof, to induce the desired crystallisation of the polyester. During the heat-setting, a small amount of dimensional relaxation may be performed in the transverse direction (TD) by a procedure known as \"toe-in\". Toe-in can involve dimensional shrinkage of the order 2 to 4% but an analogous dimensional relaxation in the process or machine direction (MD) is difficult to achieve since low line tensions are required and film control and winding becomes problematic. The actual heat-set temperature and time will vary depending on the composition of the film and its desired final thermal shrinkage but should not be selected so as to substantially degrade the toughness properties of the film such as tear resistance. Within these constraints, a heat set temperature of about 180 to 245\u00b0 C. is generally desirable. In one embodiment, the heat-set-temperature is within the range of from about 200 to about 225\u00b0 C., which provides unexpected improvements in hydrolytic stability. After heat-setting the film is typically quenched rapidly in order induce the"} +{"id":"RedPajamaC4.0008","text":"Michael: I'm here with Geoff Bower from Demon. [If I'm saying that right. He gave me extensive lessons on how to pronounce it.] And we're going to be talking about secrets from the folks who make the official Lucee CFML Docker images. So as well as that, we'll look at some ColdFusion dev ups tips. Why is he thinks Servulous is so cool these days, and some of the neat apps he's building with Lucee CFML with his team there down in Australia. And also look at tricks they use on migrating legacy Adobe ColdFusion to Lucee. And we'll also do a little bit of chat about web [inaudible] [00:40], and a few other interesting things. So welcome Geoff. Michael: And just in case you don't know, he's C.E.O. of Demon, has been around for like 22 years, been doing ColdFusion forever, or at least since version one. Geoff: Seems like forever. Now probably since version\u2026 I think might be version was is three and a half I can't remember. Michael: In 97, was three and a half? Geoff: Nearly three and a half. 97 is sort of the time frame. Michael: Yeah, and he's also president of LAS; the Lucy Association Switzerland. So he's the \u2026that's where the buck stops as they say in America. Geoff: It's where the buck stops, yeah. Michael: Yeah, so you guys there make all the official Lucee Docker images. Tell us about that, and why that matters to people listening. Geoff: Well, I think the first thing to say is in terms of the Docker images, there's a need internally at Demon for example to have a nice image that runs Lucee in the best possible way, the best possible way that we see. And so having built that, we decided to release that as a formal image that other people could download directly from Docker hub. But there's no reason to have to use the official images. It's just a good starting point for that, and there are other images that are out there. So, some people have their own specific images for example Ortus have a command box image, but we run with a very\u2026 I guess plain or vanilla Tomcat Lucee style image. We have two images actually. We have one which is just the rule for Lucee, and another which is a compound image that includes the engine exploit server as well which is the probably the most common image that we use internally. But other people use a bit of a mix. Michael: So does this help reduce problems in getting set up fast on using Lucee or? Geoff: I think so, I mean the biggest thing with respect to Docker I think is a bit of a mental shift to the way in which you build your applications. So in the case of Demon, is brief history and move towards Docker as a deployment pipeline. We have always been very focused on moving to an environment where we can very readily build services programmatically rather than having to build them manually. So rather than having some kind of dragon slayer document which tells you all the individual things that you would have to do to get an image of your server back up running, we would look to do that programmatically. So, write a program which will install the server everything from the operating system, all the way through to the application. And so, that discipline for us started quite a few years ago. And we used to run with vagrants, and we moved all of our production servers, most of our production services I should stay to Linux. And so we started to standardize exactly how we would build servers. And that was part of an early desire to have what we call an ephemeral server, or a server that only exists for a short period of time. And to treat your service in the expression of industry is to treat them like cattle rather than treat them like pets. So in a mansion in the old days in the '90s, you had that kind of classic service sitting underneath the\u2026 on the desk. No one really knew what was installed on it, and you just have to kind of groom it, and nurse it back to health on a regular basis, and patch it, etcetera, etcetera. So these days, when we look at operating a server, we literally destroy the server completely and build it from scratch. So if you can get to that point, and I see if you a great deal of confidence and kind of resilience in your deployment pipeline. And if anything goes wrong, you're really quite confident to just throw the server away, and rebuilt it from scratch. And so in the old days, (when I say old days we're talking three years ago) you would have to use things like shift, or ansible, or salt, or a bunch of these sort of provisioning programming languages that effectively allow you to code server installations. And you do something like vagrant on the desktop to be able to emulate the server environment in a local development sense. And so really, it's a culmination of many different areas that have led to the ability to be able to do this easily. You have to wait for that process to take its course from the very beginning. And if you make a mistake, and you find out about that 20 minutes later, you go, oh. And then you change the script, and you can kick that process off again. So it can be quite\u2026 even though it's quite rewarding once you have it finished in quite a laborious sort of process. Dockers and containers in general, so containers is a technology that has been around in the Linux community for many years. And Docker really is a what I guess initially a set of tools, and a standardized practice, if you like, to dealing with containers that made it much more accessible to people who weren't Linux administration [inaudible] [06:56]. Now those I mean it really was the purview of just very limited group of people, and Docker really made that a much broader and accessible environment. And now over the last two years, it's been a bit of a gold rush in the Docker environment where there are just tools, tools, tools and lots of it and they will jumping on board a Microsoft is going to say in the light jumped on board with Windows containers. And so, there's been a massive amount of investment. And not just in terms of money, but in terms of just sheer will power, mind power into making Docker a reality. And the reason for that is it makes that ephemeral server technology, that whole the scripting a server environment much, much easier. So it's an order of magnitude easier to do all of that in Docker than it used to be in say for example in say shift, and vagrant, and some kind of cloud based solution. So, Docker makes that concept of a programmatic installation very straightforward, and also gives you the ability to effectively version control your server installation. So we're used to the idea of having virtual control for our applications branching, and doing different things with respect and application rolling back. If you didn't like the commits you made, that type of thing is while not a sophisticated in Docker is certainly possible in Docker. So you can have your own images that incremental changes to the way in which your server is installed. And that is exactly how the Lucee Docker images work. For example: a Lucee Docker images are all based on the official Tomcat image and so Tomcat; that community, does all the work to make the best possible Lucee\u2026 Sorry, the best possible Linux based Tomcat image. And then on top of that, we layer all of the installation places for Lucy. So we don't try and know challenge Tomcat's expertise in that particular area. They choose the underlying Linux distribution which I think memories is a Debian based installation, and then open JDK, and then Tomcat on top of that. And there are several different options that you have in that Tomcat environment. And so, eventually, you will start to offer the variations in the Lucee environment that are offered in the underlying Tomcat environment. And specifically for anybody who is into the Docker side will be probably be looking at Alpine Linux based installations in the near future. And that's Alpine Linux is a special type of Linux is being developed for this sort of environment in that it's extremely lean. It's about five megabytes of something in size. Geoff: Yeah, very, very small and then you would add to that incrementally; the packages and things that you need. So, it's designed for this type of distribution, and installation. Michael: Last time I installed an operating system from a company in Seattle. It was gigabytes, just eats up stuff. Geoff: Well, is a very big difference. For example: if you wanted to do a Windows Docker container for example which is sort of possible with Windows containers. Is a little bit behind the eight ball compared to Linux containers. I think you\u2026 I don't know what the comparable based OS options are. And effectively, Docker shares, and utilizes the underlying operating system. So if it sees anything that it needs already, it doesn't bother to download it again. It just uses that layer. I don't know at what point the windows container kind of kicks in and so, Windows containers, I'm not sure in terms of what size they are. But certainly in the Linux environment, it is very interesting in terms of your ability to make these changes. If I want to do a Lucee upgrade for example in a couple of text changes and then redeploy, and it's done. And it can be done in seconds and doesn't take in minutes. The really the time it takes is the time your server hosting Docker has to download the new image, and slotted in like a cartridge. And then, spin up the container. It takes a few microseconds to get that running. So it's pretty cool. And I think that again, there is a bit of a ramble around. But the whole purpose of doing these things, the whole purpose of moving to an ephemeral server-like infrastructure is back to this concept of resilience of your deployment process. You wanna have absolute confidence that when you're deploying something, it's not going to break. So we often think about that in terms of the code changes we make. So, make a couple of code changes, add a new feature. You wanna test that and make sure that it's not gonna break anything when you deploy it. But probably, I think a greater risk to deployment problems and the like are when we make changes to the server environment that surround that code. So we're making configuration changes, or we need to add an extra module, or an extension, or something of that nature which has\u2026 It's harder to replicate for a start in your local development environment. And it can have kind of far reaching implications in the server environment when you go to make that deployment, and that change. And what's worse is it's very difficult typically in an old sort of legacy infrastructure environment to roll that back. I logged on remotely to my Windows box, and I clicked a few check boxes with the mouse. Everything seemed to be working okay, but in the middle of the night, all the alarms are going off, the servers are dead. And nobody really knows, or even can remember what you actually did at that point. You know, is this checkbox I clicked, or something else, or what the hell happened, or forgot to replicate it across the cluster, or whatever? Whereas when it's programmatically done, it is what it is and a few rollbacks, you're rolling back to exactly the installation right down to the nuts and bolts of the operating system that you had previously. So that ability to roll forward, and roll backwards gives you that confidence to have a move towards which the true goal for Demon at least is a sense of a continuous delivery. So in other words, the ability for a developer to have an idea, make a change, and have that move into the production environment in the shortest possible time. That doesn't always mean that you make changes and you immediately deploy it. Like it's instant that you going to do it that day. It's just that you have the option to do that not only in terms of time frame, but in terms of the confidence. Even as a new developer, I can make that change, it will go through the pipeline, it'll end up in a production environment. And if I really did do something catastrophic that that can be very easily rolled back, and go back to the status quo where we were before a moment earlier. And that, just having that knowledge in the background, gives you a huge amount of confidence when you look to rollout new changes, or complex changes, or infrastructure changes. And that's the first con a stepping stone towards an automated infrastructure and why Docker is so popular. The next step, and I think I talked a little bit about this in C.F. objective at two talks. One was what we do in Damon in terms of actually running a development environment. And the second one was how we go about deploying that in the real world out into a production environment. So often, people will play with Docker, will have that running locally about it a little Lucee service spun off, and it all seems like magic. But then when they go to deploy it into production, there's an whole other set of headaches that they consider all that they're perhaps doing it wrong. They're logging on to the box and they're pulling the Docker images manually. And so the next step is this whole orchestration piece where you can click a few buttons or programmatically do it. And instantly, you get from one container to 16 containers all running in a cluster, all spread across multiple data centers. The sort of stuff that you kind of dream of\u2026 Even five years ago that this was just an impossibility. The thought of being able to deploy something, and then scale it across multiple data centers just with a couple of command changes was really again only available to the very largest engineering teams. And now, it's literally available to anybody even with just a simple blog, you could easily do a clustered login solution, and have that running up and down. We do that with pretty much all of our clients now. Even the very smallest client because we have a base image in Docker which always offers that kind of standard installation. And then, we have a standard set of libraries sit on top of that for our applications typically. We work with a framework in ColdFusion called 'Far Cry' which it's fallen from favor I think in recent times. A lot of boxing style frameworks that are very popular these days. But nevertheless, that's the one that we enjoy using. And it means that when we go to deploy something, that even though it might be a simple let's say a simple content management environment, it's immediately clustered. So it starts in a clustered state. Even our simplest clients we typically run as two containers just because that's a standard for us, and those two containers will automatically find themselves going across a large cluster into different data centers, and on a high availability mode. And again, this only possible because of the advances that we've had in things like cloud infrastructure. I mean we're predominantly in the Amazon at the moment, and if you're let's say thing you have a database typically, we use MySQL, or MS SQL. And so in MySQL database, if you want to install that manager, then cluster it, and then have a splitter the two data centers, and handle all of that kind of infrastructure if you like, that's a lot of work that's a dedicated systems administrator just to have to plan to pull that stuff off. And it's a fairly unique so specialty. It's MySQL clustering specialty. Whereas in the Amazon, I can go give me a MySQL instance that's this size. Yes, I'd like to have a plus sequel [inaudible] [14:38] data centers \u2026. have it's done. Click the check box [and it is literally a checkbox] Just click, and you go I'd like some read replicas because it's going to be the Olympics or something and it's nice to scale. So click read replica times X, and they just spring magically in the [inaudible] no idea how it happens, where it goes, it just works. And it's that type of infrastructure on demand that really makes these overall dev ups pipelines for small companies an absolute reality. Of course, we know a little bit more about MySQL, and then, I applied it there. But you really don't need to know anything more than that. And you can select the number of backups, how far those snapshots will go back in time. All of that administrative paper, the maintenance, the upgrades; it's all managed by somebody else, and at a price point that is frankly just ridiculous. I mean someone like me who used to look at deploying physical servers in the data centers ten years ago. This is two minutes and you have something up and running. Whereas before it was two weeks you'd be lucky if Dell, or somebody actually shipped the physical computers into the pages in that sort of time frame. And then, you have a man on the ground wired all up. And it's just a completely different but thousands and thousands of dollars difference in terms of price. So, even if you're not going to Docker and you're kind of on the more server image by side. Like the way that the guys are looking at a Lucee gold image for AWS, and AWSAMI. It's a very big change to managing your own infrastructure. And if you take the next step which is containerization. And the reason why that's a little bit different is we don't have a server which is dedicated to a client; for smaller clients. We would have a cluster they call\u2026 I think I+ is currently called Cloud eight. It's almost a cloud nine, but not quite. So it's cloud eight. It's out there. It's got about four servers live across three data centers and when we do a deployment, the orchestration tools just choose where those containers will fit into that cluster whatever has the most space or is kind of the least used resource wise. Again, these are all decisions we don't have to make anymore. It's automated to a large degree. And for larger clients, they'll have a dedicated cluster. It's cool, and then you think about you're paying for the service by the minute. This is another thing that's also quite interesting. And so, we have staging environments which programmatically start up in the morning at 8:00 and then shut down at 8:00 p.m., and that's just automatic. You can override that and say no I'd like the staging cluster to stay up a little bit longer. But we can just cut 50 percent of your bill by automating that process because again, you don't really care. Pay is only going to take ten minutes to start the servers in another couple of minutes to deploy all the containers across them. But that's happening while I'm working the work, getting a cup of coffee, all the staging service are coming out, and I don't even know about it. I get a couple of messages come through on the slide channel saying everything went according to plan, or in the rare occasion, things didn't quite go according to plan. And you can sort of sort that out. So yeah, it makes life a lot easier especially for companies like Demon which are running a lot of different applications, supporting a lot of different applications that are quite varied. Normally, we think about dev ups pipelines as being very intimate affairs. The application works in a certain way, and to update it, you have to sacrifice a chicken in FTP, something in a place. There's a whole kind of ritual that you often go through with larger scale applications to make a successful deployment happen. And what we've managed to do with Docker environment is to effectively sandbox all of that kind of intimate stuff into a container which is standardized, and sits in a common universal format. Whether it's on your development environment, on the staging servers, or whether it's sitting in production. And that makes a very, very big difference and an impact the way in which we develop day to day. And I should since it's not just Lucee, this is other languages that we work with. They all work in the same way. So we don't have to\u2026 We might have to in some instances unfortunately manage a PHP solution. Quite a few of those that we look after. And it's a sign dev ups pipelines for that. So we make those changes obviously it's a slightly different environment for development of the actual rollout of the application. The way it's routed, managed, clustered is extremely similar. And so that means that you know, it gets a chance that every one of the development team, and starts to get a handle on that sisops process that was otherwise a kind of a mystical black card in the old days. That's why you had systems administrators, and those guys did really cool stuff. And effectively, this is encapsulating a lot of the work that they used to have to do into something that can be programmed. And so, leave them to do more interesting things like service development at top of was something we could move on to at some point in this talk. Michael: Yes, we will be talking about that in a few minutes. So this is amazing stuff, Geoff. Thanks for sharing all these secrets about ColdFusion dev ups using Docker containers. And we'll link in the episode I did with Patrick Quinn who's the product manager for Lucee. And we talked extensively about AWS in that episode so. Geoff: Yeah, they're doing great work. They're doing great work, that's nice. Michael: They are so, the other thing that occurs to me and maybe it was implicit in something you said is you know, I remember in the old days, you're always patching the server, the operating system, or putting a hot fix on ColdFusion. You don't have to do that anymore because you just download\u2026 You just tell it to use a newer version, pull a newer version in to the image. Geoff: Exactly right, and in fact, one of the things that\u2026 You look at patching is not just patching the CFML engine. It's also patching Tomcat, or patching the underlying operating system. All of those things are quite arduous. I mean if you're not used to patching the operating system for example that something can very easily get out of date, or Tomcat. Or with the amount of legacy apps that we see sort of thrashing around on something like Tomcat seven because people are just too terrified to kind of upgrade everything to the lighter version of tomcat. That all kind of vanishes in a Docker environment. You can test all of that locally in dev stage. You can have that running well in advance of having to do it before you go to deployment. So it's not like this throwing a switch and it's out there. But when you actually do the upgrade, you're right. It's really just a simple text change for about [murmuring] [24:55] half a dozen characters. Will be from Lucee, Lucee, the new version, and that will be it. And that\u2026 if you just used our own internal Lucee image, every time there's an official release from Lucee, we typically upgrade everything at that point. So we'll upgrade, there'll be an upgrade to the operating system up in JDK, Tomcat, and then Lucee on top. And sometimes, if there's a lengthy period of time between releases of Lucy we'll actually release an interim image which has just the operating system and Tomcat upgrades. What I mean is there are a lot of issues that might show themselves in a security scan like that wouldn't necessarily be relevant to a web app. If somebody is got command line access to your application, then it's probably a few other things that have gone wrong. If you have web application before you're worrying about that particular exploit so. But it is good because at least you know what the potential problems are. Whereas currently, most people just have a kind of willful blindness to what issues might potentially exist on the whole stack to get the little tiny; literally tiny layer, which represents the CFML engine on the top, and your own application which is obviously a very large vector for attack. The underlying operating system is generally not looked at hard enough perhaps. Michael: And not just the patching but how it's configured as well. Geoff: Yes, so configuration automated as well. So you make all those changes, you decide the sorts of things that you would like to have implemented and updated. And then, when you roll it out again, you've got that opportunity to say ah, it's working perfectly and if something goes wrong, instantly roll back to the previous configuration you had [inaudible] [27:24]. So, I think it's important. When you when you see the Docker image, it's like an appliance that's got all of your pieces sealed into it. It's not like you roll it out and then F.T.P. something into place. It's already built with all the fuel code in it and everything are running at start with. So you literally to shifting from your dev environment to stage environment to production environments a kind of a medically sealed version of your app at that moment in time, and you deploy it. And so it works really well, love it, cool. But I have to admit there is a barrier to action to get into Docker, and you have to have an application that doesn't write files locally. There are a few common issues with converting to Docker. Writing files locally is an important one because imagine if you write files locally, and then the image is destroyed, it's lost those files, and so you need to be able to maintain state of your application. If you do write file that size and image or something. You know C.D.N. or some kind of shared media resource, little things like that. Once you get over that sort of hurdle. Getting into a dev ups pipeline, we do this for people if we were let's say we were commissioned to help people establish a CFML dev ups pipeline [we do this for other languages too]. But essentially, we normally have an engagement about five days to implement something. So, that gives you a base kind of core pipeline which you can work straight away and then you probably need a little bit longer to get the team into the kind of mental mindset to actually use it because you have to develop in Docker, build in Docker, deploy in Docker. And when you get past that you know, that the issue is that the sort of advantages that are described are immediately available to you. But yeah, I mean that's something that we in a bit of a plug for doing [inaudible] [29:26] that's something that we do is to help people move into that particular area. Michael: Sounds like a really useful thing there. So, you mentioned servulous earlier on, tell us a little bit about that. Michael: Oh, this was this was a rad. Geoff: No, no something\u2026 I have this on my presentation as well. I'm sure others have because it's a great image. Geoff: There's some guy, he runs a startup [crosstalk] I can't remember. But anyway, so the lasagna thing is this NTA the web TA, your app TA, your database TA; that type of thing. And then you move to a ravioli based stay with me. There are ravioli based server architecture where everything's nice little packets of pasta with goodness inside and these are the kind of micro services architecture, or Docker like architecture. I mean so everything is a nice dish. The dish is made up of lots of little packets of things working together, okay. So, servulous, is the next step beyond that where rather than having to have a micro service that you run and deploy, you would have something else that you either invoke as a service. So in other words, this is strictly speaking not servulous development. But we look at it in a similar way. If you went to Amazon and you said, \"I would like to have\u2026 I don't know the classic example of what we're working on run the moment. I want to do video transcoding. So we have some very large installations. Big university client here were effectively run a YouTube for the entire university. They had some problems with the Patriot Act, and a bunch of other things which mean that things like YouTube, or other external services that run outside of Australia are not possible for them. So they made a decision several years ago to build their own media services platform and we were the company that put together for them. And initially, we had a whole cluster of servers running FFMP, and doing transcoding. So we're running the servers, we're putting cluster out there, we're sending out you know you got a message queue that tells the cluster to pick up a new video of a transcoding a Transcode server. But you're running and maintaining a [inaudible] [31:53] structure. When moving that to Amazon now where Amazon have the transcoding service. You don't even know what it does. Pop the file into somewhere in S3, it picks that up, transcodes it, and the new file appears somewhere else. So then a whole process effectively. You're not managing a server or doing anything you're just calling upon the service that runs and processes that. And you can take that extension slightly further where you can now write applications where it just performs a function, does a function, and that function might be in the case of what we do. It might be to see that a new video has arrived for transcoding to update a let's say dashboard or content management interface if you like to say yup this video is here, register the video, pick up some metadata about the video, and then move the video file into an area to be transcoded. And then when the transcoding finishes, we have another function which just wakes up and goes, \"Hello, video is finished, everything seemed to go okay.\" I will now update the database to say this video is available, this is where it is, you can continue. And so in that particular environment, there are several different components. One is a Lucee application (interestingly enough) that runs all of the web interphases, provides the opportunity for a user to interact with all of that interesting infrastructure sitting behind the scenes. Michael: Wow! That's a lot of data. Is it really expensive to use it and I'm an Amazon transcoding? Geoff: It's not I mean compared to running\u2026 You mentioned you've got a server farm that you're running permanently. I mean you can predict to a certain degree the amount of traffic, or volume you're likely to experience. So during exam time, or during assessment time, many of the courses at the university now accept a video submission as an assessable kind of item. And so, you have to have the ability to be able to receive that video as part of that student's assessment criteria and then process it so you know that everybody waits until the very last second to submit their particular assessment. And so, you end up with a kind of mad rush it's a midnight where everything has to be uploaded and processed. Whereas the rest of term time might be a very small trickle for that particular subject area for example. So for a certain degree, you can predict the amount of scalability that you might require. We tend to just have it all sit in a queue, and if the queue gets too big, we'll automatically scale the servers. But in the case of the Amazon infrastructure you only pay for what you use. So, if there's a huge burst, it'll suddenly do this kind of massive parallel transcoding of all the video, and then it'll just go back to nothing. And so you're relying upon I guess the overall kind of resource consumption of that Amazon data center which is typically much larger than our own set of services that we have in place. I mean it can be some bottlenecks, but as they say, everything we have queues and then gets processed. At Amazon, during\u2026 I mean we're in the middle of that rollout. So it looks to us as though Amazon's much more efficient at managing the scaling and we are on the takes us time to respond to the queue of this. So, we're really impressed. I mean that's something that we've done for a couple of clients already. So we did that for the Olympics. We do all the public facing in the structure of the strain Olympic team. We moved them out of Bright Cove and pushed them into Amazon. We've got university here which is all around FFM exam which we're currently moving its massive installation. And look at a couple of other clients in the pipeline to make that video conversion because it is much less expensive if you only use\u2026 If you imagine like having 16 terabytes of data. Just pull that number out there is a kind of example. If you had to run that on your own network storage, that's expensive. And if suddenly you need to add more disks to that right away, that becomes very expensive. Whereas three in Amazon is highly curable very, very high variability, and is comparatively inexpensive. If you've got all of your assets on the five gigabytes, it's very inexpensive so. It's compelling I mean we spent all these years trying to get away from vendor lock in. So, getting everything to Linux, and trying to containerized everything so that we wouldn't have to be dependent on any particular vendor. But Amazon offers such great options that it's difficult not to\u2026 just use this server, it's really nice. But if you want to move to somewhere else, that service wouldn't exist. You have to replace them so it's a certain degree there's a bit of lock in, but it's very inexpensive compared to doing it on your own. Geoff: Even here in Australia, we're only tiny, and we have like\u2026 I think the last but thousands of people attending this conference here in Sydney. I mean it is huge. And the other providers like as [inaudible] and digital ocean. And others are pretty good too, but they doesn't just have the breadth of services. I mean it is\u2026 You now when we look at it, we do a deployment, we pick up a bunch of PC2 service for a Docker environment. We don't even do main cash anymore, so we have an elastic cash installation that's an AWS service that spins up across multiple data centers. We can use red [inaudible] cached if we want to in that particular environment. We use the cloud search product now which is a kind of\u2026 What is? I think that\u2026 I think it is still losing based. I can't remember, but it's a great service. We index everything through that service and have the search results come back. There are heaps of things that we do now that is just part of our standard deployments. It's so easy and so, we can suddenly have a client this extremely high end, high availability, absolutely top grade infrastructure solution. And it doesn't cost us that huge amount of consulting effort that it used in the old days to actually just get it running. Let alone managing and supporting that infrastructure the moment it's deployed. So, yeah it's\u2026 It has really revolutionized the way in which we can address applications even the simplest applications used to think about. We've got a couple of startups we're involved with here in Australia. And you think about\u2026 you shouldn't be thinking about scalability initially. It's hard to because you're trying desperately on a kind of shoestring budget to get things done. And so, trying to do all this extra work to make it hugely scalable. It's very often not part of people's thinking. It's like when we get the scale, we'll now have to reinvest and get rid of that technical debt and scale. But for us, even that wouldn't have to worry about that. I mean our standard deployment even for a simple solution is scalable. And so, it gives us this kind of again, the confidence been of what okay. We can do that, we do this, do this, and it's automatically. We have to go out of our way to make it not scalable. Yeah, I mean everything we're using is something that is automatically\u2026 something that can be deployed in the cluster. And so we have to make a conscious decision to use something that won't be, and sometimes, you have to. There are some services and things you example we run unable to survive in the box of books just a start up that we're involved with here in Australia selling e-books to secondary schools. And we have an Adobe contents server that runs all of the digital rights management, and so that's a single point of failure if you like. But we don't. I mean it's pretty robust, I could be wrong. But it's not something we'll look to cluster until such time as we have a huge amount of volume that might require it. But everything else is fully distributed, high availability, all clustered. And we're in that kind of startup phase. So, [inaudible] is really, really good. Michael: So, I am guessing you've migrated a lot of legacy Adobe Cold Fusion apps to Lucee CFML over the years. Geoff: Yes, that would be true. I mean I think the vast majority of our stuff now is Lucee based. We do have\u2026 we still do have a number of Adobe ColdFusion clients. They tend to be in a situation where it's less expensive for them to just keep upgrading, or to not upgrade at all which is even worse. But to keep upgrading and to make a migration. And so, to make a migration is not just a case of getting the code to run on Lucee. I mean that is actually probably the easier path depending on this type of application that we're running. There's a lot more involved, so whoever's involved in that infrastructure, the systems administrators. Everybody in that environment needs to be comfortable with the move to the newer version of Tomcat running Lucee. What might be the problems and complications? Better the devil you know than the devil you don't; that type of the top of the issue. But the actual code changes tend to be relatively minor depending on the sort of things you do. So for example: if you're very heavy P.D.F. uses easy P.D.F. forms the like Lucee doesn't have a huge amount of coverage in that particular area of CFML. And so, you might need to look at wiring in some sort of an external service, or potentially rewriting those particular areas of your application to adjust CF reporting modular; that's a big part of what you do. If you have all of the U.I. elements; CF windows, CF crazy crack smoking menu, things like that. If you are unfortunately in a situation where you're bound up in those sorts of tasks which we don't support. So as a principle, we don't support the U.I. elements in Lucee. Then your migration might be a little bit harder than normal. But generally speaking, it's pretty straightforward. I mean the coverage for CFML compatibility is very high. It's a core priority for us, and if we are seeing compatibilities are treated\u2026 Someone will say things like C.F. window, etcetera. Then we treat those with a high degree of priority. And yeah, I mean we have obviously most of our apps; that's not true. Let's say many of our apps have migrated from Adobe ColdFusion. But we are still building lots of new apps; lots of greenfield projects that we stop, that are started with Lucee. We're not just in that kind of maintaining legacy mode, and reducing licenses. We actually use the product because we find it useful as a tool welding new stuff. Michael: That's great to hear that you create lots of new ColdFusion apps. So, that's a good story to hear. Geoff: [Crosstalk] [45:29] known to many people. I mean it used to be a\u2026 You know there's a kind of a\u2026 I hesitate to say a sort of a stench attached to CFML in recent times. This old crack smoking language that no one would use. Whereas there is obviously a very modern language which has many if not all of the features of other languages. And also a kind of a unique approach which I think is very well suited to web app development as opposed to development in general. And this may be a bit of you know, people have come off the high horse of it has to be language purists. Certainly, in terms of this paying for solutions. These days, we tend to not get the question what's the technology platform. If we're asked what the technology platform is, we actually literally say it's Linux running Tomcat with an application framework on top. We don't even get to the point of mentioning the specific language, or framework that is being deployed. From the client's point of view, it's more of; okay, after maintaining our infrastructure, what would be managing and it's Linux, Tomcats; that's really what they are managing available. The application we're managing at our level. And they're more interested in the solution, and the result than they are in the on line technology. Whereas ten years ago, I guess the height of the dot com boom, the top people were very you know, we're going all dot net, we're going all Java, or they were very focused on specific language decisions, and these days, that seems to be less important. And while that continues to be the case, we will continue to enjoy using Lucee, but in those areas where it's not appropriate. So for example: writing a servulous function to process, video transcoding. Often Amazon queue, we will choose a language which is more specifically suited to that particular environment. And I know many shops would just build a CFC in ColdFusion and cobble something together on those side of that kind of monolithic server that they've got in place. But when you break that down and start to look at a more micro services architecture, you're really just saying that well this piece here, put that in a little container or a little servulous function and that will do its job really well. And we'll choose a language specifically for doing that job really well. And that's generally the way we like to look at it rather than seeing it as kind of the one where they say you got a hammer and you use it to bang every\u2026 everything or whatever it is. It's a tool that works extremely well for web app development. And certainly for us, we're comfortable familiar with it still continues to be very successful for us. And while that is true, we will continue to use it. I mean I know things like you know, interesting enough, when we were looking again this year earlier in the year. Ruby, what's happened to Ruby on Rails for God's sake? It's got a stench-like\u2026 other languages are there. Isn't it strange? I mean from being the darling of the Web development community to now being your independency Helen, and Ruby bundles are a disaster of this. I mean every language has its own particular challenges, and I've seen beautiful things written in Ruby, and not so beautiful things. But it is just this kind of flavor of the month business, isn't it? I mean I don't know what will be the next flavor of the month probably is it node, nodes flavor of the month. I wonder how long that will last. But again you've got to use the tools that work for you. It's more about the solution than anything else and the maintainability of it. Michael: So, tell us about Web DU. That was a conference down in Australia. Yes, great conference. Geoff: [Crosstalk] close to my heart for [inaudible] [50:14] So, where do you is something in the dotcom crash back in kind of 2002, 2003 sort of time frame. We used to go in the boom. We used to send people overseas to conferences and I was fortunate enough to speak at the very first the layer conference in Boston. We're part of that whole sort of vibe around the community, and sharing your technology, and your knowledge that topic. And when the crash came, that became very difficult. You know people were from\u2026 It was literally a boom burst sort of cycle where people are driving a Ferrari one day and the next day, they're on the street. Everything's gone; literally everything, and it was a much tougher time. And so, one of things we felt would be good if we can take the team to a conference overseas, that we would run our own conference locally. And as it so happens, Sydney seems to be a fairly popular destination for people and it was surprisingly easy for us to encourage really top notch speakers to come all the way out to Sydney on a kind of holiday which they would incorporate the conference. And so we did everything in our power to sort of treat speakers like rock stars that they are, and it's a kind of build a conference around that sort of notion of community. And it was never a kind of a for profit thing. It was always [sometimes made quite a bit of money]. But we nearly always spent it all. So, we would have outrageous parties, and it was a bit ridiculous at times. But we had a huge amount of fun and I think certainly everybody that I talked to who reminisces about where do you\u2026 It was a different time, and it was a different sort of conference. It really was about having a fantastic exchange of knowledge, information, networking, and generally a kind of a good time. In a period of time that was less wonderful in reality for people. You know when you have to go back to the office and fight your way through that crash time. So that was the kind of vision of it. It ran for ten years, and didn't kind of paper out really we had two young children at the time too, and just newborn. We just couldn't continue. So, it's a huge amount of effort to run a conference like that behind the scenes is a lot of\u2026 It's a huge amount of\u2026 But if you've got 20, 30 speakers, you go to chase them all up, provision them with everything they've got, then you get all the sponsors. It's a really\u2026 to do well at conference it takes a lot of time. Michael: It's a full time job. I don't know. This to a destination that is less, less wonderful, or less kind of fantasyland. So anyway, that worked well for us, I still travel to conferences overseas on occasion as recently as C.F. objective in Washington. Washington D.C. I should say it's obviously different from Washington State. We don't think of Washington State out here. We literally\u2026 Washington"} +{"id":"RedPajamaC4.0009","text":"BibleForums Christian Message Board > Christ Life > Bible Chat > What if a Christian wants a pre-nup contract signed before marraige? View Full Version : What if a Christian wants a pre-nup contract signed before marraige? Here's the situation..he's a widower, one child is half way through college, the other only 12 yrs old, owns his home, has a large pension from one jobhe worked at for 29 yrs, has started a new career, is contemplating his own businesin the near future as he is only 53 yrs old.He is an only child, will inherit a sizeable estate when his father passes away who is also a widower and in his late 80's. She is 51 yrs., her children are raised, her husband is remarried, left her with the short end of the stick as in no assetsor retirement , she owns her own mobilehome , car, and has a modest income but pretty much lived pay check to pay check while raising her own children absent the former husbands financial assistance..was the stay at home parent before this..so there will be no time for her to ever actually establish the earning potential her fiance has..or set up a retirement plan that will cover her needs absent working for as long as possible. Her fiance wants them to sign and enter into a prenuptual agreement where the bulk of the assets, home and grandfather to the boys estate is put under protection and seperation for the son's in the event he were to die..so in effect she is supposed to sell of any of her belongings, her home. etc..when they get married, move in with him, keep working and inthe event he dies..she is on her own..with a very small allowance set aside to help her get back on her feet again.. And this is supposed to stand from now until the youngest child turns 24 yrs old...or 12 yrs from now..that and he will only match and contribute the amount she earns as \"joint assets\", the rest set aside for his sons.but they will stay in his home which she will never be a co-owner of but will be expected to contribute to the upkeep of as \"the wife\".. I was a bit shocked to hear this..but both profess to be Christians and he is arguing his biblical responsibilites to his children justify this request and refuses to get married to anyone who will not abide by these terms..to \"protect his children\". Is he right?..something seems very wrong with this \"conditional\" approach to marraige where it is supposed to be two Christians entering a biblical marraige where there should be no divorce \"down the road\" or anticipating failure and preparing with a pre-emptive strike here towards ones spouse. My gut instinct is that a pre-nup means you don't trust the person you're about to marry, which leads me to wonder why you are marrying them. Is your friend is concerned about his own assets, or the assets he will inherit from his father? If it's his own assets my suggestion is that he spends a lot of time thinking and praying about whether marriage is the right thing for him to do. If it's his father's assets a lot of thought and prayer is still advisable, but on a practical level his father can leave assets to his son (i.e. the father's grandson) directly and cut your friend out of the equation completely. Ultimately it boils down to that one phrase, \"til death do us part\". If your friend thinks his wife-to-be isn't going to honour that phrase, or isn't willing to take the chance, a marriage may not be advisable. Thank you for the response Tango. At face value, I suppose it makes some sense regarding a fathers desire to make sure his son's are secure and to give that consideration. My friend was \"left\" by a husband who had been a minister when they married, about 6 yrs into his marraige, he had a crisis of sorts in his faith, left the ministry , claimed he no longer believed in God..had had an affair and got one of the members of the church pregnant,and she was married at the time herself..so they went off together..and he has basically fallen off the face of the earth since then..apparently has left a trail of broken marraiges and children in his wake. My friend on the other hand raised their three children, one was hit by a car when a teenager , suffered some horrendous injuries and by the Grace of God has recovered and thrived..but the medical care, rehab and everying was a huge expense.This gal is so strong in her faith, and so humble,salt of the earth..not driven by materialistic things whatsoever..she remained unmarried to focus all of her attention on her kids, feeling this was the priority for that season of her life. I can't say one thing bad about her fiance..he too was a very remarkable parent, his children are lovely..he is well respected and liked as is my friend..they appear to be what looks like a very well suited and compatible match. They also saught council about marraige from the Pastor regarding this period of their life having been single so long..and for what ever reason, this fella ommited his intentions to require a prenup in the counseling sessions, it just arrived out of nowhere while they were approaching making the plans to set the date several sessions into the counseling. Apparently the Pastors position is that there is nothing wrong with it.. That sounds odd..for so many reasons to me..but again I am not one who dwells on these issues beyond a point, never had the luxury as my circumstances have not been so different from my friends in respect to simply not making money a master..and so little around to even worry about beyond a point..pretty much resting in God's sufficiency for the future where I can not solve such matters beyond a point. It would seem reasonable to provide legal diligence to the welfare of living children in respect to setting up a will to provide for their welfare in the event of a death..but a prenup? Ths woman will be in effect the step mom..and she adores this child and will be an integral part of his life between now when he is 12 yrs old and 24 yrs old. if they marry..nor do I or my friend see anythig wrong about the actual arrangement of the income in respect to approaching this as if they were just starting out and had to reach some common ground about becoming one in financial matters.. It's the issue of this mans \"worries\" over the divorce issue..and the clause his children do not suffer if he 'fails' at his marraige..being the priority and not his concern if \"his wife\" suffers in the event this happens..that is a huge red flag to me.. But a \"pre-nup\" aggreement from my standpoint is putting a contract of a man above and beyond the marital contract of a biblical marraige..it's providing for \"conditions\" of failure..not commitments to success IMHO.. It does not sit well with me..and I am concerned that this is also a sign of how \"big\" this man's step of faith is with much when he approaches the sanctity of the marraige bond. That it would become a \"dagger\" to encourage him to not undertake the challanges of his commitments in respect to the gravity of them in the event were they to reach an impass and his perceptions of headship relied upon \"money\" as his assurance he did not need to reevaluate if he was wrong over some issue..that this could become a weapon, rather than remain a tool. In otherwords their \"onenness\" would not be in balance or actually \"real\" in terms of the vested commitment..from his end of it. Why I was shocked, that he Pastor \"trivialized this\" scripturally. First time I ever heard of this or was personally vested in regard to the long term implications of anothers welfare in respect to participating in this practice. Hope others can offer some insights into this and if they have anything to contribute from a Pastor's perspective. i dont necessarily see it as we not trusting this person. I think it is wise. We may trust them when we marry them, but down the road somethings might happen to make them lose trust. Your friend loves his money too much....so much, that it is getting in the way of his view of a biblical marriage. If he believes in 'til death do us part' (her too)...this should never be an option. If they feel a pre-nup is necessary, then the seed of doubt in their marriage has already been planted. Marriage is the everlasting bond between a man and woman. Therefore, unless they know in their hearts that they are meant to be together forever, they have no business getting married, IMHO. If you are afraid of a break-up perhaps you aren't ready to commit \"til death do us part\" I think you hit the nail on the head Tango with what disturbs me..that and this one other thing.. The contingency of this mans concerns regarding his \"fidelity\" issues with his behavior being the one where he is concerned his kids do not suffer just \"throws me for a loop\"..because it ommited responsibility for his wife for life...if \"he is in the wrong\". My friendship with the gentleman is simply not on the same level as with the prospective bride..her standing is impeccable before all her know her and have knowledge of her circumstances. While I can not vouch for his character beyond the limited view I have of it..I found nothing objectionable and again, very likable and respectable..I admire much about his walk as a Christian and up until this point nothing \"concerning\" regarding his beliefs in so much as we have had many discussions. She is struggling with the issue of entering into this contract as a \"cross your fingers and hope for the best oath\" before men that superceeds what she is already prepared to abide by before God entering to covenent with God..and I think she has a valid concern.. She's not interested in \"his money\"..or taking him for a ride..and understands the implications of his concerns for the younger child and both boys..while they are basically dependent upon their father until they reach emancipation in regard to making the transition into being financially independent..the rest \"boggles her\".. It's not a community property state or are their any laws in this state where he would have to exercise due caution to keep the state out of his affairs either.. I did go and do some research about this..and there is no biblical sanction against it..and at one time marraige contracts were practiced..so it seems to fall under the condition, \"while all things are permissable, not all things are profitable to the Glory of God..\" I guess my take is simply this..the pre-nup may be \"profitable\" to the welfare of the kids and protection of the money..it certainly is not profitable to the Glory of God when prioritizing contingencies for a divorce that one is going to enter into a covenent before God ,that is never going to take place,she will be his wife until her death or his in these circumstances. I am very dissapointed with the Pastor for not appoaching this more proactively on behalf of setting aside the pre nuptial agreement and simply using other ways to make assurances for the boys welfare as in a living trust. I am also surprised the Pastor did not \"pick up\" that this man brought this forward at the late time he did and well after she had become very emotionally committed to him..between the engagement and setting the marraige date..and AFTER several counseling sessions..that is certainly a red flag of sorts if nothing else about his ability to anticipate and put her needs before his. So true and so sad because it is Tango. I look back on all the years of struggling with four of my own, a single mom..and so many challanges the \"average bear\" never faces along with the normal ones of life. It's not much different now because I am on disability and it's a very modest income indeed..but I don't mind..I am simply grateful I have \"just enough\"..and often a little to spare when kids show up looking for \"vittles\". if anything , at 51 yrs old, I look around and chuckle all the time some of the things laying around have longer life expectencies than I probably do.. I have to honestly say I never felt more contentment and peace by simply relying on the Lord and taking things day to day..that the free things in life were often the most priceless..God has been so kind and generous in so many ways and my kids wanted for 'nothing'...just can't imagine sitting around worrying about all my \"stuff\" after I'm gone and where it will land or whose hands it will land in. I haven't read any replies yet, so I don't know how others feel. But I feel that it is wrong. I would think that if you agree to marry someone, you do so KNOWING that the Lord put the whole thing together. In essence, I think a pre-nup shows a lack of trust in the Lord, plain and simple. It saddens me that this man could die and his wife would not receive anything (if I read the post right), and he is okay with that. I'm all for protecting your children and making sure that they will be taken care of, but the Word tells us that we are to put our spouses above all except the Lord. I hope this guy spends some serious time in prayer over this. It sounded in the original post that a good deal of the hesitance is not down to the threat of divorce, but of the wife favouring her natural children over the husband's son in the event of the husband's death. To me it still betrays this fellow's lack of trust in his wife-to-be, and her devotion to raising his son as one of her own. In this case it doesn't sound like anybody has divorce on the brain, but a prenuptial agreement always means somebody has an angle they want to play. Both of you folks hit the nail on the head with this fellas concerns for \"his children\" being a huge priority..nor would I call that wrong...and perhaps prudent to set aside a mechanism to provide for them..many do.. In the event \"he\" somehow down the road fouls this up..thatthey don't suffer financially as a result of him ruininghis marraige and somehow \"forgetting\" that if he does this, its HIS WIFE, that wil be the one harmed here first and foremost.. If she commits her life to him for 15 yrs..and on the 15th year, he \"goes nuts\" and commits adultery or finds someoen else more to his suiting..he can legally emacipate his money from the divorce..and technichally, all his wife would get would be what she brought into the marraige and shown the door.. I believe in the eventof his death there would be a modest life insurance policy inforce for her but the rest would roll over to his son's andor their children at the time if I understand this correctly. Now if this were a first marraige, both starting out from scratch..that would not fly..obviously, but they are in their fifties..so they each have their own \"assets\" It's screwy to say the least..15 yrs from now she would be 66 yrs old..while boththe boys would be 39 yrs old and 27 yrs old, assuming they are responsible young adults, married or set up on their own, healthy and situated in life.. Dad sees a contingency that at 67 yrs old he decides he wants a new spring bride..becasue it \"happenes\"..now he walks away and his wife is left back in 2008 with exactly what she had in 2008 to live on for the balance of her life and has to go out and strt over at 66 yrs old.. I personally find this obnoxious and just absolutely unacceptable for a Pastor to ignore this \"reality\" being incorporated into a \"possibility\" and say that there isno danger or scriptural basis to challange this man's reasons for wanting a pre-nup. If nothing else \"if\" I had been the Pastor, I would have challanged this and said..\"well\".. Marraige is not a 50:50 proposition..its a 200% one, both bring 100% to it! If I were the woman I would not do it. Clearly this man loves his material possessions and money more than he does the idea of spending the rest of his life with someone he loves. Remember what Jesus said about rich men entering the kingdom of heaven, it is easier for a camel to pass through the eye of a needle. We are told that we are possessed by our possessions and this man clearly is. I do not want to seem like I am judging him because we all fall short, but he is clearly living in the flesh. Would the pastor who is counseling then happen to be the pastor of a church that the man gives some significant amount of $ to? Honestly, my observation is that this gentleman is very faithful and generous in regard to his wealth in respect to making donnations towards ministries..he gives because he can but I have no clue what his spirit about giving would be if he had been one of the ones who were not so blessed. But then again,so is this sister, and I have often seen her give sacrificially..and part with her only \"dollar\"..nor ever hesitate and always joyfully when she could..it troubled her deeply when she could not do more. Both things I know this Pastor has seen and is aware of...I can't imagine what he was thinking...which is why I feel led to approach him on this and try to determine why he felt led to do this to see if I have missed something. In effect he has put her in a very untenable situation for approaching this man and attempting to present her concerns without appearing to be \"guilty\" of some wrongful motive for doing so..because in his \"mind\" he is in the right and has the Pastors approval..hence she could \"only \" be wrong if she failed to abide by this council. That's pretty lousey IMHO..and a great disservice to actually ministering to someone who may have responded differently had it not been reinforced he was on the wrong page to begin with for much. It calls this Pastors behavior into account as well for promoting this and am not sure it should be disregarded here either...which I am also inclined to approach as such. It grieves me terribly. I'm wondering if this man is responding to some pressure from his family, specifically his father from whom a large inheritance will come. In the case that my father left me a sum of money with the desire that it be used to provide for his grandchildren only, I think it would be right for me to honor his wishes. Even if this is not what the father has expressed explicitly, I understand that sometimes wealthy families feel they have a responsibility to preserve that wealth for subsequent generations. In other words, you may not feel that an inheritance is \"your money\" to do with what you want or even feel is appropriate. In that case it would not be about keeping money away from your spouse in the event of a death or break-up, but more about fulfilling the wishes of your parents. Of course, this does not apply to any arrangements made with regard to his own pension, assets, etc. Even so, to make such an agreement, there would have to be some tiny seed of a concern that possibly this marraige could not work out. Whether you can trust some one wholy while still believing there is the slightest chance they could do something totally out of character that would lead to the end of the marraige, I don't know. But, I think that concern would be the place I would focus my energy first, before making any decisions about money. If preservation of the inheritance is the problem there are two points I'd note. And the far more practical notion that the groom-to-be's parents can always leave money into some kind of discretionary trust to look after him and then his biological children, or create a trust to look after the children and leave a lesser amount to him. well there is a lot here already so I probably cannot add anything to the conversation. But honestly, I can understand this mans position, however, as the woman in the relationship I would also be hurt and wonder if the man loves me at all. Because if he wants to marry her he should love her enough to want to make sure she is taken care of if anything happens to him. And on top of all that, it sounds to me like he questions his decision to marry her, which means he questions his love for her, or maybe he questions her love for him. Simply because we are talking about a poor woman marrying a wealthy man. But as others have said, there may be family pressure, and there are other ways around this concern. Trust funds are a great way to insure estate protections. And shoot, he could even give her a monthly allowance to do with what she wills, including save it. Ultimately, I think that this situation is doomed from the start unless he re-evaluates the situation. :hmm: Because I have a feeling that this is going to leave her with some feelings of resentment toward him, because she will always question his love and trust for her. I would address this particular aspect with your friend and tell him to consider this before he goes any further. And maybe just insure the care of his children, his estate and his fathers estate, and the care of her in his will instead of a prenup. I love these sorts of issues. Because we don't have to beat about the bush, we all already know the answer but just won't do it! God gives me so many gifts every day of my life. I have a roof over my head - but only 3 bedrooms for a family of 7 i cry out. I have more food than i can eat, 2 cars, clothes and money to spare - it's not enough! This man, like me, trusts wealth and money in the bank. Like me he'd have more faith if it could all be taken away. So where does that leave us in this cae? Satan the devil having a field day! My advise to your female friend would be to be the best christian she can be, and put marriage second. If this man wants money more than her, so be it. Tango is correct. It all comes down to who is your God? Just want to report I suggested both folks drop in here and \"lurk\" to read the responses.. This brother was convicted his position on the pre-nup was wrong and has departed from it 'completely'..and is telling grampa to set up the grandkids and the church with the proceeds from his estate. That God has already blessed him more than he deserves to have provided my friend as a partner for the balance of his life..\"if\" she would still have him. She said ,yes..and furthermore both are going to commit and pursue doing a mission trip in China with what ever else God has blessed with them with for their \"honeymoon\". It would break my heart if the man I wanted to marry wanted me to sign such an agreement. And why is she so little provided for in case there is a divorce?! If she loves him and she want to sign it, it should be re-written to better provide for her. No one is looking after her best interests. She should not sign it the way it stands. I guess I can be thankful I did not marry a rich man. If I were dating again, it would be something that I would have thought about, that is, whether to have a prenump or not. Or perhaps he was too embarassed to bring it up before and finally was forced to as he saw the wedding date approaching. Unless it's because someone planted the seed in him recently. As one can see by your lady friend, she married a pastor and still got divorced, so there are no guarantees. I have nothing to back me up except the practical side of me, and I'm thinking the man is doing a wise thing of have the agreement; however, I think they need to have a better discussion on what the outcome would be for her. Understandably, she should not have 1\/2 of his assets or of his inheritance, but it needs to make sense. Despite the advice of my attorney, I could not in good conscience use a pre-nuptual agreement. The vow is .............\"till death do you part.\" If I took the vow \"till death,\" I intend to honor it. As to distribution at ones death; a will, not a pre-nup, handles that matter. If one enters into marriage with an escape clause, they are not really being honest when they make the vow \"till death do you part.\" I am the one who stands to lose financially. My wife brought nothing but debt into the marriage and I brought in substantial cash, real-estate, and business holdings. All of which were debt free. I guess the question in my mind was do I do it God's way, or Man's way. My worldly goods were accumulated by doing It God's way so I will continue to do it His way. As a pastor I deal with this question almost on a weekly basis. It is a complex issue that depends on numerous factors ranging from net worth of the parties, financial stability, off shore ownerships, real estate etc etc etc. In the end, there is a place for a prenup and there are places where it is just a tool to control. what I have found that works best for me is to seek out legal counsel. Use a Christian lawyer who understands family law. Saying it is a conditional approach to marriage is some what true but often times not the case when one spouse has invested years and all of thier wealth in a business which needs protection from both ends. In essence, you are saying that you should enter into marriage planning for its failure? With all respect, I think that in this case you are applying man's wisdom to a situation. Man's wisdom in this situation does not mesh with God's wisdom. God ordained Marriage to be a covenant. Our Lord and Saviour Himself said that the covenant was only broken because of hardness of of Heart. I am also an ordained pastor and do counsel. I could never tell someone God said this, but due to the norms of society today you shold do things man's way instead of His way. If a marriage is easy to get out of, people will take the easy road out. I do not see how you could give the marriage vow\"till death do you part,\" knowing that you had counseled the couple to enter into a pre-nuptual agreement on how they would break the vow if they so decided to do so at a latter date. When I counsel, and when I was counseled, I was taught and now teach that marriage is a covenant. It was ordained by God. It is not to be broken. When I went to counseling for my marriage, the counselor asked us if we had or intended to have a pre-nuptual agreement. We said no. He said \"Good, if you had I would not mary you.\" From a pastoral standpoint, I can not see how one could take any other position. Man's wisdom, God's wisdom; which do we choose to follow? Man's way, God's way; which way do we order our lives? Marriage is tough, people should be taught to endure in the marriage. Vows are taken in the sight of God to be kept, not broken. Why make a provision to break a vow that will be taken before God, before the vow is even made? Tell this guy to try cramming himself through the eye of a needle cos he has about as much chance of entering heaven if he lives the rest of his life as he is demonstrating here. Who honestly care about money next to the granduer of God? Money is just something we have that we use to exchange for goods. This man needs to wake up to reality and start living for Jesus and not for his attachment to his monetary desires. I understand that we and Christians should plan ahead as Paul did in his ministry. But extending such planning to counteracting God's sovereignty in the institution of marriage is in essence wilfully sinning. He may have any way of justifying himself in this but when it comes down to it he isnt thinking of his future wife and isnt thinking of God's control. He should be praying for God to bless his marriage rather than writing up fence laws with the expectation of a failure. It disgusts me. In many ways I can understand how this person feels. He wants to protect his children from the possibility of someone trying to claim what is rightfully theirs. On the other hand the lady sounds like she did come up with the short end in her previous marriage. This was wrong for her ex not to make a better provision for her retirement for her. If this gentleman has the funds it sounds like he does then maybe he could buy her a small but nicely furnished house or condo in a good neighborhood. This way she would not have to be put out on the street and would have the safety of her own place awaiting her...they could lease it out for now. And if he has this kind of financial backing then perhaps he would hire someone to come in and clean the family home once or twice a month...making sure the son't don't become lazy and self centered. She shoul not be expected to contribute to the upkeep of the family home since whe does not get it or anything inside of it...here again, perhaps it would be better to sell the home and buy a home together that will go entirely to her if anything happens to him. Wheather she would be equitably compensated would have to be determined by a lawyer...He should want to be sure she is WELL taken care of and left without any fears, worries or debts. Once again she needs to be able to put her thoughts and needs into this agreement so she is taken care of and not left out financially. I agree that you would expect practicing Christians to get along. Plan for the marriage to last until they are separated by death. This man has worked hard to have what he does and in these financial times, trying to put two boys through college, etc. So can you honestly blame him for being concerned about loosing everything he has if she is not the nice Christian person that has been described. helpmate, who needs to be important to him also....a happy balance is required in handleling this situation. Both now and in the future. We can justify almost anything. There are \"good reasons\" to do all sorts of things that are against the wisdom of God. Read my post carefully. You will notice that is not what I say. I never would encourage people to breal their vows. I did read what you said. With all respect, you are counseling with the provision for divorce. If two are entering covenant, there will be no divorce. Are they entering a God ordained covenant, or merely a \"civil union?\" I council covenant. A blood covenant to be more precise. Ther is no provision counciled for it to be broken. It is a life long covenant. Please tell me how you see a prenup and pleae tell me what expereince you have in such matters as it pertaikns not as a licence to \"divorce\" but as a form of protection for each spouse in the event of litigation from third parties? What specific litigation from third parties are you referring? I assume that you are speaking of children. A will, not a pre-nup is the best legal means to cover that. No that's not what I am referring to. Mr A wants to marry Ms B to become MR and MRS AB. Mr A is a mutlinational enterpreneur worth $X millions. Ms B net worth is $15,000 and real estate. Mr A asks for a prenup. Ms B asks why? Mr A says because in the event of a bankrupcy the $15,000 plus the home Ms B brings into the marriage is protected from the courts because of the prenup. (vice versa is true also.). Mr A and Ms B become Mr and Mrs AB. Mr AB continues to be successful when 10 yrs later one of his products malfunctions and kills someone. He goes bankrupt because no one will buy his product any longer and looses everyting in the ensuing litigation. They go after everything except becvause of the prenup they cannot touch Mrs AB $15,000 and her home that she brought into the marriage. Mr and Mrs AB live happily ever after. I think the point has been missed that pre-nups can protect family disputes from happening if both parties perish. For example kids from one side can take all the money if they play their cards right. If there was a car crash, and one parent died, and then the other parent died later - the money would go to the second parent to die, and then to their kids. The pre-nup takes care of that. MR and and Mrs AB are married. From God's standpoint, what is his is hers and hers his. That would include bad debt if that were to happen. I understand and respect what you stated in another message about marriage being a blood covenant. What I was looking at was the fact that we have no idea what kind of people are involved in this pre-martial agreement. Are they born again believers who understand \"blood covenant\" marriage? Are they people who just believe their is a God in heaven? Etc... I was assuming that they were not born again or at least maybe he is not, because of his attitude with the pre-martial agreement and not wanting to give the bride to be much of anything. I know we are suppose to believe that God will provide for our every need...but I have lived through seeing my father taken for over fourty thousand dollars by a very wicked women after the death of my mother. At sixty-one I have seen a lot in this old world and I guess I believe that we have to look out for ourselves and use the wisdom God put's inside of us to the best ability we have. Honestly, I have some pretty strong feelings about this. .. I've not read the responses to this string nor do I believe that I should. There is so very much to devide Christians that I try not to find anything else to toss into the mix but for a Christian to even consider a prenuptial agreement just tosses reams of uncertainty into the mix. I mean, is God or is He not? I really did not misstate the question and I do mean to ask, \"Is God?\" Because if He is why would we tempt Him this way? Wonderful! I'm so glad that this situation has been resolved in God's way, not man's way. :hug: Thank you for sharing this news. In God's eyes, the two become one. Why not let the two become one completely? When you marry someone, you give them your all and you receive their all. You do not hold back from one another. The good is taken with the bad. What if? If one party is a christian and the other not, the marriage should not happen anyway. The marriage is against the council of God. God did not instruct man to enter marriage having Already planned his escape clause. He instructed the two to become one flesh until the death of one of the partners. God's wisdom on the matter is straightforward. Man's wisdom simply is not at harmony with His wisdom. In God's eyes, the two become one. Why not let the two become one completely? When you marry someone, you give them your all and you receive their all. But you do not give your kids all, to their kids (or other relatives). When people marry with previous children, its more complicated than do you trust each other. Even if both parties are truly pious widows, both fine God-fearing individuals with nothing but love and trust for each other, greedy in-laws can still steal your children's financial security. Its different with kids, because if you take the risk of opening your finances to somebody for the sake of love, than is your risk to take. Its a different matter to risk another innocent party's (your kids) financial future for the sake of your personal life, when that innocent party did not make the choice to do that. Will your partner become someone else after you marry - maybe runs around on you or gets a divorce despite your wishes? In other words, is your assessment of your partner good enough to risk your family on? Its a gamble, and I think wise and loving parent would make provision for their children based on all possibilities. Or further - you, spouse and spouse's kids all in same accident, you die, then spouse, then spouse's kids - money goes to whoever spouse's kids money would go to (not your kids). Some random in-laws now control the money you would have sent to your kids. Probably 50% of more of people here will shudder at the thought. Pre-nup solves it. A will, not a pre-nup is the christian way to deal with the circumsances to which you refer. That was my first thought, but a will will not differentiate between what is your money vs what is spouse's money unless that difference is made before marriage since money and value can change over time. If you die and leave your estate to your kids, your spouse can still have rights over everything in your joint name unless measures are taken before hand to determine exactly how to divide it up, ie a pre-nup. That was my first thought, but a will will not differentiate between what is your money vs what is spouse's money unless that difference is made before marriage since money and value can change over time. If you die and leave your estate to your kids, your husband can still have rights over everything in your joint name unless measures are taken before hand to determine exactly how to divide it up, ie a pre-nup. I am sure that the laws differ by State. In Georgia, the will is perfectly capable of handling the distribution of wealth at the death of one spouse. I would not have a scriptural problem with a pre-nup that dealt with, and only with, the distribution of assets at the death of one spouse. However, if the pre-nup dealt with divorce in any way, I still have scriptural problems with it. What if the pre-nup dealt with distributions of wealth with respect to a possible divorce? Only one person needs to ask for a divorce, and the other person's kids could lose out financially because of it. The kids would just have to lose out. Marriage is not entered into with a written provision for its failure. The money is not the kids, it is the parents. If the parent loses most of it in a divorce, it was not the children's money anyway. We can always find a reason to justify our actions, but entering a covenant with a written provision for its failure, is simply an abomination to everything a covenant was ordained by God to be. We'll have to disagree I guess. God does not evaluate the actions in and of themselves but rather the heart. The heart justifies in God's eyes, the individual who signs a pre-nup out of love rather than out of fear or distrust. When it comes to concern for other human beings especially our children, protection and provision for them is a marker of a real man or woman. Pre-nups in that case protect those who should not suffer because of the failures of the couple. Its pretty arrogant and selfish IMO, to risk the best form of financial and social security of children, only to justify one's own beliefs about themselves and their need for personal fulfillment. Marriage is ordained by God to be a covenant. By placing a provision for its failure in the covenant, you reduce the covenant to a mere civil union. personally i doubt i could ever marry anyone that felt the need for a prenup. If he doesn't trust me then why would he want to marry me or if i didn't trust him then why on earth would i want to marry him? Marriage is giving all of yourself to your spouse, including possessions. and yes there is that risk of things not working out but my thought is why cripple the marriage with the tone of distrust before it even starts just because of what could happen? Very interesting indeed. What if the fiance is a woman requesting a prenup? Would the views submitted remain the same? My wife requested a prenup before we were married. She indicated at the time that the need for the prenup was not solely hers, but to satisfy her Mother, and other family and friends who suspected that I wanted to marry her for what she had. What did she have? She owned a Bread and Breakfast that she acquired out of a divorce settlement with her first husband. She, at the time I proposed to her, was diagnosed with breast cancer and had just completed surgery and began her chemotheraphy. I felt that this was the perfect time to demonstrate my love and commitment to her, at the time when she would have felt abandoned and hopeless. I thought, that just incase she thought, I would no longer have any interest in her I would prove otherwise I proposed. She said yes, but, first you must prove your love for me by agreeing to sign a prenup. My response to her, \" you do not trust me\". She insisted that unless I signed the agreement there would be no marriage. I decided that if I held out, she and her family would be convinced that I did not love her, so I agreed and signed the prenup. The marriage did not go very far when the first disagreement resulted in my being threatened with being kicked out of her house. That behavior continued until finally I could not return to her anymore in \"her house\" and we are legally separated. IMOP: Beware of any Christian who proposes a prenup. A prenup introduces the first negative, the seed of doubt, the opening that allows the enemy to walk right in. A Pastor that counsels \" it is OK\" has not sought the Holy Spirit's guidance and He\/She does not understand the seriousness of the vows inherent in a marriage contract. Of course there is a lot more detail to my experience and I would be happy to share it some other time. If she doesnt trust you to leader her in the relationship then there is little point to marriage. We cant conform to this world, with it's idols. We musnt conform to this world. Your experience has given you wisdom brother. God be praised. I hope you pray for her, that she would come to a real knowledge of what Christ calls us to be\/live. I think a pre-nup is fine. It is not a seed of doubt being planted. It does not mean you don't trust the person. You have to be prudent. I can trust a person 100% and it doesn't guarantee they will always be the person I married. Things can happen that change people that you couldn't know. Lets say I'm a woman and my husband is the greatest man in the world. He makes a mistake behind the wheel and kills our son in a car wreck. He is so depressed he turns to alcohol and starts to beat me. This can happen and I know someone who it indeed did happen to. A pre-nup, if understood properly is fair. As faithful and truthful and devoted as you may be, you do not want to leave custody to your children or if you have a large estate, the keys to half of it out of your control to the whims of an imperfect human. That's what I am, that's what everyone on this board is. No offense, but i think that's a bad reason. The sovereign control of God in life lends me to attempt (sometimes unsuccessfully) to yield my circumstances to Him. I can say 'what if' all day, but in the end just giving it all up to Him is what brings about a peace. Marriage is giving yourself to the other party and dedicating your joint lives to God's purpose. A pre-nup taints this unity and makes it look like a farce. Marriage is God's gift and He made it right the first time. Here's the problem with that line of thinking. You are not protecting yourself from God's version of marriage with a prenup. A prenup is protection from man's additions to the marriage contract. Under God's marriage, if a person wants to leave He says to let them leave. Not leave, take half of all the belongings and the children. It's because man added some rules that in some situations can be completely unfair to the marriage laws that make prenups necessary in extreme situations. There are people who are duped all the time into marrying a person who is after just their money. There are quite a few Christians who believe marriage to be in the eyes of God and all the state stuff doesn't mean a thing. Once again, you can put your faith in God and He will deliver, but to put everything on the line when it comes to immense assets or children by putting your faith in man, that is entirely different. I swear, its as if people think that if you put God at the center of the marriage and pray and pray and pray that everything will work out in it. It's simply not the case because God gave us all free will, and you can only control YOUR free will. I'm watching a very close friend who took abuse from his wife day after day and he prayed and refused to divorce her and now she is divorcing him and trying to take FULL custody of their daughter (and the daughter absolutely hates the mother) and the house and she is claiming she is unable to work due to the husband \"not allowing her to.\" This guy has taken and done everything to keep the marriage together, but he can't keep another person from walking to the courthouse to file divorce papers. I dont think that line of argument reflects the need for a pre-nup, but the need for marriage laws regarding divorce to be reviewed. I would have no objection to writing up a covenant between the man and wife stating they will abide by a biblical marriage and that divorce is only allowable in X situations and in such a situation the offending party gets nothing. That is Godly. What is not Godly is not giving all of yourself over to your spouse in faith under God. \"It hath been said, Whosoever shall put away his wife, let him give her a writing of divorcement: But I say unto you, That whosoever shall put away his wife, saving for the cause of fornication, causeth her to commit adultery: and whosoever shall marry her that is divorced committeth"} +{"id":"RedPajamaC4.0010","text":"Do not select a roofer primarily based solely on price. Sure, cheaper costs may be good to your pocket, nevertheless it may very well be a sign that you are not going to get the quality work you want. Take a look at the BBB to find out if a possible roofer is someone you can belief. Always verify the shades aspect of your house for deterioration of the shingles. The facet that's uncovered most to the solar lasts longer as a result of the heat of the solar keeps the shingles lying flat. This prevents wind and rain from loosening the shingles, but shingles on the shaded side come loose sooner. Don't ever paint your roof, no matter how a lot you think it's going to enhance in appearance. Older shingles could crack, look dark and otherwise take away from the beauty of your private home, nevertheless; painting causes critical and permanent injury to the roofing system. Merely substitute the previous tiles or have the whole roof carried out, or wait till you may, fairly than trying paint. If you're inquisitive about changing into more green, you need to use environmentally protected supplies for roofing. Recycled material consisting of used plastic, rubber and wood waste is usually a great choice, in addition to photo voltaic panels. This could also prevent cash on preliminary costs or vitality charges in the dwelling. With a solid deal with studying extra about roofing, this text is bound to provide you what you want. You wish to know what you're doing when it comes to putting a new roof on your own home, and that requires that proper knowledge. Hold reading to study what it's worthwhile to know. Some roofers have subcontractors that they use. That means that a different roofer may come out to your own home than you had been expecting. Speak to the roofer ahead of time to search out out if they subcontract work out. If they do, it's possible you'll want to take into consideration going with someone else, because you cannot be certain who will show up. When selecting skilled roofers, it pays to contact the BBB. This will help you see whether clients have filed complaints with your prospective contractors. You might want to additionally test-in with the Chamber of Commerce. It's also necessary that you simply get this estimate in writing. Although you might suppose you want a brand new roof, this isn't at all times the case. As a substitute, call a dependable and trustworthy skilled to examine your roof before forking over the cash for a new roof. A lot of instances, of us get full roof replacements once they solely wanted some restore work. Be leery of anybody who randomly knocks in your door, and presents to repair your leaky roof. Unscrupulous con-men will provide to do the work, and most instances run along with your money, with out doing any of the work in any respect. In the event you need a roofing job completed, do your research and discover a roofing contractor you could trust. When assembly with knowledgeable roofer, ask to see a copy of their legal responsibility insurance. Any reliable roofer ought to have copies available. If they've a hard time offering you with their papers, they're probably not someone you wish to work with. When you're trusting someone along with your roof, you want all your bases covered. Before hiring somebody to do work in your roof, ask them who their provider is. Make it some extent to name and confirm that their account is in good standing. You do not need someone to repair your roof then another person comes and tells you that you're accountable for paying any remaining balances. After a radical inspection and cleaning of the roof, it is crucial to patch and seal any drawback areas. Be sure that the climate report exhibits nice climate, as a result of sealing supplies may take up to two days to utterly remedy. A sealant or other coating should be utilized after the areas are cured. Search for a roofer that provides ensures on their work. Most repairmen won't provide this, but someone who has put in a completely new roof should offer you this with no hesitation. If you do not ask about this ahead of time, it's possible you'll find yourself paying a ton for a new roof, and paying much more for somebody to repair it in case you have points. If you're unable to search out the place your roof is leaking, attempt to not turn out to be discouraged. You will find the issue, and the use of a water hose and a buddy system will help. If your own home is very giant, communicate through phone to verify every particular person in in the spot they need to be. You do not need water to stream into your house if no one's there to identify the leak! Repairing a roof in dangerous weather is a recipe for catastrophe. Put a bucket beneath any leaks until the climate improves, then go examine the roof and see if it's potential so that you can repair it. by Raymundo Fustonon December 10, 2018 July 6, 2018 Leave a Comment on In search of Knowledge About Roofing? You Need To Learn This Article! If you cannot discover any local contractors who actually interest you, then take a drive by way of your neighborhood or nearby neighborhoods and search for signs of repairs. When you discover a roof that looks prefer it has been recently replaced, ask the householders who dealt with the job and what they though of their experience. Invest in the very best high quality roofing tiles your money should buy. That is particularly necessary in case you are dwelling in the home you are transforming. The perfect roofing supplies on your residence depend on the local weather of your location, so you'll want to analysis the very best roofing tiles in your climate. When installing a new boot on any pipes which go away your roof, be sure that they fit as snug as a bug in a rug. In the event that they're even slightly loose, water can seep inside of them, inflicting you a headache you don't need. Select the proper dimension to spare yourself from problems down the road. Always hold safety in mind. If you can be going up in your roof, make certain that you consider what you might be doing and be as protected as doable. If there is any moisture, corresponding to rain, ice or snow, watch for it to dry off before going up on your roof. While you should go away heavy obligation work up to professionals, there's plenty of preventative maintenance you are able to do to maintain your roof in great form. Maintain an eye out for shingles that have to be repaired or changed, and make sure your flashing and underlining are in good situation. With a little bit effort, you possibly can keep away from massive restore jobs altogether. Should you can afford to do so, all the time opt for shingles that final for a longer time frame. For example, your contractor may ask you to decide on between 25-12 months and 50-yr shingles. Whereas the 50-year shingles may cost one or two thousand dollars more, it is price your cash for the extended lifetime of the supplies. Once you install a metallic roof on your property, be certain collected snow is not going to slide off over a doorway. You or a guest could possibly be surprised when a large clump of snow slips off the roof onto your head. Use particular crosswise pieces to direct the snow off to both facet as a substitute. Should you're trying to deal with roof repairs by yourself, proceed with caution. A roof is a dangerous place to be, and also you need to be properly geared up for it. Put on shoes with rubber soles, and use a nicely braced ladder that has rubber safety toes. Your roof isn't worth risking your life over. Check your rubber boots in your roof for cracking or dryness. In case you are roofing yourself, ensure you all the time double-examine any measurements you make. Regardless of how certain you might be on a measurement, one small mistake might trigger you to waste invaluable materials, which might lead to tons of and even 1000's lost. When utilizing pricey items, such as galvanized roof flashing, this is especially important. In case you have a leak and are going on your roof to seek for it, convey a hose with you. You possibly can spray the hose in order to find out the place the leak is coming from. However, don't do this in the winter, as the water from the hose may cause ice. Don't select a roofing firm primarily based on solely the price. Value is not a reliable indicator of what firm is greatest in your roofing wants. There are occasions whenever you is perhaps provided some rebates and reductions that could lower the price. Try taking the time to make calls, learn over contracts and written estimates, and ask questions that you've got before making your closing decision. Do what you possibly can to keep your gutters clear from particles. If your gutters are clogged it might probably lead to water sitting on your roof for an extended time frame. That can then lead to water injury to the roof, which then might result in some very heavy leaking. Prevent disaster by maintaining in your gutters by way of the year. It is not straightforward to be taught every thing you want to find out about roofing. Information can be hard to seek out, or written in a way that is difficult to understand. That is the place this article is available in. It accommodates a few of the greatest roofing advice out there, and the tips inside should be very easy to digest. Ask the contractor what what guarantee is obtainable on the work finished. You may be able to get a greater deal when you discuss to certain corporations. As well as, all the time get a guaranty in writing, together with the estimate, so that you've the knowledge in your possession. This ensures there aren't any modifications made to your phrases later. Before a contractor starts working in your roof, do not hesitate to ask any query you may have. In case you let your questions go unanswered, it may end up in issues. If you cannot get clear solutions from a contractor, they're probably not somebody you need to work with. Folks typically examine the roof and skylights for any leaks. The storm might trigger additional harm anyhow, so there really will not be a lot use in attempting fix it until all of it ends. If you are occupied with turning into more green, you can use environmentally safe supplies for roofing. Recycled materials consisting of used plastic, rubber and wooden waste is usually a nice possibility, as well as solar panels. This can additionally save you money on preliminary costs or vitality rates in the house. With a solid focus on studying extra about roofing, this article is sure to offer you what you want. You want to know what you're doing in the case of placing a new roof on your own home, and that requires that right knowledge. Maintain reading to study what it is advisable know. Measure twice, reduce once. If you'll be doing your personal roofing job, you want to ensure that your measurements are correct. It will prevent each money and time. You may guarantee your measurements are accurate by taking the extra time it takes to measure two, and even 3 times. Never attempt to restore your roof while the weather circumstances are hazardous. Your roof can wait till the storm clears, and you need to be extra concerned about your safety than the state of your roof. The storm could cause additional harm anyhow, so there really is just not a lot use in attempting repair it until all of it ends. Make sure that you hire a roofing contractor who has a locatable, everlasting business residence. In case you rent a roofing contractor who doesn't have a permanent administrative center, you risk being scammed. Moreover, if the roofing contractor you rent does a great job, it may be useful to have stated contractor's permanent contact particulars readily available in case you have got any extra issues together with your roof sooner or later. Never neglect safety when planning repairs in your roof. Repairing a roof in unhealthy climate is a recipe for catastrophe. Put a bucket beneath any leaks until the climate improves, then go examine the roof and see if it is potential for you to repair it. Once you rent a roofing contractor, be sure you discover one which guarantees his work. It's also vital that the contractor carries insurance that covers his workers on the job. You shouldn't want to fret that your property insurance shall be charged is a workers falls out of your roof and is injured. It is advisable also verify-in with the Chamber of Commerce. If you're unable to search out where your roof is leaking, attempt not to turn out to be discouraged. You're going to discover the problem, and the use of a water hose and a buddy system can assist. If your home could be very massive, talk by way of phone to make sure each particular person in within the spot they should be. You do not need water to stream into your own home if nobody's there to identify the leak! Ask your roofer about putting in architectural shingles on your private home or carport. While one of these shingle prices more than conventional shingles, they're more attractive. Architectural shingles have the same durability and quality as regular shingles, but are also accessible in more colours, textures and thicknesses. They don't seem to be a must-have, however the difference is noticeable. While you're planning on installing a brand new roof, selecting a cloth mainly comes all the way down to how lengthy you plan on staying in the house. If you plan on promoting the home quickly, material that lasts 20 years could also be applicable. If you plan maintaining the home and residing in it long term, you'll save money in the long term by selecting materials that last forty years or longer. Your co-worker may have raved over a contractor, and you will have been offered an incredible deal, however that does not imply you shouldn't get multiple estimates. Be sure your roofing contractor has a security plan. You should ask a contractor for their safety plan earlier than letting them work on your home. These plans are vital for ensuring your undertaking is completed. They are also required by OSHA or the Occupational Security and Well being Administration. There is no shame in having another person do roofing give you the results you want. In case you're scared of heights, don't have any steadiness or simply plain intimidated by your roof, hire someone else to do the give you the results you want. Roofers may be surprisingly inexpensive, and the cost is value the advantages to your psychological well being. When wanting into different types of roofing materials, you should consider varied components. For instance, the worth range you're putting your budget in will in the end decide what you are able to afford. A slate roof will be very expensive, nevertheless, it will last longer than your lifetime. If you have ever suffered from a broken roof, you know how irritating that is. Sadly, diagnosing the issue and choosing a solid roofing contractor will not be an easy job. Happily, if you educate yourself on the topic, you possibly can extra simply determine problems and choose the fitting roofing contractor when crucial. If you find yourself the marketplace for a roofing repair firm, take the time to conduct some analysis through online evaluate sites, the native chamber of commerce and any enterprise complaint bureaus. By spending the time mandatory to do this, you stand a significantly better probability of finding a reputable agency with the sources to do the job properly. When deciding on a roofing contractor to repair or inspect your roof, you'd be sensible to decide on an area one that has a permanent address. In the occasion of an emergency, equivalent to a leak or pure catastrophe, it can make your life a lot simpler to have a roofer that is native. Conduct a thorough roof inspection over your entire floor, so you do not miss any drawback areas. The fabric must be bonded well, and fasteners are secured. If you wish to work on a certain space, the material should be clean and dry. Be secure when working on the roof to keep away from harm. If you'll be going up in your roof to fix a leak, at all times work with a buddy. Roofing will be actually harmful and a fall could be devastating. Using a harness will assist to ensure no unhealthy accidents occur. You all the time need to wear rubber soled footwear for extra traction too. When individuals are competing for the work, you're going to get better presents. Get a number of quotes from multiple roofing corporations. Not all firms are the same. You might see a company with big advertisements in the Yellow Pages, but that doesn't assure the quality of their work. Get hold of a number of quotes from numerous roofing companies and evaluate their details to each other. Try solely getting bids from licensed contractors since some states do not require licenses for roofing contractors. Rigorously examine the written estimate that you're given by a professional roofer. Be sure to doc when your project starts, the estimation of when it is to be completed, and what funds are made. Avoid paying in full up entrance. Be certain the guarantee is clear and that you simply perceive what voids it. A few of the new types of roofing materials are metal panels, slate tiles and shingles shaped from composite supplies. These roofing selections vary from common price to very costly, and the costliest ones can last the lifetime of the home. Take into account how long you will personal your private home when choosing your roofing material. Think about your individual safety first. It's best to always assess the situation thoroughly earlier than you begin any roofing repair job. It's because rushing up to repair your roof as soon as you discover an issue might result in a serious accident. As an illustration, you must by no means attempt to fix a roof when it's raining or extremely windy outdoors for obvious reasons. Ask for copies of the roofing firm's legal responsibility protection before letting them work on your roof. If they're an experienced and professional company, then they need to have these papers with them after they meet with you. Any company that does not carry or outright refuses to provide copies of their insurance coverage and papers detailing worker's compensation must be averted. Take into account the climate in your area when changing your roof. Clay roofing is a great materials if the world that you just dwell in has a dry local weather; it might assist keep a cushty temperature inside the house. Clay tiles applied in damper climates may cause speedy deterioration. If you have doubts, simply ask. While you're making an attempt to hire a roofing contractor, it's essential to be certain they're in possession of legal responsibility insurance. Insurance is a sign of a dependable contractor. If anything occurs while they work on your roof, the insurance will take care of it. Among the most famous buildings have slate roofs, all having a complicated and timely look. Do not settle for the material price quotes from only one contractor. When a roofing contractor has completed working on your roof, ensure that to get a lien waiver. This document will let you already know that your contractor has settled any and all money owed with the producer for any and all supplies used. This can keep you from getting any surprises afterward. When hiring a roofing contractor, be extra cautious of those that won't provide you with an estimate on paper earlier than the work is started. A reputable contractor shouldn't have any drawback supplying you with an estimate that particulars the costs involved and the work to be carried out. You must look elsewhere if a contractor won't agree to provide that data. Consider fixing small roof issues by yourself. There's a wealth of data accessible relating to initiatives which you could full on your own without prior expertise. If you have the time out there to learn about the problem and the treatment it can save you your self a lot of money and acquire some expertise on learn how to preserve your property yourself. Think about the type of roofing supplies used on other homes in your neighborhood. It's best to mix in and avoid standing out as too totally different. You residence will appear more enticing to a potential buyer when it appears to be like as if it matches into the neighborhood by which it is positioned. Get a number of quotes from multiple roofing companies. Not all companies are the identical. You could see a company with large advertisements in the Yellow Pages, but that does not assure the standard of their work. Acquire multiple quotes from numerous roofing firms and examine their details to one another. Attempt only getting bids from licensed contractors since some states do not require licenses for roofing contractors. If you're within the strategy of building a brand new home, choose a roofing materials that has a long life. You don't want to fret about replacing your roof 15 or 20 years after you progress into your new home. Try a number of forms of roofing supplies before making your alternative. If a deal seems too good to be true, it most likely is. Calling around for different quotes to your roofing job is essential to ensure you get the very best value. Nevertheless, if a contractor is offering their providers way under the average, ask yourself why. It could very properly be a superb deal, but it surely might be a rip-off as nicely. Have a number of people come out and offer you totally different quotes. When a vicious storm blows through, you'll have to climb as much as the roof to examine for injury. Of course, search for any missing items, be they shingles or flashing. Additionally test your gutters for looseness and clogs, and verify nearby bushes for any limbs which are broken and could come crashing down on your private home. Do not discuss to just one roofer. Your co-worker could have raved over a contractor, and you might have been offered an incredible deal, however that does not imply you shouldn't get a number of estimates. Encourage a number of contractors to put in bids for the job. When people are competing for the work, you're going to get better offers. It doesn't matter what form of particular person you're, it's good to be educated about roofs. Chances are you'll not be capable of use this advice right now, however there will come a time when these tips will actually come in useful. In the case of roofs, it's essential to be prepared, and now you might be. Totally different states usually have completely different necessities in the case of roofing. You could must have a permit or a bond if you need work to start on your home. Get in touch with the constructing division in your area to ask them whether or not this is applicable to you or not. You might not be a roofing expert, however that doesn't imply you may't take nice care of your roof. No matter what path you observe, the recommendation you learn above should assist. Do not be afraid to seek out more roofing data should you need it. Before lengthy, individuals could also be asking you to give them roofing tips! You probably have a normal handyman that does work in and round your house, do not permit him to do anything to your roof. Fixing a roof requires a high level of expertise and know-how. For this reason you'll be better off hiring somebody that makes a speciality of one of these work. Don't work with any roofing contractor that desires to provide you an estimate over the telephone. Every roof is completely different, and it is best to find somebody that is prepared to return out and take a look at your specific problem. If someone balks at making a home visit, you must probably hire another person. If you happen to've been wanting to put a roof on your property, but you wish to know extra about your options, then you've found the precise article. From what type of roof to hiring the fitting man, you want to know some recommendation that can assist you navigate your manner. Proceed studying to seek out out some helpful details about roofing. Then, if there are any smears, wipe them with solvent. While it might be tempting to look out over the vast view that your roof provides, you could possibly easily trip over one thing and fall. It doesn't matter what form of particular person you are, it is good to be educated about roofs. You might not be able to use this recommendation proper now, but there will come a time when these tips will really come in useful. In terms of roofs, it is necessary to be prepared, and now you are. Totally different states often have totally different requirements relating to roofing. You might need to have a permit or a bond if you would like work to start on your own home. Get in contact with the building department in your space to ask them whether this is applicable to you or not. Do not work with any roofing contractor that wants to provide you an estimate over the telephone. Every roof is different, and you should find someone that's willing to come out and check out your particular challenge. If someone balks at making a home visit, it's best to in all probability rent someone else. In the event you've been wanting to place a roof on your private home, but you need to know more about your options, then you've found the precise article. From what sort of roof to hiring the fitting guy, it's worthwhile to know some recommendation to help you navigate your method. Proceed studying to search out out some helpful details about roofing. When meeting with knowledgeable roofer, ask to see a copy of their liability insurance coverage. Any reliable roofer should have copies readily available. If they have a hard time offering you with their papers, they're in all probability not someone you need to work with. Whenever you're trusting someone together with your roof, you need all your bases covered. Earlier than hiring someone to do work in your roof, ask them who their supplier is. Make it a degree to call and verify that their account is in good standing. You don't want somebody to repair your roof then another person comes and tells you that you are liable for paying any remaining balances. The contractor that you hire to do your job should be local and reputable. Many individuals rent folks from out of city as a result of they're a bit cheaper, however that poses a problem when you've got any points. The contractor may not be capable of come out and fix your issues immediately since you are to this point. To protect the integrity of your roof, clean the gutters usually. Many roof issues, resembling leaking, are caused by back-ups within the gutter system. Having a clogged gutter signifies that rain and snow can't adequately drain and that puts an additional burden on your roofing materials. Purchase instruments to make cleansing the gutters quicker and simpler on you. Have a number of folks come out and give you completely different quotes. Whilst you should leave heavy responsibility work as much as professionals, there's plenty of preventative upkeep you are able to do to maintain your roof in nice form. Hold an eye fixed out for shingles that have to be repaired or replaced, and ensure your flashing and underlining are in good situation. With a little effort, you possibly can keep away from massive restore jobs altogether. When you can afford to do so, always opt for shingles that last for an extended time period. For example, your contractor might ask you to choose between 25-year and 50-year shingles. While the 50-yr shingles might cost one or two thousand dollars extra, it is price your cash for the extended lifetime of the supplies. When a vicious storm blows by, you'll have to climb up to the roof to test for damage. Of course, look for any missing pieces, be they shingles or flashing. Also verify your gutters for looseness and clogs, and examine nearby bushes for any limbs that are broken and will come crashing down on your private home. Don't talk to just one roofer. Your co-employee might have raved over a contractor, and you might have been provided an amazing deal, but that doesn't imply you shouldn't get a number of estimates. Encourage multiple contractors to put in bids for the job. When persons are competing for the work, you are going to get higher provides. Don't choose a roofer based mostly solely on value. Sure, cheaper prices could also be good in your pocket, however it could be a sign that you are not going to get the quality work you want. Take a look at the BBB to seek out out if a potential roofer is somebody you may trust. At all times verify the shades facet of your private home for deterioration of the shingles. The facet that's uncovered most to the sun lasts longer as a result of the warmth of the solar retains the shingles lying flat. This prevents wind and rain from loosening the shingles, but shingles on the shaded side come loose sooner. If you're planning on installing a new roof, selecting a fabric primarily comes all the way down to how lengthy you intend on staying within the dwelling. When you plan on selling the house soon, material that lasts 20 years may be appropriate. Should you plan holding the house and dwelling in it long run, you may save money in the long run by selecting materials that last forty years or longer. When you could not have observed any issues from beneath, checking the insulation will be certain that no further harm might be brought on as you can repair the leak instantly. Get a number of quotes from a number of roofing corporations. Not all companies are the same. You may see an organization with huge adverts in the Yellow Pages, however that doesn't guarantee the quality of their work. Receive multiple quotes from various roofing corporations and evaluate their details to each other. Strive solely getting bids from licensed contractors since some states don't require licenses for roofing contractors. Speak to household, buddies and colleagues about suggestions whenever you need a roofer. Utilizing the information given to you by others who have had work achieved by the contractor is the easiest way to find a good one. If you have dealt with other forms of contractors, they could be capable of advocate someone too. They may at the least have the power to send you to the proper people. Some roofers have subcontractors that they use. That means that a different roofer might come out to your home than you had been expecting. Talk to the roofer ahead of time to seek out out in the event that they subcontract work out. In the event that they do, you may wish to think about going with someone else, because you cannot be positive who will present up. When deciding on professional roofers, it pays to contact the BBB. This may help you see whether prospects have filed complaints with your prospective contractors. You might want to additionally test-in with the Chamber of Commerce. Ask the contractor what what warranty is offered on the work accomplished. You may be able to get a greater deal in case you talk to certain corporations. In addition, always get a guaranty in writing, together with the estimate, so that you've got the information in your possession. This ensures there aren't any changes made to your terms later. Earlier than a contractor begins working in your roof, do not hesitate to ask any question you may have. If you let your questions go unanswered, it can result in problems. If you cannot get clear solutions from a contractor, they're probably not somebody you wish to work with. Hopefully, this article has helped you discover out extra about roofing. Do not select a roofing firm primarily based on solely the worth. Worth isn't a dependable indicator of what firm is finest in your roofing wants. There are times while you is likely to be provided some rebates and reductions that would lower the worth. Attempt taking the time to make calls, read over contracts and written estimates, and ask questions that you've got before making your ultimate determination. A very lovely and distinctive search for your roof may be created with slate roofing. Such a roof is sort of indestructible, and can last as long as your own home. You will need a substantial support system for slate roofing as a result of it's fairly heavy. Slate roofs will be found intact on European buildings that are tons of of years previous. Since replacing your roof may be probably the most costly initiatives besides the price of the house itself, be sure to know who you are hiring. Keep away from the temptation to hire a buddy of a buddy, or cheap \"handymen.\" Search for a licensed contractor who guarantees his work and comes with many good opinions and suggestions. Always inspect your roof boots whenever you happen to be up in your roof, for no matter motive. They generally tend to dry-up and crack, leaving damaged areas the place the rain and snow can come in. Be ready to remove and change the encompassing shingles, too. Roof boots could be found at most main hardware stores. Slate roofs can give you one thing that a shingle roof can not, that is an aged and complex look. Slate roofs have been used for a whole bunch of years, as tar shingles have not been produced for so long as individuals have needed roofs. A few of the most well-known buildings have slate roofs, all having a complicated and well timed look. Do not make modifications to your roof that aren't lengthy-term. It's good to save money, however the further injury that pushing aside high quality repairs may cause, often finally ends up costing more later. Ask your mates for recommendation relating to your roof. Many people preserve their properties by themselves, and are comfortable to assist a friend to discover ways to do the same. Even when you don't discover someone that is helpful, you may no less than get a very good recommendation on a contractor that may assist you to out. Never work in your roof by yourself. It's best to always have someone else current, even whether it is solely for the aim of getting somebody that may name emergency companies in the event you fall. Falling from the roof could be a disaster, however not having somebody to help you is even worse. When inspecting your roof, take extra care to any areas the place there are valleys. Valleys are the place two of your roof intersections be part of together (they're additionally referred to as ridges). These are widespread locations for leaks to kind and particles to gather so just remember to be aware of these areas during your inspections. It is important that any roofing contractor you might be considering provides you with the tackle of their physical location. It should not be a PO box or an condo! When they have workplace house, even whether it is within a house they personal, you recognize where to go in case you have any issues. When seeking to substitute your roof, remember to look around at your numerous options for roofing contractors. Have multiple folks come out and give you totally different quotes. However, do not forget that the cheapest choice will not be always the most suitable choice. If you happen to go the cheap route, however are uncertain of the quality of their work, you can pay for it in the long run. Do you wish to discover out more about roofing? You've come to the proper place! Whether or not you are seeking to rent professionals, are a do-it-yourself sort, or fall someplace in between, the advice in this article ought to be actually beneficial. Learn on to discover some fantastic roofing suggestions you can use right away. If you happen to're trying into hiring a roofer, the first question you need to ask is how lengthy the corporate has been in business. Someone might sound great on paper, but if they're new to the game, they could still be ironing out kinks of their business practices. You don't want to be the one they test issues out on. Ask as many questions of your roofer as that you must before you rent him. Never wash your roof with the same pressure washer you employ to scrub the sides of your own home. The high-powered water flow can reach proper up under your roofing shingles and force them off! Even when it would not occur all of sudden, stress washers will harm your roof, inflicting extra problems for you than it solves. Sometimes it can be arduous to find out if you happen to just want your roof mounted or if it needs to be replaced. This decision is often made when you could have a leak, storm harm or your roof is at the least 15 years previous. Have your roof inspected by your insurer and trust in their prognosis. If you set up a metallic roof on your private home, make sure that amassed snow is not going to slide off over a doorway. You or a visitor could possibly be stunned when a large clump of snow slips off the roof onto your head. Use special crosswise items to direct the snow off to both side as an alternative. In case you're attempting to handle roof repairs on your own, proceed with caution. A roof is a dangerous place to be, and you wish to be correctly geared up for it. Put on footwear with rubber soles, and use a properly braced ladder that has rubber security ft. Your roof is not price risking your life over. Don't accept the fabric value quotes from just one contractor. Shady contractors can charge more than double of their prices for the supplies used. Do your analysis earlier than committing to a contractor, and if they quote a high cost for a certain materials ask them for a motive for the fee difference. Ensure that you might be properly secured anytime that you go on high of your roof. This is very important since you can simply lose stability if you have not been on a roof a lot. Thousands of people get killed or injured from falling off their roofs. Roofing contractors you hire ought to have present credentials. T examine your roof for leaks, use a simple garden hose. Think native when hiring a roofer. Ensure that your roof is effectively ventilated. Take into account the climate in your area when changing your roof. Clay roofing is a superb material if the world that you simply live in has a dry local weather; it may well help maintain a comfortable temperature inside the house. Clay tiles utilized in damper climates could cause fast deterioration. If in case you have doubts, just ask. If you're attempting to hire a roofing contractor, you could ensure they are in possession of legal responsibility insurance coverage. Insurance coverage is a sign of a reliable contractor. If anything occurs while they work on your roof, the insurance will maintain it. Significant roof repairs are never a pleasure. Minor issues ought to at all times be addressed before they turn into even larger issues. To keep up correct maintenance on your roof, minor effort that you simply make as we speak will aid you avoid main effort at a later date. The information that are shared with you in this article will help you properly maintain your roof. You by no means need to climb atop your own roof to inspect for harm. When you've got any doubt concerning the structural integrity, it's best to rent knowledgeable. You needn't run the danger of the roof caving in from your walking on it. When taking on a roofing job, just be sure you perceive what you might be doing, before beginning the project. Taking a category at your local ironmongery store can prepare you for the job. Not understanding what you are doing may end up in the job costing more than you ever supposed. Mow your garden the day before your roof is changed. It isn't uncommon for nails and different particles to land within the grass throughout development. Shorter grass allows you to find any errant nails. Some contractors use a magnetic machine to find stray nails. These gadgets are handiest when used on shorter grass. If the contractor doesn't do this, end up a brand new one. In case you have a contractor coming to remove your outdated roof, make sure to reduce the grass beforehand. This will permit you to have a better time locating nails that fall on the bottom so you possibly can pick them up later. Even when your contractor has a nail finder, it'll work higher with clipped grass. Study your roof on a yearly foundation. Spring and winter are instances when harm is prevalent. Because of this, it's best to keep a detailed eye in your roof throughout this time especially. With the intention to be certain that your roof stays in good condition, make sure that you trim the bushes in the surrounding areas. It will forestall any branches from scuffing the floor of your roof which may eventually result in more severe problems. This also helps forestall any fungus or mildew develop in your roof. Ask your contractor how lengthy he has been in business. Although a contractor with just one or two years' experience may be wonderful in what he does, it's better to be protected and select somebody with a minimum of 5 years' experience. Remember that extra work experience does not at all times equal better work, but for probably the most part, that is the case. Keep away from putting off a roof restore for any length of time, even if it seems like a minor issue. Once a shingle or two have blown off, it's a lot easier for the wind to get beneath the rest and blow them off too, one-by-one. Fixing your roof immediately will decrease injury, saving you cash. For those who're looking into getting insurance coverage in your roof, make sure that alternative is roofed along with repairs. You don't wish to be caught paying for a new roof out of pocket. Restore coverage is a good factor to have, however you also want to be covered for the worst case situation. When you're the market for a roofing restore firm, take the time to conduct some research through on-line review sites, the native chamber of commerce and any enterprise criticism bureaus. By spending the time needed to do this, you stand a significantly better probability of finding a good firm with the resources to do the job correctly. When deciding on a roofing contractor to restore or inspect your roof, you'd be sensible to choose a local one which has a permanent deal with. In the occasion of an emergency, equivalent to a leak or pure disaster, it'll make your life so much easier to have a roofer that is local. Additionally test your gutters for looseness and clogs, and verify nearby bushes for any limbs which are broken and will come crashing down on your property. Those that are engaged on their roof, would be smart to always watch where they step. Whereas it could be tempting to look out over the huge view that your roof gives, you would easily journey over one thing and fall. At all times preserve your eyes forward of where you'll be stepping. Examine, or have another person inspect your roof regularly. Retaining your roof in fine condition will help forestall a lot of issues sooner or later. Your roof is a very important part of your house and helps protect the inside and the surface. Ensuring that issues are the way in which they need to be. Mow your lawn the day earlier than your roof is replaced. This might help them simply find any nails they drop, making things simpler on each of you. Quick grass also makes a magnetic nail finder work much more efficiently. Take some time to study the basics of roofing, such as the materials, the styles, and the terminology. With this info, you will be guarded in opposition to sneaky tactics from roofers who need to make the most of the common buyer. At minimal, it's best to be able to understand what goes into the repair and choose the legitimacy of any bills. If you can't find any native contractors who really curiosity you, then take a drive by way of your neighborhood or nearby neighborhoods and search for signs of repairs. Whenever you find a roof that appears like it has been recently changed, ask the homeowners who handled the job and what they although of their experience. Invest in the best quality roofing tiles your cash should purchase. That is especially important if you are residing in the home you are transforming. The best roofing supplies to your dwelling rely on the climate of your location, so remember to analysis the perfect roofing tiles in your local weather. Ensure you get a detailed estimate by any contractor you are considering of hiring to work in your roof. This estimate needs to incorporate every little thing from permits, materials, cleanup and labor. It is also necessary that you simply get this estimate in writing. Any reputable enterprise should be more than keen to offer you one. It may possibly typically be troublesome to find a leak in your roof. You'll finally find the supply of the leak, by eliminating certain areas, using a hose, and having another person have a look at it, as properly. If it is a big home, use cell phones to communicate so that water is not flowing into the house unnecessarily as you check completely different areas to search out the leak. A couple of times a year, go into the attic and take a look at your insulation. When your roof is leaking or broken, it's too late to begin learning about roofing. You have to be taught as much as you can while your roof is still in fine condition. Study the knowledge from this article, so that you can get the roofing work you need executed properly. Copper roofs are a really expensive choice. However, if you are able to afford the copper roofing materials, it is a very beautiful choice. As the copper ages, the copper turns a teal green color that accents most houses very properly. Although this is a expensive option, anybody who sees your home will likely be astonished. By no means rent a roofing contractor who expects a deposit up entrance. A very good contractor has financial stability, so they will not ask you for money to cover their supplies till the supplies have been delivered to your home. Also anticipate an incredible contract which details all expenditures on your part and that of the contractor. Strive spraying your roof down together with your garden hose to be able to discover the leak. Bear in mind, however, that this trick is only good thought in the course of the warmer months. Doing this within the winter is hazardous, and might lead to further injury to your roof for the time being. You'll want to have somebody inside while the roof is being sprayed so that you're certain to"} +{"id":"RedPajamaC4.0011","text":"were facilitated by His Excellency, Governor Roosevelt, and Mrs. Assistant Commissioner, and Senora Bague. who, with Mrs. Meyerhoff, made the field studies a few years ago. Ramon Gandia, engineers and geologists. States Agricultural Experiment Station, Mayaguez, by Mr. D. W. Station, Rio Piedras, by Mr. R. Fernandez Garcia, Director; Dr. Mel T. Cook; Don Pedro Osuna; Don Francisco Sein, and Mr. J. also of Arecibo; to Mr. Robert B. Noyes, of Ponce, and Mrs. H. T. Cowles, of Mayaguez; to Mr. and Mrs. W. V. Mr. and Mrs. Harold I. Sewall, of Naguabo; to Mr. and Mrs. E. Experiment Station of St. Croix. eight more of them for publication there this autumn. only under such soil conditions. 1 Published in that Journal, 1: 226- 231. Je 1930. the children of San Juan, of a young tree of \" Cobana negra \" last year at the Agricultural Experiment Station at Maya\u00adguez. considerable distance, here for nearly half a mile. 2 See Jour. N. Y. Bot. Gard. 31: 45- 47- F 1930. limestone south of Coamo Springs, and elsewhere. In February, a visit to Porto Rico was made by Professor L. R. and with Mr. H. N. Vinall, Forage Crop Expert of the De\u00adpartment. the Pepper Family, for publication in \" North American Flora,\" much remaining to be made known. Dr. William T. M. specimens illustrating the life- history of some of these in\u00adsects. privileged to see the very large series brought together by Dr. J. mapped in detail by Dr. Montalvo. classes of people, in accordance with their varied interests in it. to receive or to supply the roasted seed in the entire condi\u00adtion. of its parts, with various objects in view. notably C. liberica Hieron., have been cultivated to some extent. The total number of species in the genus is about twenty- five. Cephalanthus or Buttonbush is our one large . shrub in this family. the Cinchonas, from which we derive our quinine. courtesy of The New York University Press. usually of a snowy white color and thick luxurious texture. from its rich waxy leaves, the effect is most intriguing. that the two together have the same form as that of the fruit. also found in the face of the seed after the putamen is removed. The texture of the seed is hard and tough. The coffee fruit should be fully ripe before being gathered. i * f l r! \" coffee in the pod.\" After its removal, it is sold as \" podded\" coffee and then its keeping properties are not so good. jars, such as fruit jars. to the kernel. This may or may not be removed before roast\u00ading. which must be winnowed out. taste for which the coffee is valued. FIGURE 3. Sketches, showing structure of the coffee berry or fruit. through Professor Ralph H. Cheney. some specialist in coffee, whose integrity can be relied upon. the country of origin, the quality or grade, and the proper price. for drinking. Men who do this as a business are known as coffee-tasters. but this is by no means true of the caffeine that we imbibe in it. injury or even death if employed in excess or at a wrong time. greater amount of mental work of natural, or even superior qual\u00adity. extends to the muscles of the heart. in an ordinary full cup of coffee of average strength. this process not seriously impairing the flavor of the coffee. that he no longer cares for the pure product. but we know comparatively little about the contemporary vegeta\u00adtion. World to a much greater extent than in America. There is ample evidence that the glaciation was not continuous. front is melting away more rapidly than the mass is advancing. in the wake of the ice front wherever it receded. gravel transported by streams from the melting ice- front. Garden, Saturday afternoon, March 15, 1930. about the same as they are today. Close to the ice front, we have evidence of cooler climatic con\u00additions. now in existence, and so also, apparently, are most of the species. of Rhode Island. This large area is by no means all thickly set\u00adtled. Garden on Saturday afternoon, June 21, 1930. for enlarging the park system there will prove successful. area shows an unusually large variety of native species. over 150 species of trees and shrubs are of fairly common occur\u00adrence. than any other tree species. Mass.; Prof. Alexander W. Evans, New Haven, Conn.; Mr. S. Parker, Mr. C. A. Reed, Mr. Knowles Ryerson, Dr. Walter T. D. C.; Frere Marie- Victorin, Universite de Montreal; Dr. Island, died at his home in Hempstead, New York, on June 3. where it continues to instruct many thousand visitors annually. and of members of an advisory board. des Greifswalder Boddens. Greifswald, 1908. An account of the Bartram garden, Philadelphia, published in \" The Hor\u00adticulturist\" der Schneebeere ( Symph. rac. Michx.) Berlin, 1927. Annates de cryptogamic exotique. Vols. 1, 2 nos. 1- 2. Paris, 1928- 29. by Henry and James Groves. London, 1904. Beriicksichtxgung des Vierwaldstattersees. Jena, 1911. JOHN. Fungi of Manitoba. London, 1929. BOARDMAN, ROSINA COX. Lilies and orchids; a series of drawings in color. BOUQUET, ARTHUR GEORGE BRISTOW. Cauliflower and broccoli culture. Klebs, Vol. 1, and atlas. Berlin, 1907. CHRISTIAN. Plant competition; an analysis of community functions. de I' Indochine et du Yunnan. Hanoi- Haiphong, 1920. gefindlichen Ter liars chichi en von Dux. Halle, 1891. FISCHER, JOHANN BERNHARD. Versuch einer Naturgeschichte von Liv-land. Forstliche Blatter fur Wurtemberg. Vols. 1- 7. Tubingen, 1828- 1834. Miinden. Vol. 1. Berlin, 1879. Reich im Jahre 1772. 2 vols. St. Petersburg, 1775. GREMLI, AUGUST. Exkursionsflora fur die Schweiz. Ed. 9. Aarau, 1901. GR0N, A. HOWARD. Skov og Folk. K^ benhavn, 1925. HETLEY, G. B. The native flozvers of Nezv Zealand illustrated in colours. Journal fur das Forst- und Jagdwesen. Vols. 1- 4. Leipzig, 1790- 1794. KIRCHNER, EMIL OTTO OSKAR VON. Flora von Stuttgart und Umgebung. Algen und Pilzen. Ed. 2. Jena, 1928. unterhalb des Wasserwerkes. Stuttgart, 1911. Menneskets Tjeneste. [ Kj0benhavn,] 1906. unter besonderer Beriichsichtigung der Algenv eg elation. insects; their habits and control. New York, 1928. and coloured from nature. Ed. 2. London, 1807. Naturzvissenschaftliche Zeiischrift filr Land- und Forstwirtschaft. Vols. I- 18. Stuttgart, 1903- 20. Gewachse des Culms von Europa. Mtinster i. W., 1914. 0STRUP, ERNST VILHELM. Danske Diatomeer. KjjjSbenhavn, 1910. 1898- 1901. 2 pts. Kjzfbenhavn, 1913- 1916. enthaltend meist noch nicht oder wenig bekanute fossile Pflanzen. Dippoldiswalde & Leipzig, 1852- 54. Bovey Tracey, Devonshire. London, 1863. PETZHOLDT, GEORG PAUL ALEXANDER. Ueber Calamiten und Steinkohlen-bildung. der Vereinigten Staaten von Nordamerika. Leipzig, 1907. von W. Gothan. Berlin, 1921. Praktische Blatter der Bayr. Landesansialt fur Pflanzenbau und Pflansen-schutz. Vols. 1- 5. Freising, 1923- 1927. til Bestemmelsen af de danske Blomsterplanter og Karsporeplanter. REINECKE, KARL L. Flora von Erfurt. Erfurt, 1914. anden del blomsterlpse Planter. KpSbenhavn, 1904. Homberg ( Bez. Kassel). Berlin, 1907. dem Donetz- Becken. St. Petersburg, 1894. catalogue of the species in the Department of Botany, British Mxi-seum. Part 2. Ed. 2 rev. London, 1926. Ueber Stigmariopsis Grand ' Eury. Jena, 1894. SOUTHCOTT, M. Some Newfoundland wild flowers. St. Johns, 1915. SPRECHER VON BERNEGG, ANDREAS. Tropische und sub- tropische Weltwirt-schaftspfianzen. Vol. 2. Olpflanzen. Stuttgart, 1929. der Gegend von Chemnitz. Leipzig, 1918. Sees im Zusammenhange mit chemischen und physikalischen Bestxm-mungen. THOMPSON, HOMER COLUMBUS. Sweet potato production and handling. UNGER, FRANZ. Versuch einer Geschichte der Pfianzenwelt. Wien, 1852. von Helsingfors. 1. Helsingforsiae, 1926. Contributions to the Garden roar be deducted from taxable Incomes. Description-Table Of Contents Scientific Survey of Porto Rico and the Virgin Islands; Coffee; Plant Life South of the Ice Front during the Glacial Epoch; The Trees and Shrubs of Greater New York; Notes, News, and Comment; Accessions. Transcript VOL. XXXI JULY, 1930 No. 367 JOURNAL OF THE NEW YORK BOTANICAL GARDEN SCIENTIFIC SURVEY OF PORTO RICO AND THE VIRGIN ISLANDS N. L. BRITTON COFFEE H. H. RUSBY PLANT LIFE SOUTH OF THE ICE FRONT DURING THE GLACIAL EPOCH ARTHUR HOLLICK THE TREES AND SHRUBS OF GREATER NEW YORK ARTHUR HARMOUNT GRAVES NOTES, NEWS, AND COMMENT ACCESSIONS PUBLISHED FOR THE GARDEN AT LIME AND GREEN STREETS, LANCASTER, PA. THE SCIENCE PRESS PRINTING COMPANY Entered at the post- office in Lancaster, Pa., as second- class matter. Annual subscription $ 1.00 Single copies 10 cents Free to members of the Garden THE NEW YORK BOTANICAL GARDEN BOARD OF MANAGERS HENRY W. DE FOREST, President JOSEPH P. HENNESSY HENRY DE FOREST BALDWIN, Vice President CLARENCE LEWIS F. K. STURGIS, Vice President ADOLPH LEWISOHN JOHN L. MERRILL, Treasurer D. T. MACDOUGAL E. D. MERRILL, Secretary KENNETH K. MACKENZIE EDWARD D. ADAMS PARKER MCCOLLESTER CHARLES P. BERKEY H. DE LA MONTAGNE, JE., MARSTON T. BOGERT BARRINGTON MOORE GEORGE S. BREWSTER J. PIERPONT MORGAN N. L. BRITTON LEWIS RUTHERFURD MORRIS NICHOLAS MURRAY BUTLER H. HOBART PORTER ROBERT W. DE FOREST HENRY H. RUSBY THOMAS A. EDISON GEORGE J. RYAN CHILDS FRICK MORTIMER L. SCHIFF R. A. HARPER EDMUND W. SINNOTT JAMES J. WALKER, Mayor of the City of New York WALTER R. HERRICK, President of the Department of Parks SCIENTIFIC DIRECTORS R. A. HARPER, P H . D., SC. D., Chairman D. T. MACDOUGAL, PH. D, LL. D CHARLES P. BERKEY, P H . D., SC. D. BARRINGTON MOORE, A. B., M. F MARSTON T. BOGERT, SC. D., LL. D. HENRY H. RUSBY, M. D., SC. D NICHOLAS MURRAY BUTLER, P H . D., GEORGE J. RYAN, LL. D. LL. D., LITT. D. EDMUND W. SINNOTT, PH. D. DIRECTOR EMERITUS N. L. BRITTON, P H . D., SC. D., LL. D. GARDEN STAFF E D. MERRILL, SC. D Director- in- Chief MARSHALL A. HOWE, P H . D., SC. D Assistant Director JOHN K. SMALL, P H . D., SC. D Head Curator of the Museums A. B. STOUT, P H . D Director of the Laboratories P. A. RYDBERG, P H . D Curator H. A. GLEASON, P H . D Curator FRED J. SEAVER, P H . D Curator ARTHUR HOLLICK, P H . D Paleobotanist BERNARD O. DODGE, P H . D Plant Pathologist FORMAN T. MCLEAN, M. F., P H . D Supervisor of Public Education JOHN HENDLEY BARNHART, A. M., M. D Bibliographer PERCY WILSON Associate Curator PALMYRE DE C. MITCHELL Associate Curator SARAH H. HARLOW, A. M Librarian H. H. RUSBY, M. D Honorary Curator of the Economic Collections ELIZABETH G. BRITTON Honorary Curator of Mosses MARY E. EATON Artist ROBERT S. WILLIAMS Administrative Assistant E. J. ALEXANDER Assistant Curator ALBERT C. SMITH, A. B Assistant Curator CLYDE CHANDLER, A. M Technical Assistant MARJORIE E. SWIFT, A. M Assistant Pathologist ROSALIE WEIKERT Technical Assistant KENNETH R. BOYNTON, B. S Head Gardener G. L. WITTROCK, A. M Docent H. M. DENSLOW, A. M., D. D Honorary Custodian of Local Herbarium ROBERT HAGELSTEIN Honorary Curator of Myxomycetes E. B. SOUTHWICK, P H . D Custodian of Herbaceous Grounds ETHEL ANSON S. PECKHAM. Honorary Curator, Iris and Narcissus Collections JOHN R. BRINLEY, C. E Landscape Engineer WALTER S. GROESBECK Clerk and Accountant ARTHUR J. CORBETT Superintendent of Buildings and Grounds JOURNAL OF The New York Botanical Garden VOL. XXXI JULY, 1930 No. 367 SCIENTIFIC SURVEY OF PORTO RICO AND THE VIRGIN ISLANDS As Chairman of the Committee of The New York Academy of Sciences on the Scientific Survey of Porto Rico and the Virgin Islands, the insular possessions of the United States in the Amer\u00adican tropics, I was in Porto Rico for five months from November, 1929, to April, 1930, accompanied by Mrs. Britton, who gave me continued assistance, and whose facility in the Spanish language paved the way for many interesting observations and discoveries and for many enjoyable occasions, not otherwise obtainable, be\u00adcause, even after thirty years of United States control, with an enormous development of the educational system, the language and literature of Porto Rico remain essentially Spanish, which is just as good as English, if you happen to know it. Our studies were facilitated by His Excellency, Governor Roosevelt, and Mrs. Roosevelt, by Hon. Carlos E. Chardon, Commissioner of Agricul\u00adture and Labor, and Senora Chardon, and by Hon. Jaime Bague, Assistant Commissioner, and Senora Bague. The investigations, conducted by the Committee, since 1914, in\u00adcluding Geology, Palaeontology, Botany, Horticulture, Forestry, Zoology, Archaeology, and Anthropology, have been in coopera\u00adtion with the Insular Government of Porto Rico, the American Museum of Natural History, the Department of Geology of Co\u00adlumbia University, The New York Botanical Garden, and with aid by members of the scientific staffs of many other institutions and other students, either in field work, or in the study of the very large collections of specimens which have been made, or in both; the results are in progress of publication, in a series planned to 161 162 consist of sixteen volumes, each of four parts; about one- half of this series, thirty parts, have now been issued, four more are in press for publication during 1930, and the remainder of the work is in preparation. Altogether, over fifty investigators have taken part, or are still occupied; the work has been, essentially, a labor of love, no one participating having received any special financial remuneration; specimens have enriched the museums of cooper\u00adating institutions and authors receive the credit for their contribu\u00adtions through publication. It has been most gratifying to demon\u00adstrate that the scientific knowledge required for the consummation of the plan exists within our institutions or among individual stu\u00addents not attached to institutions. For purposes of the Geology of the Survey, Porto Rico was areally divided into seven districts, with the Virgin Islands and the Porto Rican islands Vieques ( Crab Island) and Culebra ( Snake Island) constituting another. Results of the study of five of the Porto Rico mainland districts, with maps and illustrations, have already been published, as well as parts of those of the study of the small islands. The remaining geological parts are being written by Professor Howard A. Meyerhoff, of Smith College, who, with Mrs. Meyerhoff, made the field studies a few years ago. During our recent visit we obtained some additional fossils from limestones of his districts for consideration by him. We observed, with interest, a new establishment for the fabrication of roof- tile and hollow brick, directly from a decomposed rock, identified for us by Professor Berkey as andesite porphyry, located near La Muda, near the western border of the Fajardo District. We re\u00advisited the manganese mine in the marble mountain, Sierra de Naranja, near Juana Diaz, and learned of another recently discov\u00adered manganese deposit near Adjuntas. Several of our geological trips were under the guidance of Don David Noble and Don Ramon Gandia, engineers and geologists. Botanical and horticultural studies were largely devoted to ob\u00adservations on the very many economic and ornamental plants in recent years experimentally introduced into Porto Rico from many parts of the world and their behavior under the climatic and soil conditions. These studies were facilitated at the United States Agricultural Experiment Station, Mayaguez, by Mr. D. W. 163 May, Director, and Mr. T. B. McClelland, Senior Horticulturist; at the Forest Station, Rio Piedras, by Mr. William P. Kramer, Chief Forester, and his assistants, Messrs. C. Z. Bates, G. E. Ger-hart, and W. C. Hottle; at the Insular Agricultural Experiment Station, Rio Piedras, by Mr. R. Fernandez Garcia, Director; Dr. Mel T. Cook; Don Pedro Osuna; Don Francisco Sein, and Mr. J. A. B. Nolla; at the Trujillo Plant Propagation Station, by Senor Adolfo Mayoral; we are also indebted for aid and information, horticultural and botanical, to Don Andres Oliver, of Arecibo, and Senora Oliver; to Don Lorenzo Oliver and Senora Oliver, also of Arecibo; to Mr. Robert B. Noyes, of Ponce, and Mrs. Noyes; to the Misses Noble, of Condado; to Mrs. F. T. Maxwell, of Ensenada; to Mrs. Herman L. Cochran, of La Muda; to Pro\u00adfessor H. T. Cowles, of Mayaguez; to Mr. and Mrs. W. V. Tower, of Pueblo Viejo; to Mrs. F. W. Vaughan, of Bayamon; to Mrs. Robert A. Miller, of Ponce; to Miss Clara Livingston, of La Sardinera; to Mr. and Mrs. W. McKay Jones, of Villalba; to Mr. and Mrs. Harold I. Sewall, of Naguabo; to Mr. and Mrs. E. M. Ellsworth, of Cidra; to Messrs. Murphy and Clark at Villa Leon. Mr. Arthur S. Fairchild, of St. Thomas, communicated specimens and information from his important garden at Louisen-hoj, and Mr. J. B. Thompson many records from the Agricultural Experiment Station of St. Croix. Studies of the native flora were continued, with especial refer\u00adence to rare or little- known species, and a few wild plants hitherto unrecorded for Porto Rico were detected; we also obtained more common names for a number of species. Mrs. Charles E. Home, who has diligently prosecuted her artistic studies of native species, accompanied us on many occasions, increasing her noteworthy collection of water- color studies, now including over three hun\u00addred accurate and beautiful paintings. Some of these have been reproduced in several issues of The New York Botanical Gar\u00adden's journal \" Addisonia,\" and I wrote descriptive text to ac\u00adcompany eight more of them for publication there this autumn. We were much interested in the soil survey of southern Porto Rico in progress while we were there by Mr. James Thorp and Don Gulielmo Torreuelles on behalf of the Sugar Planters; with Mrs. Thorp they accompanied us on several occasions; here there 164 are extensive areas of plains very little elevated above the Carib\u00adbean Sea, much of the land subject to saline influence and thus unavailable for agriculture; its drainage, or other improvement is a highly important problem. These saline or subsaline lands are characterized by a number of species of wild plants, which exist only under such soil conditions. Don Gulielmo escorted us during one trip to the beautiful gar\u00adden \" Los Nisperos \" at Tallaboa, a residence of Don Lucas Val-divieso of Ponce, located in nearly the most arid part of Porto Rico, where, through continued irrigation, luxuriant conditions had been obtained, including many very large trees of several kinds, the \" Nisperos \" ( Sapodillas) being among the tallest seen by us anywhere. Following a request by the editor of \" Journal of the Cactus and Succulent Society of America,\" for a communication, as Honor\u00adary President of that association, I wrote, for publication, a de\u00adscriptive account of the fifteen native species of Cactuses, 1 with special reference to their distribution in relation to rainfall, in\u00adcluding data obtained from recent observations; I am indebted to Dr. Oliver E. Fassig, Meteorologist of the United States Weather Bureau at San Juan, for rainfall data at numerous stations in Porto Rico and the Virgin Islands. The progress in reforestation of Porto Rico, under the active direction of Chief Forester Kramer is noteworthy. From the sev\u00aderal Forest Service nurseries, about one million seedling trees, of various species, are now annually distributed, and their records show that some three times that number could well be distributed to advantage, when means are provided; requests for young trees from owners of estates and from corporations have largely in\u00adcreased, indicating expanded interest in forestry and appreciation of its importance. In February, an examination of forest conditions and needs in Porto Rico was made by Mr. Joseph C. Kircher, District Forester, and Dr. R. M. Evans, Assistant District Forester, of the Federal Forest Service; we participated in dendrological discussions with them and in several field trips, in company with Mrs. Kircher and Mrs. Evans; their report and recommendation favoring large ex\u00adtensions of both the Federal and the Insular Government forests, 1 Published in that Journal, 1: 226- 231. Je 1930. i6S and the establishment of a Federal Experiment Station in Porto Rico, is a highly important contribution to tropical forestry. The Federal inquiry was extended to the Virgin Islands, through an examination of conditions on St. Croix, St. Thomas, and St. John, made by Mr. Kramer in April, and followed by an important re\u00adport by him. On Arbor Day, November 29, I took part in the planting, for the children of San Juan, of a young tree of \" Cobana negra \" ( Stahlia monosperma), an endemic species of Porto Rico, now rare, symbolic of the need for reforestation2; this tree is valued for its nearly black, heavy wood; fortunately its seeds germinate readily and the Forest Service obtained several thousand seedlings last year. Quite a different condition obtains in another rare en\u00addemic tree, the \" Hueso,\" or \" Violet tree\" ( Phlebotaenia Cowellii), with hard, white wood, the seeds of which germinate very sparingly; we have searched and inquired of country people for young trees on many occasions, with no success, until in April of this year, one of the cattlemen at Llanos de Coamo brought us a single seedling found by him under one of the several trees exist\u00ading in the beautiful arroyos of that estate. A few seeds ger\u00adminated last year at the Agricultural Experiment Station at Maya\u00adguez. The permanent preservation of several relatively small natural areas of Porto Rico, illustrating various ecological features, through withdrawal of lands from private ownership is very im\u00adportant, supplementary to the large forest reserves. We have called attention to several of these areas, and, especially to the wooded valley traversed by the main driveway at Guajataca, be\u00adtween Quebradillas and Isabela; here the beauty and significance of the natural forest have recently been marred and further threatened by clearing the upper slopes, leaving patches of bare, white limestone. This charming valley is the only place in Porto Rico where the natural forest is traversed by a main road for any considerable distance, here for nearly half a mile. Members of the Biology Department of the University of Porto Rico are enthusiastic field naturalists, making effective use of the published parts of the Scientific Survey. We participated in excursions organized by Professors Pagan and Garcia and 2 See Jour. N. Y. Bot. Gard. 31: 45- 47- F 1930. i66 Mrs. Rachel Dexter and aided in their study and determinations of many plants. The lichens of the region are, as yet, imperfectly and incom\u00adpletely known. Very large collections have been made in former years, and studied by several investigators, but a comprehensive list of them has not been compiled. I took with me all the records of these studies, and as a contribution to the subject, arranged and reduced them in catalogue form, indicating over four hun\u00addred species at present known, but there are, probably, many more. We collected some additional specimens of interest on limestone south of Coamo Springs, and elsewhere. The herbarium of the Insular Agricultural Experiment Station at Rio Piedras is a representative collection of Porto Rican plants, the only one in Porto Rico, very important for reference, and illustrating the Descriptive Flora and Plant Ecology pub\u00adlished by the Scientific Survey. It has recently, under the direc\u00adtion of Dr. Mel T. Cook, been improved and augmented; we added a considerable number of specimens, and aided in the in\u00adcorporation of many others. I made progress in writing a Sup\u00adplement to the Descriptive Botany published in the fifth and sixth volumes of the Scientific Survey, planned for publication in the fourth part of the sixth volume, together with a comprehensive index to volumes five and six, prepared with much assistance from Mrs. Britton. In February, a visit to Porto Rico was made by Professor L. R. Jones, accompanied by Mrs. Jones, and by Dean Russell, of the University of Wisconsin, on behalf of the Tropical Plant Re\u00adsearch Foundation, for consultation with Commissioner Chardon, relative to many problems in Tropical Agriculture. We partici\u00adpated in field trips and in discussions. Conferences were also held with Mr. L. H. Dewey, Fiber Expert of the United States De\u00adpartment of Agriculture, who was inspecting fiber studies at May-agiiez, and with Mr. H. N. Vinall, Forage Crop Expert of the De\u00adpartment. To aid the study by Professor William Trelease of species of the Pepper Family, for publication in \" North American Flora,\" additional herbarium specimens were made, including a species determined by him as new to science, found by Mrs. Britton growing on a tree near the road from Guayama to Cayey; sped- 167 mens of the flowers and leaves of the native century plants were also obtained for his study of Agaves, supplementary to his mono\u00adgraph published several years ago by the National Academy of Sciences. Entomological investigations in Porto Rico have recently been stimulated by the appointment of Dr. M. D. Leonard as Entomol\u00adogist at the Insular Agricultural Experiment Station; we were in the field with him on several occasions, the inter- relations of in\u00adsects and plants providing a fertile field for observation and dis\u00adcussion, much remaining to be made known. Dr. William T. M. Forbes, of the Department of Entomology of Cornell University, visited Porto Rico in April, especially for the study and collection of butterflies and moths; he has recently written up part of the Lepidoptera for publication by the Scientific Survey; he made large collections and obtained much additional information; we assisted him and mutually exchanged information about butterflies and plants. Professor Needham, also of Cornell University, vis\u00adited Porto Rico in the course of an air- plane trip from Florida to Dutch Guiana, especially for the study of tropical dragonflies and was with us for a day at Coamo Springs, where he collected de\u00adsirable specimens illustrating the life- history of some of these in\u00adsects. Archaeology, for the Scientific Survey, remains to be written, for publication in volume sixteen. To aid our Committee, we ob\u00adtained some information relative to a number of collections of Indian implements and other objects available for study, and were privileged to see the very large series brought together by Dr. J. L. Montalvo, of Ponce, and the collection of Don Pedro Monclova at Coamo. We also visited some of the many sites of aboriginal villages; these sites, along and near the southern coast, have been mapped in detail by Dr. Montalvo. Throughout, our experiences were delightful. The ample, truly wonderful driveways provide ready access to most parts of the island, and many of the country roads are traversible by small motor- cars. The tropical climate is enjoyable, tempered by the trade- wind, reaching summer heat through the middle of the day, but quite cool in the later afternoon, at night, and in the early morning. N. L. BRITTON. COFFEE The term \" coffee\" possesses different meanings for different classes of people, in accordance with their varied interests in it. To the guests at table, it means a beverage ready for use; to the average housekeeper, the roasted and ground seeds of the coffee plant, ready for the percolator or boiler. The importer and wholesale dealer think of these seeds in their'raw or unroasted state, marketed in coffee sacs, and he recognizes different classes of this raw product, according to the amount of preparation to which it has been subjected before he receives it. This also is the view of the medicine manufacturer, who uses the raw coffee, unless it is handled under the name \" caffea tosta,\" when he ex\u00adpects to receive or to supply the roasted seed in the entire condi\u00adtion. If we go to the coffee- grower, we find him using the term coffee variously, as applied to the plants in his grounds, to the crop as gathered from them, or to the seeds as they are packed ready for the market. If we carry our investigation farther, we find that the numerous brands of coffee advertised for sale to the consumer differ greatly in the operations that have been per\u00adformed upon them, in the mixture of various substances with the coffee, to change its special properties or perhaps to deceive and defraud the purchaser, or in the removal from it of one or more of its parts, with various objects in view. The coffee plants of cultivation are large shrubs, mostly per\u00adtaining to the species Coffea arabica L. Several other species, notably C. liberica Hieron., have been cultivated to some extent. The total number of species in the genus is about twenty- five. They are mostly natives of Africa, although some pertain to other tropical regions. They belong to the family Rubiaceae, or the Madder Family, best known to our public by the little Mitchella or Partridge Berry and the various species of Galium. The Cephalanthus or Buttonbush is our one large . shrub in this family. This same important family includes the ipecac plants, and also the Cinchonas, from which we derive our quinine. The coffee shrub is now cultivated in nearly all tropical regions, although it does not do well in all of them, since its demands for suitable climatic conditions are quite definite and insistent. Not only do these conditions affect the health of the plant and the success of its culture, but they have a decided influence on the 169 FIGURE I. Coffea liberica Hieron. A branch, showing leaves, flowers, and young fruits, reduced. From R. H. Cheney's book on \" Coffee,\" by courtesy of The New York University Press. character of the beverage yielded by the coffee. As the general rule, the finer grades of coffee, that is, those of finest aroma and flavor, are produced at high altitudes, while the lower elevations may produce coffee that is stronger in its nerve- stimulating activity. 170 The writer recalls an occasion when, with two companions, he was riding through a mountainous region where coffee was cul\u00adtivated, and stopped to seek a short rest with a planter whose house stood invitingly by the roadside. After a cordial greeting, our host, a complete stranger to us, whispered some instructions to a servant, who shortly reappeared with nine cups of coffee, three for each of us. Our host requested us to try them in a specified order, and then questioned us as to any differences of flavor that we might have noted. All three were quite distinct, as attested by all the guests. He then explained that all these grades were grown in his own grounds, the difference in flavor being due to conditions of altitude, soil, and exposure of the loca\u00adtions of growth. Coffee is one of the most beautiful of shrubs, at any stage of its development. With neither flowers nor fruits, it is a lovely foliage plant, its leaves being abundant, symmetrically placed in pairs, broad and thick, and of a deep- green color, with a glossy lustre and general waxy appearance. The flowers occur in clus\u00adters in the axils of the leaves, each resembling a small Gardenia, usually of a snowy white color and thick luxurious texture. They are delightfully fragrant, and are followed by oval fruits about as large as peanut kernels, and of a color changing from green to red and yellow as they ripen. Occasionally we may see a wand- like branch, perhaps two or three feet in length, densely clothed with a succession of products, quite ripe fruits at the base and opening flowers at the summit, with intervening fruits in all stages of maturity. The shrubs are planted, often on a steep hillside, in regular rows. When such a plantation is viewed, with its branches swaying in a gentle wind and the sunshine glistening from its rich waxy leaves, the effect is most intriguing. Technically, the coffee fruit is a two- stoned drupe. The outer fleshy portion, or sarcocarp, is of rather firm consistency and is not edible; nor has any important use been found for it. The two stones or putamens fit closely together by their flat sides, so that the two together have the same form as that of the fruit. Their shells are not thickened and hard, as in the plum or peach, but are chartaceous or parchment- like, and thin. They must be removed before the coffee is roasted and prepared for use. To the dealer, this putamen is known as the \" pod.\" In the flat face of each putamen there is a deep longitudinal furrow, which is also found in the face of the seed after the putamen is removed. The texture of the seed is hard and tough. The coffee fruit should be fully ripe before being gathered. The first operation is the rubbing off of the pulp. This in a large plantation is done by machine, but the man with a few plants, grown to supply his own wants, usually employs a smooth stone or a piece of hard wood, with which the fruits are abraded in a wooden bowl or trough. After the stones are washed and dried, the coffee is ready for shipment, usually in bags specially ^_ ^ IgP ~* WPm ^ MmmJTj. m | f j UMIRPfiK' \" JKt?* T* ^ mfmiKm& i'^ HKfiaW^^ HHIHS Wi i \u2022 \u2022 Si\/ i ^ \u00bb H i * f l r! Hp* ^ | jjia& 3 * j5L $ * N O M I ^ a^ P^ 1 xJ^ 1^ arm^ W ^ iffli^ H*- FIGURE 2. Coffea arabica L. A drooping branch, showing nearly mature fruits, much reduced. ( Photo taken in Porto Rico by M. A. Howe.) made for the purpose. The putamen or pod is sometimes re\u00admoved at the place of production, although not usually. When this is not done, the commercial designation of the coffee is \" coffee in the pod.\" After its removal, it is sold as \" podded\" coffee and then its keeping properties are not so good. The quality of raw coffee deteriorates with long keeping, but this effect may be greatly reduced by keeping it closely protected against the atmosphere. In such cases, great care must be taken to keep it dry, as it readily becomes mouldy. The flavor of coffee deteriorates still more rapidly after being roasted, so that many 172 housekeepers prefer to purchase raw coffee and to roast and grind it just before using. However, even ground roasted coffee will retain its flavor very well for a long time if packed tightly in air\u00adtight jars, such as fruit jars. The coffee with the pod removed constitutes the seed itself and this possesses its own covering, the testa, which is closely adher\u00adent to the kernel. This may or may not be removed before roast\u00ading. Such removal is effected by abrasion, rotating the seeds in a tumbling barrel. This process is known as \" washing\" and coffee so treated is sold under the name \" washed coffee.\" If this is not done before roasting, this outer membrane will separ\u00adate in the roasting process and will flake off as a sort of chaff, which must be winnowed out. It must be understood that unroasted coffee has none of the fragrance and flavor for which the article is valued, these being: developed by the production of new substances in the coffee by the roasting process. We must therefore next consider the con- j stituents of this interesting seed. ' The relative quality of any coffee is determined partly by its flavor and aroma and partly by its strength, the amount of coffee,., used being, of course, the same in any comparison that is made.- By the \" strength\" of coffee, we mean its power to produce the characteristic effects on the system after drinking it. This effect is produced by the alkaloid caffeine, the amount usually being between 1 and 2 per cent of its weight. The amount of caffeine can be readily determined by chemical analysis or assay. This assay will ordinarily yield a larger percentage after the coffee is roasted than before, but this is not due to any actual increase m the amount, but to the fact that the caffeine is more readily and completely extracted after the roasting. The substances that give the odor and flavor, on the other hand, are not present in the coffee before it is roasted. In that state it contains about 15 per cent of sugar, 13 per cent of fat, and a variable amount of tannin, with other substances in less amount. Under the influence of the roasting, the chemical composition of these substances is de\u00adstroyed and new substances are formed from them, which are volatile, giving the aromatic odor, and also imparting the peculiar taste for which the coffee is valued. As a rule, coffee that is strong in caffeine is less fine in odor and flavor, so that the practice of mixing or \" blending\" different 173 sorts is commonly employed to yield a product that combines all the different qualities that are desired. In the more elevated regions, like the high mountains of Jamaica, Guatemala, Colombia, Bolivia, and Arabia, coffee of exquisite flavor is produced, which brings very high prices. Some of these coffees, from the most favorable localities, are not found in the general market, being completely subscribed for in advance of production, by special M A N iiwtnsniM f SUIT fUlP COFFEE HALVfcO SINGLE BEAN. \u2022 PA iW BERBY SHOWING COFFEE r 1 ii ^ 4sf COFFEE BERRY WITH HALF OF FRUIT PULP REMOVED, SHOWIKIS TWO. COFFEE BEANS IN PARCHMENT COVERINGS. FIGURE 3. Sketches, showing structure of the coffee berry or fruit. By courtesy of The Brazilian- American Coffee Promotion Committee, through Professor Ralph H. Cheney. customers. About the best coffee that is in abundant commercial supply and readily obtainable is probably Medellin coffee, shipped from a Colombian city of that name. Almost equally good is Bogota coffee, from the same country. Most Brazilian coffee, produced at relatively low altitudes, is very strong, that is, rich in caffeine, but of rank and inferior flavor. The well- informed coffee- buyer pays no attention whatever to the common trade-marked brands nor to the advertisements concerning them, but orders by the geographical names, such as those given above. Un\u00adfortunately, in the present depraved state of our trade, one has little assurance of getting what he pays for, unless he buys from some specialist in coffee, whose integrity can be relied upon. Although a lot of samples of coffee may be quite indistinguish\u00adable to the average individual, the coffee expert knows at a glance the country of origin, the quality or grade, and the proper price. He can do the same thing also by tasting the coffee as prepared 174 for drinking. Men who do this as a business are known as coffee-tasters. The skill of these expert tasters and the accuracy of their con\u00adclusions was well demonstrated at a recent competition held in Xew York City. Forty- eight different commercial brands of coffee were tested by eight experts, the tests extending over three sessions on three succeeding days. All the samples were per\u00adcolated in the same way, by the same cook. The samples were so numbered that no taster knew what coffee he was tasting. Two tests were made at each session. In all of the tests, the same brand of coffee came out first, and another one came last in all cases. The aromatic and savory principles of coffee have little influ\u00adence in affecting the general physiological activity of the system, but this is by no means true of the caffeine that we imbibe in it. This produces profound effects upon the human system, in various ways, being capable of great service as a medicine, or of causing injury or even death if employed in excess or at a wrong time. Its direct effects are almost wholly upon the nervous system, but through the action of these nerves important secondary effects are produced on other organs. Both the activity and the strength of the heart are promptly increased, giving a better blood supply throughout the body, especially in the brain, with increased energy and activity and a great reduction in the sense of weariness and fatigue, when these exist. Increased activity from this cause is especially noticeable, and very prompt, in the work of the kidneys, and in this way there is an increased removal of waste products from the svstem. There is also a marked tendency toward a con\u00addition of comfort and cheerfulness. The most valued effects, especially when the quantity taken is considerable, are those on the intellectual faculties. Caffeine is one of the very few things that genuinely stimulate intellectual activity as a whole. Such things as alcohol appear to stimulate, because they upset the mental equilibrium, and produce an active mental disorder, whereas caffeine stimulates all the faculties equably, producing a greater amount of mental work of natural, or even superior qual\u00adity. Herein lies the great temptation to excessive coffee- drinking by intellectual workers, who are often compelled to continue mental activity beyond the point where the system demands rest for the safety of the nervous system. As a temporary emergency 175 measure, this stimulation may do, the extra effort being com\u00adpensated by a corresponding resting period thereafter. The natural temptation, however, is to abuse the assistance thus se\u00adcured and to continue to bend the intellectual bow farther and farther, until it snaps or refuses to come back to its natural and efficient state. Thus, coffee may become a habit- forming drug, although not in the same way nor to the same extent as articles of the narcotic class, which affect the intellect unequally. The result of excessive coffee- drinking, reducing the desire for and the ability to sleep and stimulating the amount and intensity of mental activity, if long continued, eventually brings on a condition of insomnia, nervousness, inability to carry on sustained effort, and other results which are quite the opposite of those produced by its moderate use. Carried still farther, there occurs a condition of inability to use the muscles in a normal way and this condition extends to the muscles of the heart. The strictly medical uses of coffee and caffeine can not be taken up here, but they are very important, and would be much more so if coffee were not used habitually, so that its medicinal effects have become to some extent prevented. The medicinal dose of caffeine is one or two grains, and this is about the amount in an ordinary full cup of coffee of average strength. All that has been said of coffee applies also to tea, which, ounce for ounce, contains about twice as much caffeine as coffee. This alkaloid is also contained in much larger amounts in guarana, the national beverage in northern Brazil, in cola seeds, used in tropical Africa, in matte or Paraguay tea and in cassine or dahoon, of the southern United States, which was a much used beverage and an important article of commerce among the aborigines, when they inhabited that country. Because of the tendency to acquire a habit of excessive coffee- drinking, many persons have adopted the use of coffee from which most of the caffeine has been extracted, this process not seriously impairing the flavor of the coffee. The adulteration of ground coffee, by the addition of various subtances, has been carried on to an enormous extent. Many substances have been used for this purpose, beans and chicory root probably having predominated. It is a notable fact that after a person has long been accustomed to the use of one of these adulterated coffees, he may acquire a taste for it to such an extent that he no longer cares for the pure product. H. H. RUSBY 176 PLANT LIFE SOUTH OF THE ICE FRONT DURING THE GLACIAL EPOCH* _ One of the many questions frequently asked of the geologist is in relation to the kinds of life- animal and vegetable- that ex isted south of and in the vicinity of the ice front at the time when he great continental glaciers of the Glacial Epoch or Ice Age of the Quaternary Period covered practically the entire boreal and north temperate parts of North America and Europe We have learned considerable about the animal life- the mam\u00admoth, mastodon, woolly rhinoceros, cave bear, giant sloth e t c - but we know comparatively little about the contemporary vegeta\u00adtion. It should be said, however, that search for the remains of this vegetation, and its study, have been carried on in the Old World to a much greater extent than in America. There is ample evidence that the glaciation was not continuous. There were several advances and recessions of the ice. A glacier advances by the actual movement of its mass; but when it recedes it does not move backward. Recession simply means that its front is melting away more rapidly than the mass is advancing. Where this condition obtains, it manifestly indicates warmer cli\u00admatic conditions than previously prevailed. Hence we infer that the Glacial Epoch included periods of cold with warm or tem\u00adperate periods intervening. Throughout the glaciated region of the Ice Age all forms of life were frozen or ground out of existence; but close to the ice front\u2014 if we may judge from conditions close to many existing glaciers\u2014 plant life was in existence and plants followed every\u00adwhere in the wake of the ice front wherever it receded. Remains of the vegetation of the Ice Age have been preserved in the silts of glacial lakes and ponds, in the morainal debris along the line of furthest ice advancement, and in swamps and lowland areas beyond, which were buried beneath deposits of sand and gravel transported by streams from the melting ice- front. In Maryland, for example, we find old swamps1 buried under successive layers of gravel, sand, and clay that represent the sedi\u00adments transported from the north. The plant remains, preserved * Abstract of an illustrated lecture delivered at The New York Bo\u00adtanical Garden, Saturday afternoon, March 15, 1930. 177 in the form of peat and lignite, show that the vegetation then in existence there was almost identical with that of a modern cypress swamp, such as the Dismal Swamp of Virginia. Evidently at this distance south of the ice front\u2014 which, in the eastern part of North America, reached its furthest southern extension at about the latitude of New York City\u2014 the climatic conditions were about the same as they are today. Close to the ice front, we have evidence of cooler climatic con\u00additions. Leaves of poplars, birches, ericaceous shrubs, etc., are frequently found in the sediments of glacial lakes and ponds that were topographic features of the period; and now and then the leaves and cones of coniferous trees that are typically representa\u00adtive of northern regions. The genera are all identical with those now in existence, and so also, apparently, are most of the species. The lecture was illustrated by lantern slides of maps that showed the glaciated areas of Europe and North America, views of modern glaciers, localities where plant remains of the Ice Age have been found, photographs and drawings of many of the fossil plant remains, etc. ARTHUR HOLLICK. THE TREES AND SHRUBS OF GREATER NEW YORK* The total area of greater New York, comprising the five bor\u00adoughs of Manhattan, Brooklyn, Bronx, Queens, and Richmond ( Staten Island) is larger than many people realize. Its 315 square miles are equal to about one fourth of the area of the state of Rhode Island. This large area is by no means all thickly set\u00adtled. There are many sections still awaiting development, and fortunately large tracts have been reserved for public parks. With the growth of the city in years to come, these public parks will contain the sole representatives of our native flora, and it is im\u00adportant that as much of them as is practicable be preserved in its natural condition. Parts of Central Park, especially near its north end, have been left in this wild state; also, Pelham Bay Park and Van Cortlandt Park in the Bronx together cover nearly 3000 * Abstract of an illustrated lecture given at The New York Botanical Garden on Saturday afternoon, June 21, 1930. i78 acres, much of them in a state of nature. It is very important that this policy be continued. In Manhattan another beautiful wooded area is the new Inwood Park. Around Flushing there are locali\u00adties of interest to tree- lovers, and Kissena Park preserves many rare, exotic specimens that were originally nursery- grown. The terminal moraine north of Jamaica and Hollis is another interest\u00ading region. But the greater amount of wild land in the city may still be found on Staten Island, and we hope the present movement for enlarging the park system there will prove successful. From a botanical standpoint the Greater New York area is of great interest because it is the meeting place of more southern spe\u00adcies such as Sweet Gum, Willow Oak, Persimmon, Black Jack Oak, Virginia Pine, etc., with more northern species such as Sugar Maple, Beech, Yellow Birch, Hemlock, etc. On this account the area shows an unusually large variety of native species. Nine species of oaks and four kinds of hickories are common in the Greater City and can readily be distinguished with a little practice. The birch family is also well represented. Altogether, over 150 species of trees and shrubs are of fairly common occur\u00adrence. The effect of the gas and smoke from automobiles ( automo-bilosis) on the street trees has become a serious problem. Most trees along much- traveled streets show their leaves on the lower limbs blackened and curled around the edges. The London Plane and Oriental Sycamore, as well as the Ailanthus, seem to with\u00adstand these noxious gases and the dust and"} +{"id":"RedPajamaC4.0012","text":"Agenda The Shadow a CEO initiative is a great opportunity for budding managers to spend quality time with top CEOs and contribute to worthy causes. We have the who's who of the corporate world lined up to mentor you - the most promising future leaders in India. Here is the one's who've signed up so far - and we have more on the way! Arnab Goswami Editor-in-chief and News Anchor Indian news channel Times Now and ET Now. Nirmal Jain Chairman India Infoline Ltd. Shiv Shivakumar Chairman and CEO PepsiCo India Holdings Pvt. Ltd. Sudhanshu Vats Group Chief Executive Officer Viacom18 Media Pvt. Ltd. Varun Berry MD Britannia Industries Ltd. Born in August 3rd 1955, Ajay Piramal is one of India's leading industrialists, philanthropists and social entrepreneurs. He heads one of India's largest business groups (Market Cap USD 7 billion; FY 2015 revenue USD 2.5 billion), with activities in healthcare, real estate, financial services, information services, and glass packaging. The businesses of the Piramal Group have operations in the UK, US, Germany, Sri Lanka, Japan, Hong Kong and India and their products and services are sold in over a 100 countries. Mr Piramal became the Chairman of the Piramal Group at the young age of 29. Known for identifying opportunities ahead of the curve, he diversified from the century old textile family business Morarjee Mills into the healthcare sector by acquiring Nicholas Laboratories Ltd. in 1988. Since inception the revenue for Piramal Enterprises has grown at a CAGR of ~25%. PEL generated annualised returns of ~ 30% for their shareholders. The company become one of the top three globally in critical care anaesthesia gases, contract manufacturing and research. The group has over 600 scientists and 1000 patents. In 2010, a portion of the Group's pharmaceutical business was sold to Abbott Labs for Rs.18000 Crores. The Piramal Group has continued on its innovative path, utilizing proceeds from the sale, the company has made several investments including the Acquisition of Decision Resources Group, a global leader in providing research, data, analytics and insights to the Global Pharma industry, the acquisition of a division of Bayer Imaging, which help to identify Beta-Amyloid Neuritic Plaques, which have been shown to correlate with Alzheimer's' Disease, an investment in Vodafone India, which generated an IRR of 19% on a ~$ 1.2 billion investment, investment in the India financial services company, Shriram Transport and Shriram Capital, amongst other things. He is the Chairman of Piramal Glass, the fastest growing specialty glass players in Asia and Piramal Realty which aspires to be the most respected real estate developer in India. In the social sector he has established the Piramal Foundation which has created break-through initiatives that have made a positive difference to millions of people in healthcare services, rural education, potable water, livelihood creation & youth empowerment, improving access to primary healthcare, leadership capacity in government schools and for generating livelihood for rural women. He has made valuable contributions in public policy by serving on the Prime Minister's Task Force on Knowledge-Based Industries and Prime Minister's Council for Trade & Industry. He has served as a Director for the State Bank of India. Presently, he serves on the Harvard Business School's Board of Dean's Advisors and the Chairman of the Board of Governors of IIT Indore. Mr Piramal has won several global awards in recognition of his philanthropic work, including the Forbes Philanthropy Awards in the Outstanding Philanthropist category in 2013 and 2014. He was selected as a Global Leader of Tomorrow by the World Economic Forum before he was forty. He has been awarded as 'Entrepreneur of the Year' Award, UK (2006), 'CEO of the Year Award' by World Strategy Forum. Recently, Mr. Ajay Piramal, has been conferred with an Honorary Doctorate Degree in Philosophy (D. Phil) by the Amity University, India. In July 2015, Mr. Piramal won the \"Business Leader of the Award\" instituted by the Indo-American Chamber of Commerce. Mr Piramal did B. Sc (Hons.) from Bombay University (1975). He completed his M.M.S. from Jamnalal Bajaj Institute of Management Studies (1977) and AMP from Harvard Business School (1992). Amit joined Bain Capital in early 2008 to set up the Mumbai office. Prior to joining the firm, he had spent most of his professional career at DSP Merrill Lynch, a leading investment bank in India. He retired from DSP in 2007 as its Board Member & senior most Managing Director, with direct oversight of its Global Markets & Investment Banking business. Amit started his professional career as an engineer at India's leading engineering & construction firm, Larsen & Toubro. Amit is a Member of the Board of Directors of Genpact, Piramal Enterprises, Tata Investment Corporation and Emcure Pharmaceuticals. He is also active in India's not for profit space and serves as Governing Council Member \/ Founder of Ashoka University, and as a Trustee\/Board Member of The Akanksha Foundation (providing education to less privileged children) and GiveIndia (India's leading philanthropic exchange). Amit was named Next Generation Philanthropic Leader of the Year by Forbes in 2013. He received his MBA from Boston College and was awarded the school's Distinguished Alumni in 2007. He received his undergraduate degree in Electrical Engineering from VJTI, Bombay University. He was named as a Young Global Leader by the World Economic Forum in 2007. Amitabh Chaudhry is the Managing Director and Chief Executive Officer at HDFC Life. He has been with the company since January 2010. HDFC Life is today recognized as the premium brand in the insurance space and is one of India's largest private life insurers. Before joining HDFC Life, he was the MD and CEO of Infosys BPO Ltd and was also heading the testing unit of Infosys Technologies Ltd. He played a critical role in building the BPO from its inception to an extremely profitable business with presence in eleven centers across seven countries. He started his career in 1987 with Bank of America and worked in diverse roles ranging from Head of Technology Investment Banking for Asia, Regional Finance Head for Wholesale Banking and Global Markets and Chief Finance Officer of Bank of America (India). He moved to Credit Lyonnais Securities in 2001 where he headed the investment banking franchise for South East Asia and structured finance practice for Asia before joining Infosys BPO in 2003. Mr. Chaudhry completed Engineering in 1985 from Birla Institute of Technology and Science, Pilani and PGDBM in 1987 from IIM, Ahmedabad. He serves on the Board of Manipal Global Education Services Limited, a market leader in corporate and college education in various emerging markets and Shriram Transport Finance Co Ltd, one of the largest non banking auto finance companies in India. He is also an Independent Director with Credila (an HDFC Ltd. Company), India's First Dedicated Education Loan Company. Mr Analjit Singh is the Founder Chairman Emeritus of The Max Group a $2.5 billion multi business enterprise, with interests in life insurance (Max Life), health care (Max Healthcare), health insurance (Max Bupa),senior living (Antara). Max Group is renowned for service excellence and has successful joint ventures with some of the pre-eminent firms of the world including Mitsui Sumitomo of Japan, Life Healthcare of South Africa and Bupa Plc of the United Kingdom. Earlier partners include, New York Life Insurance Company, Hutchison Whampoa, Motorola and Lockheed Martin. Amongst his private businesses, Mr Analjit Singh has significant interests in real estate in India and lifestyle related ventures in the Western Cape, South Africa, pertaining to viticulture, wine making and hospitality. The activities are centred around the Franschhoek Valley and Riebeek-Kasteel in the Swartland region of the Western Cape, South Africa. A self-made entrepreneur Mr Analjit Singh was awarded Padma Bhushan, India's third highest civilian honour, by the President of India in 2011. An alumnus of The Doon School and Shri Ram College of Commerce, University of Delhi, Mr Analjit Singh holds an MBA from Graduate School of Management, Boston University. He has been conferred with a honorary doctorate by Amity University. Professionally, he is the non-executive Chairman of Vodafone India and a Director on the boards of Tata Global Beverages and Sofina NV\/SA, Belgium. Till recently, he served as Chairman of the Doon School. Mr. Analjit Singh is a member of the Founder Executive Board of the Indian School of Business (ISB), India's top ranked B-School, and has served as Chairman of Board of Governors of the Indian Institute of Technology (IIT), Roorkee- India's oldest and most prestigious engineering college. He has instituted a scholarship fund for meritorious management students from India at his alma mater-Graduate School of Management-Boston University. The scholarship runs under the rubric MAS (Max Analjit Singh Scholarship). Mr Analjit Singh is a member of the Prime Minister's Indo UK CEO council. In past he has also served on the Prime Minister's Indo US CEO council. Mr Analjit Singh has also served as the co-chair of Prabodhan, a unique forum for facilitating closer and more effective engagement between European and Indian decision makers and opinion leaders with Mr Ratan Tata-Chairman Emeritus of Tata Group and Vittorio Colao-Group Chief Executive of Vodafone as co-patrons. He has been felicitated by Senator Hillary Clinton, former US Secretary of State on behalf of Indian American Centre for Political Awareness for his outstanding achievement in presenting the international community with an understanding of a modern and vibrant India and for creating several successful joint ventures with leading American companies and promoting business ties with the USA. He has been honoured with the Ernst and Young Entrepreneur of the Year Award (Service Category) and the Golden Peacock Award for Leadership and Service Excellence. In 2014 he was awarded with Spain's second highest civilian honour, the Knight Commander of the Order of Queen Isabella and the Distinguished Alumni Award from Boston University. He also serves as the Honorary Consul General of the Republic of San Marino in India. Anand Kripalu took over as Chief Executive Officer of United Spirits Ltd. (USL), on the 1st of May 2014. Subsequently, he was appointed as Director and Managing Director on 14 th August 2014. He is also a member of the Diageo Global Executive Committee. Anand was formerly President, India and South Asia, at Mondelez International, and Managing Director of Cadbury India Ltd. In this position, Anand played a key role in leading Mondelez in India after the Cadbury acquisition by Kraft. He presided over eight years of continuous industry leading growth and helped the business earn status as one of India's Most Admired Companies. He joined Cadbury India at the end of 2005 as Managing Director - Indian SubContinent and was subsequently appointed President - Cadbury Asia in October 2008. Prior to this, Anand worked in Unilever for 22 years. He joined Unilever in 1983 through the erstwhile Indian division of Chesebrough Ponds and went on to hold several key positions in Sales and Marketing. He set up the Dental Innovation Centre at Mumbai, was Head of Market Research, Head of Marketing for the Laundry category for India and the Central Asia Middle East Region, and General Manager - Sales & Customer Development for the Detergent business. In his last assignment as Managing Director for Unilever's East Africa operations, Anand turned around a loss making business to deliver double-digit growth. Anand is on the board of Marico Ltd since 2007. In 2009-10 he chaired the CII National FMCG Committee. He has been on the Managing Committee of the Bombay Chamber of Commerce and Industry and the National Executive Committee of FICCI. He is currently the Chairman of the CIABC (Confederation of Indian Alcoholic Beverage Companies), the apex association for all alcobev companies. Anand earned a Bachelor's Degree in Electronics from the Indian Institute of Technology, Madras and an MBA from the Indian Institute of Management, Kolkata. He completed the Advanced Management Program from Wharton Business School in 2004. He was recently conferred with the Distinguished Alumnus Award from IIM Kolkata. Anurag Behar, a man who wears many hats, acts as the CEO of the Azim Premji Foundation; Vice Chancellor of the Azim Premji University & Chief Sustainability Officer of the Wipro Group; as well as a part of their Group Executive Council. He is also closely involved with Azim Premji Philanthropic Initiatives, a grant-making organization supporting not-for-profit organizations working on certain specific issues in the social sector. Anurag has been engaged with efforts to improve education in India for the past fourteen years. He has been a vocal advocate for the critical importance of public systems, in particular the public education system. His many years in business have given him an insider's view in to both the possibilities and limits of markets. For the past few years he has also been engaged with environmental and ecological issues. He writes a fortnightly column for the newspaper Mint, on Education and Ecology. Anurag has earlier played leadership roles in business. As the CEO of Wipro Infrastructure Engineering, he led the business from being No. 20 in the world to being the No. 1 in 5 years. The business has operations in Europe, India, Brazil, and China. He led Wipro's investments in two strategic diversifications - in the Clean Energy and Water sectors. He has been responsible for many corporate functions for Wipro including Brand, Quality and Innovation. In the early part of his career he was part of the team that built the leadership position of Wipro GE Healthcare in South Asia. Anurag has served on the Board of Wipro GE Healthcare Ltd and of the TERI University. He serves on various government & industry councils, such as the National Mission on Teachers and Teacher Education, the Government of India implementation committee for the Justice Verma Commission, and with the CII's National Climate Change Council. He is on the board of the Institute of Trans-Disciplinary Health Sciences and Technology. He has been honored by the World Economic Forum, by being elected as a 'Young Global Leader'. He is equipped with an MBA from XLRI, Jamshedpur and a BE in Electrical & Electronics Engineering from National Institute of Technology, Trichy. He is a long distance runner. Mr. Bhargav Dasgupta, is the Managing Director & CEO, ICICI Lombard General Insurance Company Limited, the largest private sector general insurance company in India. Mr. Dasgupta began his career with the erstwhile ICICI Limited in 1992 and he has held key leadership positions in diverse business areas in the ICICI Group including Project Finance, Corporate Banking and Treasury; E-commerce; Strategy; International Banking and Life Insurance. Mr. Bhargav Dasgupta holds a PGDBA from the Indian Institute of Management Bangalore and a B.E (Mechanical) degree from Jadhavpur University. Mr. Bhaskar Bhat is currently the Managing Director of Titan Company Limited. He received his B.Tech degree in Mechanical Engineering from IIT Madras in 1976 and PGDBM from IIM Ahmedabad in 1978. Mr. Bhat started his career as a management trainee at Godrej & Boyce Manufacturing Co. (P) Ltd. in 1978. After spending five years at Godrej, he joined the Tata Watch Project initiated by Tata Press Limited. Since 1983 he has been associated with the Tata Watch project which later became Titan Watches Limited to Titan Industries Limited and now Titan Company Limited. Bhaskar having been at Titan since inception has engineered the creation of such endearing Indian brands as Titan, Tanishq, Sonata, Fastrack, Titan Eyeplus, Goldplus, Xylus and so on. He pioneered the concept of franchising and retailing in these Industries. Titan Company Limited has grown to become the largest watch manufacturer in India and the fifth largest in the world. Under his leadership, the Company has enlarged its portfolio. The Company now has four main business units: watches, jewellery, eyewear and precision engineered components and in addition markets Fragrances, Bags and Ceramic ware. Bhaskar is also associated with education institutions such as TA Pai Management Institute as a member of the Governing Council and is the Chairperson of the Board of Governors, NIT - Uttarakhand. After he was recognised as a Distinguished Alumnus at IIT - Madras in 2008, IIM - Ahmedabad also conferred the Distinguished Alumnus Award on him in 2011. Mr. Kumar Mangalam Birla took over as Chairman of Aditya Birla Group in 1995, at the age of 28. From a turnover of US$ 2 billion and operations in 8 countries in 1995, today under his stewardship, the Group's revenues are in excess of US$ 41 billion with operations straddling 36 countries. He has made 36 acquisitions globally \u2013 the highest by an Indian multinational. An iconic figure, Mr. Birla has won several accolades, to cite a few \u2013 the International Advertising Association's (IAA) \"CEO of the Year Award 2016\"; US India Business Council (USIBC) 2014, \"Global Leadership Award\"; Economic Times \"Business Leader Award\" in 2003 and 2013; Forbes India Leadership Award \u2013 Flagship Award \"Entrepreneur of the Year 2012; NDTV Profit Business Leadership Awards 2012, \"Most Inspiring Leader\"; CNBCTV18 IBLA \"Business Leader for Taking India Abroad 2012\"; CNN-IBN \"Indian of the Year Award 2010\"; JRD Tata \"Leadership Award 2008\"; NDTV's \"Global Indian Leader of the Year 2007\". An educationist, Mr. Birla is the Chancellor of Birla Institute of Technology & Science (BITS). He is Chairman of IIT, Delhi, and Chairman of Rhodes India Scholarship Committee for Oxford University. He serves on London Business School's Asia Pacific Advisory Board and is an Honorary Fellow of the London Business School. A Chartered Accountant, Mr. Birla earned an MBA from London Business School. Mr. Birla and his wife, Mrs. Neerja Birla, have three children, Ananya, Aryaman Vikram and Advaitesha. Sudhanshu Vats is Group CEO, Viacom18 Media Pvt. Ltd. responsible for all their brands\/businesses comprising Colors, Rishtey, MTV, MTV Indies, Nick, Sonic, Nick Junior, Vh1, Comedy Central, Colors Infinity in Broadcast Entertainment and Viacom18 Motion pictures in Filmed Entertainment. In the last three years he has successfully steered the group into profitable growth phase while expanding the channel network, driving content led cinema and entering experiential entertainment through live events across genres. A Hindustan Unilever (Unilever India) veteran Sudhanshu Vats has spent about 20 years with Unilever in different assignments. A Management Graduate from Indian Institute of Management - Ahmedabad, he joined Hindustan Unilever Limited as a Management Trainee and has since worked with them in various Sales & Marketing and General Management roles across different categories (Home & Personal Care and Foods) and in all the four geographies in the country. During his tenure he has shaped many popular Household brands, most notably Lipton, Vim, Wheel, Surf, Rin, Lifebuoy & Lux. He has also done a short-term assignment on Modern Trade (Organized Retailing) in Thailand. In his last assignment with Unilever as Vice President \u2013 Laundry South Asia & Radiant based in Mumbai he grew South Asia Laundry business in strong double digits crossing the Euro 1 bn Turnover milestone in 2011. In his earlier assignment as Vice President - Skin Cleansing and Laundry & HHC, HUL India, he successfully led the Laundry and HHC categories doubling this large business segment in the last four years. Sudhanshu successfully launched three brands in India - Comfort in 2006, Lipton Ice Tea in 2002 and Domex in 1997. In 2002 he worked closely with Pepsi (India) and PBI globally to a forge the JV for Lipton Ice tea in India. He has also done a short-term assignment on Modern Trade (Organised Retailing) in Thailand. He developed a detailed 5 year plan for HUL Modern Trade business laying the foundation for the same and developed Rural Distribution Strategy for HLL in 2001. Sudhanshu won many awards at Hindustan Unilever. Some of the notable ones being Unilever Global Award for Laundry in 2008, Asia AMET Award for Laundry in 2007 & 2008, Chairman's Award (India) for Laundry in 2007 & 2008, Chairman's Award (India) for Launch of confectionery in 2002 and Director's Award (India) for Lipton in 2003. During 2004-2005, Sudhanshu worked with BP in India for about 18 months as Vice President Marketing. During this period he successfully re-launched Castrol Master Brand in Oct 2005 within a record three month turnaround time. First country in the world to re-launch Castrol Master Brand and the new Product Brand Architecture. This re-launch had many firsts \u2013 PR, Creative development, Design adaptation. He won The Transcon Award, Helios (highest bp award) Regional Commendation. Sudhanshu is an NTSE Scholar and All India Merit Position holder (CBSE 1983). He was the Head Boy of his school and was awarded the Governor's medal for the Best All Around Student at MNSS, Rai in 1985. A brilliant speaker who won many debating competitions, a theatre enthusiast who acted and directed plays including Shakespearean theatre and a fine cricketer (Keeper Batsman) who played at the State level, Sudhanshu went on to win the Gold Medal for the Best All Rounder at NIT Kurukshetra in 1989. Sudhanshu leads industry thinking and brings a fresh perspective to the Media & Entertainment sector. He is committed to the development and expansion of this sector in India. He is Director on the Board of IBF (Indian Broadcasting Foundation), Director on the Board of BARC (Broadcast Audience Research Council) and Chairman of the National Media and Entertainment Committee of CII (Confederation of Indian Industry). Sudhanshu is married. His wife, Deeksha is an Environmental Professional. He has two daughters, Akshiti and Avni. He is an avid trekker and runs full marathons regularly. He is a Sub 4 hour marathon runner. Education is his Giving Space where he actively contributes towards Primary School Education for the underprivileged. Shaheen Mistri is the CEO of Teach For India, and serves as one of its founding board members. She has earned global recognition for her devotion to educating and empowering the less privileged children of Mumbai and Pune. Born in Mumbai, Mistri lived in thirteen different countries while growing up. At the age of eighteen she returned to Mumbai, keen to learn more about the city and its slums, when she decided to enroll at the University of Mumbai. Mistri knew about inequalities in India's education system. But what she saw shocked her. Mistri soon came to realize that children living in the slums lack access to quality education and are deprived of the skills necessary to compete in India's formal, competitive job market. She founded the first Akanksha Center in 1989, enrolling fifteen children and employing college friends as volunteers. It eventually evolved into the Akanksha Foundation, a nonprofit education project that provides after-school tutoring to disadvantaged children at more than 60 centers and formal education at six schools. The centers and schools are in Mumbai and Pune. Volunteers, mostly college students, teach children using an innovative methodology, which has won the foundation international honors. Over the past twenty years, the Akanksha Foundation has expanded from serving fifteen children in one center to almost 4,500 children in fifty-one centers in Mumbai and Pune. As the recognition of Akanksha's work grew, Mistri continued to see a disparity between the magnitude of problems that plague India's education system and the contribution her organization could make to solve them. She saw an opportunity to expand her reach and work for more transformative changes when she met Wendy Kopp, the founder of Teach For America. The U.S. program recruits and trains outstanding recent college graduates, who commit to teach for two years in U.S. public schools. Two decades later, Mistri has used her conviction and enthusiasm to motivate college students and young professionals to join the Teach For India movement and devote two years of their lives to end educational inequity in India. The challenge of transplanting the concept to a system as complex and diverse as India's (eight languages are accepted for school instruction) is tremendous. Mistri and her colleagues launched Teach For India in 2008, after which the organization has recruited almost 1700 teaching Fellows till date for its two-year teaching Fellowship. \"Through Teach For India we work to eliminate inequity in education in India,\" says Mistri. \"Initially, on my part, it was an attempt to learn about myself by teaching children. But the work has outgrown my or anyone's personal intentions. Our belief is that every child must have an excellent education to develop his or her potential fully. With this vision in mind, we are building a movement of leaders for educational reform. Mr. Rahul Khosla is a seasoned business leader with deep management experience, broad leadership skills and wide business perspectives, developed over a global career spanning more than thirty years. He is currently President, Max Group and Executive President, Max Financial Services. In addition, he is the Chairman of the Boards of Max India, Max Life Insurance and Max Healthcare. He also serves on the Boards of Max Bupa Health Insurance and Antara Senior Living. As Group President, Mr. Khosla is the Max Group's preeminent executive. He is responsible for group strategy, overall management of group capital, performance, human capital, partnerships, governance, policies, brand, reputation and external representation, while deepening the Group's framework of core values. Till January 2016, Mr. Khosla was the Managing Director of the erstwhile consolidated Max India Limited. Under his leadership over the past four years, the Max Group has successfully delivered superior financial performance, significantly grown market capitalization, built organizational depth and concluded seminal corporate transactions across its businesses. He has formulated and is leading the implementation of a comprehensive strategic framework across the Group to deliver long-term value. Before joining Max, Mr. Khosla spent 11 years in Singapore as the Group Head of Products for Visa across Asia Pacific, Central Europe, Middle East and Africa. This was preceded by hisrole as Chief Operating Officer of Visa for the Asia Pacific region. Prior to Visa, he held several senior roles - Country Head for ANZ Grindlays' consumer banking businesses in India; Head of Retail Assets, Strategy, Finance and Legal at Bank of America and CFO for the American Express TRS businesses for India and South Asia, eventually going as Business Leader to help set up a pioneering in-house global processing facility for American Express. Mr. Rahul Khosla is President, NatHealth, India's leading multi-stakeholder platform for healthcare organisations, and Co-Chairman of the CII National Committee on Healthcare. In addition, he serves on the Executive Board of the Indian School of Business (ISB), one of Asia's top B-Schools. Sunil Lulla is the Chairman and Managing Director of Grey Group India. With over 30 years of experience, Sunil brings skills in media, marketing, communication and management. Sunil spent an early part of his career, which spanned over a period of nine years, in advertising with J Walter Thompson (JWT) in Mumbai, Taipei and Shanghai. There, he worked in the capacity of client services and planning on well-known brands such as Unilever, De Beers, Parke Davis, Citibank and others. His early exposure to management came in being part of the team, which turned around the music company (HMV\/ EMI), now known as Saregama, where he was responsible for music acquisition and marketing. In the first wave of the Internet, Sunil with other entrepreneurs rolled out indya.com, a leading portal, which got acquired by News Corp. He brought zing and youthfulness to MTV, which via its re-launch and Indianisation, became a youth icon in India. His approach to global and differentiated content for SONY saw the mainstream TV channel's viewership treble and its revenues double. As Managing Director at the Times Television Network, Sunil helped build the television business for The Times Group, with a portfolio of five TV channels, all which became market leaders in their respective space. With over 16 years of TV broadcasting experiences, Sunil has been a prominent member on many industry boards and forums where he shaped policies and set industry standards and best practices. He is married to Vinodini who works in the social sector. Their daughter, Ayesha, is pursuing a Master's degree in Psychology. Every few years, Sunil engages in a new passion. He has taken on learning the tabla, mixology, drawing, sailing, and now mid-distance running, which started in 2013. Thus far, he has participated in four half-marathon (21 km) races with a timing of under two hours in each of them. Shantanu Prakash founded Educomp Solutions Limited in 1994, a few years after acquiring an MBA degree from the Indian Institute of Management, Ahmadabad. His vision has been to transform the teaching-learning process through the use of technology and best practices. Educomp is the leader in education content, professional development, online learning and the first company to set up high quality schools across the country. Educomp works with over 32,000 schools and 20 million students across the globe. The company employs over 12000 people across India, USA and Singapore. Under Shantanu's leadership, many awards and accolades have come Educomp's way. Educomp was ranked number one in Education & Training in the study, \"India's Best Companies to Work for-2009\". Educomp won top honours in the for-profit category, winning the NASSCOM Foundation Social Innovation Honours-2010. Educomp was also named in the 200 \"Best under a Billion\" for the Asia-Pacific region by Forbes magazine in 2008 and 2011. Similarly BT 500, over the years and most recently in 2012, has featured Educomp in its list of most valuable private companies in India. titled 'Stay Hungry Stay Foolish' by Rashmi Bansal published in May 2008 which has been a best seller ever since. It is also the recipient of the \"Frost & Sullivan India Technology Innovation Award 2015\" for e-Learning platform. Educomp was conferred with two awards at the \"South Asia Education Summit Award 2014\" (organized by ICT Post in association with UNESCO), Best in Ongoing Teacher Enhancement \u2013 where its 'Evolve Teacher Training System' won accolades and the Best in Academic Innovative Curriculum \u20132014. where its 'E-DAC Learning System' scored. At the India Education Awards 2015, Educomp won the award for the Most Impactful PPP program in Skill Development. Shantanu is also the founder and Managing Trustee of the Learning Leadership Foundation (LLF), an organization dedicated to bringing best practices in education to under-resourced schools. He is on the international advisory board of Fundacao Dom Cabral, Brazil and a member of the Global Agenda Council on Emerging Multinationals with the World Economic Forum. As an investor, Shantanu has made several investments in innovative early stage and mid stage companies focusing on the internet, education, media, gaming, finance and infrastructure. Shantanu is a charter member of TiE (The Indus Entrepreneurs) an organization that connects entrepreneurs. He is a frequent speaker in education and business conferences worldwide. Anshu Gupta is the Founder Director of Goonj, an award winning pan India non profit organization. Popularly called the Clothing Man Anshu is the recipient of 2015 Ramon Magsaysay Award for his work on transforming the culture of giving in India. Having studied mass communication and economics, Anshu started as a freelance journalist and went on to a corporate career which he eventually left to start Goonj in 1998. Goonj was founded with a mission to make clothing a matter of concern and to bring it among the list of subjects to work on in the development sector. Starting with 67 personal clothes, today Goonj channelises about 2000 tons of material every year including disaster relief and rehab. works and has 11 offices with about 300 full time people as a formal team. Under Anshu's leadership and vision Goonj has taken the menacing growth of urban waste and used it efficiently as a tool to trigger large scale development work in rural India. By creating a barter between two new currencies; labor of the the person in the villages and the old material of cities, Goonj has built the genesis of a ' parallel economy which is not cash based but trash based' . Anshu brings to the table an instinctive empathy and connect with people by dignifying the act of giving. In the macro picture he has identified some basic needs outside the radar screen of the governments, business and development sector by structuring some imaginative solutions using urban waste. Anshu is known as one of the leading social entrepreneur and is an Ashoka and Schwab Fellow apart from being a member of the Humanitarian Crisis Council of the World Economic Forum and has been listed by the Forbes magazine as one of India's most powerful rural entrepreneurs. Mr S. Sivakumar is a Member of the Corporate Management Committee of ITC Limited, () one of India's leading companies with a diverse portfolio of businesses. He oversees ITC's Agri and Information Technology Businesses with annual revenues of US$ 2 Billion. ITC is a global exemplar in sustainable business practices and is the only company in the world, of comparable dimensions to be 'carbon positive', 'water positive' and 'solid waste recycling' positive. The pioneering farmer empowerment initiative, ITC e-Choupal, conceptualised by Sivakumar, benefits over 4 million small farmers through customised agri-extension and market linkage services, while providing a unique source of competitive advantage to ITC's packaged foods business. ITC e-Choupal has won several awards including UNDP's World Business Award, Wharton-Infosys Business Transformation Award, Development Gateway Award, Stockholm Challenge Award and India Innovation Award. Sivakumar himself is also honored with the World Technology Award. Sivakumar is currently the Chairman of the National Agricultural Council of the Confederation of Indian Industry (CII), Vice Chairman of the World Economic Forum's Global Agenda Council on Social Innovation, and a member on the Board of Governors of Institute of Rural Management, Anand (IRMA). Sivakumar served on the Boards of India's National Bank for Agriculture and Rural Development (NABARD), and Indo US Knowledge Initiative on Agriculture, the Private Sector Committee of the Consultative Group on International Agricultural Research (CGIAR), and UN Global Compact's Core Advisory Group to develop Sustainable Agriculture Business Principles, among other organisations. Sivakumar is an MBA in Rural Management, Class of 1983 from IRMA. Sivakumar is a passionate photographer and a regular blogger (http:\/\/shivsthirdeye.blogspot.com\/). He can be reached at @S_Sivakumar on Twitter. Vipin Sondhi is the Managing Director and Chief Executive Officer of JCB India Limited, and has led the company's growth journey in India over the past 10 years. JCB India has since established market leadership in the Construction and Earthmoving Equipment Industry. Backed by the Industry's finest after sales service system and with five state-of-the-art factories in India conforming to JCB's Global Quality standards, Mr. Sondhi has led the growth of JCB India's export business spanning over 60 countries. He has also successfully managed the acquisition, retention and development of a world-class team that has been instrumental in strengthening the company's operations and steady expansion. He is an alumnus of The Indian Institute of Technology \u2013 Delhi and The Indian Institute of Management \u2013 Ahmedabad. Mr. Sondhi has over three decades of experience in Manufacturing and Engineering based companies such as Honda, Tata Steel and Tecumseh ( An American company which was the world's largest manufacturer of compressors for refrigerators and air conditioners in its time). He is an elected member of the CII National Council and the Chairman of the Capital Goods Committee. He was awarded the Confederation of India's Young Manager's Trophy in the year 2000, The Udyog Rattan Award by the Institute of Economic Studies in 2011 and The CEO of the year award at CEO India Awards in 2014. He lives in Delhi with his wife and daughter. Arjun Nohwar heads the enterprise vertical for Uber (Uber for Business) in Asia Pacific. Prior to joining Uber, he worked for nine years with the Tata group (as a TAS officer), the last three years of which were spent working with the Group Chairman on international business development and sovereign coverage. He has worked across the automotive, telecom, real estate and financial services industries and also spent a year at the Planning Commission of India devising the country's manufacturing strategy. Arjun is also on the Board of Advisors of AMBA, an organization that leverages Information Technology to provide sustainable livelihood to adults with moderate and severe intellectual disability. A keen Golfer and avid reader, he is currently based out of Mumbai. Rahul Joshi heads the news operations of Network18 since September 2015. An alumnus of Narsee Monjee Institute of Management Studies 1994, Rahul has worked with The Economic Times for over 20 years, ten years as its editorial director. He was also the founding editor of the newspaper's sister channel ET NOW, which was launched in 2009. Uday Shankar is the Chairman and CEO of Star India, one of the largest Media & Entertainment companies in India reaching over 650 million viewers a month across India and more than 100 other countries. Uday has been a leading voice in the Indian media and broadcasting sector, shaping reforms for the industry and consumers. He currently serves as the Chairman of the FICCI (Federation of Indian Chambers of Commerce and Industry) M&E Committee and is the former President of the Indian Broadcasting Federation. Uday began his career in journalism, and was earlier the CEO and Editor of 'Star News', the first 24 hour news channel in India. He was also the Editor and News Director at TV Today Group, where he spearheaded the launch of two leading Indian news channels, 'Aaj Tak' in 2000 and 'Headlines Today' in 2003. He holds an M. Phil in Economic History from the Jawaharlal Nehru University, Delhi. Umang leads the Global Marketing Solutions teams in India and plays a key role in building and maintaining strategic relationships with top clients and regional agencies. Umang has close to two decades of leadership experience covering sales, marketing and partnerships where he successfully built teams and grew businesses for multinational companies like Intuit, Symantec and Sun Microsystems. Prior to joining Facebook, Umang was the Managing Director of the South Asia region at Adobe. He was responsible for growing their business in India and helping India grow to amongst the leading markets for Adobe in the APAC and global regions. He is an engineering graduate from University of Pune, an alumni of Harvard Business School and the recipient of the prestigious '40 Under Forty: India's Hottest Business Leaders Award 2014' given by The Economic Times and Spencer Stuart in 2014 and most recently GQ's 50 Most Influential Young Indians for 2016. Umang enjoys golf, photography, travel and speaks often on Digital Marketing at industry events and at academic institutions. Mr. Punit Goenka, a young and dynamic professional with a strong entrepreneurial background, started his career with Essel Group, a vibrant conglomerate with diversified business interests in media & entertainment, infrastructure, and other leading sectors. Being the Managing Director and Chief Executive Office of Zee Entertainment Enterprises Ltd., Punit has been extremely successful in enhancing the company's performance and in driving the company towards its set goals. Under his leadership, ZEE has achieved scores of milestones and prestigious awards, elevating the brand to a global cadre. Dun & Bradstreet \u2013 Rolta Corporate Award, BusinessworldInfocom ICT Award, IMC Fusion Award for Excellence in Media, are some of the many such awards bagged by ZEEL during Punit's tenure. His futuristic vision and sharp acumen in the new media domain, has led the company to a global stature today. Punit is also responsible for expanding the company's international presence across 171 countries, and its reach to over 1 billion viewers. Punit is also listed amongst the top 100 CEOs of India, in a study published by Business Today. He has also received the prestigious Economic Times '40 Under Forty' India's Hottest Business Leaders Award and has bagged the prestigious IAA Leadership Award under the category of \"Media Person of the Year Award\". Punit has been awarded the esteemed Medaille d'Honneur Award at MIPTV and has been recognized as the \"Entrepreneur of the Year\" during the recently held Asia Pacific Entrepreneurship Awards. For his immense contribution to the media and entertainment industry, Punit has also been felicitated as the \"Impact Person of the Year\". Going forward, Punit envisions ZEE to be ranked amongst the top global media brands. A graduate in Veterinary Science, Shailesh holds a post-graduate degree in Business Management from the Indian Institute of Management (IIM), Ahmedabad. In a career spanning over 30 years, Shailesh has wide-ranging experience in the pharmaceutical industry. He held senior Sales and Marketing positions in SmithKline Beecham Pharmaceuticals and GlaxoSmithKline (GSK) in India and Great Britain. As Head of the Tropical Medicine Business unit for International Markets in SmithKline Beecham, UK, he championed the research and development on drugs for tropical diseases. He was a Wholetime Director of SmithKline Beecham Pharmaceuticals before its merger with GlaxoWellcome. Shailesh joined Sanofi in April 2002 as Managing Director, and was later appointed as the Managing Director of the combined Company, Sanofi-Aventis, in October 2005. Starting 2010, Shailesh took on further responsibilities as Vice-President for Sanofi's South Asia Region. Shailesh has been listed among 'India's Best CEOs' in Mid-Sized Companies category by Business India magazine in 2014, and in 2013 was recognized as 'Most Valuable CEO' in Mid-Sized Companies category by Business World magazine. Chairman & CEO, PepsiCo India Holdings Pvt. Ltd. Shivakumar, or Shiv as he is popularly known, is Chairman & CEO of PepsiCo India Holdings Pvt Ltd. Shiv has done long stints in Hindustan lever, Nokia and now PepsiCo. He has worked with over 50 brands in his career and has shaped brand and company growth through innovation, new business models and building a consumer centric culture. He places significant emphasis on building eco system partnerships and coaching people. Shiv believes in contributing back to academia and society. Shiv writes regularly for the business press, teaches at the top international business schools and mentors young leaders. Shiv was the President of the All India Management Association in the year 2012-2013. He is currently on the IIM Ahmedabad Board of Governors and also on the Board of Godrej consumer products. Shiv is the current Chairman of the CII FMCG Group. Shiv's pioneering work in Nokia and the telecom sector is part of case studies at Harvard, ISB and Ivy Business schools. He is an avid reader of management literature and loves reading biographies. He is also a keen sports watcher. Shiv has been awarded many times for brand building, for leadership, for turning around companies. The dearest to his heart is the distinguished alumnus award. Shiv is a distinguished alumnus from both Institutes he studied in \u2013 IIT Madras and IIM Calcutta. He is one of possibly 20 people who have a distinguished alumnus from both an IIT and an IIM. He was one of 9 people to get the most distinguished alumnus award from IIM Calcutta in 2011, in their first 50 years. \"Mr. Mariwala leads Marico Limited as its Chairman. He is also Chairman & Managing Director of Kaya Limited. Over the past three decades, Mr. Mariwala has transformed a traditional commodities driven business into a leading consumer products and services company in the Beauty and Wellness space. Mr. Mariwala's entrepreneurial drive and passion for innovation, enthused him to establish the Marico Innovation Foundation in 2003.The Foundation acts as a catalyst to fuel innovation in India. Mr Mariwala started ASCENT in 2012, a not-for- profit expression of his passion to create a unique trust based peer-to- peer platform for high potential growth-stage entrepreneurs that leverages the \"power of the collective\" and enables them to share and exchange experiences, ideas, insights and create a healthy ecosystem to learn from each other and grow their enterprise. Mr. Mariwala was the President of Federation of Indian Chambers of Commerce and Industry (FICCI) in 2011\". Saugata joined Marico Limited in January 2004 as Head of Marketing. In the year 2007 he was elevated to become the CEO of the Company's India business. In April 2013, Marico restructured its Consumer Product Business (CPB) in India and International Business Group (IBG) under Saugata's leadership as the CEO of Marico Limited, the unified FMCG business. In March 2014, Saugata was appointed as the Managing Director of the Company. Prior to joining Marico, Saugata was Chief of Marketing and Group Sales at ICICI Prudential and was part of the start up team that was instrumental in establishing ICICI Prudential. Vivek Gambhir is Managing Director, Godrej Consumer Products Limited (GCPL). Vivek joined Godrej Industries in 2009 as Chief Strategy Officer and was responsible for enhancing the strategic capabilities within the Group companies, guiding overall Group strategy, conducting portfolio analysis, leading mergers and acquisitions and driving special projects. Under Vivek's leadership, the Group's planning processes became more robust. He helped define the CREATE portfolio strategy and the 10X10 objective for the Group. Vivek led the Finance, Investor Relations, Legal and IT functions for Godrej Industries. He was also the Secretary to the Godrej Family Business Board. In his role as Chief Strategy Officer, Vivek was very closely involved with GCPL. He was the key architect of GCPL's 3 by 3 strategy, led mergers and acquisitions and was instrumental in driving the company's international expansion efforts. He co-led Project Neo that developed the blueprint for integrating the erstwhile Godrej Sara Lee business with GCPL. He also led the process for a private equity investment in the company. Prior to joining the Godrej Group, Vivek was a partner at Bain & Company, one of the world's leading business consulting firms. He worked with Bain in Boston, Singapore and New Delhi. He was a founding member of Bain's consulting operations in India and led the firm's FMCG practice in India. Vivek is the President of the Home Insect Control Association, an Executive Committee member of the Indian Beauty and Hygiene Association and serves as a Director on the Board of Philips India Limited. Vivek has an MBA from the Harvard Business School and a BS (Computer Science) and BA (Economics) from Lafayette College. He is married to Roopika, who is a photographer and they have three children. Together, they enjoy traveling to offbeat locations. Vivek has written numerous columns for leading business publications on a variety of issues such as organisational transformation, innovation, brand profitability and sales force effectiveness. He also writes a weekly blog on leadership called 'Monday-8AM' (http:\/\/www.monday-8am.com). Madhavan Menon is the Chairman & Managing Director of Thomas Cook (India) Limited, India's leading integrated travel and travel related services company. Madhavan joined Thomas Cook in 2000 as the Executive Director, responsible for the Foreign Exchange business and stepped up to the position of Managing Director in April 2006. With effect from 1st January, 2016, Madhavan was appointed as the Chairman & Managing Director of the company. Madhavan is also the Chairman of its subsidiaries - SOTC Travel Services Private Limited (formerly known as Kuoni Travel India Pvt Ltd), Kuoni Travel (China) Ltd (Hongkong), Travel Corporation (India) Ltd (TCI) & LuxeAsia Pvt Ltd (Srilanka). Madhavan is a member of the Board of Quess Corp. Limited (formerly IKYA Human Capital Solutions Pvt. Ltd), Sterling Holiday Resorts Limited, where Thomas Cook India owns 69.55% and 100% respectively. He is also a Trustee of PRIDE, an NGO that focuses on healthcare and education for the under privileged. During his tenure as the Managing Director, Thomas Cook has acquired six companies namely SOTC Travel Services Private Limited (formerly known as Kuoni Travel India Pvt Ltd), Kuoni Travel (China) Ltd (Hongkong), LuxeAsia Pvt Ltd (Srilanka), Quess Corp Limited., (formerly IKYA Human Capital Solutions Pvt. Ltd), Sterling Holiday Resorts Limited, Travel Corporation (India) Ltd (TCI) and LKP Forex. Madhavan has a varied background having commenced his career in Grindlays Bank and subsequently worked in Citibank, Emirates Bank and in the Financial Services Division of the Aditya Birla Group. Madhavan's areas of interest include Treasury, Corporate Lending, Operations, Corporate Governance, Corporate Social Responsibility and Strategic planning. Madhavan completed his MBA from George Washington University, undergraduate degree from American University of Beirut and schooling at the Cathedral and John Cannon School. He has also participated at the Executive Management Programme at Harvard University and INSEAD during his tenure with Thomas Cook. Gopal Vittal is the Managing Director & Chief Executive Officer (India & South Asia) of Bharti Airtel Limited. In his role as CEO of the country's largest privately integrated telecom operator, he is responsible for defining and delivering the business strategy and providing overall leadership for Airtel's India & South Asia operations. He moved into this role from Bharti Enterprises where he was the Group Director - Special Projects (April 2012 - Feb 2013). In this capacity, he worked towards formulating and supporting Airtel's International strategy and data expansion. Prior to this, he was at Hindustan Unilever, where he was heading the US$3.5bn Home and Personal Care Division. During the various global and national responsibilities he held during his 20 years stint at Unilever, Gopal gathered a wealth of experience in assimilating the consumer mind set, managing operations efficiently, winning with the customer, building brand and innovating to secure market leadership. Mr. Vittal also held the post of Director, Marketing at Bharti Airtel (2006-08) and made significant contributions towards driving revenue growth, market leadership and building Airtel as an iconic brand. Mr. Vittal is an alumnus of Madras Christian College and has completed his MBA from IIM Calcutta. Varun joined us from PepsiCo. He comes with over 27 years of work experience with premier companies like Hindustan Unilever and PepsiCo, both in India and overseas and a successful track record of leading start ups,"} +{"id":"RedPajamaC4.0013","text":"Ok, David, Would you like to start tell me a bit about your 'boy jobs', as you call them. Before your proper job. Odd jobs. It sounds as if there was quite a few of them. There are. I was quite surprised. There must be perhaps a couple of dozen once I add them all up. But I learned at a very early age that if you did or made a performance you were rewarded for it. And I learnt that very early in life and the earliest I can remember, I was only about three, and my parents used to chuck me off to church every Sunday \u2013 that happened for many years. So they could have some time on their own I suppose, on Sunday morning. And off I used to go to church and we lived quite near the church in Rosebery Road in Norwich, which is just off Angel Road. And we lived just half a mile \u2013 a mile at the most away from there. And my grandmother lived pretty close as well and I was very close to my grandmother. I will bring my grandmother into it again later on. I used to go to this church in Rosebery Road every Sunday morning every single week. And I think I must have been a bit of a performer anyway \u2013 certainly I was an adventurer because \u2026 I won't go into this long story. I was in this shop in Norwich called Frank Price \u2013 in Norwich, in Botolph Street, people will remember the shop. I was in there and I followed the machine that polished the floor \u2013 it was a very big shop like Jarrold's \u2013 and I followed this around and my mother or grandmother \u2026 I can't remember which now \u2013 I wasn't at school. I followed the machine around the shop 'cos I was fascinated by it and I got lost and I lost my mother, or my grandmother, and she lost me and I thought \u2013 I obviously said to myself \"well, I got to get myself home\" \u2013 so at the age of about four I then walked home. And they must have been worried out of their minds. But, as I say, I was a bit of an adventurer \u2013 I used to do things of my own accord. Anyway, just coming back to the church. At Christmas they had a Christmas party for all the children in Sunday school. And they asked the children to do a performance and I remember distinctly doing a performance at the church. I stood on a little stool, because I was only about four, and made a poem, which one of my aunts had taught me it was called \"If I had a donkey\". So I stood on this stool and performed to the audience and at the end, of course I got some applause, and they gave me a present and I though \"Oh well if I do this \u2026!\" And that followed me all the way through my life until today \u2013 sixty odd years. So that set me on the road. And then because I used to go to church every Sunday \u2026 and then we moved from New Catton, where we were living then, to Sprowston I went to Sprowston Church, on North Walsham Road, and then I went to the parish church in Sprowston, St Cuthbert's. They had two churches \u2013 one St Cuthbert's, on Wroxham Road, and another one called St Margaret's, which is the old parish church, which is just on the edge of Sprowston. And so I was at Sunday school, which was on Sunday afternoon at Sprowston, and we were in the big main St Cuthbert's church but we were broken up into classes \u2013 age classes -so the youngest ones were there and they worked round the church so there were about 5 or 6 different classes going on, in the church, with the Sunday school teacher taking each one. I was right at the front near the pulpit and the Vicar, Reverend Aitken, who was the Vicar there. A lovely man, in fact he became Bishop of Lynn later on. Aubrey Aitken, he was a great Norwich City fan. But he had cancer of the throat and he had a box in his throat and [imitating voice] and I kept in touch with him all the way through until he died. From that early day, from Sunday school, when I was probably about six or seven then. Our Sunday school team, class, was right at the front near the pulpit and he used to come up to the pulpit and just give a little parable, or something like that, or a miracle during the Sunday school. Because he was so involved, so committed, he was a wonderful man. Throughout my life, as in my previous talk to you, lots of influence from other people. And I stayed behind after Sunday school and he said \"I've heard you singing in Sunday school. Would you like to join the choir?\" So I said \"Yes\", there was no reason why I shouldn't join the choir. So I joined the choir and of course I was being paid again. So that was really my first paid job \u2013 being a chorister at St Cuthbert's Church. And we used to get, I think, something like about 6d, 2 \u00bd pence, for a service. And we used to do two services on the Sunday \u2013 11 o'clock in the morning at St Margaret's and then 6 \u2013 6.30 in the evening at St Cuthbert's. And we used to get 6d for the service and there was choir practice on Friday night. And we had a cassock and surplice on, you know, the black [? ] and purple bottoms but white top and purple frock, you know, so proper choir boys. And then weddings \u2026 we used to get half a crown for weddings. And I remember Christmas particularly because we used to go round the streets of Sprowston singing Christmas carols. I remember distinctly one Christmas, it had been snowing very very hard, and we were walking round the streets, in Sprowston, just off Wroxham Road, knocking on doors. I loved the atmosphere of that and then, they were all ages \u2013 right from me as a little one, from the age of whatever I was, six or seven, right through to adults, so there was a good number in the choir and what they used to do is go round the pubs 'cos there were lots of pubs in Sprowston in those days. We used to go round the pubs and go into the bar \u2013 and I had never been in a pub before and all these people with fancy hats on and all the Christmas decorations and so on. And, I must have had a reasonable soprano voice 'cos I was often asked, particularly at Christmas, to sing \"Once in Royal David City\" and \"Little Town of Bethlehem\", things like that. So in the pub they put me in front of the microphone and I sang and then of course they went round with the collecting bag. That was the Brickmakers Arms, that particular pub I remember that distinctly \u2013 and then there's the Woodman, which was down the bottom, then there was another one on School Lane and another one on Mousehold Lane. We would do all the pubs, as all the people were drinking away and they could put money into the collecting bag. So I was raising money like that as well 'cos people again would clap and put money in and they would feel particularly generous at Christmas and put half a crown in or something. Then we used to go back to the church and put all the money on the table and count it out and I would think \"I contributed to that.\" So really that was my first actual earnings. We used to do that in my church choir, because I was in a church choir. When I look back it was quite amazing that it happened but I had an ulterior motive, of course, 'cos the money I could use towards the things that I like doing which, throughout my life, have been bicycles, cycling, and had to spend quite a lot of money on my bike, one way or another. Obviously I used to get pocket money, that was another thing where you were paid for what you were doing, if you like, if I helped around the house or whatever. Most children in the class at school would get pocket money so that was a natural thing that happened. But I used to like to supplement my pocket money, certainly from singing in the choir, and that helped to pay for things for my bike like a new pump or repair outfit or a bell or something like that for the bike. And I was also interested very much in buses, real buses, and I was hooked on buses from that day and I am still hooked on buses and I am interested in vehicles and buses generally. Particularly with Bressingham Steam Museum, which I am involved in, and I am a member of a bus museum as well and have actually owned a couple of buses so I am really into \u2026 these are old buses, preserved buses and I used to buy a lot of bus books. I've still got all of them \u2013 I got a couple of hundred different bus books. People, my wife and family, always buy me a bus book for Christmas. That's just incidental. That's why I had this incentive really to do odd jobs, little jobs on the side and to raise money to do the things I would want to do which I couldn't do otherwise, you know just with 6d a week pocket money, however much I used to have. I remember my grandfather, he gave me half a \u2026 We were going on a Sunday school outing to Cromer and he came along to wave goodbye, 'cos I was only young and couldn't go on my own. So he took me to the church and we caught a bus to Cromer and I remember again distinctly he gave me half a crown coin, 12 \u00bd p, and said \"Have a nice day in Cromer\". And what would I do in Cromer? I would buy a Dinky Toy. Because that was one of my other things I liked doing \u2013 spending money on Dinky Toys. So that was the choir days and then near my school, because I went to Sprowston infant school and junior school which were in School Lane near the Wroxham Road roundabout. And after school we often used to go \u2026 there was a sweet shop called Kandy Kabin \u2013 K Kandy, K Kabin, opposite the Brickmakers pub, which I just mentioned, on the other side of Sprowston Road. And we would go there after school and buy sweets \u2013 penny bubble gum and things like that and sherbet lemons, liquorish, and all those old fashioned sweets. The man who ran the Kandy Kabin \u2026 I used to go there quite a lot, not necessarily every night but often, and my father, when he came from work on a Friday night, he would always go into Kandy Kabin and buy some sweets for the weekend and then give them to us on Friday night. The man in the Kandy Kabin shop got to know me quite well and he also ran an ice cream manufacturing, not factory, but business behind the sweetie shop and that was called Brown Owl, as in bird, ice creams and he used to sell these. In the summer we used to go round the back and buy our cornets of ice cream from this man. So I really got to know him quite well through that. And one day he said to me \"I also run a paper round I need a new boy for my paper round. Are you interested?\" So again, I was still in the choir, still getting my half a crown for weddings. I don't think I ever sung for a funeral. But certainly we did quite a lot of weddings on a Saturday, which was quite a lot of money in those days. And he said, \"I need a newspaper delivery boy. Would you come and work with me?\" So I obviously asked my parents and they said yes, so I became a newspaper boy as well. So that again gave me a bit more, a sort of supplement to my earnings. So that was the Sprowston era. And then my father was working for Jarrold's in Norwich, in the print factory. He was, what was called \u2013 bit of a mouthful \u2013 a lithographic artist and they, Jarrold's, published hundreds of thousands of books on all sorts of subjects, and again he used to work on a Saturday morning. And sometimes would take me down there to see his offices, more or less an artist studio. Which was a little building, it wasn't in the big building. The one by the river? The one by the river yes. It wasn't in there \u2013 that was where the printing press was. There was a little detached cottage next to it and he had a studio upstairs where he worked. And he would have all these inks and colours and he would retouch paintings, just to make them \u2026 if they came off the press slightly incorrect, it was his job to do that. Sort of finish them, touch up? That's right. To, you know, perfect it. So he was with Jarrolds and a job was advertised in Great Yarmouth with a company called Erie Resistors, which I think I mentioned in my previous [contribution], because that was that was the reason I moved then to Great Yarmouth. So I won't go into all that detail again. So we moved to Great Yarmouth and he got a job with Erie Resistors and so I gave up the choir in Norwich and Sprowston and we weren't affiliated to any particular church in Gorleston, although my father was quite a religious man. I went to his church with him and I didn't sing in the choir, or anything like that, or get paid for doing. Just one little thing I remember as well, a way I earned a little bit more money. My grandmother used to clean a house in Colegate in Norwich for two elderly spinster teachers. They owned this house which is a really fantastic, very old property in Colegate. She used to go down every Saturday morning and clean this house and she used to take me with her on several occasions. And just behind the house was a recycling centre, you know amazing in those days 'cos that was 50-60 years ago, and they were called Whites and actually they are still around today. And they are huge today as a recycling centre and they used to just have this little place. They used to have this and they used to collect newspaper and also jam jars, and so often I used to go with my grandmother when she was cleaning and take some newspaper. You used to get paid, they would put it on the scale, and would get paid for the newspaper and you got a halfpenny for a pound jar and a penny for a two pound jar. So I used to collect all the jars up from \u2026 I must have been a junior entrepreneur or something. Well, you used to take drinks bottles back didn't you. I can remember doing that. Take them back to the pub even. The pub used to have a little window. Beer bottles. I can remember Steward and Patterson's \u2013 brown beer bottles they used to take back. So again I was getting a few extra pennies that way. So we moved to Great Yarmouth and so I had to start really all over again to find out another source of income. So I could get my bike sorted out. I'll show you a photograph of my bike which I've still got, when we have finished, so you can see why I was so keen on cycling. I loved cycling I used to cycle all over the country. And that will actually come into the story in a little while, what I did. So I was in Gorleston and had to start afresh. So one day a boy at school \u2013 I was at Great Yarmouth Grammar School which I mentioned before on the earlier tape \u2013 a boy at school was doing a grocery round on a grocery bike \u2013 on a delivery bike with a big pannier at the front and he came up \u2013 his name is Jimmy R. I knew Jimmy very well, he's a bit older than me, and he came up to me one day, in the playground, I remember it distinctly, and said \"I do a delivery round. But I am thinking of giving it up \u2013 would you like to do it?\" Now goodness knows why he asked me. I might have sort of spread the news a bit that I wanted a job or something. I said \"Yes. I need to earn some money to make sure my bike is ok and I could buy some more bus books and so on and so forth.\" So he said, \"I will take you down to the shop and you can meet the lady who runs the shop and see whether you'd like to do the job or not.\" I still keep in touch with Jimmy R. He became a vet and he specialised in race horses and he worked at Newmarket for quite a long time and then he moved to Australia and he actually lives in Australia at the moment. But we were \u2026 there's a lot of childhood friendships, which I still keep going and I still meet people and talk to people that I was at school with. We were an all boys school. They were all chaps -no girls there. Anyway so he took me to the shop which was in a road called Cliff Hill in Gorleston-on-Sea. And this little corner shop that sold virtually everything. That was Mrs W's shop and everybody knew Mrs W's on the corner of Cliff Hill in Gorleston. And he took me along and I met Mrs W and she was very rotund she was, but very much in charge of the shop. There were \u2013 two ladies assistants who worked in the shop, and they were a really busy little shop. As I said they sold all sorts \u2013 everything like a mini Sainsbury's really, all the vegetables were all stacked outside the shop on shelves \u2013 all the potatoes, cauliflowers and cabbages and things. And then inside \u2026 everything was inside \u2013 jams, marmalades, butter, eggs \u2013 the lot. Particularly because Gorleston was \u2026 and Great Yarmouth \u2026 but Gorleston where we lived which was not far from my house \u2013 'cos I could just cycle down when I got home from school at about 4.15 and I'd take my satchel off, take my school clothes off, put some other clothes on and cycle down to Mrs W's shop and start the delivery. Gorleston in the summer, of course was very much a holiday centre. So there's lots of hotels and guest houses in Gorleston \u2013 in those days hundreds. Not so many these days. There's Cliff Hotel, Pier Hotel \u2013 lots of quite big hotels. And Mrs W had cornered the market, pretty well, especially when this stuff could be delivered by a delivery boy on his delivery bike \u2013 so that was me. I actually, she paid me 1\/3d an hour. Again not very much money. But I used to work for a couple of hours or more and maybe on Friday night, for the Saturday, when things were happening on Saturday, especially in the summer, I would do a few more hours so 2, 3, 4 shillings soon adds up. It really helped me, as I keep saying, to do the things I wanted to do. This was a really old fashioned delivery bike, you know, huge and heavy and a great big metal pannier on front where you put all the boxes of groceries in there and I used to have a planned route where I would go so there would be Mrs Smith, Mrs Jones, Mrs Green and they were nearly all Mrs. I can't remember any men but the good thing about that was that they were Mrs and I used to knock on the door 'Oh, Hello Mrs Green, I've got your groceries here. Shall I bring them in?' I was really into sort of marketing in a big way (laughs). Because, and then she would say 'Would you like a cup of tea, David', and I would say 'I can't stop very long but I would like a cup of tea if I may'. They used to give me 10 shillings and a pound \u2013 ten shilling note was really something. 'cos I used to deliver to the doctors as well, there was several doctors I used to deliver to, so again I was always polite, I was always on time and I would always chat with them and always give them a smile and butter them up and it paid dividends \u2013 literally it paid dividends. And then these little old ladies as well poor, you know, quite poor ladies there was a little old lady I remember I would have to go down, 'cos Gorleston is really on a cliff and there is a Cliff Hill \u2013 quite a big cliff and she lived half way down the cliff, you had to go through the gate down all these steps and knock on the day. And she would open the door and the stink coming from this place, 'cos she was not well off at all, and I used to be just taking a very small box but she would always used to insist on giving me a tip and then she would give me a biscuit or something like that. Again, throughout my life, I've sort of had this ability to sort of talk to people, chat to people, and again I would listen to her story or something or help her with something and again I got the message quite quickly if you did something special for somebody they would maybe repay you. That was the delivery boy story and I did that for three years. And after I had been there for perhaps a year or two and I was getting 1\/3d an hour, as I said, and I thought well I have been here some time and she hasn't put my wages up so one day I said to her \"Mrs W\", and she had a very spoiled small son, I have forgotten what his name was, but he was very spoiled. He was upstairs above the shop he used to have everything sort of pressed upon him by his mum, Mrs W. And I said \"Mrs W, I would just like to speak to you after we have finished today.\" And so I had written it all out and said in this letter I said \"I have been here for a couple of years and you haven't increased my wage and I think now, with we didn't talk about inflation in those days, but I said words to the effect that I think I ought to have a bit more and I suggested 1\/6d. So I said I have written this little note out and she gave me 1\/6d an hour from then and so that worked as well. So I stayed there for 2 or 3 years. What sort of age were you roughly? Yes, but I think you had to be 16 before you could actually work officially and get a national insurance number. Because that was just an evening job and I don't suppose anybody was too bothered about that. And a couple of hours a night and then I used to go home and do my homework after that. So the other kids at school probably went home and watched television for a couple of hours. But, I didn't, I was on my trade bike, as we called it. One good incident that happened, there were lots of little incidents of course, but I was taking some groceries \u2013 huge box \u2013 there was a cardboard egg box which was 3ft long and about 2ft wide and deep as well and that contained, when it was delivered to the shop, a gross of eggs, 144 eggs, came in this great big box and then Mrs W used to keep all the boxes so that when I went on the delivery bike all the groceries could go in this box. So all the customers had a little notebook and they used to write down what they wanted to be delivered the next week so but that would all be written down \u2013 tea, coffee, butter, eggs, milk and so on. And then the hotels and guest houses did that as well. And this guest house right on the riverside at Gorleston there was this guesthouse there with lovely view out across the sea and the harbour at Gorleston. And they'd done their order- and it was a huge order- it must have been a Friday night order for the weekend. So I put all this stuff on the front of the bike and had a little front wheel, a little tiny front wheel and a big back wheel because of the big pannier that was in and the weight. And so I cycled off on this thing tied on the front. Not tied down which really it should have been. And just before I reached this guesthouse there was a pothole in the road and I hit, it was dark, and I hit the pot hole and the whole thing went right across. And the eggs were on top, a big tray of eggs, about 36 eggs on the top. All went onto the road so I picked everything up, put back in the box, rode back, obviously couldn't take it to the guesthouse in that state. Rode back to the shop and said to Mrs W \"I hit a hole in the road and the whole lot fell off\" So we packed it up again and off I went redelivered. Did you have to pay for the eggs? Not something you do every day? She thought it was an act of god or whatever and not my fault particularly. Then she would send me out on expeditions because they had run out of something. She would get the order book and she'd go down and they'd want 2 pounds of streaky bacon or something and she had run out of bacon. So she used to send me on an expedition to another shop to buy some bacon and then come back. So that was quite interesting so that lasted about two or three years. This was the days before supermarkets wasn't it?. With like an old fashioned shop with counters and the people paid on account. And had the bacon slicer. She really ran the shop very well and, Mr W, I mean she was very gregarious, knew all her customers and treated them nicely. They came back on a regular basis and she had everything in her shop and if she didn't she'd get it. Mr W, used to be, he was very quiet I don't think in the three years I worked there I don't think I ever heard a word from him at all. He used to sort of wander around with his pipe and he'd have this hat on and he'd used to get things from the cold store in the back of the shop. But he didn't have anything to do, really, with the shop itself. And then other jobs came along and I realised that I wasn't going be able to continue doing that. I had been doing it for a long time \u2013 rain or shine, winter or summer. But as I said all the time it was supplementing my income. My parents were pretty generous in fact I was quite indulged really as a boy. I was the oldest grandchild out of about seven grandchildren that my grandparents had. But I was the first and so \u2013 I was the first before you know other grandchildren came along as well \u2013 and so I had a lot of doting, if you like, upon me but my parents were very generous as well. Not only did they give me pocket money but they used to buy me bus magazines and car magazines and comics and things like that and sweets of course. But other things like I used to take pride in keeping my bike up to date and I think I spent most of the money on my bike rather than other things. So that brings me to really the summer holidays when I was still at school. So I was, as I said, 15-ish when I was doing the grocery round and so coming onto, say, 16 and in the summer there were hundreds and hundreds of jobs available and it was traditional really for virtually all my grammar school friends, all the grammar school pupils, who were 16 to find a job in the summer 'cos there was so much around. And so my friend Mike King, who I was at school with, who was also a very keen cyclist, we used to cycle to school, it used to be about 3 or 4 miles to school. My friend Mike King he, as I said, was a keen cyclist and we used to cycle to school together. And we decided together that we would do a summer job. So we went \u2013 the first thing we did when school broke up in July \u2013 we went straight round to the unemployment office, as it was called, in Great Yarmouth and registered and got our National Insurance number so that meant we could officially apply for jobs. So we went along to unemployment office and registered. So all that time before when I was with Mrs W I was an unofficial worker really. So we got off, probably on the Friday we finished school we probably went in straight away. We decided that we would do something together. Mike used to help me if I was on holiday or unwell or something. He used to do the grocery round for me. We were very close and even today we are very close, I'll probably ring him tonight just to tell him you have been around today. So then Monday morning we, in fact, got a job straight away, Monday morning, the chap in the employment office said \"Smiths' Crisps\" Can you remember Smith's Crisps? The little blue salt in the Smith's Crisps, it had a special name for a little blue \"blue bag\" or something like that we used to call it. But Smith's Crisps had a big factory, a big crisp factory, on Caistor Road in Great Yarmouth, quite near the racetrack in Great Yarmouth. And this chap said \"They need some people down there at Smith's Crisps so off you go\" So we start \u2013 and we worked on shifts \u2013 and we start on the Monday morning at 6 o clock in the morning so we had to be up at 5 o clock to get ready and to cycle. We cycled again both of us down to Smith's Crisps factory, which is about 3 miles on the bike. And started there at 6 o clock in the morning and the chap in charge said, to Mike, \"Right, you go on the potatoes,\" so he went on the potatoes and I weren't quite sure what he did. And he said \"You, David, I want you on the weighing machine\" so I was on the weighing machine which is on a conveyer belt so I had a seat like here and I had a weighing machine in front of me and this conveyor belt was continuously going on along side of me here you see. And every, say, every one in 10 crisps bags that went past I had to pick it up and put on the weighing machine and make sure it was 4oz or whatever it was. 'cos you had to pick out any underweight ones and then put them in a bag. So it was like this all the time. \"choog, choog, choog\". For 8 hours, 'cos you were on this shift from 6 o'clock till 2 o'clock. Obviously you would have a break to go to the toilet or to have a cup of tea in the canteen or something like that. And so I did that all day \"choog, choog, choog\" and Mike was on the potatoes. I don't know what he was doing on the potatoes. But at 2 in the afternoon we'd finished work and we cycled home and he said, 'cos we had 6 weeks holiday in the summer. He said \"I don't think I can put up with this for 6 weeks\" And I said \"and its jolly boring isn't it?\". What a horrible boring job it was. And he said, \"We will turn up again tomorrow morning and see what happens\". During the night all I could see was this conveyor belt going through my dreams \u2013 all these packet of crisps going past. So monotonous, you know, there was no break from it whatsoever. Most of it was dealt with by ladies who were normally on, they were then packing after me, packing the crisp in a big box, putting the seals on, you know. All things in those days that happened in a food factory, it's all automated nowadays days, but a lot of them there were women in white hats, white, you know coats. We had a white coat on as well. So on the Tuesday we did the same thing, \"clunk, clunk, clunk\" picking up all of these\u2026You had to try and spot an empty bag or a light bag that wasn't full and then take it out and then put it in the\u2026 Someone must have been trying to spot whether the little blue bags, salt bags, went in as well with the crisps. After 2 days we said, to each other, \"We can't stand this anymore\". So on the Wednesday we went in and said \"Sorry, we can't do this anymore. Were going somewhere else\" ,the cheek of it really, and so we went straight and he said, you know, the boss must have said \"Ok. If you don't want to do it\" and we must have got paid for the couple of days we did go there for. So we went down to the unemployment office and said \"We'd like a change\" and this chap said \"There was a job at V's\". There's a lot of Italians went to Great Yarmouth in 1930s and this particular family, called V were very successful. A lot of Italian families. So they said. \"There's jobs for both of you down at V's, Go and report to Mr Wills.\" So we went on our bikes, again, rode round to Regent Road in Great Yarmouth. And Regent Road, I don't know if you know Great Yarmouth. Regent Road is one long straight road all the way from the town centre right the way through to the beach and the Britannia Pier at the other end. It's all full of all kinds of gifts shops now. Exactly and was then. All full of gifts shops, bloater shops, herrings shops you could post bloaters to your friends up in Scotland or something from the shop. And Cinema's, there were 2 cinemas in the road, and restaurants galore \u2013 Ice cream parlours galore and V's were right at the other end and they have a restaurant upstairs, a posh restaurant upstairs, where you had to pay 10 shilling's, no not as much as that, no half a crown I think. Anyway it was quite a posh restaurant upstairs where you say down and there were waiters and waitresses. And then on the front, out on the road, there was a great big ice cream machine and people used to buy ice creams as they were walked past, you know, Mr Softy type ice creams. Which V's used to make on the premises, they made their own ice creams to maximise their profitability. \"Right. I want you to fill these empty milk bottles,\" little tiny milk bottles, they were half a pint I should think. Anyway they were very small glass milk bottles. \" I want you to fill those with orange juice\" and that was our job. And there was a great big drum of concentrated orange juice, 2ft round drum of orange juice, and we had to add water to it and then so much water to so much concentrated orange juice and then, with a little tap, fill these bottles of orange juice which they would then sell in the shop. We would have to put the cap on as well, they would supply the caps, these little tin foil caps went on the top. And that was our job. Yes. We weren't on the conveyor belt, but we had to fill these bottles of orange juice which they would then sell in the shop and in the restaurant and so on \u2013 so that was our job. And we were outside, we weren't inside we were outside, 'cos they had the yard at the back, I mean it was absolutely filthy, you can't imagine what it was like. And we used to ride our bikes around to the back of the restaurant, of the premises. We never even knew that these alleyways existed, and we went through this gate and just put our bikes to one side and worked on this orange-making machine. [Laughs] Which wasn't really a machine at all. No. I wonder how hygienic it was, really? Yes, indeed. Well, we used to wash the bottles in hot water, wasn't too bad I suppose. And we used to drink some of the orange juice ourselves if, you know, we got thirsty, which was allowed. Then he needed some help in the kitchen \u2013 there was a lady in the kitchen who, again, another Mrs. W \u2013 a big, a large woman in white again. Mrs. W always used to have a white, you know, apron and uniform on. That must have been the trend in those days. And this lady was the cook, she was in charge of the kitchen for the restaurant upstairs, so they used to have lots of Fray Bentos tinned lunches, you know, sort of dinner for one type things, and you had to put these in the oven. That was all prepared, so, you know, she didn't have to sort of prepare all the pies, the meat pies and things like that. They bought these tins of Fray Bentos, ready prepared, similar to the sort the thing you get from Marks and Spencer's these days. And as all of this was going on she used to prepare her own vegetables, so all the vegetables used to arrive in the backyard. There would be sacks of potatoes and cauliflower, cabbage, carrots, and things being delivered by the local produce merchant. So all that used to come in, so there would be helpers in the kitchen peeling and doing things like this, so Mr. Wills came along and said he'd find somebody else to look after the orange juice, would we help in the kitchen? So we helped in the kitchen and we did, you know, all sorts of stuff in the kitchen helping to peel potatoes, which again was a pretty boring job, but we were being paid. I should think we were probably being paid something like two shillings \/ half a crown an hour, more than I was on the trade bike so that was reasonable. And it would be, say, nine o'clock in the morning, not horrendous hours, nine o'clock in the morning 'til perhaps five o'clock, six o'clock at night, with a break for lunch during the day. So the hours were, you know, reasonable, and we were both earning money and spending all the money on our bikes, buying new bits for our bikes. And then, the next thing was \u2026 oh there was a bar, there was a bar in the restaurant and I got to know the chap who was behind the bar. He was on his school holidays, as well. But he was a bit of a posh bloke \u2013 he was the son of a local architect. So I got to know him quite well, and Mr. Wills came along and said, 'One of my girls has left, one of the waitresses 's left.' All the serving staff in the restaurant, they were all girls. And they were all students \u2013 university students \u2013 who'd come over from Belfast in Northern Ireland. He used to advertise every year in the local Belfast paper and say 'Students wanted to waitress at my restaurant.' And so all these girls with an [in an Irish accent] Irish accent you know, were serving all the people in Regent Road! In Yarmouth! And they used to find digs, you know, some sort of really rundown guesthouse advertised on the back of beyond, you know, which was only ten bob a week or something, and they all lived together and they all kept together. They probably all knew each other anyway because they were university students. They used to come from Queens University in Belfast. And they came all the way over, you know, to Yarmouth, do their six weeks, or perhaps more as they were university, and then go back again, and earn themselves quite a bit of extra pocket money. And he came up to me, and he was married to \u2013 Mr. Wills was married to one of V's daughters \u2013 because, as I said, the whole family was running this business. And he said, 'Oh, one of my girls has left, would you like to be a waiter?' And I said, 'Oh yeah, great,' because I'd sort of worked my way up really, you know, from orange juice to potatoes to working in the kitchen, and this is probably after working a couple of weeks I'd been there \u2013 two or three weeks, maybe. And he said, 'Would you like to be a waiter?' And he said, 'Here's your jacket \u2013 you know, wear a jacket, a white jacket as a waiter and wear a tie and look, you know, quite smart because we have some nice customers coming in who pay good money,' and so on. So I was waitressing \u2013 waitering, rather than waitressing \u2013 and that was good fun because once again, like my little old ladies on the train, I could butter them up \u2013 'Here we are sir, here we are madam, how are you today?' And they became regulars, you know, they came in every day, and I had a little section, we all had a little section of our own. And they used to come and sit in my section and then they used to give me tips because I'd look after them, and he'd say, 'I'd like a pint of bitter, please.' So I'd go to the bar and see my friend at the bar and get a pint of bitter and give him his drinks and her her drinks, her Dubonnet or whatever she had. And one day, this was really a big section, one day at lunch someone tipped me ten shillings \u2013 they gave me a ten shilling note, which was really amazing because I probably, it took me all day to properly earn ten shillings. I've forgotten the exact amount, but I distinctly remember the ten shilling note that this chap gave me, which, you know, when I got home and told my parents it was sort of unbelievable. Like a ten pound note almost, or something. Yeah, it would have been! It would have been. And I thought, 'Wow, this is it!' Instead of just filling milk bottles with orange juice, here I was as, you know, almost a proper job, really. And then when lunch was finished, by about half past two in the afternoon \u2013 I probably helped in the kitchen beforehand, in the morning, to prepare the various meals and things like that, and then from twelve 'til about half past two I was waitering, and they didn't do dinners in the evenings, it was just lunches because they would go back to their hotels, these people, in the evening and have a proper meal. And so, you know, I quite enjoyed that, especially with the girls, because I got a bit of banter from the girls. And then in the afternoon I'd go downstairs and help in the take away, the tea rooms, the ice cream parlour, and help, you know, pour out the teas. And there'd be a great big tray full of white cups and you know you had this great big tea urn and filling \u2013 and they'd be queuing \u2013 there'd be thousands and thousands of people come to Great Yarmouth in the summer in those times. We're talking about the early 1960s, 1960, '61, something like that. Heyday. And they used to come on their coaches from the Midlands, from the North \u2013 there used to be thousands of coaches all along the Acle Straight. On a Saturday morning all these coaches coming into Great Yarmouth, all full of holiday-makers, and the train coming in. I've got lots of photographs of all these coaches and trains and things and all the holiday-makers. They all needed a cup of tea! Actually there's a book there [shows book]. So now actually there's an interesting little feature, takes place at V's, quite near the end \u2013 I'd probably worked there for four weeks \u2013 and part of the deal was that the waiters, well the waiter \u2013 I was the only one \u2013 and the waitresses had a free lunch. And whatever was left over from the lunch to the customers, you know, we could choose what we wanted. And we all sat down in the corner and had our lunch. And one day I was having my lunch and Mr. Wills used to be wandering around all over the place, making sure that everything was in order. He was the manager of the whole lot. And he would have noticed me there having my lunch, and I'd finished and handed the plate back in for washing up, and one of the girls said, 'Oh, I don't really fancy my lunch today.' And she said, 'Would you like it?' And I was, I'm a great eater [laughs] \u2013 I'll eat for England \u2013 and I was using up all this energy on my bike, you see, so I never got fat. I was really quite fit. And so I said, 'Yeah! Yeah, I'll have your lunch.' Well they'd all \u2013 I'd finished mine, they'd all finished theirs, apart from her, they all trooped off, I was left in the corner eating her meal, and he came round, Mr. Wills came round and said, 'What are you doing? Why \u2013 you just had your lunch! What are you doing with another lunch?' And I said, 'Well, the girl didn't want it.' He said, 'You can't have two lunches! That's not allowed.' You know, like Alan Sugar, The Apprentice \u2013 'You're sacked.' [Laughs] 'You're fired!' And I said, 'What?' I said, 'It was her lunch!' 'I don't care. You're fired. On your bike.' [Laughs] So I said, 'Oh, well, alright.' Mike was in the kitchen so I said to Mike, 'I just got sacked' \u2013 because I mean, they could do that in those days, you know, only temporary people. So I said, 'Oh, I'm going to look for another job.' So I went straight round to the unemployment office and I said, 'I'm finished at V's, have you got any other vacancies?' He said, 'Yeah, they need someone at Bird's Eye,' \u2026 factory in Great Yarmouth, where they made, you know, shelled peas, frozen peas, beans, all of that sort of thing, fish fingers, the Birds Eye fish fingers. Great big factory. It's all closed down now, all gone. Did the actual peas come"} +{"id":"RedPajamaC4.0014","text":"1. M.P. Hosseini, H. Soltanian-Zadeh, Sh. Akhlaghpour, \"Assessing Lung Volumetric Variation to Detect and Stage COPD,\" Presented at and Published in the Proceedings of the 1st Middle East Conference on Biomedical Engineering (MECBME'2011), Sharjah, UAE, Feb. 21-24, 2011. 3. S.-Sh. Fakhraei, H. Soltanian-Zadeh, F. Fotouhi, K.V. Elisevich, \"Consensus Feature Ranking in Datasets with Missing Values,\" Presented at and Published in the Proceedings of the Ninth International Conference on Machine Learning and Applications (ICMLA'2010), Washington, DC, USA, Dec. 12-14, 2010, pp. 771-775. 4. A. Mahmoodzadeh, H.R. Abutalebi, H. Soltanian-Zadeh, H. Sheikhzadeh, \"Determination of Pitch Range Based on Onset and Offset Analysis in Modulation Frequency Domain,\" Presented at and Published in the Proceedings of the Fifth International Symposium on Telecommunications (IST'2010), Tehran, Iran, Dec. 04-06, 2010. 5. A. Mahmoodzadeh, H.R. Abutalebi, H. Soltanian-Zadeh, H. Sheikhzadeh, \"Single Channel Speech Separation with a Frame-based Pitch Range Estimation Method in Modulation Frequency,\" Presented at and Published in the Proceedings of the Fifth International Symposium on Telecommunications (IST'2010), Tehran, Iran, Dec. 04-06, 2010. 6. A. Sojoudi, S.M. Shams, G.A. Hossein-Zadeh, H. Soltanian-Zadeh, B. Bogerts, K. Schiltz, M. Walter, \"Spectral Clustering of Resting State fMRI Reveals Default Mode Network with Specifically Reduced Network Homogeneity in Major Depression,\" Presented at and Published in the Proceedings of the 17th Iranian Conference of Biomedical Engineering (ICBME'2010), Isfahan, Iran, Nov. 03-04, 2010. 7. Sh. Fakhraei, H. Soltanian-Zadeh, K. Elisevich, F. Fotouhi, \"Attribute Ranking for Lateralizing Focal Epileptogenicity in Temporal Lobe Epilepsy,\" Presented at and Published in the Proceedings of the 17th Iranian Conference of Biomedical Engineering (ICBME'2010), Isfahan, Iran, Nov. 03-04, 2010. 8. M.P. Hosseini, H. Soltanian-Zadeh, Sh. Akhlaghpour, \"Evaluation of Changes in Surface and Volume of Lung in Chronic Obstructive Pulmonary Disease,\" Presented at and Published in the Proceedings of the 17th Iranian Conference of Biomedical Engineering (ICBME'2010), Isfahan, Iran, Nov. 03-04, 2010. 9. M.A. Latif, A. Babajani-Feremi, D. Barkmeier, J.A. Leob, H. Soltanian-Zadeh, \"Spatio-temporal Localization of Focal Epileptic Sources from Intracranial Electrocortical Recordings using an Independent Component Analysis (ICA) Algorithm,\" Presented at and Published in the Proceedings of the 17th Iranian Conference of Biomedical Engineering (ICBME'2010), Isfahan, Iran, Nov. 03-04, 2010. 10. P. Zamaani, M.H. Kayvanrad, H. Soltanian-Zadeh, \"Cardiac Cine MRI Using Compressive Sensing Principles,\" Presented at and Published in the Proceedings of the 17th Iranian Conference of Biomedical Engineering (ICBME'2010), Isfahan, Iran, Nov. 03-04, 2010. 11. M.P. Hosseini, H. Soltanian-Zadeh, Sh. Akhlaghpour, A. Behrad, \"A New Scheme for Evaluation of Air-Trapping in CT Images,\" Presented at and Published in the Proceedings of the 6th Iranian Conference on Machine Vision and Image Processing (MVIP'2010), Isfahan, Iran, Oct. 27-28, 2010. 12. S. Almasi, H. Soltanian-Zadeh, \"Derivation of Error Probability of Compressive Sensing Methods Based on Information Theoretic Concepts,\" Presented at and Published in the Proceedings of the 6th Iranian Conference on Machine Vision and Image Processing (MVIP'2010), Isfahan, Iran, Oct. 27-28, 2010. 13. M. Afzali, H. Soltanian-Zadeh, \"Comparison of Hierarchical and Sequential Clustering Methods for Analysis of DTI Data of TLE,\" Presented at and Published in the Proceedings of the 6th Iranian Conference on Machine Vision and Image Processing (MVIP'2010), Isfahan, Iran, Oct. 27-28, 2010. 14. S.-Sh. Fakhraei, H. Soltanian-Zadeh, F. Fotouhi, K.V. Elisevich, \"Effect of Classifiers in Consensus Feature Ranking for Biomedical Datasets,\" Presented at and Published in the Proceedings of the ACM Forth International Workshop on Data and Text Mining in Biomedical Informatics (DTMBIO) in conjunction with CIKM, Toronto, Canada, Oct. 26, 2010, pp. 67-68. 15. Y. Salimpour, H. Soltanian-Zadeh, M.D. Abolhassani, \"Extended Kalman Filtering of Point Process Observation,\" Presented at and Published in the Proceedings of the 32nd Annual International IEEE EMBS Conference, Buenos Aires, Argentina, Aug. 31-Sept. 4, 2010. 16. N. Alaydie, F. Fotouhi, Ch.K. Reddy, H. Soltanian-Zadeh, \"Noise and Outlier Filtering in Heterogeneous Medical Data Sources, Presented at and Published in the Proceedings of the 21st International Conference on Database and Expert Systems Applications (DEXA 2010), Bilbao, Spain, Aug. 30-Sept. 3, 2010, pp.115-119. 17. S. Maleki-Balajoo, G.A. Hossein-Zadeh, H. Soltanian-Zadeh, \"Parcellation of functional Magnetic Resonance Image (fMRI) Based on Finite Mixture Models via Self-Annealing Expectation Maximization,\" Presented at and Published in the Proceedings of the 24th International Congress and Exhibition of Computer Assisted Radiology and Surgery (CARS 2010), Geneva, Switzerland, June 23-26, 2010. 18. S.H. Reza-Tofighi, K. Khaksari, H. Soltanian-Zadeh, \"Automatic Recognition of Five Types of White Blood Cells in Peripheral Blood,\" Published in the Proceedings of the International Conference on Image Analysis and Recognition (ICIAR 2010), Povoa de Varzim, Portugal, June 21-23, 2010. 20. M. Afzali, H. Soltanian-Zadeh, \"Comparison of Voxel-Based Morphometry (VBM) and Tractography of Diffusion Tensor MRI (DT-MRI) in Temporal Lobe Epilepsy,\" Presented at and Published in the Proceedings of the 18th Iranian Conference on Elec. Eng. (ICEE'10), Isfahan, Iran, May 11-13, 2010. 21. M. Esmaeil-Zadeh, H. Soltanian-Zadeh, K. Jafari-Khouzani, \"SPHARM-Based Shape Analysis of Hippocampus for Lateralization in Mesial Temporal Lobe Epilepsy,\" Presented at and Published in the Proceedings of the 18th Iranian Conference on Elec. Eng. (ICEE'10), Isfahan, Iran, May 11-13, 2010. 22. M. Najafi, H. Soltanian-Zadeh, T. Mikkelsen, \"Predicting Treatment Results of Brain Tumors Using Multiparametric MRI and Neural Network,\" Presented at and Published in the Proceedings of the 18th Iranian Conference on Elec. Eng. (ICEE'10), Isfahan, Iran, May 11-13, 2010. 23. S. Maleki Balajoo, G.A. Hossein-Zadeh, H. Soltanian-Zadeh, \"Exploratory fMRI Analysis Based on Finite Mixture Models via Self-Annealing Expectation Maximization,\" Presented at and Published in the Proceedings of the Southern Biomedical Engineering Conference (SBEC 2010), College Park, Maryland, USA, April 30-May 2, 2010. 24. E. Moghimirad, S.H. Rezatofighi, H. Soltanian-Zadeh, \"Multi-Scale Approach for Retinal Vessel Segmentation Using Medialness Function,\" Presented at and Published in the Proceedings of the 2010 IEEE International Symposium on Biomedical Imaging: From Macro to Nano (ISBI'10), Rotterdam, Netherlands, April 14-17, 2010. 25. A. Akhondi-Asl, K. Jafari-Khouzani, H. Soltanian-Zadeh, \"Multiple-Atlas-Based Automatic Segmentation of Hippocampus for Lateralization in Temporal Lobe Epilepsy,\" Presented at and Published in the Proceedings of the 2010 IEEE International Symposium on Biomedical Imaging: From Macro to Nano (ISBI'10), Rotterdam, Netherlands, April 14-17, 2010. 26. M.R. Arbabshirani, M. Nakhkash, H. Soltanian-Zadeh, \"Comparison of Canonical Correlation Analysis and ICA Techniques for fMRI,\" Presented at and Published in the Proceedings of the 4th International Symposium on Communications, Control and Signal Processing (ISCCSP'2010), Limassol, Cyprus, 3-5 March 2010. 27. M. Afzali, H. Soltanian-Zadeh, \"Tract Based Spatial Statistical Analysis of Diffusion Parameters in Temporal Lobe Epilepsy,\" Presented at and Published in the Proceedings of the 16th Iranian Conference on Biomedical Engineering, Tehran, Iran, Dec. 30-31, 2009. 28. A. Akhondi-Asl, H. Soltanian-Zadeh, \"Integrating Location and Tissue Type Information in Entropy-Based Coupled Object Segmentation of Brain Structures,\" Presented at and Published in the Proceedings of the 16th Iranian Conference on Biomedical Engineering, Tehran, Iran, Dec. 30-31, 2009. 29. M. Najafi, H. Soltanian-Zadeh, T. Mikkelsen, \"Outcome Prediction of Bevacizumab Treatment of Brain Tumor Patients Using Multiparametric MRI,\" Presented at and Published in the Proceedings of the 16th Iranian Conference on Biomedical Engineering, Tehran, Iran, Dec. 30-31, 2009. 30. F. Dadashi, B.N. Araabi, H. Soltanian-Zadeh, \"Gait Recognition Using Wavelet Packet Silhouette Representation and Transductive Support Vector Machines,\" Presented at and Published in the Proceedings of the 2nd International Congress on Image and Signal Processing (CISP '09), Tianjin, China, Oct. 17-19, 2009. 31. L. Amini, C. Jutten, S. Achard, O. David, H. Soltanian-Zadeh, G.A. Hossein-Zadeh, P. Kahane, L. Minotti, L. Vercueil, \"Directed Epileptic Network from Scalp and Intracranial EEG of Epileptic Patients,\" Presented at and Published in the Proceeding of the IEEE International workshop on Machine Learning for Signal Processing (MLSP), Grenoble, France, September 2-4, 2009. 32. M. Jabarouti-Moghaddam, H. Soltanian-Zadeh, \"Automatic Segmentation of Brain Structures Using Geometric Moment Invariants and Artificial Neural Networks,\" Presented at the 21st biennial International Conference on Information Processing in Medical Imaging (IPMI'09), Williamsburg, VA, July 5-10, 2009, Published in the Lecture Notes in Computer Science, vol. 5636, pp. 326-337. 33. H. Bagher-Ebadian, K. Jafari-Khouzani, P.D. Mitsias, H. Soltanian-Zadeh, M. Chopp, and J.R. Ewing, \"Predicting Final Extent of Ischemic Infarction Using an Artificial Neural Network Analysis of Multiparametric MRI in Patients with Stroke,\" Presented at and Published in the Proceeding of the 2009 International Joint Conference on Neural Networks (IJCNN'2009), Atlanta, GA, June 14-19, 2009. 34. N. Tajbakhsh, B.N. Araabi, H. Soltanian-Zadeh, \"Noisy Iris Verification: A Modified Version of Local Intensity Variation Method,\" Presented at and Published in the Proceeding of the 3rd IAPR International Conference on Biometrics (ICB'2009), Alghero, Italy, June 2-5, 2009, Lecture Notes in Computer Science, vol. 5558, pp. 1157-1166. 35. M. Jabarouti-Moghaddam, H. Soltanian-Zadeh, \"Segmentation of Putamen Using Geometric Moment Invariants and Neural Networks,\" Presented at and Published in the Proceedings of the 17th Iranian Conference on Elec. Eng. (ICEE'09), Tehran, Iran, May 12-14, 2009, pp. 193-198. 36. P. Zamani, H. Soltanian-Zadeh, \"Increasing Speed of Magnetic Resonance Imaging Using Compressive Sampling,\" Presented at and Published in the Proceedings of the 17th Iranian Conference on Elec. Eng. (ICEE'09), Tehran, Iran, May 12-14, 2009, pp. 211-216. 37. Y. Salimpour, H. Soltanian-Zadeh, \"Particle Filtering of Point Processes Observation with Application on the Modeling of Visual Cortex Neural Spiking Activity,\" Presented at and Published in the Proceeding of the 4th International IEEE\/EMBS Conference on Neural Engineering (NER'09), Antalya, Turkey, April 29-May 2, 2009, pp. 718-721. 38. L. Amini, S. Achard, C. Jutten, H. Soltanian-Zadeh, G.A. Hossein-Zadeh, O. David, L. Vercueil, \"Sparse Differential Connectivity Graph of Scalp EEG for Epileptic Patients,\" Presented at and Published in the Proceeding of the 17th European Symposium on Artificial Neural Networks (ESANN'2009), Bruges, Belgium, April 22-24, 2009. 39. P. Zamani, H. Soltanian-Zadeh, \"Reconstruction of Undersampled Cardiac Cine MRI data Using Compressive Sensing Principles,\" Presented at and Published in the Proceeding of the Signal Processing with Adaptive Sparse Structured Representations (SPARS'2009), Saint-Malo, France, April 06-09, 2009. 40. S. Samadi, H. Soltanian-Zadeh, \"Symmetric Analysis of EEG and fMRI Using Nonlinear Models: A Simulation Study,\" Presented at and Published in the Proceeding of the Signal Processing with Adaptive Sparse Structured Representations (SPARS'2009), Saint-Malo, France, April 06-09, 2009. 41. M. Rajabioun, A. Babajani-Feremi, H. Soltanian-Zadeh, \"New Method for Detection of Brain Activations from MEG Signals,\" Presented at and Published in the Proceeding of the 14th National Computer Society of Iran Computer Conference (CSICC'2009), Amir Kabir University, Tehran, Iran, March 11-12, 2009. 42. S.H. Rezatofighi, H. Soltanian-Zadeh, R. Sharifian, R.A. Zoroofi, \"A New Approach to White Blood Cell Nucleus Segmentation Based on Gram-Schmidt Orthogonalization,\" Presented at and Published in the Proceeding of the 2009 International Conference on Digital Image Processing (ICDIP'2009), March 7-9, 2009, Bangkok, Thailand, pp. 107-111. 43. S.H. Rezatofighi, A. Roodaki, A. Pourmorteza, H. Soltanian-Zadeh, \"Polar Run-Length Features in Segmentation of Retinal Blood Vessels,\" Presented at and Published in the Proceeding of the 2009 International Conference on Digital Image Processing (ICDIP'2009), March 7-9, 2009, Bangkok, Thailand, pp. 72-75. 44. M. Esmaeil-Zadeh, H. Soltanian-Zadeh, G.A. Hossein-Zadeh, \"Comparison of Recent Least Square Approaches for Fusion of Multimodal Medical Images,\" Presented at and Published in the Proceedings of the 15th Iranian Conference on Biomedical Engineering (ICBME'09), Mashhad, Iran, Feb. 12-13, 2009, pp. 437-442. 45. M.R. Nazem-Zadeh, E. Davoodi-Bojd, H. Soltanian-Zadeh, \"Effect of Spherical Harmonic Coefficients on Fiber Bundle Segmentation,\" Presented at and Published in the Proceedings of the 15th Iranian Conference on Biomedical Engineering (ICBME'09), Mashhad, Iran, Feb. 12-13, 2009, pp. 392-397. 46. M. Jabarouti-Moghaddam, R. Rahmani, H. Soltanian-Zadeh, \"Automatic Segmentation of Putamen using Geometric Moment Invariants,\" Presented at and Published in the Proceedings of the 15th Iranian Conference on Biomedical Engineering (ICBME'09), Mashhad, Iran, Feb. 12-13, 2009, pp. 372-377. 47. E. Davoodi-Bojd, H. Soltanian-Zadeh, \"Evaluation and Comparison of Two Models of White Matter Fibers Using DTMRI,\" Presented at and Published in the Proceedings of the 15th Iranian Conference on Biomedical Engineering (ICBME'09), Mashhad, Iran, Feb. 12-13, 2009, pp. 349-354. 48. M. Mohammadzadeh, H. Soltanian-Zadeh, M. Shahabadi, A. Tavakoli, D. von Elverfeldt, \"Design of a Dual Helix Intravascular MRI Coil,\" Presented at and Published in the Proceedings of the 15th Iranian Conference on Biomedical Engineering (ICBME'09), Mashhad, Iran, Feb. 12-13, 2009, pp. 467-471. 49. A. Babajani-Feremi, S.M. Bowyer, J.E. Moran, K. Elisevich, K. Podell, H. Soltanian-Zadeh, \"Multi-Area Integrated E\/MEG and fMRI Modeling,\" Presented at and published in the Proceedings of SPIE Medical Imaging 2009: Biomedical Applications in Molecular, Structural, and Functional Imaging, Orlando, FL, Feb. 7-12, 2009, vol. 7262, pp. 72621V-1-11. 50. M.-R. Siadat, R. Hammad, A. Shetty, H. Soltanian-Zadeh, I. Sethi, A. Eetemadi, K. Elisevich, \"DTI Data Modeling for Unlimited Query Support,\" Presented at and published in the Proceedings of SPIE Medical Imaging 2009: Advanced PACS-based Imaging Informatics and Therapeutic Applications, Orlando, FL, Feb. 7-12, 2009, vol. 7264, pp. 726415-1-10. 51. A. Babajani-Feremi, S.M. Bowyer, J.E. Moran, K. Elisevich, H. Soltanian-Zadeh, \"Variational Bayesian Framework for Estimating Parameters of Integrated E\/MEG and fMRI Model,\" Presented at and published in the Proceedings of SPIE Medical Imaging 2009: Biomedical Applications in Molecular, Structural, and Functional Imaging, Orlando, FL, Feb. 7-12, 2009, vol. 7262, pp. 72621T-1-11. 52. M. Rajabioun, A. Babajani-Feremi, H. Soltanian-Zadeh, \"Combinational Method for Focal Brain Activation Detection Using MEG Signal,\" Presented at and published in the Proceedings of SPIE Medical Imaging 2009: Biomedical Applications in Molecular, Structural, and Functional Imaging, Orlando, FL, Feb. 7-12, 2009, vol. 7262, pp. 726220-1-11. 53. M. Dadgostar, P.R. Tabrizi, E. Fatemizadeh, H. Soltanian-Zadeh, \"Feature Extraction Using Gabor-Filter and Recursive Fisher Linear Discriminant with Application in Fingerprint Identification,\" Presented at and Published in the Proceeding of the 7th International Conference on Advances in Pattern Recognition (ICAPR'2009), Feb. 4-6, 2009, Indian Statist. Inst., Kolkata, India, pp. 217-220. 54. S.H. Rezatofighi, R.A. Zoroofi, C. Lucas, R. Sharifian, H. Soltanian-Zadeh, \"Automatic Recognition of Basophils in Hematological Images,\" Presented at and Published in the Proceedings of the 5th Iranian Conference on Machine Vision and Image Processing (MVIP'2008), Tabriz, Iran, Nov. 4-6, 2008. 55. M. Dadgostar, P. Roshani-Tabrizi, H. Soltanian-Zadeh, E. Fatemizadeh, \"Fingerprint Recognition Based on Gabor Filter and FLD\/RFLD Transformation,\" Presented at and Published in the Proceedings of the 5th Iranian Conference on Machine Vision and Image Processing (MVIP'2008), Tabriz, Iran, Nov. 4-6, 2008. 56. M.R. Nazem-Zadeh, E. Davoodi-Bojd, H. Soltanian-Zadeh, \"Fiber Bundle Segmentation Using Level-Set Method and Spherical Harmonic Coefficients,\" Presented at and Published in the Proceedings of the 5th Iranian Conference on Machine Vision and Image Processing (MVIP'2008), Tabriz, Iran, Nov. 4-6, 2008. 57. M. Gheiratmand, H. Khaloozadeh, H. Soltanian-Zadeh, \"Optimization of Intermediate Layer Features of the HMAX Object Recognition Model,\" Presented at and Published in the Proceedings of the 5th Iranian Conference on Machine Vision and Image Processing (MVIP'2008), Tabriz, Iran, Nov. 4-6, 2008. 58. S.H. Rezatofighi, R.A. Zoroofi, R. Sharifian, H. Soltanian-Zadeh, \"Segmentation of Nucleus and Cytoplasm of White Blood Cells Using Gram-Schmidt Orthogonalization and Deformable Models,\" Published in the Proceedings of the 9th International Conference on Signal Processing (ICSP'08), Beijing, China, Oct. 26-29, 2008. pp. 801-805. 59. S.H. Rezatofighi, A. Roodaki, R.A. Zoroofi, R. Sharifian, H. Soltanian-Zadeh, \"Automatic Detection of Red Blood Cells in Hematological Images Using Polar Transformation and Run-length Matrix,\" Published in the Proceedings of the 9th International Conference on Signal Processing (ICSP'08), Beijing, China, Oct. 26-29, 2008. pp. 806-809. 60. M. Gheiratmand, H. Soltanian-Zadeh, H. Khaloozadeh, \"Towards an Inclusive Computational Model of Visual Cortex,\" Presented at and Published in the Proceedings of the 8th IEEE International Conference on Bioinformatics and Bioengineering (IEEE BIBE 2008), Athens, Greece, Oct. 8-10, 2008, vol. 1-2, pp. 671-675. 61. L. Amini, R. Sameni, C. Jutten, G.A. Hossein-Zadeh, H. Soltanian-Zadeh, \"MR Artifact Reduction in the Simultaneous Acquisition of EEG and fMRI of Epileptic Patients,\" Presented at and Published in the Proceedings of the 2008 European Signal Processing Conference (EUSIPCO-2008), Lausanne, Switzerland, Aug. 25-29, 2008. 62. N. Tajbakhsh, B.N. Araabi, H. Soltanian-Zadeh, \"An Intelligent Decision Combiner Applied to Noncooperative Iris Recognition,\" Presented at and Published in the Proceeding of the 11th International Conference on Information Fusion(ICIF'2008), Cologne, Germany, June 30-July 3, 2008. 63. N. Tajbakhsh, B.N. Araabi, H. Soltanian-Zadeh, \"Feature Fusion as a Practical Solution toward Noncooperative Iris Recognition,\" Presented at and Published in the Proceeding of the 11th International Conference on Information Fusion (ICIF'2008), Cologne, Germany, June 30-July 3, 2008. 64. H. Hamidian, H. Soltanian-Zadeh, R. Faraji-Dana, M. Gity, \"Estimating Brain Deformation During Surgery Using Finite Element Method: Comparison of Two Linear Models,\" Presented at and Published in the Proceedings of the 22nd International Congress and Exhibition of Computer Assisted Radiology and Surgery (CARS'2008), Barcelona, Spain, June 25-28, 2008. 65. M. Shaker, H. Soltanian-Zadeh, \"Atlas-Based Segmentation of Brain Structures in Temporal Lobe Epilepsy Using Optimized Voxel-Based Morphometry,\" Presented at and Published in the 22nd International Congress and Exhibition of Computer Assisted Radiology and Surgery (CARS'2008), Barcelona, Spain, June 25-28, 2008. 66. H. Hamidian, H. Soltanian-Zadeh, R. Faraji-Dana, M. Gity, \"Comparison of Two Linear Models for Estimating Brain Deformation during Surgery Using Finite Element Method,\" Presented at and Published in the Proceedings of the 2008 IEEE World Congress on Computational Intelligence (WCCI 2008), Hong Kong, June 1-6, 2008, pp. 4089-4094. 67. A. Akhondi-Asl, H. Soltanian-Zadeh, \"Constrained Optimization of Nonparametric Entropy-Based Segmentation of Brain Structures,\" Presented at and Published in the Proceedings of the 5th IEEE International Symposium on Biomedical Imaging: From Macro to Nano (ISBI'08), Paris, France, May 14-17, 2008, vol. 1-4, pp. 41-44. 68. E. Davoodi-Bojd, H. Soltanian-Zadeh, \"Atlas Based Segmentation of White Matter Fiber Bundles in DT-MRI Using Fractional Anisotropy and Principal Eigen Vectors,\" Presented at and Published in the Proceedings of the 5th IEEE International Symposium on Biomedical Imaging: From Nano to Macro (ISBI'08), Paris, France, May 14-17, 2008, vol. 1-4, pp. 879-882. 69. A. Akhondi-Asl, H. Soltanian-Zadeh, \"Effect of the Number of Coupled Structures on the Segmentation of Brain Structures from MRI,\" Presented at and Published in the Proceedings of the 16th Iranian Conference on Elec. Eng. (ICEE'08), Tehran, Iran, May 13-15, 2008. 70. M. Pourahmadi, H. Soltanian-Zadeh, \"Speech Enhancement Using Combination of Blind Source Separation and Kalman Filtering,\" Presented at and Published in the Proceedings of the 16th Iranian Conference on Elec. Eng. (ICEE'08), Tehran, Iran, May 13-15, 2008. 71. E. Yahaghi, H. Soltanian-Zadeh, \"Evaluation of Intracellular Water Exchange on MRI Relaxation Time Using Lee Model,\" Presented at and Published in the Proceedings of the 16th Iranian Conference on Elec. Eng. (ICEE'08), Tehran, Iran, May 13-15, 2008. 72. H. Banizaman, H. Soltanian-Zadeh, \"Adaptive Traffic Prediction in Self-Sizing Networks Using Wavelets,\" Presented at and Published in the Proceedings of the 16th Iranian Conference on Elec. Eng. (ICEE'08), Tehran, Iran, May 13-15, 2008. 73. M. Shaker, H. Soltanian-Zadeh, \"Automatic Segmentation of Brain Structures from MRI Integrating Atlas-Based Labeling and Level Set Method,\" Presented at and Published in the Proceedings of the 21st Canadian Conference on Electrical and Computer Engineering (CCECE'2009), Niagara Falls, Ontario, Canada, May 4-7, 2008, vol. 1-4, pp. 1755-1758. 74. H. Jahanian, A. Yazdan-Shahmorad, H. Soltanian-Zadeh, \"4D Wavelet Noise Suppression of MR Diffusion Tensor Data,\" Presented at and Published in the Proceedings of the 33rd IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP'2008), Las Vegas, Nevada, USA, March 30-April 4, 2008,vol. 1-12, pp. 509-512. 75. M. Shaker, H. Soltanian-Zadeh, \"Voxel-Based Morphometric Study of Brain Regions from Magnetic Resonance Images in Temporal Lobe Epilepsy,\" Presented at and Published in the Proceedings of the 2008 IEEE Southwest Symposium on Image Analysis and Interpretation (SSIAI'2008), Santa Fe, New Mexico, USA, March 24-26, 2008, pp. 209-212. 76. H. Hamidian, H. Soltanian-Zadeh, R. Faraji-Dana, M. Gity, \"Optimization of Two Linear Models for Estimating Brain Deformation During Surgery Using Finite Element Method,\" Presented at and Published in the Proceedings of the 2008 International Workshop on Signal Processing and its Applications (WOSPA'2008), United Arab Emirate, March 18-20, 2008. 77. H. Hamidian, H. Soltanian-Zadeh, A. Akhondi-Asl, R. Faraji-Dana, \"Comparison of Linear and Nonlinear Models for Estimating Brain Deformation Using Finite Element Method,\" Presented at and Published in the Proceedings of the 13th International CSI Computer Conference (ICSICC'2008), Kish Island, Iran, March 9-11, 2008, Advances in Computer Science and Engineering, vol. 6, pp. 340-347. 78. H. Banizaman, H. Soltanian-Zadeh, \"A Novel Approach in Adaptive Traffic Prediction in Self-Sizing Networks Using Wavelets,\" Presented at and Published in the Proceedings of the 13th International CSI Computer Conference (ICSICC'2008), Kish Island, Iran, March 9-11, 2008, Advances in Computer Science and Engineering, vol. 6, pp. 763-768. 79. E. Davoodi, H. Soltanian-Zadeh, \"Grid Based Registration of Diffusion Tensor Images Using Least Square Support Vector Machines,\" Presented at and Published in the Proceedings of the 13th International CSI Computer Conference (ICSICC'2008), Kish Island, Iran, March 9-11, 2008, Advances in Computer Science and Engineering, vol. 6, pp. 621-628. 80. A. Pourmorteza, S.H. Reza-Tofighi, A. Roodaki, A. Yazdani, H. Soltanian-Zadeh, \"Context-Dependent Segmentation of Retinal Blood Vessels Using Hidden Markov Models,\" Presented at and Published in the Proceedings of the 13th International CSI Computer Conference (ICSICC'2008), Kish Island, Iran, March 9-11, 2008, Advances in Computer Science and Engineering, vol. 6, pp. 348-355. 81. A. Babajani-Feremi, H. Soltanian-Zadeh, J. Moran, \"Validation of Proposed Integrated MEG and fMRI Model Using Real Data,\" Presented at and Published in the Proceedings of the 14th Iranian Conference on Biomedical Engineering (ICBME'08), Tehran, Iran, Feb. 13-14, 2008. 82. P. Zamani, B. Williams, H. Soltanian-Zadeh, F. Bahrami, \"Extracting Motion Primitives from Persian Handwriting Data,\" Presented at and Published in the Proceedings of the 14th Iranian Conference on Biomedical Engineering (ICBME'08), Tehran, Iran, Feb. 13-14, 2008. 83. A.R. Mohammadi-Nejad, G.A. Hossein-Zadeh, H. Soltanian-Zadeh, \"Evaluating Effects of Imaging Parameters on Single Cell Detection in Molecular MRI via Simulation,\" Presented at and Published in the Proceedings of the 2007 IEEE International Conference on Signal Processing and Communications (ICSPC'07), Dubai, United Arab Emirates Nov. 24-27, 2007, vol. 1-3, pp. 588-591. 84. A. Eetemadi, M.-R. Siadat, H. Soltanian-Zadeh, F. Fotouhi, K.V. Elisevich, \"Content-Based Support Environment (C-BASE): Data Preparation and Similarity Measurement,\" Presented at and Published in the Proceedings of the Seventh IEEE International Conference on Data Mining (ICDM'07), Omaha, NE, USA, October 28-31, 2007. pp. 145-150. 85. M.-R. Siadat, H. Soltanian-Zadeh, F. Fotouhi, A. Eetemadi, K.V. Elisevich, \"Data Modeling for Content-Based Support Environment (C-BASE): Application on Epilepsy Data Mining,\" Presented at and Published in the Proceedings of the Seventh IEEE International Conference on Data Mining (ICDM'07), Omaha, NE, USA, October 28-31, 2007. pp. 181-186. 86. A.-R. Mohammadi-Nejad, G.-A. Hossein-Zadeh, H. Soltanian-Zadeh, \"Evaluation of Bold Sensitivity Using a Realistic MRI Simulator,\" Presented at and Published in the Proceedings of the 2007 Joint Meeting of the 6th International Symposium on Noninvasive Functional Source Imaging of the Brain and Heart and the International Conference on Functional Biomedical Imaging (NFSI & ICFBI), Hangzhou, China, Oct. 12-14, 2007, pp. 268-271. 87. M. Aghagolzadeh, H. Soltanian-Zadeh, B. Araabi, A. Aghagolzadeh, \"A Hierarchical Clustering Based on Mutual Information Maximization,\" Presented at and Published in the Proceedings of the 2007 International Conference on Image Processing (ICIP'07), San Antonio, TX, USA, Sept. 16-19, 2007, vol. 1-7, pp. 277-280. 88. S. M. Hosseini, B. N. Araabi, H. Soltanian-Zadeh, \"Shape Analysis of Stroma for Iris Recognition,\" Presented at and Published in the Proceedings of the 2nd IAPR\/IEEE Int. Conf. Biometrics (ICB), Seoul, Korea, Aug. 27-29, 2007, Lecture Notes in Computer Science, Advances in Biometrics, vol. 4642, pp. 790-799, Springer Verlag, 2007. 89. F. Dargi, M.A. Oghabian, A. Ahmadian, H. Soltanian-Zadeh, M. Zarei, A. Boroomand, \"Modified Fast Marching Tractography Algorithm and Its Ability to Detect Fiber Crossing,\" Presented at and Published in the Proceedings of the 29th IEEE EMBS Annual International Conference, Lyon, France, Aug. 23-26, 2007, pp. 319-322. 90. Sh. Badizadegan, H. Soltanian-Zadeh, \"Designing Matched Wavelets with the Maximum Coding Gain Criterion for R Peak Detection in ECG Signal,\" Presented at and Published in the Proceedings of the 15th Iranian Conference on Elec. Eng. (ICEE'07), Tehran, Iran, May 15-17, 2007, pp. 44-49. 91. M. Ghannad-Rezaie, K. Jafari-Khouzani, H. Soltanian-Zadeh, \"Recovery Limitations of MEG Source Localization Model for Epilepsy,\" Presented at and Published in the Proceedings of the 4th IEEE International Symposium on Biomedical Imaging: From Nano to Macro (ISBI'07), Arlington, Virginia, April 12-15, 2007, vol. 1-3, pp. 1088-1091. 92. A. Yazdan-Shahmorad, H. Jahanian, S. Patel, H. Soltanian-Zadeh, \"Automatic Brain Tumor Segmentation Using Tissue Diffusivity Characteristics,\" Presented at and Published in the Proceedings of the 4th IEEE International Symposium on Biomedical Imaging: From Nano to Macro (ISBI'07), Arlington, Virginia, April 12-15, 2007, vol. 1-3, pp. 780-783. 93. A. Akhoundi-Asl, H. Soltanian-Zadeh, \"Nonparametric Entropy-Based Coupled Multi-Shape Medical Image Segmentation,\" Presented at and Published in the Proceedings of the 4th IEEE International Symposium on Biomedical Imaging: From Macro to Nano (ISBI'07), Arlington, Virginia, April 12-15, 2007, vol. 1-3, pp. 1200-1203. 94. Ch. Khodaverdian, H. Soltanian-Zadeh, \"Fast Independent Component Analysis and Tensor Deflection for Estimating Multiple Fibers per Voxel,\" Presented at and Published in the Proceedings of Proceedings of the 12th Annual Conference of Iran Computer Society (CSICC'2007), Tehran, Iran, Feb. 20-22, 2007, pp. 220-225. 95. Ch. Khodaverdian, H. Soltanian-Zadeh, \"Estimation of Multiple Fibers per Voxel Using Fast Independent Component Analysis,\" Presented at and Published in the Proceedings of the 13th Iranian Conference on Biomedical Engineering (ICBME'07), Tehran, Iran, Feb. 21-22, 2007, pp. 92-97. 96. S.E. Mahmoudi, V. Taimouri, A.H. Simjour, Sh. Faghi-Rouhi, N. Asadi, M.R. Nazem-Zadeh, M.R. Sehati, A. Akhundi-Asl, G.A. Hossein-Zadeh, H. Soltanian-Zadeh, \"Web-Based Software for 2D and 3D Processing and Display of Medical Images,\" Presented at and Published in the Proceedings of the 13th Iranian Conference on Biomedical Engineering (ICBME'07), Tehran, Iran, Feb. 21-22, 2007, pp. 133-139. 97. P. Bahman-Bijari, A. Akhundi-Asl, H. Soltanian-Zadeh, \"Coupled Object Segmentation Using Entropy and Fuzzy Characteristics of Tissues,\" Presented at and Published in the Proceedings of the 13th Iranian Conference on Biomedical Engineering (ICBME'07), Tehran, Iran, Feb. 21-22, 2007, pp. 25-30. 98. Z. Torbatian, H. Soltanian-Zadeh, \"Extraction of Magnetic Resonance Spectroscopic Imaging (MRSI) Characteristic Using Wavelet Transform,\" Presented at and Published in the Proceedings of the 13th Iranian Conference on Biomedical Engineering (ICBME'07), Tehran, Iran, Feb. 21-22, 2007, pp. 112-117. 99. F. Dargi, M.A. Oghabian, A. Ahmadian, H. Soltanian-Zadeh, M. Zarei, \"Diffusion Tensor Digital Phantom for Crossing Fiber Detection,\" Presented at and Published in the Proceedings of the Fourth Iranian Conference on Machine Vision and Image Processing (MVIP'2007), Mashhad, Iran, Feb. 14-15, 2007, pp. P1-1-8. 100. S.M. Hosseini, B. Najar-Araabi, H. Soltanian-Zadeh, \"Classification of Iris Color Images Using Hue Co-occurrence Matrix: A Step Towards Robust Human Identification,\" Presented at and Published in the Proceedings of the Fourth Iranian Conference on Machine Vision and Image Processing (MVIP'2007), Mashhad, Iran, Feb. 14-15, 2007, pp. P2-1-8. 101. S. Badizadegan, H. Soltanian-Zadeh, \"Designing Matched Wavelets for R Peak Detection in ECG Signal,\" Presented at and Published in the Proceedings of the Third Cairo International Biomedical Engineering Conference (CIBEC'06), Cairo, Egypt, Dec. 21-24, 2006. 102. Z.Torbatian, H. Soltanian-Zadeh, \"MR Spectroscopy Guided Brain Tumor Detection and Evaluation Using Fuzzy Clustering,\" Presented at and Published in the Proceedings of the Third Cairo International Biomedical Engineering Conference (CIBEC'06), Cairo, Egypt, Dec. 21-24, 2006. 103. L. Amini, H. Soltanian-Zadeh, E. Fatemi-Zadeh, G.A. Hossein-Zadeh, \"Automatic Landmark Generation for Nonlinear Registration of Anatomical and Functional Brain MRI,\" Presented at and Published in the Proceedings of the Third Cairo International Biomedical Engineering Conference (CIBEC'06), Cairo, Egypt, Dec. 21-24, 2006. 104. Ch. Khodaverdian, H. Soltanian-Zadeh, \"DTI Crossing Fibers Estimation Using Fast Independent Component Analysis,\" Presented at and Published in the Proceedings of the Third Cairo International Biomedical Engineering Conference (CIBEC'06), Cairo, Egypt, Dec. 21-24, 2006. 105. P. Bahmanbijari, A. Akhoundi-Asl, H. Soltanian-Zadeh, \"Interactive Coupled Object Segmentation Using Symmetry and Distance Constraints,\" Presented at and Published in the Proceedings of the Third Cairo International Biomedical Engineering Conference (CIBEC'06), Cairo, Egypt, Dec. 21-24, 2006. 106. M. Aghagolzadeh, H. Soltanian-Zadeh, B. N. Araabi, and A. Aghagolzadeh, \"Finding the Number of Clusters in a Dataset Using an Information Theoretic Hierarchical Algorithm,\" Presented at and Published in the Proceedings of the 13th IEEE International Conference on Electronics, Circuits and Systems (IEEE ICECS), Nice, France, Dec. 10-13, 2006, vol. 1-3, pp. 1336-1339. 107. A. Mehrtash, Sh. Vahdat, H. Soltanian-Zadeh, \"Fuzzy Edge Preserving Smoothing Filter Using Robust Region Growing,\" Presented at and Published in the Proceedings of the IEEE World Congress on Computational Intelligence, Vancouver, Canada, July 15-21, 2006. Received Best Session Presentation Award. 108. M. Ghannad-Rezaie, H. Soltanian-Zadeh, M.-R. Siadat, K.V. Elisevich, \"Medical Data Mining using Particle Swarm Optimization for Temporal Lobe Epilepsy,\" Presented at and Published in the Proceedings of the IEEE World Congress on Computational Intelligence, Vancouver, Canada, July 15-21, 2006. 109. V. Taimouri, G.A. Hossein-Zadeh, H. Soltanian-Zadeh, \"Spatially Adaptive Kernels for Adaptive Spatial Filtering of fMRI Data,\" Presented at and Published in the Proceedings of the IEEE International Joint Conference on Neural Network, Vancouver, Canada, July 16-21, 2006, vol. 1-10, pp. 1384-1388. 110. M. Aghagolzadeh, H. Soltanian-Zadeh, B.N. Araabi, \"Multiscale Face Detection: A New Approach to Robust Face Detection,\" Presented at and Published in the Proceedings of the IEEE International Conference on Fuzzy Systems, Vancouver, Canada, July 16-21, 2006, vol. 1-5, pp. 1229-1234. 111. M. Soleymani, G.A. Hossein-Zadeh, H. Soltanian-Zadeh, \"Fixed and Random Effect Analysis of Multi-subject Spatial Activation Maps in Wavelet Domain,\" Presented at and Published in the Proceedings of the IEEE International Joint Conference on Neural Network, Vancouver, Canada, July 16-21, 2006, vol. 1-10, pp. 1389-1392. 112. H. Fatemi-Shariatpanahi, N. Batmanghelich, A.R.M. Kermani, M. Nili-Ahmadabadi, H. Soltanian-Zadeh, \"Distributed Behavior-based Multi-agent System for Automatic Segmentation of Brain MR Images,\" Presented at and Published in the Proceedings of the IEEE International Joint Conference on Neural Network, Canada, July 16-21, 2006, vol. 1-10, pp. 4535-4542. 113. P.B. Bijari, A.R. Akhoundi-Asl, H. Soltanian-Zadeh, \"Refinement of Active Contour Based Thalamus Segmentation Using Genetic Algorithm,\" Presented at and Published in the Proceedings of the 7th Annual Research Congress of Iranian Medical Sciences Students, Tehran, Iran, May 30-June 1, 2006. pp. 434-436. 114. Z. Torbatian, H. Soltanian-Zadeh, \"DT-MRI Noise Reduction Based on 2D Anisotropic Diffusion Filtering,\" Presented at and Published in the Proceedings of the 7th Annual Research Congress of Iranian Medical Sciences Students, Tehran, Iran, May 30-June 1, 2006. pp. 430-431. 115. S. Badizadegan, H. Soltanian-Zadeh, \"R Peak Detection in ECG Signal Using Matched Wavelets,\" Presented at and Published in the Proceedings of the 7th Annual Research Congress of Iranian Medical Sciences Students, Tehran, Iran, May 30-June 1, 2006. pp. 428-429. 116. A. Babajani, H. Soltanian-Zadeh, \"Using Real MEG and fMRI Data for Parameter Estimation of the Integrated Model,\" Presented at and Published in the Proceedings of the 14th Iranian Conference on Elec. Eng. (ICEE'06), Tehran, Iran, May 16-18, 2006. 117. M. Rajabioun, A. Babajani, H. Soltanian-Zadeh, \"New Weighting Method for Reducing Noise Sensitivity of MEG Inverse Problem,\" Presented at and Published in the Proceedings of the 14th Iranian Conference on Elec. Eng. (ICEE'06), Tehran, Iran, May 16-18, 2006. 118. P.B. Bijari, A.R. Akhoundi-Asl, H. Soltanian-Zadeh, \"Thalamus Segmentation in MRI Using Region and Gradient Information in Level sets,\" Presented at and Published in the Proceedings of the 14th Iranian Conference on Elec. Eng. (ICEE'06), Tehran, Iran, May 16-18, 2006. 119. S. Badizadegan, Z. Torbatian, H. Soltanian-Zadeh, \"Extraction of ECG Characteristic Points by Wavelet Transform,\" Presented at and Published in the Proceedings of the 14th Iranian Conference on Elec. Eng. (ICEE'06), Tehran, Iran, May 16-18, 2006. 120. K. Jafari-Khouzani, H. Soltanian-Zadeh, K. Elisevich, \"Hippocampus Volume and Texture Analysis for Temporal Lobe Epilepsy,\" Presented at and Published in the Proceedings of the 6th IEEE International Conference on Electro\/Information Technology (EIT'2006), Mich. State Univ., East Lansing, MI, May 7-10, 2006, pp. 394-397. 121. M.-R. Siadat, H. Soltanian-Zadeh, K. Elisevich, \"Rule-Based Decision-Making Framework for Knowledge-Based Anatomical Landmark Localization (K-BALL),\" Presented at and Published in the Proceedings of the 3rd IEEE International Symposium on Biomedical Imaging: From Nano to Macro (ISBI'06), Arlington, Virginia, April 6-9, 2006, vol. 1-3, pp. 1368-1371. 122. M.-R. Siadat, K. Elisevich, H. Soltanian-Zadeh, K. Jafari-Khouzani, S. Bowyer, \"Subdural and Depth Electrode Placement in the Brain for Validation of MEG in Partial Epilepsy,\" Presented at and Published in the Proceedings of SPIE Medical Imaging 2006: Visualization, Image-Guided Procedures, and Display, San Diego, CA, Feb. 12-14, 2006, vol. 6141, pp. 61412A1-8. 123. A. Babajani, M.H. Nekooei, H. Soltanian-Zadeh, \"Extended Neural Mass Model for Integrated Modeling of EEG\/MEG and fMRI,\" Presented at and Published in the Proceedings of Proceedings of the 11th Annual Conference of Iran Computer Society (CSICC'2006), Tehran, Iran, Jan. 24-26, 2006. 124. M. Rajabioun, A. Babajani, H. Soltanian-Zadeh, \"A New Method for Solving MEG Inverse Problem,\" Presented at and Published in the Proceedings of Proceedings of the 11th Annual Conference of Iran Computer Society (CSICC'2006), Tehran, Iran, Jan. 24-26, 2006. 125. M.R. Sehati, R.A. Zoroofi, H. Soltanian-Zadeh, \"Design and Implementation of a Standard Radiology Information Management System Expandable to Other Clinical Information Systems,\" Presented at and Published in the Proceedings of Proceedings of the 11th Annual Conference of Iran Computer Society (CSICC'2006), Tehran, Iran, Jan. 24-26, 2006. 126. M. Mohammadzadeh, M. Shahabadi, S.A. Ghasempour-Shirazi, H. Soltanian-Zadeh, \"Design and Simulation of Quad-Loop Probe for Intravascular MRI at 1.5 Tesla,\" Presented at and Published in the Proceedings of the 12th International Conference on Biomedical Engineering (ICBME'2005), Singapore, Dec. 7-10, 2005. 127. Y. Salimpour, M.D. Abolhassani, H. Soltanian-Zadeh, \"Auditory Wavelet Transform,\" Presented at and Published in the Proceedings of the 3rd European Medical and Biological Engineering Conference (EMBEC'05), Prague, Czech Republic, Nov. 20-25, 2005. 128. E. Yahaghi, H. Soltanian-Zadeh, M. Shahriarei, N. Fatouraee, \"Estimation of Blood Brain Barrier Permeability by Statistical and Analytical Methods,\" Presented at and Published in the Proceedings of the 3rd European Medical and Biological Engineering Conference (EMBEC'05), Prague, Czech Republic, Nov. 20-25, 2005, pp. 1896-1 to 1896-4. 129. M. Ghannad-Rezaie, H. Soltanian-Zadeh, R.A. Zoroofi, \"Seizure Prediction Using Kalman Filtering in State Space,\" Presented at and published in the Proceedings of the 12th Iranian Conference on Biomedical Engineering (ICBME'05), Tabriz, Iran, Nov. 16-18, 2005. 130. B. Afshin-Pour, G.A. Hossein-Zadeh, H. Soltanian-Zadeh, \"Comparison of Time and Wavelet Domain Approaches in Non-parametric Detrending of fMRI Time-Series,\" Presented at and published in the Proceedings of the 12th Iranian Conference on Biomedical Engineering (ICBME'05), Tabriz, Iran, Nov. 16-18, 2005. pp. 244-249. 131. M. Aghagolzadeh, H. Soltanian-Zadeh, B.N. Araabi, \"Information-Based Clustering Using Renyi's Entropy and Scatter Matrices,\" Presented at and Published in the Proceedings of the International Symposium on Telecommunications (IST'2005), Shiraz, Iran, Sept. 10-12, 2005. 132. M. Ghannad-Rezaie, H. Soltanian-Zadeh, K. Jafari-Khouzani, M.-R. Siadat, R.A. Zoroofi, K.V. Elisevich, \"MRI-SPECT Data Fusion for Temporal Lobe Epilepsy Surgery Candidate Selection,\" Presented at and Published in the Proceedings of the Seventh IASTED International Conference on. Signal and Image Processing (SIP'2005), Honolulu, Hawaii, USA, Aug. 15-17, 2005, pp. 128-132. 133. H. Jahanian, H. Soltanian-Zadeh, G.A. Hossein-Zadeh, \"Statistical Inference in Fuzzy Cluster Analysis of Functional MRI,\" Presented at and Published in the Proceedings of the Seventh IASTED International Conference on. Signal and Image Processing (SIP'2005), Honolulu, Hawaii, USA, Aug. 15-17, 2005, pp. 133-135. 134. M. Aghagolzadeh, H. Soltanian-Zadeh, B.N. Araabi, \"New Information-Based Clustering Method Using Renyi's Entropy And Fuzzy C-Means Clustering,\" Presented at and Published in the Proceedings of the Seventh IASTED International Conference on. Signal and Image Processing (SIP'2005), Honolulu, Hawaii, USA, Aug. 15-17, 2005, pp. 410-413. 135. N. Batmanghelich, H. Soltanian-Zadeh, B.N. Araabi, \"Knowledge-based Segmentation: Using Simultaneous Shape Priori and Histogram Information to Segment Brain Structures,\" Presented at and Published in the Proceedings of the Seventh IASTED International Conference on. Signal and Image Processing (SIP'2005), Honolulu, Hawaii, USA, Aug. 15-17, 2005, pp. 414-419. 136. H. Jahanian, H. Soltanian-Zadeh, G.A. Hossein-Zadeh, \"Noise Suppression of fMRI Time-Series in Wavelet Domain,\" Presented at and Published in the Proceedings of the Seventh IASTED International Conference on Signal and Image Processing (SIP'2005), Honolulu, Hawaii, USA, Aug. 15-17, 2005, pp. 136-138. 137. M. Ghannad-Rezaie, H. Soltanian-Zadeh, M.-R. Siadat, K.V. Elisevich, \"Soft Computing Approaches to Computer Aided Decision Making for Temporal Lobe Epilepsy,\" Presented at and Published in the Proceedings of the IEEE NAFIPS Annual Conference on Soft Computing for Real World Applications, Detroit, Michigan, June 26-28, 2005, pp. 42-45. 138. M.R. Siadat, H. Soltanian-Zadeh, F. Fotouhi, K.V. Elisevich, \"Uncertain Decision-Making Schemes for Knowledge-Based Anatomical Landmark Localization (K-BALL),\" Presented at and Published in the Proceedings of the IEEE NAFIPS Annual Conference on Soft Computing for Real World Applications, Detroit, Michigan, June 26-28, 2005, pp. 37-41. 139. K. Jafari-Khouzani, H. Soltanian-Zadeh, R. Finley, F. Fotouhi, \"Neural Network Scoring of Spots in X-Gal and \u2013leu Plates,\" Presented at and Published in the Proceedings of the IEEE NAFIPS Annual Conference on Soft Computing for Real World Applications, Detroit, Michigan, June 26-28, 2005, pp. 46-50. 140. Sh. Faghie-Roohi, R.A. Zoroofi, Sh. Akhlaghpour, H. Soltanian-Zadeh, \"Colonoscopy Image Processing,\" Presented at and published in the Proceedings of the International Conference on Information and Knowledge Technology (IKT'2005), Tehran, Iran, May 24-26, 2005. 141. M.R. Sehati, R.A. Zoroofi, H. Soltanian-Zadeh, \"New Method for Designing Object-Oriented Software Basis for Hospital Information Systems,\" Presented at and published in the Proceedings of the International Conference on Information and Knowledge Technology (IKT'2005), Tehran, Iran, May 24-26, 2005. 142. H. Jahanian, S.M. Shams, G.A. Hossein-Zadeh, H. Soltanian-Zadeh, \"Feature Space Analysis for Group Inference in fMRI Data,\" Presented at and Published in the Proceedings of the 13th Iranian Conference on Elec. Eng. (ICEE'05), Zanjan, Iran, May 10-12, 2005. 143. E. Yahaghi, H. Soltanian-Zadeh, M. Shahriarei, N. Fatouraei, \"Leakage form Blood Brain Barrier: Effect of Injection Profile on Plasma and Extravascular Concentrations,\" Presented at and Published in the Proceedings of the International Conference on Biological and Medical Physics (ICBMP'2005), Al-Ain, UAE, March 27-30, 2005. 144. M. Soleimani, A. Movafeghi, M. H. Kargarnovin, H. Soltanian-Zadeh, \"Hardware Design and Reconstruction Results of SUT-1 EIT System,\" Presented at and Published in the Proceedings of the International Conference on Biological and Medical Physics (ICBMP'2005), Al-Ain, UAE, March 27-30, 2005. 145. A. Khadivi, K. Nazarpour, H. Soltanian-Zadeh, \"sEMG Classification For Upper-Limb Prosthesis Control Using Higher Order Statistics,\" Presented at and published in the Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP'2005), Philadelphia, PA, March 18-23, 2005. 146. M. Solaymani, H. Soltanian-Zadeh, \"A Method for Noise Reduction of Video Images,\" Presented at and published in the Proceedings of the Third Iranian Conference on Machine Vision and Image Processing (MVIP'2005), Tehran, Iran, Feb. 23-24, 2005. pp. 165-172. 147. M. Emadi-Andani, H. Soltanian-Zadeh, B. Najar-Araabi, \"Automatic Human Recognition using Static Parameters of Body in Walking,\" Presented at and published in the Proceedings of the Third Iranian Conference on Machine Vision and Image Processing (MVIP'2005), Tehran, Iran, Feb. 23-24, 2005. pp. 240-245. 148. B. Afshin-Pour, G.A. Hossein-Zadeh, H. Soltanian-Zadeh, \"Non-Parametric Trend Estimation in Fractal Noise using Wavelet Transform,\" Presented at and published in the Proceedings of the Third Iranian Conference on Machine Vision and Image Processing (MVIP'2005), Tehran, Iran, Feb. 23-24, 2005. pp. 371-377. 149. S.A.M. Golestani, G.A. Hossein-Zadeh, H. Soltanian-Zadeh, \"Clustering of Parametric Maps for Evaluation of fMRI Analysis Methods,\" Presented at and published in the Proceedings of the Third Iranian Conference on Machine Vision and Image Processing (MVIP'2005), Tehran, Iran, Feb. 23-24, 2005. pp. 378-385. 150. R. Farjam, H. Soltanian-Zadeh, R.A. Zoroofi, \"Automatic Grading of Pathological Images of Prostate Using Texture Analysis,\" Presented at and published in the Proceedings of the Third Iranian Conference on Machine Vision and Image Processing (MVIP'2005), Tehran, Iran, Feb. 23-24, 2005. pp. 386-393. 151. S. Orafa, H. Soltanian-Zadeh, \"Design of Case-Based Reasoning Control Systems using Pattern Recognition Methods,\" Presented at and published in the Proceedings of the Third Iranian Conference on Machine Vision and Image Processing (MVIP'2005), Tehran, Iran, Feb. 23-24, 2005. pp. 537-543. 152. M. Ghannad-Rezaei, H. Soltanian-Zadeh, \"New Distributed Pattern Recognition Method in Wireless Sensory Networks,\" Presented at and published in the Proceedings of the Third Iranian Conference on Machine Vision and Image Processing (MVIP'2005), Tehran, Iran, Feb. 23-24, 2005. pp. 544-551. 153. M. Zeydabadinezhad, R.A. Zoroofi, H. Soltanian-Zadeh, \"Segmentation of Brian Tissue in MRI using Gaussian Mixture Modeling,\" Presented at and published in the Proceedings of the Third Iranian Conference on Machine Vision and Image Processing (MVIP'2005), Tehran, Iran, Feb. 23-24, 2005. pp. 552-559. 154. N. Batmanghelich, H. Soltanian-Zadeh, B. Najar-Araabi, \"Automatic Brain Structure Segmentation in MRI using Medial Representation of Interacting Contours,\" Presented at and published in the Proceedings of the Third Iranian Conference on Machine Vision and Image Processing (MVIP'2005), Tehran, Iran, Feb. 23-24, 2005. pp. 560-567. 155. L. Amini, H. Soltanian-Zadeh, C. Lucas, M. Gity, \"Segmentation of Red Nucleus from Brain MRI Using Dynamic Models,\" Presented at and published in the Proceedings of the Third Iranian Conference on Machine Vision and Image Processing (MVIP'2005), Tehran, Iran, Feb. 23-24, 2005. pp. 577-584. 156. A. Babajani, M.H. Nekooei, H. Soltanian-Zadeh, \"Exploring Relationship between fMRI and MEG Using a New Model,\" Presented at and published in the Proceedings of the Third Iranian Conference on Machine Vision and Image Processing (MVIP'2005), Tehran, Iran, Feb. 23-24, 2005. pp. 600-607. 157. H. Jahanian, H. Soltanian-Zadeh, G.A. Hossein-Zadeh, \"Wavelet Transform Denoising for fMRI Analysis,\" Presented at and published in the Proceedings of the Third Iranian Conference on Machine Vision and Image Processing (MVIP'2005), Tehran, Iran, Feb. 23-24, 2005. pp. 608-613. 158. K. Jafari-Khouzani, H. Soltanian-Zadeh, K. Elisevich, \"Texture Analysis of High-Resolution FLAIR Images for TLE,\" Presented at and Published in the Proceedings of SPIE Medical Imaging 2005: Image Processing, Pt. 1-3, vol. 5747, pp. 1348-1355, San Diego, CA, Feb. 15-17, 2005. 159. K. Jafari-Khouzani, H. Soltanian-Zadeh, K. Elisevich, \"MRI and SPECT Fusion for Epilepsy Lateralization,\" Presented at and Published in the Proceedings of SPIE Medical Imaging 2005: Physiology, Function, and Structure from Medical Images, Pts 1 and 2, vol. 5746, no. 1, pp. 662-669, San Diego, CA, Feb. 15-17, 2005. 160. R. Farjam, H. Soltanian-Zadeh, R. A. Zoroofi, K. Jafari-Khouzani, \"Tree-Structured Grading of Pathological Images of Prostate,\" Presented at and Published in the Proceedings of SPIE Medical Imaging 2005: Image Processing, Pt 1-3, vol. 5747, no. 1, pp. 840-851, San Diego, CA, Feb. 12-17, 2005. 161. B. Afshinpour, H. Soltanian-Zadeh, G.A. Hossein-Zadeh, C. Lucas, \"General Linear Model Estimation in fMRI Using Genetic Algorithm in the Frequency Domain,\" Proceedings of the 10th Annual Computer Society of Iran Computer Conference (CSICC'2005), Tehran, Iran, Feb. 15-17, 2005. pp. 68-75. 162. A. Babajani, M.H. Nekooei, H. Soltanian-Zadeh, \"Integrated MEG and fMRI Model,\" Proceedings of the 10th Annual Computer Society of Iran Computer Conference (CSICC'2005), Tehran, Iran, Feb. 15-17, 2005. pp. 76-84. 163. M. Zeydabadinezhad, H. Soltanian-Zadeh, R.A. Zoroofi, \"Brian MR Image Segmentation by Gaussian Mixture Modeling,\" Presented at and published in the Proceedings of the 2nd IEEE GCC Conference, Bahrain, Nov. 23-25, 2004. 164. A. Yazdan-Shahmorad, H. Soltanian-Zadeh, R.A. Zoroofi, \"Comparing Wavelet and Wavelet Packet Feature Spaces in MRSI Brain Tumor Characterization,\" Presented at and published in the Proceedings of the 2nd IEEE GCC Conference, Bahrain, Nov. 23-25, 2004. 165. R. Farjam, R.A. Zoroofi, H. Soltanian-Zadeh, \"Unsupervised Texture Segmentation Using Roughness in Wavelet Domain,\" Presented at and published in the Proceedings of the 2nd IEEE GCC Conference, Bahrain, Nov. 23-25, 2004. 166. S.M. Shams, G.A. Hossein-Zadeh, H. Soltanian-Zadeh, \"Group Inference in fMRI using Canonical Correlation Analysis,\" Presented at and published in the Proceedings of the 2nd IEEE GCC Conference, Bahrain, Nov. 23-25, 2004. 167. M.M. Karimi, N. Batmanghelich, H. Soltanian-Zadeh, C. Lucas, \"A 3-D Deformable Surface Method for Automatic Hippocampus-Amygdala Complex Segmentation,\" Presented at and published in the Proceedings of the 2004 IEEE Nuclear Science Symposium and Medical Imaging Conference, Rome, Italy, Oct. 16-22, 2004, vol. 6, pp. 3725-3729. 168. S.M. Shams, G.A. Hossein-Zadeh, H. Soltanian-Zadeh, \"Activation Detection in Multi-Subject Studies of fMRI Using GLRT,\" Presented at and published in the Proceedings of the 2004 IEEE Nuclear Science Symposium and Medical Imaging Conference, Rome, Italy, Oct. 16-22, 2004, vol. 5, pp. 2778-2782. 169. R. Farjam, H. Soltanian-Zadeh, R.A. Zoroofi, \"Wavelet-Based Determination of Malignancy of Pathological Images of Prostate,\" Presented at and published in the Proceedings of the 4th WSEAS Int. Conf. on Signal, Speech and Image Processing (ICOSSIP 2004), Izmir, Turkey, Sept. 14-16, 2004. 170. M. Zeydabadi-Nejad, R.A. Zoroofi, H. Soltanian-Zadeh, \"Comparison of Three Gaussian Mixture Modeling and Spatial Encoding Methods for Segmenting Human Brain MRI,\" Presented at and published in the Proceedings of the 4th WSEAS Int. Conf. on Signal, Speech and Image Processing (ICOSSIP 2004), Izmir, Turkey, Sept. 14-16, 2004. 171. M.M. Karimi, N. Batmanghelich, H. Soltanian-Zadeh, C. Lucas, \"Improvement of Simplex Meshes Model for 3D Hippocampus Segmentation,\" Presented at and published in the Proceedings of the 4th IASTED International Conference on Visualization, Imaging, and Image Processing (VIIP 2004), Marbella, Spain, Sept. 6-8, 2004, pp. 631-635. 172. M. Mohammadzadeh, H. Soltanian-Zadeh, M. Shahabadi, A. Tavakoli, \"Novel Double-Turn Loop Probe for Intravascular MRI,\" Presented at and Published in the Proceedings of the 26th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, San Francisco, CA, Sept. 1-5, 2004, vol. 2, pp. 1151-1154. 173. A. Yazdan-Shahmorad, H. Soltanian-Zadeh, R.A. Zoroofi, \"MRSI Brain Tumor Characterization Using Wavelet and Wavelet Packets Feature Spaces and Artificial Neural Networks,\" Presented at and Published in the Proceedings of the 26th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, San Francisco, CA, Sept. 1-5, 2004, vol. 3, pp. 1810-1813. 174. M. Mohammadzadeh, M. Shahabadi, H. Soltanian-Zadeh, A. Tavakoli, \"A Novel Open-Ended Intravascular MRI Loop Probe,\" Presented at and Published in the Proceedings of the 26th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, San Francisco, CA, Sept. 1-5, 2004, vol. 2, pp. 1148-1150. 175. A. Movafeghi, A.R. Nateghi, M. Soleimani, M.H. Kargarnovin, H. Soltanian-Zadeh, \"Image reconstruction algorithms for SUT-1 EIT System,\" Presented at and Published in the Proceedings of XII International Conference on Electrical Bio-Impedance, V Electrical Impedance Tomography, Gdansk, Poland, June 20-24, 2004, pp. 579-582. 176. H. Jahanian, H. Soltanian-Zadeh, G.A. Hossein-Zadeh, \"Controlling the False Positive Detection Rate in Fuzzy Clustering of fMRI data,\" Presented at and Published in the Proceedings of 2nd IEEE International Symposium on Biomedical Imaging: Macro to Nano (ISBI'2004), Arlington, Virginia, April 15-18, 2004, vol. 1-2, pp. 388-391. 177. M. Zeydabadi, R.A. Zoroofi, H. Soltanian-Zadeh, \"Multi-Resolution Automatic Segmentation of T1-Weighted Brain MR Images,\" Presented at and Published in the Proceedings of 2nd IEEE International Symposium on Biomedical Imaging: Macro to Nano (ISBI'2004), Arlington, Virginia, April 15-18, 2004, vol. 1-2, pp. 165-168. 178. G.A. Hossein-Zadeh, A. Golestani, H. Soltanian-Zadeh, \"Clustering-based Framework for Comparing fMRI Analysis Methods,\" Presented at and Published in the Proceedings of 2nd IEEE International Symposium on Biomedical Imaging: Macro to Nano (ISBI'2004), Arlington, Virginia, April 15-18, 2004, vol. 1-2, pp. 1008-1011. 179. H.Z. Rafi, H. Soltanian-Zadeh, \"Mutual Information Restoration of Multi-spectral Images Using A Generalized Neighborhood Operation\" Presented at and Published in the Proceedings of Fourth International ICSC Symposium on Engineering of Intelligent Systems (EIS'2004), Madeira, Portugal, Feb. 29-March 2, 2004. 180. D. Momeni, R.A. Zoroofi, H. Soltanian-Zadeh, \"Fast Fault Detection of Industrial Products Using Shear and Warp Algorithm,\" Presented at and Published in the Proceedings of 6th SMEIR, Tehran, Iran, Feb. 2004. 181. D. Momeni, R.A. Zoroofi, H. Soltanian-Zadeh, \"Using Volume Rendering for Nondestructive Testing,\" Presented at and Published in the Proceedings of 6th SMEIR, Tehran, Iran, Feb. 2004. 182. H. Jahanian, H. Soltanian-Zadeh, G.A. Hossein-Zadeh, \"Novel Approach to Control False Positive Rate in Fuzzy Cluster Analysis of fMRI,\" Presented at and Published in the Proceedings of SPIE Medical Imaging 2004: Physiology, Function, and Structure from Medical Images, vol. 5369, no. 1, pp. 644-651, San Diego, CA, Feb. 14-19, 2004. 183. M. Siadat, H. Soltanian-Zadeh, F. Fotouhi, K. Elisevich, \"Bayesian Landmark Identification in Medical Images,\" Presented at and Published in the Proceedings of SPIE Medical Imaging 2004: Image Processing Conference, Pts. 1-3, vol. 5370, pp. 628-639, San Diego, CA, Feb. 17-19, 2004. 184. H. Jahanian, H. Soltanian-Zadeh, G.A. Hossein-Zadeh, M. Siadat \"ROC-Based Determination of the Number of Clusters for fMRI Activation Detection,\" Presented at and Published in the Proceedings of SPIE Medical Imaging 2004: Image Processing Conference, vol. 5370, no. 1, pp. 577-586, San Diego, CA, Feb. 14-19, 2004. 185. K. Jafari-Khouzani, H. Soltanian-Zadeh, K. Elisevich, S. Patel, \"Comparison of 2-D and 3-D Wavelet Features for Temporal Lobe Epilepsy Lateralization,\" Presented at and Published in the Proceedings of SPIE Medical Imaging 2004: Physiology, Function, and Structure from Medical Images, vol. 5369, no. 1, pp. 593-601, San Diego, CA, Feb. 14-19, 2004. 186. M. Zeydabadi, R.A. Zoroofi, H. Soltanian-Zadeh, \"Improving Automatic Segmentation of MR Brain Images with Wavelet and EM Algorithm,\" Presented at and published in the Proceedings of the 9th Annual Computer Society of Iran Computer Conference, Tehran, Iran, February 2004. 187. M.H. Nekooei, A. Babajani, H. Soltanian-Zadeh, \"Evaluating Linear MEG Inverse Problem Methods Based on Distributed Source Model and Developing an Efficient Combinative Method,\" Presented at and published in the Proceedings of the 11th Iranian Biomedical Engineering Conference, Tehran, Iran, Feb. 17-18, 2004. 188. N. Asadi, S.K. Setarehdan, H. Soltanian-Zadeh, \"Improving the Quality of Ultrasound Echo Signals Using Coded Excitations,\" Presented at and published in the Proceedings of the 11th Iranian Biomedical Engineering Conference, Tehran, Iran, Feb. 17-18, 2004. 189. M. Zeydabadi, R.A. Zoroofi, H. Soltanian-Zadeh, \"Automatic Segmentation of Brain Tissues From MR Images Using Wavelet Extended EM Algorithm,\" Presented at and published in the Proceedings of the 11th Iranian Biomedical Engineering Conference, Tehran, Iran, Feb. 17-18, 2004. 190. G.A. Hossein-Zadeh, A.M. Golestani, H. Soltanian-Zadeh, \"Evaluation of fMRI Analysis Methods Through a Clustering-Based Approach,\" Presented at and published in the Proceedings of the 11th Iranian Biomedical Engineering Conference, Tehran, Iran, Feb. 17-18, 2004. 191. M.S. Shams, G.A. Hossein-Zadeh, H. Soltanian-Zadeh, \"Evaluating the Correlation between fMRI Data and the Bases of a Signal Subspace through a Likelihood Ratio Test,\" Presented at and published in the Proceedings of the 11th Iranian Biomedical Engineering Conference, Tehran, Iran, Feb. 17-18, 2004. 192. E. Yahaghi, A. Movafeghi, H. Soltanian-Zadeh, M. Shahriarei, N. Fatouraee, M. Gity, \"Simulation of Blood Brain Barrier Using Statistical Methods,\" Presented at and published in the Proceedings of the 11th Iranian Biomedical Engineering Conference, Tehran, Iran, Feb. 17-18, 2004. 193. M. Mohammadzadeh, A. Tavakoli, M. Shahabadi, H. Soltanian-Zadeh, \"Design and"} +{"id":"RedPajamaC4.0015","text":"8.1 of 10 on the basis of 1281 Review. Camping outside in the woods or forest with your family, friends, and loved ones can be a very enjoyable experience. Whether sitting around the campfire and telling stories or bird watching and exploring nature, being outdoors can leave you with unforgettable memories. Now what memories you will leave with depends on how well you are prepared. If a camper is not knowledgeable about his surroundings, nature can give some pretty nasty surprises. Below are some advice and tips that will help you avoid certain situations that can damper your trip. Bugs go away. Bugs are always a very annoying problem for a lot of campers. These critters keep flying around your food, and buzzing in your ears. Also let's not forget about more serious problems from some insects, like mosquitoes, which love to bite and give you itchy bumps. Then there are lice and ticks which can pass on diseases. Here are some tips to help keep the bugs away. 1. Try not to use fragrant lotions or products. Sweet smells attract insects. 2. Try to stay cool. Bugs are attracted to sweat. 3. Bring bug repellant\/ Sunscreen. Just don't use too much, 4. Avoid eating bananas \u2013 this fruit secretes an odor through your pours which attracts mosquitoes. 5. Use coconut oil \u2013 this repels mosquitoes Beware of Ticks Ticks can be a problem due to the fact they can spread diseases. Ways to prevent yourself from exposure to ticks is to avoid grassy areas, wear a hat, and do not wear shorts when you are on a trail. You should check for ticks and if detected remove it as early as possible. If you find a tick attached to your skin, use tweezers close to your skin as possible and pull off the tick, but do not squeeze its body. You should have the doctor check the bite as soon as possible. Ticks can spread diseases such as Lyme disease and ehrlichiosis to humans, which is fatal if not treated. General Advice Here is some useful advice that is good to know on every camping or outdoor trip or vacation: 1. Bring and keep a picture of the travelers with you, in case anyone gets lost. 2. When hiking remember to bring some water, food, a flashlight, and bandages. 3. Never hike by yourself. 4. 80% of your body heat is lost through your head, so to keep warm, wear a hat. The advices I gave in this article I consider very important in helping to keep your outdoors experience an enjoyable one. Traveling to Southern California and don't have any resource to go around your city of destination? The best solution is to rent a van for a more comfortable and worry-free trip with your friends, business associates or your family. A van is spacious both for people and their cargo and this makes your trip a memorable and enjoyable one. In San Diego, for instance, visitors have a lot of places to go to for leisure such as the Seaworld, San Diego Zoo and Universal Studios. Los Angeles as well has so many exciting areas that should not be missed by vacationers. And it is only by renting a van that you can most conveniently travel to these interesting tourist spots. Van rentals are aplenty in San Diego, Orange County and L. A. you just need to look for the company that has long established a good reputation and is trusted by many travelers. And 5 Star Rent-A-Van is a firm to beat when it comes to rental vehicles. This company is known for its high quality vehicles with popular brands like Ford, Dodge and GMC that are top of the line models as well as for its personalized customer service. San Diego Van Rental caters to all kinds of travelers whether corporate, government and military, sports groups, religious groups, students, families and bands. It's more than 50 rental vehicles including 15 passenger vans, 12 passenger vans, full size vans are in tip-top condition to make sure that clients travel without a hitch to wherever they want to go. Shuttle service, tow packages and GPS navigation systems are also available if desired by clients. The firm's customer service is also unbeatable because of the friendly sales representatives and knowledgeable vehicular team who truly know what they're doing and can assist clients in all their traveling needs. Since it opened to the public in 1996, San Diego-based 5 Star Rent-A-Van has gained a good reputation being a reliable rental agency. It is a family-owned business and is one of the biggest rental firms in Southern California today. Whether clients are locals or come from abroad, this company makes sure that they provide personalized and quality service for the total satisfaction of customers. Another reason why this rental firm is mostly preferred by travelers is because of its competitive rates that even students can well afford to rent a vehicle from them. Also, renters have various payment options from credit cards, debit cards, cash to traveler's check, cashier's check or money order. The latest service provided by 5 Star Rent-A-Van to give more convenience to prospective customers is its online booking system. With this system in place, clients no longer need to call to reserve a vehicle. All they have to do is visit the company's site to find out the availability of their desired van and book it in just a matter of minutes. This online booking gives this preferred van rental company the edge among competitors in San Diego, according to its manager Ray Marashi. Having a good time is pretty high on everyone's to do list, especially when surrounded by awesome views and super-awesome friends. We hike, bike, climb, camp, raft, fish, hunt, four-wheel, sleep and eat \u2013 among other things \u2013 in the backcountry. If not done properly, that's a lot of wear and tear on our natural resources. Responsible recreation ensures future outdoor enthusiasts the opportunity to enjoy the outdoors as you have. Without a recreation code of ethics, our backcountry would become a thing of the past. Here are some universally agreed upon keys for having a good time \u2013 the right way. -Take only pictures, leave only footprints. If you carry it in, carry it out. This will eliminate litter. -Protect water sources from contamination. Use bio-degradable soap, or try hot water soap-less dishwashing, bathing and clothes washing. When using soap (even bio-degradable) and toothpaste, dispose of the wastewater at least 100 feet away from natural water sources, well or faucet water sources. -Be a good neighbor - control your noise and your pets. Always keep your dog on a leash no longer than 6 feet, and away from public swimming areas. Barking and not cleaning up after pets leads to many complaints from other outdoor enthusiasts. Do not leave pets unattended. -Be respectful of the natural environment \u2013 keep the trees and shrubs alive and growing. Nails and wires should not be used on trees because they can cause serious damage to trees. Burn damage will permanently scar or kill a tree. -When hiking or biking, stay on designated trails. This keeps damage to vegetation and erosion in one place. -Before leaving your campsite, clean your fire pit and your campsite. Make it as clean as you would want it if you were arriving that day. The next user will appreciate it. Leave-No-Trace, lnt. org, offers the following Principles for Outdoor Ethics: Plan Ahead and Prepare, Travel and Camp on Durable Surfaces, Dispose of Waste Properly, Leave What You Find, Minimize Campfire Impacts, Respect Wildlife and Be Considerate of Other Visitors. Here is the Tread Lightly!, treadlightly. org, pledge: Travel and recreate with minimum impact, Respect the environment and the rights of others, Educate yourself \u2013 plan and prepare before you go, Allow for future use of the outdoors \u2013 leave it better than you found it and Discover the rewards of responsible recreation. Responsible recreation means having the common sense and the courtesy to enjoy the backcountry without spoiling someone else's experience. Most outdoor enthusiasts understand this very well and spend a good deal of their time restoring, enhancing and conserving our backcountry. Have a good time when you're outdoors and share these keys with your friends. Use this information and you'll Get It Right The First Time. Get Outdoors! The first time I arrived in Italy by train it felt completely different to anywhere I'd travelled already. It was the summer of 2000 and I had been travelling for a nearly 2 weeks. I was more than relieved when the train pulled out of Nice on that bright August morning, what a misnomer, Nice was in my eyes not very nice at all. So when the train wound its way around the rocky hillsides, passing over the coastal rocks below I put it from my mind and concentrated on the electric blue waters of the med and the thought of my first genuine Italian cappuccino. From my window seat I could see the vibrantly coloured flowers hanging from the trees clinging to the banks above the bays, bright flowers in pots along the platforms of the tiny train stations, and the heart warming sight of an Italian Nonna sweeping her porch out, her house sitting right next to the train tracks. As I was later to travel this track many times she became my 'Italian Nonna' and I looked out for her everytime I passed by. Arriving in Ventimiglia, the first real stop over the border from France, (Monaco was also along the way) into Italy I was pleased to see a distinct difference between the Italian locals and the French ones I'd left behind. Admittedly there is a real sense of the Mediterranean life all the way along the Cote D'Azur, with fairly laid back individuals, all there to soak up sun and wine, but these locals appeared even more so. The Carabinieri on the platform as we pulled up were looking so relaxed as to almost appear asleep, even the sniffer dog didn't look at all bothered that 15 sweaty backpackers had just arrived. Nobody moved, no passports were checked, just a few cheery 'ciaos' and a 'benvenuti'. After leaving our bags with the guide to mind we set off to explore for an hour before catching the next train. Having already spent the better half of the previous hour practising how to order a cappuccino in Italian I was eager to try it out. We found a kerbside caf\u0439 and sat down. To my amazement the waiter understood my request on the first go and duly brought me the coffee. I was still grinning when we got back on the train. The journey to Cinque Terre takes you through countless tunnels, carved into the cliffs hanging out over jagged rocks and pebbly beaches. Each time we hit the darkness, the curtains flapping dementedly in the open windows, I could still see the blue water imprinted on the inside of my eyelids. Nowhere else have I experienced that effect. The locals and us were all chatting amongst ourselves until one guy asks me where we are all going in Italian. I answer Rio Maggiore. Then he asks me where we are all from. I explain that I am a tour guide and my group are all from all over the world. He is going to Calabria to see his mother and he is from Milan. He works in a factory there making cars. Another lady opens her travelling cool box to share some iced coffee in tiny plastic espresso cups with the 2 Korean girls in my group, and another one pulls out some 'dolce', sweet pastries to share with the Canadian girls. Of all my train journeys in Europe I have found the Italians to be the most generous to backpackers, in terms of communication and sharing the contents of their cooler bags. Especially on the train going to Calabria from the north. I once spent the leg between Pisa and Rome stuck in a corridor with an old guy of 60, a phrase book and a lot of sign language. He was very keen to tell me his family history and was most impressed that a kiwi from 'lontano' was trying to speak Italian. He even gave me grammar lessons and corrected my pronunciation. That never happened on a French train. More recently on the train to Florence from Pisa I sat next to a girl from Romania getting an entire itinerary of what to see and do in Florence from the guy opposite her in Italian. The interesting bit was she only spoke a few words but seemed to grasp most of what he was saying. It was great to see the passion for which he was talking about what was obviously his home town. On one trip I managed to fulfil the desires of one rather shy Chinese girl who had a thing for men in uniform. She was trying to collect as many photos of them as possible from all over Europe. Some Italian Navy boys had got on at La Spezia, obviously from the Naval base there, heading to Rome along with a couple of Air Force boys. They were filling the corridor outside the dining car, laughing and yelling, all only too willing to pose for a couple of photos with my now tomato-red-in-the-face passenger. We thought we hit the jackpot when some army boys were spotted on the platform at Ostiense in Rome, but they were waiting for another train. She got a photo through the window instead. The most frustrating time on the trains can be Florence S. M.N. The letters could easily stand for 'so many new platforms' instead of Santa Maria Novella as they have an annoying pastime of switching tracks on you. You have to listen to the announcements very carefully. They do them in both English and Italian but as soon as one train is late arriving they start shuffling the rest of the platforms like a deck of cards. With a group of 12 individuals one day we were waiting an extra 45 minutes for the train to Venice, supposedly arriving on track 11, then it was track 9, then it was back to track 11 at the very last minute. We broke the rules and ended up hurling packs across the train tracks onto the end carriage as the guard blew his whistle for the departure and we had some stragglers who hadn't heard the change walking back from the sandwich bar. Everybody made it with a sprint finish. On the contrary, in Venice the train guard was very accommodating when I had lost an American passenger between the baggage depot and the train in the short space of about 10 minutes. I explained she was late and he smiled, said ok, and waited an extra 5 minutes with me. Eventually he tapped his watch and we had to abandon her. This was the last train out of Italy to Austria that day so I wasn't sure when I'd see her again. When I eventually did she had an awesome adventure to tell, but that's entirely another story. For point to point travel you can't beat the Italian trains for good value, not just in the price because with a train ticket you get so much more than just a seat. Sometimes you don't even always get a seat, especially if it's in the middle of August, but you get a fantastic opportunity to experience the local culture that just can't be had from a guide book or the inside of a bus. It is thought that safaris as we know them now, i. e. hunting wild animals, started as long ago as the nineteenth century, the term being coined by Captain Sir Richard Francis Burton, the English explorer, when gentlemen of a certain class took pleasure in killing beasts in their natural habitat, in order to prove their manhood and bag a trophy for the library wall. Nowadays, thankfully, there are few amongst us who would consider slaughtering the wonderful creatures of Africa as a sport, but we still like to experience the adventure of hunting them down in order to watch them in the wild. Most people are keen to see the \"Big Five\" - elephant, rhinoceros, buffalo, lion and leopard. Why the graceful giraffes and antelopes and cheetahs, the fastest creatures on earth, are left out of this revered group is a mystery, but that's the way it goes. In addition to the mammals, there is also a fantastic array of colourful bird life as well as butterflies and insects, so never a dull moment on safari. Uganda is much improved, having recovered from the depredations of Idi Amin and you can risk Zimbabwe if you want but the best safariing is to be found in Kenya, Tanzania, Botswana and South Africa. Within these countries, there are many different game parks or reserves, each with a special character or attraction and often a different group of resident animals. For example, the Serengeti National Park\/Ngorongoro Conservation Area is famous for the enormous herds of wildebeest, zebra and antelope where the calves are born before the grazing runs out and the herds move on. In Kenya, Tsavo East National Park is renowned for the largest herds of elephant in the country, whereas the Masai Mara is home to all of the Big Five as well as most other species as well as being the best place to see the migration south of the wildebeest, zebra and antelope back to the plains of the Serengeti. There are also many types of safari to choose from. You can travel by small purpose-built mini-bus which holds about eight people, by jeep, by elephant or horse or even, for the adventurous, on foot (accompanied by an armed guide, of course). You can stay overnight in luxurious lodges (very welcome after a hot dusty game drive) or permanent camps (nearly as luxurious), in tree-top eco-friendly hotels or join in setting up camp on the more rugged safaris. You can also book a beach holiday and just take a half-day or a night or two away, booked locally. The most important part though, is not your mode of transport or your accommodation, but the animals. The thrill of the chase, the news from your driver that one of his colleagues has just seen a lioness with her cubs, right by the trees over there, the excitement of actually seeing in the wild, a beast which you many only have seen previously in photographs or at best, behind bars in a zoo. You may see sociable elephants, usually to be found in large family groups, if you're lucky, with babies in tow. You may see black rhino, but he probably won't see you - they have extremely poor eyesight but a great sense of smell. Then there are tall, elegant giraffes, munching from trees far out of reach of the other beasts, dainty antelopes, big cats, ferocious or playful and so much more. Put these fabulous creatures together with the vast beauty that is Africa and the sense of the dangerous and the exotic and you have the experience of a lifetime so go and shoot a few animals (with your camera, of course). San Diego offers a bevy of interesting hikes. With the average home price being around $500,000, they better be interesting! To unwind, I typically stop on my way home from work to hike from Cardiff to Carlsbad on the beach. For picturesque sunsets and \"tasty waves\", the beach between Cardiff to Carlsbad can't be beat. Cardiff - Starting I typically start this hike by parking just south of restaurant row in Cardiff. Restaurant row is located to the north of the lagoon between Cardiff and Solana Beach on Highway 101. Parking is located on the side of the road, which is right up against the beach. Give me convenience or give me death! As you head north, you first pass Charlie's and other restaurants. Past the restaurants, you will come to the beginning of the bluffs that will line the beach to the end of the hike. San Elijo campground is on top of the initial bluffs and extends for roughly a mile north. The campground is very popular and the temporary home of locals and tourist. You can tell the difference by contrasting tans with sunburns. Following San Elijo, you will walk through Sea Cliff County Park with bluffs over 100 feet high. An area known affectionately as \"Swami's\" quickly follows this park. The name derives from the fact the area above the bluff is the home to the Self Realization Fellowship Center. This area is know as hot surf spot, but is very crowded. If you are a bit winded, you can stop and watch 50 or so surfers maneuver for waves. Yes, traffic jams aren't exclusively restricted to California freeways. North of Swami's, you will cruise along a long strip of sand hemmed in by 50 to 60 foot bluffs in the town of Encinitas. For those with a wicked sense of humor, there is a relatively popular game called, \"Watch the house fall.\" Yes, the bluffs are giving away slowly. As they erode, the homes first lose plants, then patios and so on. They say real estate is all about location, location, location, but sometimes a beach front home isn't all that great. The Encinitas section of the hike is fairly long. With the high bluffs, you will find sections of the beach that are deserted. Yes, even during summer. The only thing breaking up the solitude is Moonlight Beach, a fairly popular beach with locals. Otherwise, it's just you, shells and joggers until you arrive at the end of the bluffs and South Carlsbad. Time to turn around and find the car. The Cardiff to South Carlsbad hike is about 5 miles in each direction. The walk is flat and quick. By the end, you will be relaxed and forget that Bert in accounting is a jerk. Enjoy. As more and more people become aware of sea kayaking, we see sea kayak sales climbing. The great thing about this type of outdoor activity is that the entire family can enjoy it. In addition, sea kayaking is something that can be done by the elderly or young without experience as a peaceful activity or it can be done by thrill-seekers that look for the challenge, something hard and invigorating. Because sea kayaking is so diverse, it takes different styles of kayaks to keep up. Some of the more popular types of sea kayaks include the flatwater kayak, touring kayak, sea kayak, sit-on-top kayak, surf kayak, canoe, and then of course, you have your kayak accessories. In this article, we wanted to touch on the sea kayak specifically so you can see the differences in this category alone. With this, you can determine the right type of kayak for you and have a better understanding why sea kayaks have become such a hot commodity. Most people who start out kayaking will go with a recreational or flatwater kayak. Once the basic strokes have been mastered, they will generally progress to the sea kayak. With this, you would find you have more confidence on the water, having the ability to explore the ocean waters in a new and exciting way. However, to enjoy sea kayaking, you do not have to be a professional, although you could be. You will find everything from in-store sea kayaks that are your entry level choice to the expedition models, which are generally used for the more seasoned kayaker, to the adventure kayaks, those used by people who love pushing the envelop. \u00a7 Dagger Apostle - This sea kayak is a high performance, large carrying capacity vessel that is made from durable plastic. Great for extended touring or expeditions in open waters, this sea kayak has three bulkheads and an easily accessible day-hatch located just behind the outfitted cockpit. This sea kayak comes with bow and stern hatches, neoprene cover and hard hatch, deck lines, shock cord deck riggings, recessed deck fittings, adjustable foot braces, carrying toggles, flip rudder system, padded seat cover, and three, secure mini-cell bulkheads. \u00a7 Galasport Metax - This sea kayak is a light, fast option with an easy access cockpit and comfortable seating for extended touring. This kayak is also stable but responsible, quick turning, handles surf windward waves well, offers a functional deck layout, low stern deck, two water proof hatches, rudder, recessed fittings, and SS fasteners. \u00a7 Perception Eco Bezhig - For this sea kayak, you will enjoy the ultimate in comfort. The design is sleek and responsible. This expedition boat is great for both day and multiple day trips. The kayak tracks well, offers increased stability, offers a roomy cockpit, although some feel it is a little too restrictive. \u00a7 Australis Gecko - Known as the \"budget\" sea kayak, this is a great day trip choice. With two sealed storage compartments, you will find you have enough room for one to two nights of camping gear. The bow is shaped to cut and lift any oncoming swell while deflecting water from the kayak, keeping the kayaker dry. The scene before me could be matched nowhere else on earth. Parched yellow grass spread out before us as far as the eye could see - broken only by the occasional umbrella tree and a few hundred thousand migrating wildebeest forming a dusty, thin gray line on the horizon to the north. As the sun pounded down from overhead, heat vapors danced up from the ground. This was the Serengeti - a place with no equal! Nine days earlier my six-year-old son, Jerry, and I had arrived in Arusha, a beautiful Tanzanian 'metropolis' and the main jumping off point for those wishing to book budget safaris. As with all visitors, the word of our arrival spread like wildfire. By dinner the first night, three of Arusha's tour operators were courting us. By breakfast our journey was booked. Two days later we were off. Nothing was left to chance. A jeep, driver, cook, tents, water (though I felt it best to bring my own) and park permits, were to be provided for us as part of our safari package. WILDLIFE ABOUNDS Five days of photographic heaven followed. Tanzania's best: Lake Manyara, Ngorongoro Crater, Olduvai Gorge all were our playgrounds. Each was an oasis offering its own unique landscape and unimaginably diverse wildlife. Finally, as I looked over the edge of Ngorongoro I put my camera down. No photo could do it justice. Those who do not venture there will just never know! All this grandeur, and still the place of my calling, the Serengeti, was ahead. This was the safari I had dreamed of. An inconspicuous signpost in the middle of nowhere marked our arrival at my 14, 763 square km. field of dreams. We had four days to spend in the Serengeti. Yet, within twenty minutes giraffes galloped past in their slow-motion way. Playful zebras danced in dust storms of their own creation. Nearby, lionesses lovingly groomed playful cubs. This life long fantasy achieved was all laid out for our film to capture. What more did we need? I know we needed a drink of water. I reached, I looked, I counted, one! There was one bottle of water alone in its box. Next, I added. Two people, six days out, three days left, 13 bottles of water gone. I suspected a flaw in the plan. With little choice, I begrudgingly surrendered the last bottle of 'good' water to my progeny. I would drink the questionable water provided by the safari operator the rest of the trip. Why not? After all, It was a safari. An hour later, still roasting in our jeep, we photographed an incredible golden lion as he lazed in the mid-day sun. This magnificent beast was obviously oblivious to our presence. His bed, a gigantic reddish brown termite mound standing over three feet high, could easily have slept two more. FRUSTRATION MAKES AN APPROACH Inspired, and thirsty, it was time to go forth with the courage of that lion and consume the mystery water. Thomas, my driver, was a spotlessly tidy, smartly dressed, obviously well washed and well-watered fellow. As I approached, he flashed his perfect smile and asked what I needed. Water I replied. Thomas looked 'off.' \"Ninataka maji ya kunywa\" I tried. (attempting Swahili for I need drinking water) Ah, Thomas replied, \"Maji hapana\" (meaning no water). I tried English again. We still had no water. I am sure my body temperature rose five degrees as I tried to figure out why Thomas had not brought any water from camp that day. Then, it rose another eight degrees while I tried to figure out why he did not need to drink anything. Oh well, we would soon return to camp where I would indulge in all the beige colored water I could ever hope for. I decided to tough it out. Se la vies. We were on a safari. As evening approached, we relaxed in the shade near a water hole. The sweet sent of cool water filled the air. The emerald green pool shivered ever so slightly with each twitch of a hippo's ear. When the sun sank low, the parched orange horizon beckoned for one last snapshot. It was time our crew headed for camp. Meanwhile, back at the camp, our cook had dinner ready and waiting. Before the Jeep stopped my door was open. I approached him parched, \"maji ya kunywa?\" I said. He responded, \"maji hapana.\" \"I mean water,\" I regrettably snapped. \"You must have some to drink!\" Both Thomas and the cook shook their heads 'no' and looked at me as if I was crazy for thinking anyone would have water in the bush. Didn't I know I was on safari? Not being parent of the year, I took my sons water - some of it anyway. We put the rest away for morning. CONTEMPLATING THE SITUATION I sat grudgingly at dinner watching my son, my driver and my cook, all laughing together on the man side of the camp. As a zoologist, I knew they had to have water, didn't they? Just how stupid did they think I was? Then the questions swam through my mind. How could we stay out here nearly three more days without any more water? What happened to the water the Tour Company agreed to send? What did the cook cook with? How was Thomas staying so freaking clean? If I killed my offspring and took his water, do they extradite me or would I stand trial in Tanzania? And, just how stupid did they think I was? That night I sat by the fire under the most brilliantly lit sky I have ever seen. I sat speaking to Thomas, explaining that Homo Sapiens consumed water. It was a necessity! It was a fact! He didn't buy it for a second. Ultimately, I gave up. I told my crew we would have to return to Arusha the next day. Had I been alone, I would have risked death by dehydration for one more day, but the PTA frowns on this sort of thing. Obviously annoyed by my insane whims the guys turned in. The remainder of the night was dedicated to reflecting on days past, on our incredible experiences and on something else - something odd. The previous morning while we drove through a dust-ridden wallow, we had approached a Maasai Warrior walking barefoot through the grasslands. Thomas pulled near to ask of cheetahs and such. As they spoke, I eyeballed this magnificent looking man who leaned against the front of our jeep. His long, twisted strands of hair were red with ocher and draped elegantly down his perfectly built back. He wore the traditional red Maasai fabric that was slightly tattered. In his right hand was a spear, pointed at both ends. In his left hand was the less traditional orange Fanta. Yes, I did a double take. It remained an orange Fanta. Thinking back, I recalled droplets of condensation. I was sure it was cold. I could not even come up with H2O, well enough a refreshing sugary beverage. Was I hallucinating? Was I even on safari? VANISHING THROUGH THE BUSH The sweltering heat of morning came all to soon. Breakfast with thick condensed milk, missed the spot completely and reconfirmed my decision to leave. The cook and I began to pack up camp. Jerry and Thomas (Tom and Jerry?) wandered into the bush together long before the work was finished - surprise! Whenever, I started any project the men tended to fade into the trees. In fact, completing the task at hand, I realized my moisture-retaining chef had vanished. An hour later no one had returned. I was guarding our waterless belongings from a troop of misschevious baboons and could not go in search of my three self-osmoting delinquents. Besides, If the men perished, it would prove to them my theory that they needed water to live. Ha! I would be vindicated! Ritchesness would prevail! Thus instead, I sat filming my new found primate friends. After all, I was still on safari? Half an hour later the guys emerged from the bush, talking casually as they slurped on their strawberry Fantas. My mouth dropped. Jerry nonchalantly pointed off behind them as he passed and asked, \"Mom, why didn't you came to the soda stand with us? You could at least have gotten some bottled water.\" I stood defining dumbfounded! Were they slurping away each time they vanished? What was a soda stand doing in the middle of\u2026? Why hadn't someone just said it was\u2026? Ah..? Was there a Denny's in there as well? How silly of me to have expected them to mention this. Auuuuuug! Hadn't I realized I was on a safari? Are you planning on taking a camping trip in the near future? If this is your first time going camping, you will need to get camping gear to take with you, as you may not already own it. While your first impulse may be to head on down to your local sports store, did you know that you have another option as well? You do. In addition to buying your own camping gear, you may also be able to rent it. When it comes to determining whether you should buy your own camping gear or just rent the camping gear that you need, you may have a difficult time deciding what to do. If you are wondering what you should do, you will want to continue reading on. Below, the pros and cons of both buying your own camping gear and renting your camping gear are outlined. As for buying your own camping gear, you will find that the biggest con or downside to doing so is the cost. Depending on what you need to buy, it can get pretty expensive to purchase your own camping gear. With that in mind though, there are a number of camping gear equipment pieces, like camping tents or sleeping bags, that can be purchased for affordable prices. If you are looking to camp on a budget, you can still buy your own camping gear, but you just need to know where to look. Although there are a number of downsides, like the price, to buying your own camping gear, you will also find that there are a number of pros or plus sides to doing so as well. One of those plus sides is the fact that you will own the camping gear in question. This means that you can use it as little or as often as you would like. If you are planning to take a number of camping trips in the future, you will find that it is easier, as well as cheaper in the long run, to buy your own camping gear. It is also important to mention the freedom that you have, when buying your own camping gear. When buying your own camping gear, you can buy basically whatever you want. For instance, if you would like a camping tent that is the color black, you are free to do so. When you buy your own camping gear, you have the ability to be picky if you want to be. With a large selection of camping gear pieces to choose from, from a number of different retailers, the decision as to what you want to buy is yours to make. If you are unable to buy your own camping gear or if you would prefer not you, your other option is to rent your camping gear. When it comes to renting camping gear, you will also find a number of pros and cons. As for the cons of renting your camping gear, you may find that you are faced with a limited selection of camping gear pieces to choose from. Many camping gear rental stations only carry the basic items, like tents, hot plates, and coolers. While you may have some choices, you will mostly find that your selection is limited. As for the pros or plus sides to renting your camping gear, instead of buying it, you will find that the cost is much more affordable. Despite being relatively affordable, different camping gear rental stations charge different rental fees. You will also find that camping gear can typically be rented for as little as one day or as long as a couple of weeks. Renting your camping gear is nice if this is your first time going camping and if you are unsure as to whether or not you would be interested in doing so again. As you can see, there are a number of pros and cons to both buying your own camping gear and renting it. In addition to the two above mentioned options, you may also want to think about borrowing camping gear from someone that you know. You may even be able to do so free of charge. Are you looking for something to do this summer, spring, or even fall? Whether you are looking to do so something independently, with your family, or with your friends, have you ever though about going camping? If you have yet to examine camping, you may want to think about it, as camping is often referred to as a fun and exciting pastime. Although it is nice to hear that camping is a fun way to spend some free time that you may have, you may be wondering if you should really go camping. In all honesty, you will find that it depends. While individuals from all walks of life enjoy camping, camping isn't always for everyone. If you would like to know whether you should go camping or at least think about it a little bit more, you will want to continue reading on. One of the many signs that you should think about going camping is if you love spending time outdoors. Whether you just like sitting out on your porch, going swimming, or playing sports outdoors, there is a good chance that you like camping. Camping is based on the doors. You will likely find yourself sleeping outside, eating outside, and playing outside. For that reason, if you have a love for the outdoors, a camping trip is something that you may want to examine. If you are looking for a change, you may want to think about going camping. If you are wondering if you should go camping, there is a good chance that you have never gone camping before. Unfortunately, when many people take a short trip or a full fledged vacation, many end up staying on the \"safe side.\" While it is more than possible to do this, you may want to think about trying something new, like camping. Another sign that you may want to think about going camping is if you are on a budget. Camping is nice is because it is a relatively affordable activity. When it comes to camping, many campers choose to camp in parks or other public campground areas. Many of these camping establishments will charge you a small admission fee or a small camping fee, but you will find that the cost is significantly lower than the cost of an amusement park or airfare for a long trip. It is also important to mention that you can get a lot of your camping supplies, like your food, for very cheap prices as well. Also, what is nice about going camping is that you will find that you have a number of different options. For instance, you will find that you can choose to camp in a traditional tent or an RV. If you don't own your own RV, you may be able to rent one. You will also have a choice when it comes to choosing a campground. No matter where you are looking to camp, you should be able to find a number of campground parks to choose from. If you carefully choose your campground park, you may even be able to handpick your own camping spot! Of course, the decision as to whether or not you want to go camping is your decision to make, but you may at least want to look into it. There is a reason why camping is regarded as one of the most popular American pastimes. Fireworks displays are one of the most recognizable symbols of Independence Day. But there are risks, warns Lions Clubs International, a worldwide service organization dedicated to the conservation of sight. Each year, thousands of people across the country suffer serious eye injuries because of fireworks, and nearly three-quarters of those injuries occur around the July Fourth holiday. About 2,000 eye injuries are reported each year, with nearly half by bystanders, not the people who set off the fireworks. Even sparklers can be dangerous - they are the No. 1 cause of eye injury to children. Sparklers consist of metal shrapnel burning at about 1,800 degrees Fahrenheit. \"Despite our many advances in the ability to repair severely injured eyes, the damage can be devastating, often resulting in blindness, permanently impaired vision or loss of one or both eyes,\" says Dr. Christopher Andreoli, Massachusetts Eye and Ear Infirmary's chief resident and director of eye trauma. But Andreoli says that most eye injuries caused by fireworks are preventable. Lions Clubs International and Massachusetts Eye and Ear Infirmary offer these sight-saving tips: * Leave it to the pros. Pack a picnic and attend a professional fireworks display instead of lighting your own. * Leave it to the adults. Don't let children ignite fireworks or stand near others who do. * Keep your distance. View fireworks from at least 500 feet away, and keep away from a lighted firework. Many injuries occur when checking on a firework that has failed to ignite. * Wear eye protection. Eyeglasses or sunglasses can help protect the eyes from smoke, falling ash and stray sparks. If an accident does occur, Andreoli advises covering the injured eye. Don't apply pressure to the eye or rub it, as that can make the injury worse and cause bleeding. Don't eat or drink anything until seen by a doctor. Most importantly, seek medical help immediately. Lions Clubs International is the world's largest service club organization with nearly 1.35 million members in 197 countries. : Sleeping bag liners for camping? My friend Dion made fun of my \"poor excuse for a sleeping bag,\" but it kept me warm as the temperature dropped to the low forties, and it weighed only five ounces. We were camping on the banks of the Manistee River in Michigan. So, how did it a sleeping bag liner keep me warm? The real secret was the fifteen minutes we spent gathering dead, dry bracken ferns to build a two-foot thick mattress. We set the tent on that. Then, in my liner with all my clothes on, I was fine. Actually, I've rarely slept as well camping as I did that night. Using Sleeping Bag Liners Instead Of Bags You can buy light sleeping bag liners from Campmor and other suppliers, or do like I did. I sewed a simple one of bargain-bin nylon material ($1\/yard) obtained at Walmart. Buy the lightest nylon or polyester material you can find. Depending on what you use and how big you make it, it should weigh between four and nine ounces. I found I could stay warm with a light sleeping bag liner in autumn, at a few degrees above freezing, so this strategy should work well for summer nights in the sixties. Be careful, of course. It could be dangerous, or at least uncomfortable enough to ruin your trip. Test this strategy near home, and know yourself and your enviroment. You may want to learn a few tricks for staying warm if you try this strategy. When it isn't too humid you can breath in your bag, for example. Many backpackers will tell you not to do this, because you'll be damp in the morning, but in a dry enviroment you'll dry quickly once you hit the trail. Spread the liner out to dry during a break. Just as I did the first time, you can also use a mattress of dried plants. Use dead leaves, palm fronds, grass, cattail leaves, some softer tree barks, etc. A mattress of this sort insulates you from the ground, which normally takes away much of your body heat. Scatter the leaves in the morning so they won't smother the plants underneath. Try to go to bed warm. If you're warm when you get into your sleeping bag, you're more likely to stay warm through the night. If you start out shivering, it's difficult to warm up, especially in a thin bag. More tricks for staying warm: Hot tea before going to sleep... Exercise a bit... Cover yourself with extra clothes... Elevate your feet slightly... Go to sleep earlier or later. Experiment to see what works best for you. These are options, but not recommendations. I've gone out with nothing more than a bivy sack in my jacket pocket, but I'm not recommending that either. This is just to present all the possible options for the ultralight backpacker. One of those options is sleeping bag liners. Buying a Snowboard is not as easy as it used to be. There are lots of different manufacturers and even more of different models. It can get very confusing process. There are many different types of snowboards all for different uses. Here are the most common types of snowboards. :Freeride :Park :Rail :Freestyle :All mountain :Powder The snowboard has evolved from a simple design to many different styles and functions. Purchasing a snowboard requires a few key questions to be answered, but guess what! We have the answersfor you right here. Your weight, height, foot size and riding style are the main factors that will define the appropriate stiffness, height, width and shape of the board you will buy. So lets start with the first question. Note down your answers so you can take them to the shop when you go to rent or buy a snowboard. Your riding ability? If you're a beginner, first time, newbie, taking a lesson, snowboarded 1-3 times. Intermediate - board 3-5 times a year, ride switch\/fakie catch some air, turns no problem. Advanced - buttering up those 270s on to boxes? What type of riding style do you enjoy most? Your desired riding style or the terrain you wish to ride will help determine the type of board you should rent or buy. The three main categories of riding styles are. 1. All Mountain \/ Freeride style snowboarder utilizes the whole mountain. You enjoy carving, catching air, making turns in fresh powder or just cruising the slopes. If you fancy a bit of everything, then all mountain is where your style is. 2. Freestyle includes mostly trick riding. Jumps, spins, grabs, jibbing, rails, basically tearing it up. Technical freestyle riding is usually found in the parks or near the halfpipe. Freestyle boards can tend to range from very soft boards(ideal for buttering and jumps) to very stiff(ideal for pipe). 3. Carve\/Alpine style combines speed and deep turns and utilizes everything the mountain has to offer. Alpine riders are continually transitioning from one turn to the next. It is all about high speed and hard carving. Next we move on to the question of your weight and height, this will help us pick the correct size of board. Length A good rule of thumb for all mountain is that the board should stand between your chin and your nose when set on its tail. For freestyle it should be a little shorted so you can make faster spins or put more pressure at the nose or tail of the board. Width Snowboard width is usually directly related"} +{"id":"RedPajamaC4.0016","text":"I'd like to have you turn in your Bible to the first chapter of Colossians. For those of you who are visiting, I would just say that we at Grace Church are committed to studying the Scripture, and that means that we just go from book to book. We've been studying now for the seven years that I've been here through the New Testament on the Lord's Day and through the Old Testament in our midweek Bible studies. And we find ourselves in a very, very important book called the book of Colossians. This little book, it isn't very long, it's only four chapters, was a letter written by the Apostle Paul, who wrote thirteen of the New Testament books. It was written to a group of believers in a city called Colossae; not a city of tremendous importance, but nevertheless a city of some significance, and in that particular city there was founded a little church. The man responsible was a man named Epaphras,and apparently he was the initial pastor of that small congregation in that city, a city that was in a triad of cities, including Laodicea, Heropolis, as well as Colossae in the Lykus Valley. The apostle Paul is writing to them because they are undergoing some problems. The Church is being confronted with some people who are teaching false doctrine about the person of the Lord Jesus Christ, and it's very important that the apostle Paul write this letter to straighten them out. Now as you know, if you've been with us for our study of the first chapter, Paul has just finished, as we come to verse 23, he has just finished a powerful statement on the person and work of the Lord Jesus Christ. It is really a refutation of the false teachers who were denying Christ's deity \u2011\u2011 that is, denying that He was God, denying His power to save. They had said that Christ was not God, that He was just one of many spirits equal to many other spirits, and that He alone could not reconcile man to God; He alone could not bring men into fellowship with God. And Paul denies that. Paul says Christ is greater and far beyond any other created being. He is not just like other spirits or other angels, or other beings. Verse 15 of Chapter 1 through verse 19 of Chapter 1 is a statement regarding who Jesus Christ is. He says He is the image 'of the invisible God, the first\u2011born of all creation or the prototicas, the primary one of all. For by Him were all things created in heaven and earth, visible or invisible, whether they be thrones or dominions or principalities or power and of course those are all designations of angels, and different ranks of angels, all things were created by Him and for Him; He is before all things. By Him all things hold together. He is the head of the Body, the Church. He is the beginning, the prototicasfrom the Dead, the primary one resurrected, that in all things He might have the pre\u2011eminence, for it pleased the Father that in Him shall all fullness dwell. Now there is a great statement concerning the fact that Jesus Christ is God, that He is unique, that He is singly the one that God has ordained to rule the world and rule the Church and rule the universe. Secondly, the heretics had denied the power of Jesus Christ to save men. And in Chapter 1:20\u201123 Paul says that Christ is able to reconcile to bring men to God. In verse 21, \"you who were once alienated and enemies in your mind by wicked works, yet now has He reconciled\". And so in this statement from verse 15\u201123 Paul is finalizing in simple terms the truth about Christ. He is God, and He is able to save. That's great truth. Now you'll notice that verse 23 ends with the word \"minister\". Paul has said that regarding this truth about Christ that he has just spoken he was made a minister. The term \"minister\", then, triggers Paul's thoughts for the next section, because in verses 24\u201129 he describes his ministry. He says, I am made a minister, and then he launches into a description of what that ministry involves, and it is a ministry to proclaim the Lord Jesus Christ, Frequently in Paul's letters, and I'm sure you've come across it time and time again as we have in our studies, frequently in his letters he stops to discuss his ministry. Paul frequently says I am an apostle, I do this, I do this, this way, this is how I operate, this is how I function, and he makes a very, very strong point again and again and again and again of the style and type and approach of his ministry. He does it for many reasons. He does it for one reason to defend his right to speak for God. He says, from time to time I am a sent one from God. At the end of 23 he says, \"I am made a minister.\" I didn't choose this \u2011\u2011 I was made a minister. And this should give him some credibility. This should give him some punch in speaking to them. He says it then to defend his right to speak for God, or to establish his authority. He says it also to express the wonder that he has in his mind that God called him. He would agree with what Isaiah said when he was up here and said that the Lord has called him into the ministry, and that he didn't understand that, but it was something about which he was extremely excited. Now that's the way Paul is. He continually reiterates the truth of his ministry because it is such a thrill to him, it's more than just a defense, it's also something that is exciting to him. And he wants the people to hear him \u2011\u2011 not as a self-styled, self\u2011appointed non\u2011credentialed teacher like so many that existed in the world, but he wants them to hear him as the spokesman for God. And so he repeatedly accredits his ministry. Now remember that in the city of Colossae to which the letter was written there were false teachers undermining the Gospel. They were undermining the truth of Christ. And Paul comes right back at those people and defends it, and so he feels that he must accredit his ministry. He must state his right to be believed. He must say, this is who I am and this is what God has called me to do. Hear what I say. He wants them to listen with confidence, and so it's important for him to do that. In Chapter 1:1 he says \"Paul, an apostle of Jesus Christ, by the will of God.\" And that is a statement that he is a sent one from God, and here he adds more sock to that by detailing carefully his ministries so they will understand why he writes the way he does, and they will be more prone to believe what he says. Now, as I began to look at this passage I kind of keyed in on the statement at the end of verse 27: \"Christ in you, the hope of Glory...\", and I thought well, I'm going to build around that theme. And so I got that in my mind, I began to study. And several hours of study went by in my mind and I realized that that is not really the theme of what he is saying. That is a theme in what he says, but it is not the theme. The theme that he has in mind through all of these verses is simply to present a detailed look at his ministry. And what I learned out of this passage was so exciting to me because really you have here eight different aspects of the ministry of the servant of God. Eight different aspects that should character\u00adize the life of anybody who serves the Lord Jesus Christ, any\u00adbody who's called to teach or preach or minister within the framework of Christianity. There are eight of these. Now tonight we're going to look at four of them, and next week we're going to look at the rest, the other four. And when it all comes together, you're going to get a beautiful pattern of the ministry as Paul views it. It's a tremendous portion of Scripture, because this is what he carefully does in these verses. Now to begin with, point number one. The source of the ministry. As Paul looks at his ministry he wants to talk about the source of it, and that you see in verse 23 closing out the last portion in verse 25 as well. Notice the end of verse 23 that statement, \"of which I, Paul\" and of which in reference to the Gospel back in the verse in the middle of the verse, \"the Gospel, which you have heard which was preached to every creature under Heaven of which I, Paul, am made a minister.\" The word \"minister\" is not a high\u2011fallootin' word, it's not an elevated term; it's a very, very low term. It's the word deakinos, which means \"servant\". \"I am made a servant.\" Now, how was Paul made a minister? How was he made a servant? Go back to the 26th chapter of Acts, and I want to show you something. Now remember that Paul never claimed to be a self\u2011styled apostle. Paul never claimed to have figured out one day when he sat down at his desk, \"Let's see, I could be an alchemist, or I could be a horse\u2011breeder, or I could be a farmer, or I could be a mason building buildings, or I could be a minister. Now let me put all the pros and cons, blah, blah, blah, blah, let's see. If I become an alchemist, there's always the danger that I could blow myself up. If I'm going to be a horse\u2011breeder, there's always the danger that my horses won't come out very good, and so forth and so forth. He didn't do it that way. He, in fact, had pretty well decided what he wanted to be in his life, and that was, he wanted to be a Christian killer. And so he set about to do that. And everywhere he went he says he was breathing in and out threatening and slaughter and he was slaughtering Christians. And he was one day on the road to Damascus, doing what he normally did... just get up in the morning, 8 to 5, kill Christians (laughter), and he was on his way to Damascus; and in the middle of the trip, as he approached the city, he was blinded by a light from Heaven, God slammed him to the ground, he ate a mouthful of dirt, he woke up in his blindness and said, \"Lord, what will You have me to do?\" And the Lord said, \"You are going to be an apostle to the Gentiles.\" Now, that is not working out your own career. Now notice Acts 26:13. \"At midday, oh King,\" and here he's telling Agrippa how it all happened, he's giving his personal testimony, \"at midday, oh King, I saw in the way a light from Heaven...\" I'm walking to Damascus; I saw a light from Heaven, \"it was brighter than the sun. Shining round about me and them who journeyed with me, and when we were all fallen to earth, (the whole entourage went down) I heard a voice speaking to me and saying in the Hebrew tongue, 'Saul, Saul, why are you persecuting me? It is hard for you to kick against the thorns (or the goads).\" When they used to have an ox working in a field, in order to keep the ox going in the right direction and not kick, they put pointed goads right against the heels of the ox, and if the ox kicked, too bad. So the ox learned, don't kick. And the Lord said, it's hard for you to fight against it, to resist me, to kick against me. And I said, \"Who are you, Lord?\" He recognized it was the Lord, wanted a more specific title. He said, \"I am Jesus, whom you persecute. But rise, and stand on your feet, for I have appeared unto you for this purpose (now watch this next word) to make you a minister,\" Now Paul did not choose to be a minister, he was made a minister. And a witness of the things which you have seen, those things in which I will appear unto you. Delivering you from the people, from the gentiles unto whom now I send you. Paul, I have chosen you to go to the gentiles. You are now hereby made a minister. And I'll tell you, people, that's a pretty strong statement. And I can relate to that, as you know. That's exactly what the Lord did to me. Threw me out of a car going about 75 miles an hour, skidded me all over the place, woke me up when it was all done, and spoke to my heart and said, MacArthur, you are now in the ministry. And I said, \"Right, whatever you say! You're going to fight like this, I quit.\" (Laughter) And that's precisely what happened, and I had three months in bed to let that decision sink into my heart. The Lord makes ministers. His ministers are those who are called. He's done it throughout the Old Testament. Read the story of the prophets. You have no self\u2011styled, self\u2011appointed prophets. They're called of God. Now Paul makes this clear again and again in his ministry, and in the 15th chapter of Romans in the 15th verse: \"Nevertheless, brethren, (Rom. 15:15), 1 have written the more boldly unto you to remind you because of the Grace that is given to me of God that I should be the minister of Jesus Christ to the gentiles,\" The reason I'm so bold in writing to you gentiles is because the Lord has made me a servant to you gentiles. I'm only carrying out my ministry. I'm only doing that which God has called me to do. In II Cor. 3:4, we read again: \"and such trust have we through Christ toward God, not that we are sufficient of ourselves to think anything of ourselves, our sufficiency is of God (not that I'm self\u2011confident, he says). In other words, my confidence and my trust comes because my sufficiency comes from God. That's what he's saying. God has called me into this, and God has equipped me for this. II Cor. 4:4 \"in whom the God of this age has blinded the minds of them who believe not lest the light of the glorious Gospel of Christ, who is the image of God, should shine unto them (the God of this age is Satan, he's blinded men's eyes) for we preach not ourselves, but Christ Jesus, the Lord, and ourselves your servants because of Jesus. It's Jesus that made me your servants. It's Jesus that drew me in this. Look at the 5th chapter of II Cor. 18th verse: \"and all things are of God who has reconciled us to Himself by Jesus Christ and given to us the ministry of reconciliation\". If I preach that a man can be reconciled to God, it is because God has given me that ministry. I would say this ... you don't choose the ministry that God desires for you. God chooses it. You are either obedient or disobedient. In I Timothy we find in 1:12: \"I thank Christ Jesus our Lord who has enabled me (listen) in that he counted me faithful, putting me into the ministry. Paul says, I'm here because he put me here. I Timothy 2:5 \"There is one God, one mediator between God and man, the man Christ Jesus, who gave Himself a ransom for all to be testified in due time.\" Listen, \"for this I am ordained a preacher and an apostle, a teacher of the gentiles.\" It's been ordained of God. This isn't something that I whimsically chose. In II Timothy 1:11 it says: \"Under which I am appointed a preacher and an apostle, a teacher of the gentiles\", repeating the same three terms. Now, who made Paul a minister? God. Who is the sourcethen of ministry? God. Whatever gifts you have received to operate within the Body of Christ, who gave you those gifts? According to I Cor. chapter 12 the Holy Spirit gives to all men severely as He will. It is the Spirit of God who manifests Himself in the gifts of the Spirit in order that we might minister. It is God who calls us, it is God who puts us in the ministry; it isn't something we choose. Notice again in Col. 1:25, because you have again in the same terms, Col. 1:25, it says: \"...of which I am made a minister.\" Here it is again, \"I am made a minister according to the dispensation or the stewardship of God, which is given to me for you to fulfill the Word of God.\" Notice this, I am made a minister according to the dispensation of God, which is given to me. Stop there. The word dispensation, oikanammios, noikusis law, or rule. Oikas is house. It means to rule a house; it means to be a steward of somebody else's possessions. It means to rule for the houseowner, it refers to somebody given great responsibility. God owns His Church. It's His house, His temple, and God says I want to appoint you to rule in my behalf, in my Church. It suggests being a great estate to manage, the word does, \"of which I am made a servant according to the stewardship\", or if you want a goodword for that, according to the God\u2011given responsibility. \"According to the God\u2011given responsibility which I have received.\" It's a divine office, Paul says. It's God's plan. It's God's Church. It's God's Gospel. It's God's Christ. It's God's message. It's God's truth. It's God's Word. And, he says, look, Paul. Will you manage it for me? I'm in the ministry because God has put me there. I'm a steward. You remember our study of I Cor. chapter 4, don't you, a few weeks ago? Let a man so account of us as of the ministers of Christ, Paul says, there, of stewards of the mysteries of God. I'm a steward. A steward doesn't own anything; he manages something for somebody else. The houseowner would have a steward in those days who would manage his whole house. And this was when you had a large estate, and so that the houseowner could go anywhere he wanted, the steward would take care of everything \u2011employment, wages, taking care of the supplies in the house, making sure everything was carried out \u2011\u2011 a very great responsibility. So he says, we are stewards. Moreover, I Cor. 4:2 \"...it is required of the stewards that a man be found what? Faithful.\" Just carry out the task. So Paul says, God has given me a task. God has given me a divine responsibility, and I'm obligated to fulfill it. God is the source of my ministry. In I Cor. 9 a few weeks ago we studied a couple of verses that will give you a good insight on this. I Cor. 9:16: \"For though I preach the Gospel, I have nothing to be proud of. I have nothing to boast about, to cause self\u2011glory. For necessity is laid on me, yet woe is unto me if I don't preach the Gospel. Remember we talked about that? Paul says, look, don't come up to me and say, \"Oh, Paul, you're a minister. Oh, Paul, what a self\u2011sacrificing wonderful human you are. He'll say to you, \"Look fella, I was going down the Damascus Road minding my own business, and I got thrown into this deal. Don't pat me on the back. I didn't ask for it, and now it's a situation wherein if I don't fulfill it, I'm in a lot of trouble. So don't pat me on the back about it, I had nothing to do with it. Probably a lot more responsibility than I want anyway. He says in verse 17, if I did it willingly, then I would have a reward, but it's against my will. It's strictly a responsibility that's been committed to me, that's all. It's something given to me, and I didn't ask for it, but I'm in a lot of trouble if I don't fulfill it, so don't pat me on the back \u2011\u2011 pray for me! In Gal. 2:7 Paul says, on the contrary, when they saw that the Gospel of the uncircumcision or the Gospel that goes to the gentiles was committed to me, we'll stop right there. That's all we want is that phrase. He says, the Gospel to the gentiles was committed to me, I didn't have any choice. In Ephesians, Chapter 3, he says: \"...for this cause I, Paul, the prisoner of Jesus Christ for you gentiles, if you have heard of the dispensation or if you have heard of the responsibility that God has given me, how that by revelation he made known to me the mystery, and then he said in verse 7 of which I was made a minister, by His grace. In other words, you must know that God has called me and God has made me a prisoner of Christ. I'm chained to Christ, I can't get away. I've got this tremendous responsibility to reveal the truth that God gives me to dispense the mysteries, those are the truths of God's word. I was made a minister. In Titus 1:7 \"A bishop must be blameless as the steward of God.\" Anybodyin the ministry. Bishop means a pastor, not what we call an ecclesiastical bishop, (the term just has to do with a pastor, an elder) is to be a steward of God. God has called us to a tremendous responsibility. And that's why, no matter who you are as a Christian, the Spirit of God has given you certain gifts, and if He's given you those gifts He's called you to minister those gifts and you need to do that. It's a serious responsibility. If you possess a gift of the Spirit then you possess something that belongs to God, and you are to minister that. You are to dispense it to those in need of it. I Peter 4:10: \"...as every man (that's all of us) has received the gift, even so minister the same one to another as good stewards of the manifold grace of God. Every Christian has received spiritual gifts. We're going to get into this in the 12th chapter of Corinthians in the morning, soon. Every Christian has received gifts. If you have, then minister them. As a good steward, as a steward you hold that gift, bit it isn't your own. You're going to use it and manage it for God's glory. If you have a speaking gift, then speak as the oracles of God. If you have a serving gift, then serve with the ability that God gives, that God may be glorified. The source of all ministry is God. We don't choose that. And so what am I saying? I'm saying that you had better examine your own heart to see what God has called you to do. You had better search your own heart to see what your spiritual gifts are, There are diversity of gifts, but the same Spirit, differences of administration but the same Lord. Diversities of the operations but it is the same God working in all, There are different gifts here. Every one of you are different. But you've been given a stewardship, and it's from God, and he's the source of that calling and the source of that gift, and you'd better use that thing, because you're a steward of it. Some day when you face Jesus Christ the record of your stewardship is going to be what did you do with the gifts you were given? Are you going to be like the servant who buried it in the ground and said, I knew you were tough to handle, so I just buried it and held on to it, or are you going to be the kind who multiplied stewardship? So in any ministry, whatever it is, God calls us, God equips us, God assigns us. Maybe not as dramatically as the Damascus Road experience that Paul had, but just as truly. But you say, John, how do you know God is calling me to the ministry? You'll get the message if He's calling you, believe me. One way or another. You need to be listening and then responding like Paul did with the words: \"What will you have me to (what?) to do.\" So the source of the ministry is God. He says, I am made a minister, verse 23. Verse 25, 1 am made a minister according to a God\u2011given responsibility. Second, and this is really neat, he not only talks about the sourceof the ministry but the spirit of the ministry. As we serve the Lord Jesus Christ, recognizing God has called us, what should be our attitude? What should be the spirit in which we serve? Verse 24, watch this. I'm just going to read three words...\"who now (what's the third word?) rejoice.\" What's the spirit of the ministry? A word with three letters, JOY. The spirit of the ministry is joy. Whatever our ministry is, we are to enjoy it. That's a sad reality, I think, that many ministering Christians don't have the right attitude. Do you know that? There just aren't enough joyous Christians. There just aren't enough happy Christians. It's like the little girl who saw the mule and said with a long face like that it must be a wonderful Christian (laughter). You know, there are a lot of people that have been given a tremendous responsibility by God, but they grudgingly carry it out. You know I mean, what do you do? \"Oh... I'm serving the Lord...,\" you know. It's just agonizing. Where's the joy? It's a sad reality that many pastors have lost the joy of the ministry. They don't have the right attitude. They get like Jonah, you know? Even when it goes good they're hesitant, angry, they're reluctant, bitter, resentful. You say, yeah, but I've got it taught in my ministry. It's hard to have joy. Oh? Think of this one. If you ever think you've got it tough in your ministry and you can't find joy, listen to these words. \"Looking unto Jesus, the author and finisher of our faith, who for the joythat was set before Him (what?) endured the Cross, despising the shame. Why did He do it? For the joythat was set before Him. Jesus never lost the joy of what He was doing. Never. Never. Why should you? You haven't suffered unto blood yet, he says, or you haven't died in your service. Oftentimes you'll talk to somebody, even another pastor, who'll say, \"Oh, I've lost the joy of the ministry.\" You know what that means? That doesn't mean to me that they've got bad circumstances, that means they've got bad connections, see. Because you don't lose the joy unless you lose the Lord, and if you lose the Lord, I've got to redo my theology? never lost the internal joy. We've talked about this. The element of personal joy was the spirit of his ministry. Every\u00adwhere he went he was rejoicing. You realize when he wrote the Philippians\u2011 he was rejoicing, and\u2011most likely he was in jail? And I've told you about that Jail. It was a hole in the ground. In the prison they just dropped prisoners in that place and when they got 40 in there they'd open the sewage, the sewage would run in and drown them all, they'd let it drain out and then they'd start with another 40. And that's where he was when he wrote, \"rejoice always, and again I say rejoice,\" Some\u00adbody was probably sitting there saying this guy is out of his mind. What's he so happy about? It had nothing to do with cir\u00adcumstances. He had a relationship with the living God that was perpendicular and transcended beyond all circumstances. I told you a few weeks ago, joy is the deep down confidence that God is in control of my life, and that doesn't change. That's where the joy comes. Whenever I, see somebody who's lost the joy, I don't worry, I don't want to talk about if something's happened with the Lord. Paul's joy was generated because of what Christ had done for him, and I'll tell you something else. Keep this\u00ad in mind. Humility generates joy. You know something\u2011-humility, generates joy in this sense. Paul always thought of himself as so unworthy, that even having the privilege of dying for Jesus Christ was a cause for joy, because he didn't even think he was worthy of that. When you lose the joy is when you get to thinkingyou're too good tobe sufferin' what you're sufferin', or to be havin' it like you're havin' it. And that's the wrong perspective.And he says, \"Hey, I now rejoice. You say, yeah, you know he was probably in a wonderful place. You know where he was? In prison, that's where he was. In prison. Remember him in the jail in Philippi? With his feet and his hands in the stocks, in the middle of the night in the inner dudgeon, what was he doing? Singing! Paul rejoiced even though he was bound by a chain in Rome. No circumstance could affect his deep down confidence that God was in control of his life, and boy, that brought satisfaction and the spirit of the ministry, beloved, is joy. Christians ought to just be beaming with joy. In the midst of anything and everything, and that's what the world's gonna see, and they'll say, what's wrong with those people? I was reading Eristhenes, and he says, (he's a Greek and he's commenting on Christians) and he couldn't figure them out, and he says, it's amazing. He says, when a baby dies, they rejoice, for one who passes through the world without suffering. He said, when one of them dies, they carry his body through the streets and sing hymns of praise like someone who had simply taken a journey from one place to another. He couldn't figure it out. Joyful Christians are absolutely dramatically effective on the world. The spirit of the ministry is joy. Colossians right here in chapter 2 verse 5, Paul's in jail in Rome here chained to a Roman soldier as he writes, he says, \"for though I am absent in the flesh, yet I am with you in the spirit, joying and beholding your order in the steadfastness of your faith in Christ. Absolutely undaunted was this guy. Because his joy was always based on the perpendicular. In I Thessalonians he writes, I think it's chapter 2 there, verse 19, he says, \"what is our hope? For joy, a crown ofrejoicing.\" Are not you in the presence of our Lord Jesus Christ for you are our glory and joy. Listen, he rejoiced about God and he rejoiced about everybody else, and consequently what happened to him didn't matter. And you say, I don't care what I go through, when I see that you knowthe Lord Jesus Christ and that you're going to be there at the Second Coming, I'm so happy, I could care less about me. That's what he's saying. That little letter of Philemon in the 7th verse, he says, \"we have great joy\". And here he is a prisoner again when he wrote this; he always talks about joy when he gets in jail. Says, we have great joy, because the hearts of the saints are refreshed by you, brother. When I hear about you, Philemon, I'm so happy about you. He's always got his joy in his relationship to the Lord and then his relationships with people, and so it didn't matter what happened to him because he was totally, absolutely, unselfish. When you see somebody without joy in the ministry, it's because they're selfish, and they think they deserve better than they've got, and if they really looked at their hearts they don't even deserve what they've got, right? That's why Paul kept his joy, because anything that came to him, even suffering, was something more than he felt worthy to receive. And I'll tell you something, once the joy is gone, you're in trouble, you're in a lot of trouble. Because everything you try to do is gonna be works, legalism, and have little effect. The beginning of the letter to the Philippians he writes, he says, again the same idea, he says, (he's in jail), so in verse 13 he says, \"My bonds in Christ are manifested in all the palace.\" In other words, this is great being a prisoner because all these soldiers who get chained to me keep getting saved and they take the message back to the palace. \"And many of the brothers in the Lord, becoming confident by my bonds, are much more bold to speak the Word.\" In other words, there are other Christians who can see what you can do as a prisoner who aren't so worried about it any more. They see that since I've been a prisoner, all kinds of people have been getting saved around the jail here, and so they're a little more bold to preach, figuring that if they wind up in jail they'll have a good time there too. And he says, you know there are other people who go around condemning me and saying that I'm in jail because the Lord had to put me on the shelf because I blew my ministry, and it's kind of a judgment on me and some people are trying to even add affliction to my bonds, he says in verse 16, in this kind of criticism, but some love me. But I don't care, verse 18 he says, \"if Christ is preached in that I (what?) do rejoice, and I will continue to rejoice. The spirit of the man undaunted and the spirit of the ministry is joy. What are the thieves that rob us of joy? What are the thieves that rob you of joy? Circumstances, people? People are thieves \u2011\u2011 they steal joy, you know that? If you let 'em. Things? Worry, that's the worst thief, And what are the guards that protect your joy?, Humility, Devotion to Christ. Trust in God. Those things. You say, year, but maybe it was pretty nice where Paul was going to jail here. It wasn't too bad, maybe, that's why he had so much joy, Oh? Let's look at Colossians 1:24 again, \"Who now rejoice in my sufferings'.\" Now wait a minute. Paul, you actually rejoice in your suffer\u00ading? Oh yeah\u2011 Oh yeah. Why? Because they're for (what?) for you. And secondly, they fill up that which is behind or remain\u00ading of the afflictions of Christ in my flesh for His body's sake, which is the Church. Now that is a very confused verse, as you first read it, Let me explain it to you, and this brings us to the third point, We've seen the source of the ministry, the spirit of the ministry; here's the suffering of the ministry. The suffering of the ministry. He says, I'm rejoicing in ny suffering, because it's for you, and also it fills up what is remaining of the afflictions of Christ, Now this has really been misconstrued, Now there are some people who say that Christ when He died on the cross did not finalize all suffering, This is, generally speaking, the 'Roman Catholic view, that more suffering is necessary to fill up that which remains of the suffering of Christ, and that's why they teach that the saints must suffer, And you'll find many people, there are some who are very devout, who wear belts with nails in them. I knew a man who went years and years with thing like rocks in his shoe, and tacks. There are many, many people who go and light candles and so forth, and so on, in order to get people out of purgatory, because they have to go to purgatory to suffer awhile to atone for sin because they have to fill up that which remains of the suffering of Christ. That's where all that comes from, you see. That Christ's sufferings have to be supplemented by Paul and by you and by everybody else. Now you say, what about the ones that are super good. Well, you see, if you're super good in this life, according to Catholic theology, you can get enough accomplished in this life to go right to Heaven, and then if you have any extra they'll put it into what's called the Treasure of Merit and apply it to somebody in purgatory who needs it, That's true. That's what's called the Treasury of Merit. And the idea is that you have to continue to suffer and suffer and suffer and so forth in order to expiate sin. You think that's what Paul's saying? Why, that would be a fatal blow to what he just said. Because what he just said was that Christ by the blood of His Cross, through His death, has presented us, verse 22, through death presented you what? Holy and unblameable and what? Unreprovable. Through His death. So Paul is not going to unsay everything that he has just said. And Paul is dealing with a heresy in Colossae that's insisted that Christ's death and Christ's life had to be supplemented by ascetism and human works anyway. He's certainly not going to say that. In fact, the word for affliction here is nowhere used to describe the atoning suffering of Christ. You say, well, what is he saying, All right, let's look at it. \"Who now rejoice in my sufferings for you.\" Now this, relates directly to him being a prisoner, as he is a prisoner when he writes Colossians. Chapter 4 tells us that as we find him in Rome and he makes certain references to his situation, we know without a shadow of a doubt that he's a prisoner. Now listen. In Acts 9:16 the apostle Paul was told something at the very beginning. This is the chapter that tells of his conversionthe 16th verse, \"I will show him how great things he must (what?) suffer for my namesake.\" From the very beginning God said, Paul, you're going to pay a high price. You're going to be a prisoner of life. And you know what was so neat about Paul? He never sawhimself as a prisoner of Rome. Every time he talks about being a prisoner he says, I'm a prisoner of Jesus Christ. He always saw it that way. In Philemon 1: \"Paul, a prisoner of Jesus Christ\", Philemon 9: \"Now a prisoner of Jesus Christ\", Philemon 23: \"my fellow prisoner in Christ Jesus, So he's always seeing himself not as a prisoner of the Romans, a prisoner of men, a prisoner of anybody but Christ, and all of this is a fulfillment of prophesy. So he says, hey, I rejoice in my suffering for you. It's what the Lord predicted. It just helps me to believe in Him more because it's exactly what He said would happen, I see it fulfilled. Why did he rejoice? Notice, \"because my suffering is for you.\" Now the end of the verse 24, \"it's for His body's sake, which is the Church.\" I'm suffering for your sake, For your sake. You say, in what sense? Look at Philippians 1:29. \"For unto you it is given in the behalf of Christ not only to believe on Him, but to suffer for His sake.\" To suffer for His sake. Paul says, it's not only my lot to suffer for Christ's sake, but yours too. I'm going to suffer for Him; you're going to suffer for Him, for His sake. That means because of Him. The early Church, buy they suffered. They really suffered. Paul says, I rejoice in this, I'm thrilled with it. You say, how can a guy be thrilled about suffering? Well, I'm going to give you five little thoughts here. Five causes for joy in suffering. Number one, it brings us nearer to Christ. It brings us nearer to Christ. You know, Paul wanted to get as close to Christ as he could. \u2011\u2011Philippians 3:10: \"that I may know Him, the power of His resurrection, and the (what?) fellowship of His (what?) sufferings.\" You say in what sense, John? When we suffer for the cause of Christ, that is when the world casts it's slurs at us, and mocks our Christ, in a sense that suffering helps us to understand what Jesus went through, doesn't it? Because in John 15 and 16 Jesus says, if they hated Me, they're going to hate you. If I've suffered, you're going to suffer. And in II Timothy 3:12, all that live Godly in this present age are going to suffer persecution. And so it helps us to understand more about Him. It helps us, as Hebrews 13:13 says, to go outside the gate and bear His reproach with Him. So I think there's joy in suffering because it brings us nearer to the understanding of Christ. Secondly, when we suffer it brings us the assurance of salvation. Suffering brings us the assurance of salvation, in a sense. I Peter 4:14: \"If you are reproached for the name of Glory and Christ happy are you for the Spirit of God rests on you. In other words, when you suffer you have this tremendous confidence of the presence of the spirit of God. And that's a very assuring thing. So, suffering can bring joy to the apostle Paul, to any Christian because it identifies him with Christ because it brings him a sense of the presence of\u2011the Spirit of God which assures him that he belongs to God. Thirdly, it brings a future reward\u2011. When you're willing to step out for Christ and be bold and speak the truth and suffer the consequences sometimes as we all have from time to time it promises a reward. Listen to Romans 8:18: \"The sufferings of this present age are not worthy to be compared with the Glory which shall be revealed,\" Verse 17: \"If so be that we suffer with Him we will be glorified with Him.\" There is a sense in which the suffering now will be rewarded in the day that we look forward to in the future. In fact, in II Cor, 4:17: \"Our light affliction for this moment works a far more exceeding and eternal weight of glory.\" So, suffering can bring joy because it identifies us with Christ, because it brings assurance of the presence of the Spirit of God, a confidence of salvation, it brings a future reward. Fourthly, it results in the salvation of others. it results in the salvation of others, I can remember as I wrote in the book on \"God's Will is not Lost\" the time that I preached and I suffered I think at that point maybe one of the most difficult times of persecution in my life, and out of it people were redeemed. In Philippians 2:17 he says: \"If I be offered as a sacrifice for your faith, I joy and rejoice.\" In other words, if I offer my life and you get saved that's joy. There's a price to pay, he says, but that's all right. The results are worth it. So, we can rejoice in suffering because it brings us near to Christ, it brings assurance of salvation, it brings a future reward and it results in salvation for others. And I think a fifth thing; I just have to throw this in. It leads to terrible frustration on the part of Satan because he's trying all he can to wack us around and all that comes out is good results. It puts a dent in the Kingdom of Darkness, In Acts 9:16 he says: \"How many things you will suffer for His namesake.\" It'll come to His glory; it will bounce back to the glory of Christ. Now, having said those five things, Colossians 1:24 adds another reason, and this brings us right to the text again, He says, I'm not only rejoicing in my suffering because it brings me nearer to Christ from other passages we gathered that, it gives me assurance of salvation, it brings a future reward, it results in the salvation of others, it frustrates Satan. But I am rejoicing because it fills up that which is remaining of the afflictions of Christ in my flesh. What he means is this, look; I am receiving in my body what is intended for Christ. This does not mean there is anything lacking in the atonement, it does not mean that there's some kind of short change in the value of the death of Christ, it means this. The enemies of Christ were never satisfied with what they did to Jesus, do you know that? They hated Jesus with an insatiable hate. They wanted to add to their, suffering. And as soon as Jesus ascended back into Heaven and He wasn't around any more, and the world hated Him so much, who did the world attack? The Church, didn't they? They began to persecute the Church and persecute the Church and persecute the Church, and why were they whipping the Church and burning the Church at the stake and throwing the Church to the lions \u2011\u2011 why? Was it be\u00adcause they hated those individual personalities, no. It was be\u00adcause they stood in the place of Christ and since Christ wasn't around to get they got the people who stood in His place. That's what it means. Paul is saying this, look: the world isn't done persecuting Christ, but since He's not here, whatever is lacking in what they want to do with Him I am receiving into my body and standing in His place who stood my place is a cause for joy. To take the blows meant for Him who took the blows meant for me makes me happy. If Jesus Christ could hang on the cross and take my sin and the punishment I deserve I think I can take a few punches for His sake. That's what he's saying. And you see, in that sense all Christians are in His place. As the enemies of Christ attack Christ they attack us, and what is left lacking in their minds in the affliction that Christ deserves they give to us and we ought to joyfully say, if I can take a blow for Jesus who took all the blows for me that's cause for joy. You see, in Acts 9 Jesus said to Paul as he was on the Damascus Road, we read it in 26:2, he said: \"Saul, Saul, why persecutest thou the Christians.\" Is that what He said? What did He say? \"Why persecutest thou (what?) me.\" You see, when Saul killed Christians who was he really laying the blows to? Christ. But since He isn't here, Paul says when they do it now to Him, I take the blows. I fill up in my own flesh the afflictions the world intends for Christ. In II Cor. 1:5 Paul says, for as the sufferings of Christ abound in us, the sufferings in Christ abound in us. What a great statement. The world persecutes us \u2011\u00adwe bear His suffering. And he talks about it so many places. He says in Galatians 6:17, beautiful statement, I bear in my body the scars of the Lord Jesus. The blows that I've received have been taken because the world can't hit Him. Paul says allof this, for your sake, for the Church. All of this to win you to Christ, All of this to mature you in Christ. All for you. You're the objective in this thing. I pay a price to win people to Christ. I pay a price to build the Church. They stone me. They beat me up. In II Cor. 11:23 he says what he has suffered: in stripes above measure, that is whippings, prisons more frequently, death often, of the Jews five times received I forty stripes except one (that's thirty\u2011nine stripes), three times I was beaten with rods, that's a whole big group of whip\u2011like sticks wrappedtogether that flail against the skin. Once I was stoned, three times suffered shipwreck a night and a day in the water, journeyings"} +{"id":"RedPajamaC4.0017","text":"Life has had quite hectic twists and turns lately. Sometimes I wonder how it is even possible for me as one human being to cope with all these projects I have managed to gather in my life. But in some weird way person kind of multiplies herself, expands time or makes other magic tricks when stuff just needs to be done. And there is no time to sit around when a revolution awaits! A food revolution, you know, in which I try to take part with my work. A part of my revolution dream has now become reality as my very first cookbook about healthy sweet treats, that came out in Finland some time ago has now been released in the US and it goes by the name It's a Pleasure. I'm so happy about the outcome \u2013 the book looks and feels super pretty and nice and I hope it can help to transform globally the way people feel about sweets with it's over 80 recipes for cakes, candies, cookies, muffins, ice creams, chocolates and other sweet treats \u2013 all without guten, dairy and refined sugar. Because there is just no better way to indulge than to savor with treats that left you feeling light, healthy and satisfied! Try for example these overwhelming pralines. I have prepared big batches of them lately and people have LOVED them. And no wonder. The best pralines combine many elements: a soft filling, a texture that snaps nicely and something crunchy. Also, a hint of saltiness is a big plus. These chocolates are all of the above and can be created with very simple and wholesome ingredients. Please, just try them! And if you wish to have a copy of It's a Pleasure, throw me a message here below before Oct 10th and I'll pick two winners to whom I'll post the book next week \u2013 in Finnish or in English, you choose! Until then \u2013 Viva la revolucion! 4 ounces unsweetened dark or raw chocolate, or \u00bd cup Basic Chocolate from the It's a Pleasure book. Pit the dates. Put the dates, coconut oil, water vanilla extract and salt into the blender and pur\u00e9e. Caramel should be thick and smooth. Spoon the caramel in a freezer-safe container and put it in the freezer for about 15 minutes so that it thickens a bit and is easier to handle. Line a small baking sheet with a parchment paper. When the caramel sauce has thickened, take about teaspoon-sized dollops of the caramel and place onto the prepared baking sheet and mold the caramel into balls. Press a pecan into each ball. And then add about half a teaspoon of peanut butter on each pecan nut and place the tray into a freezer. Freeze for about 30 minutes. In the meantime melt the chocolate on the top of a double boiler \/ in warm water bath. Take the pralines out of the freezer and dip each of them into the chocolate icing. Sprinkle with flaky sea salt and return them to the freezer just to set. Bring out, serve and indluge. Keep in an airtight container in the fridge or freezer. Virpi you are such an inspiration to me! I am allergic to wheat, dairy, and eggs, and I feared I would never again be able to enjoy desserts. However, after discovering your blog and purchasing your N'ice Cream book, I have become a huge fan of yours and I have enjoyed making, and eating, your recipes - especially your healthy treats. Thank you for your beautiful blog and all you do to spice up our lives! Much love from America! My baby is turning 1 on October 10th, which is Thanksgiving Day in Canada. He's having white bread with homemade apple butter and coconut whip on top; but I'll make these for the adults. Then, we'll all be able to give thanks. L\u00f6ysin sivusi juuri \u00e4sken vanhan lehtijutun perusteella. Tietyll\u00e4 tapaa terveellisen ja puhtaan ruuan suosija olen ollut jo pitk\u00e4\u00e4n. Mutta nyt olen varma, ett\u00e4 ruokakaapin sis\u00e4lt\u00f6 menee uusiksi :) Suomeksi, kiitos! Minulle! Olen pitk\u00e4\u00e4n seurannut blogiasi, mutta kirjan ostoa en ole siltik\u00e4\u00e4n kerinnyt tehd\u00e4. Olen kiinnostunut leivonnasta ilman sokeria, joten reseptit olisivat tarpeen. Enkku-versio kyll\u00e4 kiinnostaisi kovasti! Kielitaitoahan ei koskaann voi kehitt\u00e4\u00e4 liikaa! Oi, olisipa ihanaa saada kirja! Ihania konvehteja! Maistuisivat t\u00e4ss\u00e4 opiskelun ohessa..Suomenkielisen kirjan haluaisin kovasti! ever since i discovered you webpage i have been using it very often, especially your 3 ingredient chocolate cake which i use as base filled with the cream of the moment. thank you for the inspiration. i am hoping for some inspiration i can touch in form of a book :-). however i am very grateful that you are, so keep inventing beautifully healthy recipes. Would love to get a chance to explore your recipes!! Me, please! Both my mum and boyfriend are well into taking part in the food revolution (along with myself) and I would love to share the delicacies of the book with them, and many others. I have the world's biggest sweet tooth myself, and since life should not be about deprivaiton, I want to learn to make better choices also when it comes to sweet treats. What a pleasure it is being kind to animals. Thank you Virpi for showing us the way. Kirja on ollut ahkerasti lainassa kirjastosta, joten toivottavasti saisin oman suomenkielisen kappaleen, jotta muutkin kirjaston asiakkaat p\u00e4\u00e4sev\u00e4t nauttimaan ihanista herkuista! Viel\u00e4 ei kirjaasi hyllyst\u00e4ni l\u00f6ydyk\u00e4\u00e4n ja uudistettu painoshan olisi mit\u00e4 mahtavin lahja. Kielen\u00e4 menisi kumpi vain. Oih, olen haaveillut t\u00e4st\u00e4 kirjastasi jo pitk\u00e4\u00e4n, se toinen l\u00f6ytyykin jo hyllyst\u00e4. Olisipa arpaonnea! Hei Virpi! Sain juuri siskoltani Kiitos hyv\u00e4\u00e4 -kirjan syntym\u00e4p\u00e4iv\u00e4lahjaksi. Totesin vain ett\u00e4 h\u00e4np\u00e4 tuntee minut liian hyvin - lahja osui kuin nyrkki silm\u00e4\u00e4n. Olisipa hienoa jatkaa t\u00e4ll\u00e4 kirjalla kokeiluja :) Namnam ja kiitos jo aiemmista hyvist\u00e4! Kiitos ihanasta blogistasi ja herkullisista resepteist\u00e4! Suomenkielist\u00e4 kirjaa toivon sormet ristiss\u00e4. Hep! Toiveena ihana kirja suomeksi, kiitos. These look delicious (I love the photo)! Congrats on your book being out in the US- very exciting! Jo pidemp\u00e4\u00e4n erinomaisia reseptej\u00e4si seuranneena\/tehneen\u00e4 haluaisin kirjan suomeksi. Hei! Kiitos paljosta inspiraatiosta. Nyt etsin sivuiltasia kasvonaamiota, kun her\u00e4sin t\u00e4n\u00e4\u00e4n niin varhain, ett\u00e4 p\u00e4\u00e4tin alottaa p\u00e4iv\u00e4n hemmottelulla. Olispa ihana kun arpaonni suosisi! Kirjasi on loistava. Olen jo muutamia reseptej\u00e4 kokeillut. Olisi mahtavaa saada oma kirja. Nyt lainassa kirjastosta. Suomenkielinen kirja olisi haaveena. Kiitos ohjeesta!rnToivon voittavani kirjasi suomenkielisen\u00e4. N\u00e4ytt\u00e4v\u00e4t ihanilta n\u00e4m\u00e4 <3 Kirjasi olisi parasta syksyyn! I have been waiting (not so patiently) for the release of this cookbook! What an awesome idea! All of your fans are so blessed by your creativity and kitchen genius. Thank you for all you do to inspire and encourage us! Much love! Olen ohjeitasi ja kauniita kuvia katsonut usein nettisivuillasi, mutta kirja viel\u00e4 puuttuu hyllyst\u00e4. Suomenkielinen teos olisi mahtava voittaa! I would love to have your book and will most definetly try out these heavenly chocolates! Thank you. I already have the wonderful Nice Cream book, and the new one would be a wonderful addition! What I love most about your recipes is that I have most of the ingredients already at home, because I try to eat mostly plant-based...healthy indulgence is possible, let\u00b4s spread the word! Suomenkielisen kirjan uudet reseptit olisi ihana saada! Vanhat reseptit ovatkin jo tiuhassa k\u00e4yt\u00f6ss\u00e4! Oh! Menee heti t\u00e4n\u00e4\u00e4n kokeiluun n\u00e4\u00e4! Ja tuo kirja, sit\u00e4kin olen himotellut pitk\u00e4\u00e4n! I'd love to have your book! I'm usually conscious about sugar and try to use flour alternatives from time to time but I've been sceptic about not using those ingredients in sweets. You make gluten and sugar free look really yummy and feasible though so I'm looking forward to trying them out! Oispa kyll\u00e4 ihana yll\u00e4ri, kummalla kielell\u00e4 tahansa! Suomeksi kun saisin t\u00e4m\u00e4n ihanan kirjan, oisin ikionnellinen! Kaverini tarjosi muutama viikko sitten juuri noita kyseisi\u00e4 karamellip\u00e4hkin\u00e4 suklaita ja rakastuin niihin t\u00e4ysin! Lueskelin samalla kyl\u00e4ily reissulla ihan intoa piukeena kkirjaasi ja otin kuvat parista reseptist\u00e4,nyt olen kotona niit\u00e4 kokeillut ja ovat olleet ihania, kiitos! Oma suomenkielinen kirja olisi siis aivan mahtavaa saada! Oh I would love to win your book, it would be a nice present for my upcoming birthday! Minulle! Olen haaveillut kirjastasi jo pitk\u00e4\u00e4n. Mik\u00e4li nyt ei onni ole my\u00f6ten, niin marssin kirjakauppaan. Ihania suklaita! Me! I desperately need this book! I'm a huge sugarholic and I would love to find better alternatives to my cakes and cookies. Thank you! It sounds delicious Virpi!rnBig congratulations for your new book and keep up the good work! I actually have most of the ingredients already to try these. These look decadent. I also think your photography is just beautiful! Kiiitos suloisista resepteist\u00e4si ja mit\u00e4 mahtavimmat onnittelut kirjan enkkuversiosta! Suomen kieliseen kirjaan koetan arpaonneani. I love making sweets with healthy ingredients that the whole family can enjoy, so your book sounds just perfect! Sun reseptit on niin mahtavia! Lukisin mielell\u00e4ni englanninkielist\u00e4 kirjaa <3 Toki suomenkielinenkin olisi mieluinen! Oh 'it's a pleasure' to see your work finally in English - I've been longing for it for a long time and following the blog for maybe 3-4 years now and i've loved so many of your recipes! I would LOVE to win a copy, i've been hesitating to buy it cos I'm still working my way through the treats in the n'ice cream book! The sweetest pleasures in life are often the easiest to make, this recipe came to me just in time. Can't wait to try making them. Love the title of your book! Oih, olisin eritt\u00e4in onnellinen jos saisin suomenkielisen kirjasi syntym\u00e4p\u00e4iv\u00e4lahjakseni :)! Oooh kyll\u00e4 tahdon kirjan omaksi!! Olisipa mahtavaa voittaa tuo kirja suomenkielisen\u00e4! Jostain syyst\u00e4 j\u00e4i loput viestist\u00e4 ulos, mutta ihastuttavasta kirjasta englanninkielinen olisi se, jonka valitsisin! It's a pleasure olisi ihana aikainen joululahja, jos onni ei suosi niin toivon, ett\u00e4 joulupukki toisi.. Instagramisi on yksi ehdoton suosikkini ja oon sen ansiosta inspiroitunut sokerittomista herkuista. Suomenkielinen kirja olisi k\u00e4tev\u00e4mpi, jotta ei tarvitsisi muutella mittasuhteita. Kirjasi on joululahjalistalla (kyll\u00e4, on hyv\u00e4 varhaisessa vaiheessa kirjata lahjatoiveet, ett\u00e4 menee varmasti ajoissa perille ;)), mutta oishan se mahtista voittaa herkkuopus arvonnassa! Sweet as !! I absolutely adore your wicked imagination and great creativity to create such delicious and yest healthy treats with simple, well chosen ingredients ! The time has come!! The N'Ice Cream book about healthy vegan ice creams by me and Tuulia has come out today in the US. And I'm over the moon excited! The Finnish version of the book got sold out in a week here in Finland and I hope the international audience will love the English version just as much. Several people have now said to me that the N'Ice Cream book feels like the ultimate summer saver for them, and that makes me sooo happy. Because that is exactly what this book was designed to be. To enable a feel-good summer with healthy, naturally sweetened and gluten-free vegan ice creams, ice pops, sorbets, soft serves, instant ice creams, ice cream cakes & cookies, waffle cones, sauces, jams and all that jazz. And also our very best tips on how to prepare delicious ice cream easily without an ice cream maker. If you like to have more n'ice cream inspiration, come and follow our Instagram: @nicecreambook where we share pics & tips and give shout-outs to peoples beautiful nice cream creations. Be sure to tag your n'ice cream photos #nicecreambook and @nicecreambook so that we can see them! And now, ladies and gents, I'm happy to introduce these treats I have for you: Lovely lovely Vanilla Chocolate N'ice cream Sandwiches that I made inspired by a couple of recipes from the N'Ice Cream book. They just might be the perfect summer snack. And the perfect way to celebrate the launch of our book. Note that you can always just skip the cookies and make the instant ice cream base and enjoy it with this super quick chocolate sauce, if your ice cream cravings won't wait! And then there's still one more thing: A giveaway! I'm giving away one copy of the N'Ice Cream book. Just write a short hello and why you would like this book to the comments below and you're in! You've got time to participate until midnight Sunday the 22nd of May. And the giveaway is this time open to US, Canada & Finland. Good luck, my friends! Slice bananas into smaller pieces and put into the blender. Open a coconut milk can and scoop the white thick paste (about 2\/3 cup) into the blender with bananas. Add vanilla. Mix until smooth. If your blender is not very powerful prepare the ice cream in two baches. Pour the ice cream mixture in a large freezer-safe tin and freeze for about 15-30 minutes. In the meantime prepare the cookies. Preheat the oven to 175 C \/ 350 F degrees. Mix the dry ingredients in a bowl. Add water and melted coconut oil and syrup. Mix. The dough should be now easily moldable. Add a bit more water or flour if needed. You should be able to make a big ball out of the dough with your hands. Place a dough ball between two pieces of parchment paper. Roll out to \u00bd inch thickness. Cut the dough into rectangles with a knife or use a cookie mold. Place the cookies gently on a baking tray covered with a baking sheet. Bake for 8 \u2013 10 minutes. Allow to cool completely. The cookies can be a bit soft when you take them from the oven because they will get crispier as they cool. Mix the melted coconut oil, cocoa powder and coconut syrup in a small bowl. Scoop about two spoonfuls of the ice cream and place it on the back side of one cookie. Place another cookie on top of the ice cream and press down gently. Repeat with the remaining cookies. Drip some chocolate frosting on top on the sandwiches and sprinkle some shredded coconut on. Freeze for 30-60 minutes. Enjoy! Hi, just discovered your book this morning and can't wait to get it! Sorry I missed the time for the draw but wanted to say hi! Can't wait to get your book! I would love a copy! For myself to be able to keep healthy but even more for my little son, so I can offer him healthy treats. Nosiis olishan se ihan super mahtavaa voittaa t\u00e4mm\u00f6nen kirja, ku oon t\u00e4ss\u00e4 l\u00e4hiaikoina alkanu innostua kaikista n\u00e4ist\u00e4 vegaani jutuista. Mut sen verran uus homma se mulle kuitenki on nii olis super kivaa saada t\u00e4mm\u00f6nen kirja josta reseptej\u00e4 vois kattoa, nii sais sitte my\u00f6s lis\u00e4\u00e4 inspist\u00e4 siihen kokkaamiseen! I would love to have some new inspiration for raw cooking and serve my friends and family delicious healthy ice creams!! Haluaisin kirjan siksi, ett\u00e4 16-vuotias poikani on sek\u00e4 innokas englannin kielen ett\u00e4 herkkukokkailun yst\u00e4v\u00e4. T\u00e4ss\u00e4 yhdistyv\u00e4t molemmat, joten olisipa tosi kiva antaa t\u00e4m\u00e4 kirja peruskoulun p\u00e4\u00e4tt\u00e4j\u00e4islahjaksi! Hei, olin valmistamassa kirjan mango-passionhedelm\u00e4 pehmist\u00e4, mutta en tahtonut l\u00f6yt\u00e4\u00e4 kirjasta suklaakeksikuppien resepti\u00e4? Resepti piti l\u00f6yty\u00e4 sivulta 156, mutta sill\u00e4 aukeamalla oli vain vohvelikuppien resepti. Mutta ehk\u00e4 n\u00e4iden puffettikeksien reseptill\u00e4 saan tehty\u00e4 yht\u00e4 hyv\u00e4n lopputuloksen :) rnOlenko ehk\u00e4 \"sokea\" ja l\u00f6ytyyk\u00f6 resepti mahdollisesti kirjan joltain muulta sivulta vai onko se vain vahingossa kadonnut taivaan tuuliin? ;) rnHauskaa kes\u00e4\u00e4! vaniljapuffetit n\u00e4yttiv\u00e4t niin ihanilta, ett\u00e4 j\u00e4de on pakkasessa ja keksit j\u00e4\u00e4htym\u00e4ss\u00e4. Pian p\u00e4\u00e4see maistamaan. L\u00f6ysin t\u00e4nne kun himoitsen j\u00e4\u00e4tel\u00f6\u00e4 ja kolmen viikon paaston j\u00e4lkeen menin sy\u00f6m\u00e4\u00e4n kermaj\u00e4\u00e4tel\u00f6\u00e4 ja sain vatsani kahdeksi p\u00e4iv\u00e4ksi niin kipe\u00e4ksi, etten usko normij\u00e4deen kajoavani en\u00e4\u00e4 t\u00e4n\u00e4 vuonna. Todella herkullisen oloisia reseptej\u00e4. Pit\u00e4\u00e4 kyll\u00e4 kokeilla muitakin, iso kiitos niist\u00e4. Hello! This book could be the inspiration I need after my vacation full of everything too good that makes me feel sick. OMG, your recipes look so amazing! I just heard of your work today, and am so excited about your recipes. I've had to eliminate so many foods over the last few years after having reached a real health crisis, and I know that dairy, gluten, and refined sugar will never be part of my life again. I'm currently detoxing from heavy metal exposure, and am on a strict program for about another 3 weeks, but when I come off of that, your recipes would be my pleasure oasis after a long drought in the desert. Would love your N'Ice Cream Cookbook! Olen kuullut niin paljon hyv\u00e4\u00e4 sinusta ja kirjoistanne. Pakko oli tulla sivuille tutkimaan ja oih mit\u00e4 ihanuuksia l\u00f6ytyik\u00e4\u00e4n! J\u00e4tskikirja olisi t\u00e4ydellinen meid\u00e4n perheess\u00e4, lapset tykk\u00e4\u00e4v\u00e4t tehd\u00e4 ja herkutella, mik\u00e4s sen parempi herkku kuin astetta terveellisempi itse tehty j\u00e4\u00e4tel\u00f6. Vegaanisia j\u00e4\u00e4te\u00f6it\u00e4 on niin onnettomasti saatavilla, ett\u00e4 jos haluaa herkutella jollain j\u00e4nnitt\u00e4v\u00e4ll\u00e4 maulla, on j\u00e4\u00e4tel\u00f6 teht\u00e4v\u00e4 itse. Ideat alkavat loppua. J\u00e4\u00e4tel\u00f6kirja tulisi tarpeeseen. Ymp\u00e4ri vuoden oleva J\u00e4\u00e4tel\u00f6hirmu ilmoittautuu arvontaan. Ehdottomasti tulisi kokeiltua reseptit kannesta kanteen. Virpi ja Tuulia, I am a huge fan of you two !rnYour work.. that is so fascinating and sincere. It\u00b4s clear that you two are working with pure passion. rnI want to say thank you for your inspiring work.rnrn<3rnrnI really wish I would be the lucky winner of N'Ice Cream book, and if not, I am going to purchase it anyway. ASAP. Because: My summer holiday (part one) starts on Friday !! Olen kova leipomaan joten olisi mukava voittaa kirja. Rakastan j\u00e4\u00e4tel\u00f6\u00e4 ja terveellis\u00e4 herkkuja, mutta oman luovuuden kanssa tulee aina silloin t\u00e4ll\u00f6in rajat vastaan, joten t\u00e4llainen reseptikirja olisi aivan t\u00e4ydellinen! Something new to enjoy! I would like to try these recipes. My almost 3 year old is obsessed with ice cream .... or should I say \"Nice Cream\" ... I love how her eyes light up when I bring her a frozen stick of goodness and it makes me smile knowing that her dessert is healthy and working its magic in her growing body. I'm fighting an autoimmune disease myself and having my beautiful little girl and now knowing what I do about health I am determined to teach her to eat the right way and avoid the pain I've been through. Thank you for writing a beautiful book. I cannot wait to get a copy and try them out on Aim\u00e9e. Imagine if every mother did the same how much healthier the next generation would be. When healthy food is also fun it makes all the difference. Miksi? Miksi?? Koska. J\u00e4\u00e4tel\u00f6 on parasta ja terveellinen j\u00e4\u00e4tel\u00f6 yliparasta. Ihana kirja kaikista n\u00e4ist\u00e4 blogin mahtavista resepteist\u00e4 p\u00e4\u00e4tellen. Tykk\u00e4isin! Rakastan j\u00e4\u00e4tel\u00f6\u00e4, mutta pari viime vuotta j\u00e4\u00e4tel\u00f6kone on lojunut kaapin nurkassa ja olen tyytynyt valmistuotteisiin. Uusien reseptien my\u00f6t\u00e4 innostuin j\u00e4lleen koneesta ja nyt reseptej\u00e4 tarvitsisi lis\u00e4\u00e4. T\u00e4\u00e4 tulis ihan superahkeraan k\u00e4ytt\u00f6\u00f6n itselle ja siskolle, jonka kanssa taiteillaan perusherkuista terveellisempi\u00e4 vaihtoehtoja! Omistamme molemmat edelliset Kiitos Hyv\u00e4\u00e4-kirjasi, joiden ohjeet eiv\u00e4t koskaan pet\u00e4! Would love more great tasting vegan options! Haluaisin opetella herkuttelemaan terveellisesti. Entiselle sokerihiirelle t\u00e4m\u00e4 oppikirja olisi enemm\u00e4n kuin lottovoitto! Voi valloittava Vanelja!rnSun j\u00e4tskikirja sopis just mun kainaloon, koska m\u00e4 rakastan j\u00e4\u00e4tel\u00f6\u00e4 ylikaiken. Panostukses perusteella niin s\u00e4kin? Winwin! Viel\u00e4 vegaanina kaikenlaiseen ruoan n\u00e4pr\u00e4ykseen ja koristeluun kuluu paljon aikaa niin ehdottomasti t\u00e4lle kirjalle tulisi k\u00e4ytt\u00f6\u00e4! Ihania ohjeita sulla! Olisi todella mukavaa saada kirjasi omaksi.. I would love to receive att copy of your book. I've just started some new habits by cutting out sugar,dairy product and gluten. So it would be wondrful to get some inspiration for some ice creams ecspecially since the summer is around the corner!! Avomieheni on hurja j\u00e4tskirohmu ja h\u00e4n toivoo usein, ett\u00e4 saisi terveellisemp\u00e4\u00e4 j\u00e4\u00e4tel\u00f6\u00e4 kaupasta. Kirja innostaisi varmasti meit\u00e4 molempia tekem\u00e4\u00e4n itse herkkuj\u00e4\u00e4tel\u00f6it\u00e4. No siksi, ett\u00e4 voisin tehd\u00e4 ja sy\u00f6d\u00e4 t\u00e4n\u00e4 kes\u00e4n\u00e4 hyv\u00e4\u00e4 ja terveellist\u00e4 j\u00e4\u00e4tel\u00f6\u00e4 ilman sokeria ja valtavaa m\u00e4\u00e4r\u00e4\u00e4 lis\u00e4aineita. This looks stunning. I've been following you on Instagram for a while and all you create looks beyond amazing. Can't wait to see what's in this book! All the best. Ohjeet tulisi varmasti testiin. Olen yritt\u00e4nyt v\u00e4hent\u00e4\u00e4 maitotuotteiden ja sokerin m\u00e4\u00e4r\u00e4\u00e4, mutta rakastan j\u00e4\u00e4tel\u00f6it\u00e4 n\u00e4in kes\u00e4aikaan :) N\u00e4iden reseptien avulla onnistuisi varmasti terveellisemm\u00e4t kes\u00e4herkut! Puffetit on aina ollu mun lemppari j\u00e4tskej\u00e4 mutta n\u00e4m\u00e4 kyll\u00e4 n\u00e4ytt\u00e4\u00e4 ja kuulostaa paljon paremmalta ;) olisi kyll\u00e4 unelma saada teid\u00e4n j\u00e4tskikirja! Hi! Me and my two girls would love to have this book to be able to make and enjoy delish coolness on hot summer days and comfort delights for dark winter nights. Thank you and looking forward to more good stuff in the future! Oh my, how badly I would like to get that book! I have never made any kind of ice cream and I REALLY would like to try. I haven't got the chance to try yet and I think that book would be the key :)rnrnAnd I'm loving your blog! Just love the idea of healthy icecream. Your pics are just delicious! I love making my own ice cream and will definitely try one of your recipes soon. My dad is the biggest ice scream addict so your book would encourage him\/us to make some together! Omg everything you have posted from this book looks so good and beautiful. I have your Kiitos hyv\u00e4\u00e4 -book and I love it. Ice cream is part of summer, you need to have lots and lots of it. How super it would be to eat this lots and lots of ice cream in a much more healthy form than the one you buy in the store. Rakastan j\u00e4tski\u00e4, mutta vatsani ei. Onnea on ihminen, joka omassa viljattomassa vegaanikeitti\u00f6laboratoriossaan kehittelee IHANIA reseptej\u00e4 ja jakaa ne meille, joille ei tuollaista reseptienluomistaitoa ole suotu. Mmm. Haluaisin testata kes\u00e4n aikana koko kirjan reseptit l\u00e4pi! Englanninkielisen version avokado-minttusuklaa oli ainakin ihan taivaallista! Kirjan reseptit ovat varmasti niiin herkullisia! Ja olen siirtym\u00e4ss\u00e4 t\u00e4ss\u00e4 pikkuhiljaa vegaaniksi ja kauppojen vegaanij\u00e4tskivalikoimat ovat surkeat. Kirja tulisi todella tarpeeseen. Ice cream is my favorite dessert, but I love making healthy treats, so this book seems like it would be an amazing addition to my cookbook collection that I would use all the time. hi!! congrats on the book. now that is my kind of sandwich. Not having an ice cream maker a book focusing on recipes that don't require one is just what I need. Vatsa ei kest\u00e4 oikein maitoa, joten t\u00e4lle olisi k\u00e4ytt\u00f6\u00e4 :) Tosin banaanikaan ei oikein sovi, mutta voisin sitten valmistaa banaania sis\u00e4lt\u00e4vist\u00e4 resepteist\u00e4 avokille v\u00e4h\u00e4n terveellisimpi\u00e4 herkkuja, tyyppi kun sy\u00f6 aivan liikaa sokeria ja rasvaa. Oi toivoisin kovasti saavani t\u00e4m\u00e4n kirjan! Kaksi edellist\u00e4kin l\u00f6ytyy jo hyllyst\u00e4 ja ovat ahkerassa k\u00e4yt\u00f6ss\u00e4. Kes\u00e4\u00e4 kohden j\u00e4tski\u00e4 - kyll\u00e4 kelpaisi! Siis voiko mik\u00e4\u00e4n n\u00e4ytt\u00e4\u00e4 noin hyv\u00e4lt\u00e4!! Voisin el\u00e4\u00e4 j\u00e4\u00e4tel\u00f6ll\u00e4, ja nyt te ootte tehnyt siit\u00e4 mahdollista n\u00e4iden j\u00e4\u00e4tel\u00f6reseptienne avulla. T\u00e4\u00e4 kirja mun on pakko saada omaa hylly\u00e4ni kaunistamaan. Himoitsen kirjaa poikayst\u00e4v\u00e4lle, joka himoitsee j\u00e4\u00e4tel\u00f6\u00e4 (ja kaupan kasvisj\u00e4dejen tuoteselosteet on hyvin kyseenalaisia!). Oi en kest\u00e4, taas tarjoilet lis\u00e4\u00e4 ihania herkkuhetki\u00e4! Molemmat aikaisemmat kirjasi olen hyllyyni hankkinut ja ihastunut ja kyll\u00e4h\u00e4n t\u00e4m\u00e4kin pit\u00e4\u00e4 saada, varsinkin n\u00e4in kes\u00e4n korvilla. Kiitos, kun teet ja inspiroit! Sain \u00e4itienp\u00e4iv\u00e4lahjaksi Kiitos hyv\u00e4\u00e4 pikaruokaa, ihastuin. Olisi ihana tehd\u00e4 j\u00e4\u00e4tel\u00f6\u00e4 sinun resepteill\u00e4 tytt\u00e4rille varsinkin kun toinen tytt\u00e4rist\u00e4 on maidolle ja kananmunalle allerginen. Kes\u00e4lomalla n\u00e4it\u00e4 ihania tekisin ja m\u00f6kin verannalla nauttisin. Lapsetkin varmasti tykk\u00e4siv\u00e4t n\u00e4ist\u00e4 herkuista! N\u00e4m\u00e4 kaikki siun tekem\u00e4t n\u00e4ytt\u00e4\u00e4 niin ihanilta. Yrit\u00e4n juuri lapsia opettaa eroon sokerista ja t\u00e4m\u00e4 kirja olisi hyv\u00e4 apu siin\u00e4. Varsinkin teinipoika joka on hankalia, voisi itse kikkailla n\u00e4it\u00e4 ihanuuksia. I would love to have this to offer my girls something better than ice creams from grocery store. I love ice cream but lactose free ice creams aren't so tasty, not in Finland anyway. Good luck with your book, looks beautiful and tasty! Kes\u00e4ll\u00e4 mik\u00e4\u00e4n ei oo parempaa kuin j\u00e4\u00e4tel\u00f6, paitsi ehk\u00e4 ns. hyv\u00e4 j\u00e4\u00e4tel\u00f6, joten kirja olisi kiva. :) Ei haittaa, vaikka vett\u00e4 tulisi taivaan t\u00e4ydelt\u00e4, aina on hyv\u00e4 p\u00e4iv\u00e4 sy\u00f6d\u00e4 j\u00e4\u00e4tel\u00f6\u00e4! Paatunut sokerirotta ilmoittautuu! Kirja tarjoaa parempia vaihtoehtoja kes\u00e4n herkutteluihin. Your recipes & pics are really inspiring, I'd really love to have this book! I need this book - we are vegans and I want to make our toddler these yummy looking ice creams this summer to cool on a hot day! Hello from a fellow foodie from Orlando Florida! Being vegan, it's hard to satisfy my ice cream cravings! Id love to learn more about how to make different nice creams! Loving this idea! This looks like a delicious way to treat yourself! Thanks. Ihanaa, ett\u00e4 vihdoin sokerittomia ja t\u00e4ytel\u00e4isi\u00e4 j\u00e4tskiohjeita on koko kirjallinen! T\u00e4lle on ollut suuri tilaus ainakin meill\u00e4! J\u00e4\u00e4tel\u00f6 on parasta herkkua, joten mukana arvonnassa. Olen fiilistellyt kirjaa niin kauan kuin olen tiennyt sen olemassa olosta. Kirja on kaunis, kekseli\u00e4s, inspiroiva ja sit\u00e4 tulisi varmasti k\u00e4ytetty\u00e4. Ruokavalioni muuttuu entist\u00e4 terveellisemp\u00e4\u00e4n ja kehoa ravitsevampaan koko ajan, ja t\u00e4m\u00e4n toteuttamiseen t\u00e4m\u00e4 kirja olisi my\u00f6s omiaan. Sen avulla voisin edelleen tehd\u00e4 keitti\u00f6ss\u00e4 suussasulavia herkkuja. Kirja on todella toivottu! I would love to have your new book as I really don't like store bought ice cream because of all the s**t they put in them.rnrnAnd your pics are beautiful! Antaisin kirjan yst\u00e4v\u00e4lleni, jolla on jauhopeukalo! Kirjan inspiroimana voisin tehd\u00e4 koko kes\u00e4n hyvisj\u00e4\u00e4tel\u00f6it\u00e4 viilent\u00e4m\u00e4\u00e4n rankan ty\u00f6p\u00e4iv\u00e4n j\u00e4lkeen ja viikonloppuisin j\u00e4rjest\u00e4\u00e4 j\u00e4\u00e4tel\u00f6kemuja kavereille. Hello!rnrnI am waiting for the summer so baskit and your book is perfect for all those healthy and yummy summer treats. I have been struggling for the couple weeks to order or not to order your book. Rakastan j\u00e4tski\u00e4 ja olisi ihanaa saada n\u00e4iden terveellisempien j\u00e4tskien ohjeita! Taatusti tulisi pruuvattua kaikki reseptit. Looks just divine! I adore your work. You are one true wizard. Yum, the new book looks delicious! Huge congrats. The two previous books have helped me a lot in the kitchen, and I am sure that this latest one would do the same. Thank you for sharing your wonderful recipes with us! I will definitely try these, as my boyfriend always would want these icecream sandwiches, but can't eat them for the milk. Would love to surprise him with a whole book! OMG! I'm just loving this idea of combining nice cream with cookies!! And I would also LOVE to have your book, as I am the biggest ice cream fan! maitovammaisena kauppojen j\u00e4\u00e4tel\u00f6tiskit \u00e4rsytt\u00e4v\u00e4t, kun irtoj\u00e4\u00e4tel\u00f6valikoimissa on aina kaksi mahdollista vaihtoehtoa valinnalle, jos sit\u00e4k\u00e4\u00e4n. olisi siis kiva p\u00e4\u00e4st\u00e4 kokeilemaan uusia reseptej\u00e4 j\u00e4\u00e4tel\u00f6himoon, joka iskee aina n\u00e4in kes\u00e4n korvilla. Olen viimeisill\u00e4ni raskaana ja himoitsen kylmi\u00e4 ruokia ja j\u00e4\u00e4tel\u00f6\u00e4 mielell\u00e4ni p\u00e4ivitt\u00e4in. Ja koska j\u00e4\u00e4tel\u00f6\u00e4 ei vaan voi sy\u00f6d\u00e4 joka p\u00e4iv\u00e4, niin on onni ett\u00e4 hyvisj\u00e4tski\u00e4 voi! Siksi siis kirja tulisi enemm\u00e4n kuin tarpeeseen. Lis\u00e4ksi lapselleni tulee hampaita, ja olen ratkaissut aamupalan ja iltapalan jo nyt banaani-marjaj\u00e4tskill\u00e4, jota kaksivuotias lusikoi suuhunsa onnellisena. J\u00e4\u00e4tel\u00f6 on parhautta! Kuvat ovat aina niin herkullisia, haluaisin kirjan jo ihan niiden takia. I love your work, you're my idol! I have already preordered your book, can't wait to have it! Would be so nice to give a copy to a dear friend for her birthday. T\u00e4m\u00e4 kirja olisi loistava itselleni ja my\u00f6s kummipojalleni, joka ei voi k\u00e4ytt\u00e4\u00e4 maitotuotteita miss\u00e4\u00e4n muodossa. Voisin tehd\u00e4 h\u00e4nelle kes\u00e4ksi ihania j\u00e4\u00e4tel\u00f6it\u00e4. Ulkomailla yst\u00e4vi\u00e4,olisi mukava yll\u00e4tys ainakin yhdelle j\u00e4\u00e4tel\u00f6n suurkuluttajalle! Nurena s\u00f6in paljon j\u00e4\u00e4tel\u00f6\u00e4 ja sitten se j\u00e4i. Haluaisin sytty\u00e4 uudelleen t\u00e4lle herkulle. T\u00e4\u00e4 kirja olis niin ihana, olis ihana herkutella luvan kanssa.. The hottest \u2013 or should I say the coolest cookbook of the summer is now available for PRE-ORDER! And \u2013 there is a magnificant pre-order gift, too! Hooray, it is really happening, my friends! I'm so happy to launch this! So as I mentioned in my previous post, N'Ice Cream \u2013 the healthy vegan ice cream cookbook by me and Tuulia Talvio will be out May 17 by Avery Publishing, Penguin US. There's gonna be over 80 delicious recipes for healthy vegan ice creams without gluten, dairy and refined sugar. \u2026Creamy ice creams, ice pops and sorbets, instant ice creams, ice cream cakes & cookies, waffles, sauces and jams, you name it. THIS BOOK covers it all when it comes to wholesome ice creams! GATHER e-book with over 30 recipes for your wholesome, easygoing, plant-based summer parties. Oh yes, baby, it is true! By pre-ordering N'Ice Cream now you'll get this luxurious digital cookbook totally FREE. (Or if you've already pre-ordered the book \u2013 Thank you! \u2013 the offer includes you too.) Gather is not available in any other places so pre-ordering is really the only way to get your hands on this summery piece. And note also that the gift book comes as a pre-order gift only with the N'Ice Cream cookbook, so it is not included with the Finnish version, Hyv\u00e4n olon j\u00e4\u00e4tel\u00f6kirja, which will be out in stores in Finland already in about 2 weeks. The book includes recipes such as Falafels & Cashew Sour Cream, The Vegan Party Platter, Flaxseed chips & Creamy Dip, Sweet Potato Mini Pizzas, Nut-free Blueberry Pie, Divine Raw Chocolate Cake (presented below!), Apricot Cookies and Nut Fudge, Summer Pancake Cake, Brazilian Lemonade, Melon & Lime Aqua Fresca and many many more! And note, that all these recipes are totally new and original, not posted anywhere else before. Check out more about Gather e-book and how to pre-order and get your gift HERE. Oh and hey, I recommend warmly to subscribe to Vanelja's newsletter asap, as there is coming some great weekly giveaways, bonus recipes, playlists and everything wonderful to get you in summer vibes & ice cream mood! And before I leave you to enjoy the Divine Raw Chocolate Cake from Gather I have to say that we are AMAZED by all the support we have been getting from people to help to spread the news about this book. From people we know and from total strangers too! We are grateful for all the help we can get to spread the word of n'ice cream and healthy ice cream revolution. If you feel like you would want to help in any way we would be so so happy! Like by sharing this post, the N'Ice Cream preorder gift, N'Ice Cream Instagram posts or anything else. Or if you are a blogger and would want to share some ice cream tips, some photos, bonus recipes or a small feature \/ interview, please send us an email to nicecreambook@gmail.com and we'll got you covered! And now, finally. The cake. The Divine Raw Chocolate cake. It is a-bliss. Please enjoy! Chop the nuts in a blender. Wash dates and remove the stones. Add dates and cardamom with nuts and puree into crumbly dough. Press the bottom of dough on the bottom of the cake tin. Mix all ingredients in a blender until you have a smooth creamy mixture. If needed, add more coconut milk to get smoother texture but still keeping it as thick as possible. Taste and add seasoning or sweetness if desired. Pour the dough into the cake tin over the crust and put the tin into a freezer for about 30 minutes. Combine all the ingredients in a small bowl and stir to combine. Drizzle on top of the raw chocolate cake. Decorate with nuts, cacao nibs and coconut flakes. Try also fresh berries and n'ice cream! Serve and enjoy! Beautiful plating and the cake looks delicious. Glad I found your blog. As someone who is dessert and baking challenged just looking at your desert page is giving me a lot of inspiration. T\u00e4m\u00e4 l\u00e4htee tilaukseen ja lahjaksi parillekin Jenkeiss\u00e4 asuvalle kaverille! Hyv\u00e4 hyv\u00e4! This is great! My summer is now totally saved! :D :D THANK YOU! The pink plate is so beautiful. Could you tell me where it is from? Thank you! Heippa!rnOlen ihastunut blogiisi ja haluaisin kovasti kokeilla eri reseptej\u00e4, mutta n\u00e4in tavallisena koti\u00e4itin retaleena en tied\u00e4 mist\u00e4 nuita erikoisempia ruoka-aineita voi ostaa? Kuten t\u00e4m\u00e4n reseptin kaakaovoi, raakakaakaojauhe ja kookossiirappi.rnrnKiitos ja onnea uudesta kirjasta! Moikka Heli!rnrnKaakaovoita, raakakaakaojauhetta ja kookosiirappia (t\u00e4h\u00e4n k\u00e4y makeuttajaksi my\u00f6s kotimainen luomuhunaja) voi ostaa hyvinvarustelluista marketeista tai luontaistuotekaupoista. Tai tilata netist\u00e4 (esim Puhdistamolta: http:\/\/www.puhdistamo.fi\/puhdistamo\/kaakaovoi.html).rnRiippuu toki v\u00e4h\u00e4n miss\u00e4 asuu, mutta ainakin Helsingiss\u00e4 kyseisi\u00e4 aineksia jaa jo tosi kivasti ihan pienemmist\u00e4kin l\u00e4hikaupoista. rnrnToivottavasti l\u00f6yd\u00e4t ja p\u00e4\u00e4set kokkailemaan! :)rnIloa kev\u00e4\u00e4seen! Ok, wow. Do I have some BIG news for you people. Big, creamy, delicious and heavenly news. And yes, it is about ice cream, and it is about books. As I bet you guessed already from the photo. So, remember the e-book about healthy ice creams we did last summer with my friend Tuulia, that was called Kind Ice Cream for You? Yep, the cute little pink book that became surprisingly popular during the summer. Well, we thought that the e-book would have been just a nice little summer project for us, but life had bigger plans for it. As it happened, one brilliant book agent found our e-book through my friend Jessie's blog post (Jessie, you girl are pure gold! I thank you from the bottom of my heart for writing that post!) and asked if me and Tuulia were interested in making an actual book out of our e-book. And oh-my-god, OF COURSE we were! So one thing lead to another and now I am SO PROUD and SO HAPPY to announce that our cookbook about healthy vegan ice creams is gonna be out in the US in May 17th and it goes with a name N'Ice Cream. The publisher of the book is the ever so lovely Avery, part of Penguin Random House which is one of the biggest book publishers in the world. So there we are now with our ice creams sharing the home with Nobel prize winners and biggest best-sellers in the world. So crazy. So so crazy amazing! N'ice cream, I scream, everybody screeeam! There you can see the cover of N'Ice Cream on the right hand side on the first photo. That one is gonne be seen in bookstores all around North America and Canada. The cover photo on the left hand side is from the Finnish edition called Hyv\u00e4n olon j\u00e4\u00e4tel\u00f6kirja, that will be out in the middle of May in Finland through Cozy Pyblishing. So it's gonna be healthy, vegan and super easy ice creams for all the people around the world soon! And we are just so overly excited here and can't wait them to come out. We feel we have done something revolutionary with this piece and that the recipes in the book have an actual potential to make this world a little better place. Maybe we'll too get a Nobel nomination from it. Haha! But really, as Don Kardong put it: \"Without ice cream there would be darkness and chaos.\" So ice cream IS plain good, and healthy ice cream is even better. I can tell you that there is going to be a super duper nice gift for people who will pre-order the book and it will be the perfect companion to N'Ice Cream. But more about it next month! Also, be sure to sign up to my NEWSLETTER because there's gonna come some brilliant material to subscribers during this spring. And finally, before I wrap this up, I want to thank deeply everyone who supported us with this project in any way, purchased our e-book back in the days and shared the love \u2013 there's some good karma coming your way! So, we are living wonderful times, my friend, and the upcoming spring is gonna be filled with possibilities for all of us. Lets keep the light up! Moikka!rnrnT\u00e4m\u00e4 ei liity t\u00e4h\u00e4n postaukseen kuin tavallaan :) Mik\u00e4 toimisi niiss\u00e4 j\u00e4deresepteiss\u00e4 joissa olet k\u00e4ytt\u00e4nyt kananmunaa kun tahtoo vegaanisti kokata? Banaani? Ent\u00e4p\u00e4 kookosmaito. Oletko kokeillut saako tiivistek\u00f6nt\u00e4st\u00e4 yht\u00e4 kelpon? Olen k\u00e4ytt\u00e4nyt sit\u00e4 p\u00e4hkin\u00e4tt\u00f6miss\u00e4 raakakakuissa kookosmaidon j\u00e4hme\u00e4n osan tilalla (ettei tarvi niit\u00e4 t\u00f6lkkej\u00e4 ostella!). Mulla on Amaizin organic creamed coconuttia ollut. Kiitos jos jaksat vastailla! So happy for you two! And still so in love with the e-book as well! Yay! Thank you for your sweet comment Ingrid! :)rnHave a lovely day! Hei! Mahtavaa kuulla, suomenkielist\u00e4 odotellessa! Kaksi edellist\u00e4 kirjaakin ovat olleet t\u00e4\u00e4ll\u00e4 tyk\u00e4ttyj\u00e4 :) Uusi rakkauteni on minttuinen tuorehernekeitto sek\u00e4 mustikka-inkiv\u00e4\u00e4rituorepuuro, jota buustaan viel\u00e4 maustamattomalla riisiproteiinilla.rnrnEilen valmistin ensi kertaa lakritsilla s\u00e4v\u00e4ytetty\u00e4 anis-viikunakeksej\u00e4. T\u00e4ss\u00e4 pohdin, kuinka t\u00e4htianiksen saisi k\u00e4tev\u00e4sti jauhettua\/murskattua? K\u00e4ytin puolisen tuntia sen murentamiseen sormin ja sain aikaiseksi silti hieman liian v\u00e4h\u00e4n, vain noin 1\/2 rkl. kiitos kaunis. :) ihana tiet\u00e4\u00e4 ett\u00e4 odotellaan! :D good to know! rnhave a lovely day! Congratulations Virpi! This is such a great news! I'm loving your recipes and can't wait to see this book in English. rnKeep up the good work! And wow, what beautiful blossoms have I been able to witness during this first year! I have been just amazed by all the opportunities, connections and people life has sent through my blog. During this year I have made great new friends from different parts of the world, I have also made 3 cook books (insane, I know! do not try at home), been featured in international media, websites and blogs, been picked by Instagram to their suggested users list, been nominated in the Saveur Food blog Award and actually winning the award in the Best-designed blog category. And then there are also some huge huge things I can't yet talk about that have started to seed during this year. And I'm also going to make lots of these delicious banoffee-muffins, which you should try also. They too taste like a dream. Preheat the oven to 350 F degrees \/ 175 C degrees. Grease the muffin cups. Place all the ingredients into a blender and blend until smooth. Pour the mixture in muffin cups and bake for about 15 minutes. In the meantime prepare the caramel sauce and frosting. When muffins are ready, take them out from the oven and let cool. Spoon some frosting on top and pour on some caramel sauce. Serve and enjoy! Open the coconut milk can and scoop out the white thick paste in a bowl. Add peanut butter and honey. Whip until fluffy. Fold in the banana pieces. Place the coconut sugar and coconut milk in a pan. Stir gently on a medium heat until the mixture is well mixed. Let the sauce simmer on low heat for about 15 minutes until the sauce starts to thicken. Remove from the heat and stir in the vanilla extract and salt. Store in a glass jar in the fridge and use within two weeks. Herkullisia muffinseja ja hitsi miten kaunis sivusto! Paljon onnea tosiaan iki-ihana Vanelja! Onnea, onnea! <3 Kaiken hyv\u00e4n ja kiitoksen oletkin ansainnut, niin kauniit, inspiroivat ja herkulliset sivut olet luonut. Odotan aina innolla ja uteliaisuudella uusia postauksiasi. kiitos paljon! ihana kuulla ett\u00e4 postauksia odotellaan! ... ja sit\u00e4 saakin nyky\u00e4\u00e4n tehd\u00e4 melkoisen pitk\u00e4\u00e4n. :D sen verran harvakseltaan kun on ehtinyt nykyisin p\u00e4ivittelem\u00e4\u00e4n. Onnea Virpi ja Vanelja! <3 Paljon on hyv\u00e4\u00e4 takana, mutta niin on edess\u00e4kin. Valosta valoon. One of the most traditional ways to celebrate something here in Finland is to make coffee and serve cinnamon buns. That old school serving suits all types of parties and in every occasion. A baby is born \u2013 coffee and cinnamon buns, you win a lottery \u2013 coffee and cinnamon buns, someone dies \u2013 coffee and cinnamon buns, your blog is nominated in The Blog Awards Finland in the Health and Wellness category \u2013 coffee and cinn.. Wait, no. Actually then it's not coffee nor cinnamon buns, but healthy cinnamon bun\"ish\" waffles! The exception proves the rule. So here I am with my not-so-traditional but yet so-very-delicious cinnamon bun waffles as it indeed happened that my blog got nominated in the Blog Awards Finland in the Health and Wellness category. Yay! The nomination in that specific category made me took a stroll down memory lane and look back to where I started, which was five years ago in my former Finnish health blog called Kiitos hyv\u00e4\u00e4. Kiitos hyv\u00e4\u00e4 was a blog mainly about well-being and \"high quality life\". In that time I was very deeply into all kind of nutrition stuff, different methods of measuring health and gaining better health, raw food, superfood, super this and super that. I was truly and totally a health nerd. All that super health hype feels kind of funny to me nowadays, but it was an adventure I had to take in order to get here, into more peaceful and calmer place. It is very relaxing when you realise that the purpose of your life is to serve only in a way that brings great joy to yourself and others. Not to battle and strive. That is the reason I nowadays post only easygoing inspiration and nice recipes and not try to convince anyone of what is the best diet or how should others live their lives. I don't have clue, only a delicate and occasionally fading hunch on how to live my own. But that's how life, health and wellness are, delicate and constantly changing things that escape exact definitions and are not bound to one truth. My truth today is happiness and gratitude for being nominated in the biggest Blog Award in my country. And from that happiness I channel these cinnamon bun waffles to you! Thank you for being there, friend. Mix the dry ingredients in a bowl. Take another bowl and add eggs, coconut milk, coconut oil and vanilla extract and whip gently until slightly foamy. Mix with the dry ingredients. Brush coconut oil into the surfaces of the waffle iron. Pour mixture onto hot waffle iron. Cook until golden brown or prepare waffles following the instructions of the manufacture. Serve with coconut butter and cinnamon or with banana slices, peanut butter and whipped coconut cream. These look so delicious...I know my children will love these waffles. In fact, I might start eating breakfast again! Moi! Aivan ihana resepti, kiitos t\u00e4st\u00e4! Mutta yks juttu, ois tosi kiva jos viittisit laittaa noi mitat desein\u00e4 :) mut t\u00e4\u00e4 menee testiin t\u00e4n\u00e4\u00e4n. heheh, hybridip\u00e4 hyvinkin! :Drnja tattista vaan! Ent\u00e4 jos ei oo vohvelirautaa? Onnistuskoshan n\u00e4\u00e4 paistinpannulla lettutyyliin? I have to say my life is super full at the moment. Actually even a little bit too packed for my taste. My calendar is full with work, meetings and photoshoots, my hands are full with things to do both in home and also in work field, and my head is crowded with stuff I need to remember and take care of. Surprisingly, even though it usually never goes together with a hectic life, my heart is full also \u2013 and it is just bursting with gratitude! One reason for that is this unforgettable incident I had last week in New York at the Saveur Food Blog Awards where Vanelja was nominated as one of the finalist. And you can't believe this \u2013 the craziest thing happened: Editor's Choice for Best-designed Blog! As in Vanelja was picked to be the winner by the editors from the almighty Saveur magazine! high-fives with my graphic designer friends Leena Oravainio & Lotta Niemien who helped to build this site and with all you followers, readers and lovely friends and supporters! You guys made this happen! It is such a huge honor and such a recognized award that I am still totally overwhelmed and it is still hard for me to understand that it actually happened. The whole event, the award, all the amazing people and fellow bloggers I met. The whole experience was like from a dream. Especially when I was totally jet-lagged and was feeling quite surreal even in the first place. So now, we need to party. Because that's what we people do when something big comes our way \u2013 we celebrate and throw a party to mark these big happenings and changes in our lives to somehow make them feel more real, right? First we ask someone to pinch ourselves and then we party. And because it is summer and I'm just all about ice creams at the moment, as our e-book about healthy dairy-free & refined-sugar-free ice creams, Kind Ice Cream for You just got launched last week, I decided that we celebrate with ice cream. Yay! This one is an adaptation of one \"Instant Chocolate Ice Cream\" recipe from our book which can be enjoyed as a soft serve or as a more solid ice cream. I chose to flavor it with a little bit of rum and raisins just to make it more festive. And because rum & raisin is my all time favorite ice cream flavor. And well, because alcohol just gives a nice boost to certain occasions. Though here the rum is first brought to a boil so there's no change\/risk of getting tipsy. \u2026Although, you just might do it anyways because of the intoxicating raw chocolate and the super rich flavor! So enjoy, live life to it's fullest and celebrate all the big and small treasures life throws to you. For example now with these luxurious party ice cream balls flying your way! Remember to follow me on Instagram and tag your ice cream photos with #kindicecreamforyou or #kindicecream! Peel the bananas and cut them into small coins. Put the bananas into an airtight container and freeze for at least 4 hours, or overnight. In the meantime pour the almond liqueur and rum into a small pot ja bring to a boil. Turn the heat down and add raisins to the alcohol mixture and let marinate until the bananas are frozen. To make the ice cream, add bananas into a blender and pulse until a crumble forms. Keep on pulsing until the bananas start to form a smooth texture. You might have to scrape down the sides of the blender a few times. Add the marinated raisins, chocolate, vanilla and sweetener and keep on pulsing until you get a smooth and creamy ice cream texture. Mix in the raw cacao nibs and stir with a spoon. Scoop into a bowls, serve and enjoy! If the ice cream melts too much while you process it, you can freeze it a little bit before serving. * More healthy, dairy free ice cream recipes in Kind Ice Cream for You e-book! Kokeilin resepti\u00e4 ja tulos oli muuten hyv\u00e4, mutta jotain tein v\u00e4\u00e4rin, sill\u00e4 j\u00e4\u00e4tel\u00f6ss\u00e4 oli jotain kivikovia palasia. Rusinat olivat kivett\u00f6mi\u00e4, sill\u00e4 maistoin niit\u00e4 ennen kokkailua. Kivikovat palaset eiv\u00e4t olleet kaakaonibsej\u00e4, joten ajattelin rusinoiden j\u00e4\u00e4tyneen jotenkin, kun lis\u00e4sin ne banaaniseokseen. moikka! tehokkaita tehosekoittimia l\u00f6ytyy kyll\u00e4 lukuisia, mutta yksi yli muiden taitaa kuitenkin olla Vitamix. sellainen l\u00f6ytyy itselt\u00e4nikin. p\u00e4hkin\u00e4voita saa muuten tehty\u00e4 my\u00f6s monitoimikoneella. mik\u00e4li sellaisen satut omistamaan, niin kannattaa testata! Juuri vasta huomasin, ett\u00e4 blogisi on muuttunut englanninkieliseksi ja hyv\u00e4 niin. On n\u00e4\u00e4s niin kaunis blogi ja herkullisia reseptej\u00e4, ett\u00e4 kelpaa laajemmallekin yleis\u00f6lle :) Onnittelut palkinnosta!!rnrnRommirusina on ihan lempparimakuja eli t\u00e4t\u00e4 t\u00e4ytyy ehdottomasti tehd\u00e4. I found your ice cream eBook on internet and it is unbelievable! Thank you for these amazing dairy free recipes! It has arrived! Our e-book about healthy ice creams is finally out! And I must say that I am deeply and utterly in LOVE with it. Hands down, it must be the loveliest cook book I have ever encountered. And that is my totally objective opinion. If me and my partner-in-crime Tuulia Talvio would have not made it I would still love it to pieces! Hahaa! But the most amazing thing for me here is how this book took even myself by surprise. Because when we started making it this winter I would have never guessed that it would become so big, beautiful and comprehensive as it is. First we planned to make just a nice small e-book about healthy, dairy-free, refined-sugar-free and gluten-free ice creams with few nice recipes with few nice pictures. But the project kept on growing and growing until one day we realised that we have a real book in our hands, well, on our computer screens \u2013 with 130 pages and over 60 recipes, great pictures \u2013 and last but not least, a beeeautiful layout, thanks to my dear friend, a super talented graphic designer Leena Oravainio. read more about it in the book's official website: www.kindicecream.com. Take care, be Kind and have a lovely ice-cream-filled June, my friend! Turhaan et hehkuttanut, t\u00e4m\u00e4 kirja on aivan mielett\u00f6m\u00e4n ihana! Menin lataamaan sen heti. Ah, kes\u00e4 on pelastettu! jeee! kiitos ja ole hyv\u00e4! Since my childhood I have always been a sucker for candy. I must say that it is the biggest temptation for me. Even now, when I have been eating quite clean for over 6 years, it is still sometimes hard for me to pass those colorful candy shelves. All those sweets, chocolates, flavors and smells just make my head blur. Usually I can manage myself, but if you give me a bowl of candies \u2013 I will sure empty it. And not leave one tiny piece behind. Well, we all have our addictions. And I\u00b4m not alone with this one. Candy business is huge and especially here in Finland and also in Sweden even adults eat candies like there\u00b4s no tomorrow! It is crazy. That is why it is my passion to create better alternatives for all those common candies filled with refined sugars, colourants and artificial flavors. One of my dream is to join forces with some candy factory and to start creating healthy sweets for people. So holler if you happen to be in candy biz! I\u00b4m your girl. And then to the real topic of this post. It is the licorice toffee that I\u00b4ve created. I got the inspiration for it from this really popular retro toffee bar that we have here in Finland called \"Hopeatoffee\" as in Silver toffee. I don\u00b4t know where the name comes from, because it ain\u00b4t silver. It\u00b4s black. That"} +{"id":"RedPajamaC4.0018","text":"How could this happen?\" asked Secretary of State Hillary Clinton in response to the attack on the U.S. consulate in Benghazi, Libya that killed Ambassador J. Christopher Stevens and three others. The rioting by Muslims supposedly \"inflamed\" by a cheaply produced YouTube film about the Prophet Muhammad was cited as the reason, but we have learned the attacks may have been planned in advance, some to coincide with the anniversary of Sept. 11. What doesn't Secretary Clinton get? The actions and statements of Islamic extremists have been visible for some time. In his latest obsequious gesture to the Islamic world, President Obama wants to offer $1 billion in \"debt relief\" to the Muslim Brotherhood leadership in Egypt. The president apparently hopes Egypt's leadership can be bought off and will then start behaving like us. The president appears to ignore Egypt's crackdown on political opposition, its sending tanks into the Sinai, in violation of its 33-year peace treaty with Israel, and the persecution of Coptic Christians who are fleeing the country in droves. This is what America got in Iran, Egypt and now Libya when we helped topple dictators who were then replaced by radicals. That these and many other provocations against America, Israel and the rest of the West bring no credible response from the United States encourages and enables extremists to ramp up their violent behavior. \"Paper tiger\" is the term Mao Zedong used to describe \"American imperialism\" in 1956. \"Spineless amoeba\" might characterize this administration's response to outrages performed in the name of Islam. Just as the amateurish video was not the cause of the violent attacks, neither was Mitt Romney's critique of them. The Obama administration's foreign policy has failed dramatically. A recent Wall Street Journal headline had it right: \"U.S. Policy in Mideast Challenged by Assaults.\" Coddling, understanding, bowing and submitting to extremists only leads to more violence. History has shown and common sense tells us they only respect and fear power and consistency. (Find the entire article here). There are two comments that come to mind from this article which bear mentioning in the flow of communications that have been occurring on this blog. First a comment by way of disagreement with Mr. Thomas. It is very easy for Americans, and it seems especially those on the Right, to simply get inflamed and outraged by Muslim behavior, and by President Obama's alleged kow-towing to the Muslim world. While I myself have my problems with Mr. Obama, I also have problems with cultural naivet\u00e9 which seems pervasive in America today. At the root of American naivet\u00e9 is the assumption that, when all is said and done, all people, including Muslims, are just like us, or at least should be. This is both naive and false. It is a wishful carryover from post-Enlightenment and post Renaissance thinking which treats equality as axiomatic, joining it with sameness. While we may rightly say that \"all men are created equal\" this should not be taken to mean that all people, and all cultures, are the same. To assume this to be true flies in the face of the facts, and leads to cavernous naivet\u00e9, boorishness, or both. Anyone with any cross cultural experience, intelligence, and sensitivity realizes that different people groups have different culture patterns. For those of you who doubt what I am saying, or for whom an explanation would prove helpful, consider Francis Ford Coppola's brilliant emphasis on the theme of honor in the Godfather trilogy. You may remember how the first movie opens up with a man named Bonasera whose daughter has been dishonored by two young men who beat her up in order to take advantage of her. Bonasera comes to Don Vito Corelone (played by Marlon Brando), the Godfather, for revenge. The dialogue, the very first in the movie, which sets the theme for Sicilian and Mafia culture, is all about honor. \"Why did you go to the police? Why didn't you come to me first? . . . We've known each other many years, but this is the first time you came to me for counsel, or help. I can't remember the last time that you invited me to your house for a cup of coffee, even though my wife is godmother to your only child. But let's be frank here: you never wanted my friendship. And uh, you were afraid to be in my debt. . . You found paradise in America, had a good trade, made a good living. The police protected you; and there were courts of law. And you didn't need a friend of me. But uh, now you come to me and you say \u2014 'Don Corleone give me justice.' \u2014 But you don't ask with respect. You don't offer friendship. You don't even think to call me Godfather. . . . Bonasera\u2026 Bonasera\u2026 What have I ever done to make you treat me so disrespectfully? Had you come to me in friendship, then this scum that ruined your daughter would be suffering this very day. And that by chance if an honest man such as yourself should make enemies, then they would become my enemies. And then they would fear you. Later in the scene, Bonasera calls Corleone \"Godfather\" and kisses his hand. Corleone says, \"Good,\" and consents to do what Bonasera asks, to have the young men killed . . . and why? Because Bonasera has shown honor to him, and in order to restore honor to Bonasera's family. Elsewhere in the film, the theme of honor comes up again, when Michael Corleone, cooling his heels in Sicily, sees a beautiful girl, whom he wants to have as his own. His henchmen think that he should simply go and take what he wants, but Michael is more savvy than this. He goes through an elaborate social ritual of honoring the girl's family in order to win their consent that he marry her. One would certainly be a fool to imagine that one could navigate Sicilian, and especially, Mafia culture without regard to honor. In the scene with Bonasera, Vito Corleone, the Godfather (Brando) argues just this point, that Bonasera can only get what he wants if he plays by the rules of honor. But when he has not shown proper respect, he can expect nothing and is entitled to nothing. Michael clearly understands that he is dealing with a highly traditional, honor-based culture, and that he must show proper deference if he is to get anywhere. The point then, whether dealing with the Mafia, or with your other-culture neighbors and business people, or with international relations with other nations and people groups, is to take the trouble to know and to respect their cultural themes, their rituals of relationship. Anyone who cannot be bothered to do so is either naive, lazy, arrogant, stupid, or to put it most charitably, unaware. Whether we like it or not, we must accept that Muslim\/Arab culture is no less an honor culture than is Francis Ford Coppola's Sicilian landscape. And American politicians and governmental agents who refuse to learn the honor-courtship rituals of Muslim culture can expect as little progress in dealing with Muslims as Bonasera could expect from Don Corleone. Some people may not like this, and many do not. Some may feel it demeaning to play by someone else's rules. But they are wrong. It is like courting a girl: do you take her to the kinds of movies and restaurants she likes, or do you just say, \"She'll have to accept whatever I decide.\" People who take the latter approach have short relationships! And governments that despise or ignore cultural factors are fools. It is a point of high honor for religious Muslims that others show respect for their religion, their holy book, and their prophet, all of which they believe are God-given. Anyone who cannot bother to keep these matters in mind should expect no progress, and much explosive reaction from offended Muslims. For them to ignore the offense is for them to themselves dishonor their faith, their holy book, and their prophet, which is out of the question. Therefore, Cal Thomas is wrong if he imagines that the alleged disrespect shown to Muhammad had nothing to do with the recent riots. It had everything to do with them. Yet. there was something else at work, and in this, I find myself agreeing with Thomas' critique. That something else is the intentional use of riots and mayhem as an instrument of political coercion in the Middle East. As I pointed out in my previous posting (see here), political entities in the Arab world have long used these seemingly, but only seemingly, spontaneous riots as a means of political power and coercion. One need only think about the Palestinian Intifadas, and how Yassir Arafat orchestrated them as instruments of coercion, to get the point. So on the one hand, let's not be proud: for too long the United States has demonstrated too much cultural boorishness, pride and stupidity in its dealings with cultures different from our own. But on the other hand, let's not be stupid: these riots are not simply spontaneous demonstrations by an offended populace. They are also cunning and manipulative tools in the hands of cynical power brokers. We need to be wise as serpents without becoming snakes, and harmless as doves without becoming pigeons. Rioting and mayhem against the West by Muslims claiming intolerable offense. Is this something new, or is something we have seen before? Certainly, one needs only to go back about 90 years to answer that question. Notice in particular the bold type phrase which points out that the Balfour Declaration of 1917 recognized (not granted) the right of the Jewish people to the revivification of their ancient homeland. This recognition was historic. It was formative. But it was not universal. By 1922, the United States Congress ratified the Declaration. Among the British leadership, Lloyd George, Lord Balfour, and Winston Churchill were all in favor. At Versailles, where the Declaration was promulgated, the western consensus was that the Balfour recognition was morally correct, and that the Jews would prove themselves reliable allies in the region. But forces in the British Foreign Office were diametrically opposed. These were old colonialist Arabists who were convinced that if the British would accommodate the Arab world, the Arab world would become a band of dependable allies from the Sudan in the west to Iraq in the east. They therefore postulated that since the Arabs were upset with the founding of the Jewish State, therefore, nix Israel. To undermine Israel's existence, they sought to win and bribe select Arab leaders whom the British installed as rulers in the area. For example, the Hashemite Kingdom of Jordan is ruled by a family the British brought from Saudi Arabia to Jordan, formerly known as Trans-Jordan. This territory was comprised of 80 percent of the territory formerly promised to the Jews in the Balfour Declaration! These British Arabists in the Foreign Office even resisted publishing and distributing the Balfour Declaration in Palestine, so much were they opposed to the Jewish state. Richard Meinertzhagen, a career British diplomat, was adamantly against this trend. The Arabists in the Foreign Office had been working on Churchill, seeking to convince him that there could be no peace in the region unless and until the Arabs were given yet more land, to be again taken from what had been promised the Jews, so that land east of the Jordan, originally promised them in the Balfour Declaration, was transferred to the Arabs. Meinertzhagen met with Churchill, unsuccessfully seeking to call him back from the erosion of his own former strong support for a large and thriving Jewish State. Some in the British government actually encouraged Arab rioting, murder and pillage of Jews, as a means of pressuring the British government to reduce Jewish land, and curtail Jewish immigration, since \"clearly\" these two offenses were triggering the riots. But these offenses were not the cause, but the occasion for manipulative leaders to enrage the masses for political ends. Like the Intifadas in our more recent context, the riots were a tactic designed to weaken western resolve. It was during this time that the trend toward identifying the Jews as foreign agitators in the region, the trouble makers without whom there would be peace for all, became a common ploy, as it remains today. Another tactic the British employed was to disarm the Jews while leaving the Arabs armed. In 1929, on the Jewish fast day Tisha B'Av, Arab mobs attacked Hebron. killing 113 Jews and wounding hundreds more in a rampage that blotted out six Jewish communities. Hebron, the burial place of Abraham, had been a Jewish city for thousands of years. In response to the massacre, the British disarmed the Jews . . . but not the Arabs. Intolerable, you say! You say rightly. Most Jews preferred to believe supportive British rhetoric and promises of continued commitment to the founding of the Jewish State, with the British simply calling for Jewish patience with a policy of gradualism. But British deeds instead revealed a government prepared to renege on an agreement that no longer suited them. Ze'ev Jabotinsky was one of the very few Jewish leaders of the day not fooled by British assurances. He was of course right. By 1937, the Peel Commission had reduced the original land promised to the Jews to five percent of the original amount promised. By 1939, while Jews were fleeing for their lives from Nazi Europe, the Chamberlain White paper abrogated the Balfour Declaration, limited Jewish immigration to 75,000 more. In fact, the British would bar Jewish immigration to Israel for another ten years. All of this placating of the Arabs, seeking to win their cooperation, proved to be gullible folly on the part of Great Britain: Egypt, Syria, and Iraq all allied themselves with Hitler in the Second World War. The British got precisely nothing for all their betrayals, their broken promises, and their clandestine efforts. The lesson for today's situation is this. The Arab world has learned that the West fears civil instability and riots, and that when Arabs threaten or perpetrate violence, the instinct of the West is to placate them, or to remove the alleged cause of offense, thinking that by so doing, we will win or cement friendship with them. But what is often forgotten, to our peril, is that the Arab world categorically resents Western incursions, and the westernization of their lands. They also feel themselves to be divinely fated for conquest and hegemony, with all memories of vanished glories bringing humiliation, shame, and eventually fury. The Muslim culture is an honor culture, and any perceived attack on Muslim honor causes a disequilibrium that can only be resolved either by massive obsequiousness by the \"offender,\" or by undeniable retaliation on the part of the offended. This is why cartoons of Muhammad result in such violence, because of offended honor that Muslims cannot countenance. For Muslims to ignore such offenses is to themselves dishonor Muhammad and their own divinely ordained culture, something unthinkable for them. But we must also realize that violence is not merely a response to offended honor: it is also a well-worn tactic in the Arab world, manipulated by wily rulers, as was the case with Yassir Arafat's manipulation of Intifadas as a political tool. Therefore, any government which capitulates to violence or the threat of violence in the Arab world is not only revealing a naive vulnerability to this old approach, which will only win further Arab disdain, but is also forgetting the lessons of history. The friendship of the Arab world cannot be bought, and the western way of life and flow of history will always be viewed as contaminating and unwelcome. In fact, America is not so much hated because of its relationship with Israel, as Israel is hated as an advance column of the contaminating West. Therefore, while we should avoid needlessly offending Muslim honor, we should also not foolishly capitulate to the blackmail of violence. The British learned the hard way that placating violence and demands brings no reward but disappointment. The foregoing is another in a series of articles informed by my reading of Benjamin Netanyahu's A Durable Peace: Israel and Its Place Among the Nations. I had the privilege of being at a very good synagogue this Rosh Hashana. In the Musaf liturgy, which is added to the morning service corresponding to the additional sacrifices that were offered on Holy Days when the Temple stood, there is a prayer Hineni, in which the Cantor prays before the ark confessing his\/her unworthiness. It is a pleading for help that he\/she might intercede for the people who have sent him\/her to plead with God on their behalf. The prayer is magnificent\u2013utterly magnificent. It begins this way, in Hebrew of course, chanted by the cantor who stands pleading before the Holy Ark where the Torah scrolls are kept, symbolizing the presence of the covenant making God of Israel. Here I stand, impoverished of deeds, trembling and frightened with the dread of He Who is enthroned upon the praises of Israel. I have come to stand and supplicate before You for Your people Israel, who have sent me although I am unworthy and unqualified to do so. Therefore, I beg of you, O God of Abraham, God of Isaac, and God of Jacob, HaShem, HaShem, God, Compassionate and Gracious, God of Israel, Frightening and Awesome One, grant success to the way upon which I travel, standing to plead for mercy upon myself and upon those who sent me. Please do not hold them to blame for my sins and do not find them guilty of my iniquities, for I am a careless and willful sinner. Let them not feel humiliated by my willful sins. Let them not be ashamed of me and let me not be ashamed of them. All mankind will pass before You like a flock of sheep. Like a shepherd pasturing his flock, making sheep pass under his staff, so shall You cause to pass, count, calculate, and consider the soul of all the living; and You shall apportion the destinies of all Your creatures and inscribe their verdict. On Rosh Hashanah will be inscribed and on Yom Kippur will be sealed how many will pass from the earth and how many will be created; who will live and who will die; who will die at his predestined time and who before his time; who by water and who by fire, who by sword, who by beast, who by famine, who by thirst, who by upheaval, who by plague, who by strangling, and who by stoning. Who will rest and who will wander, who will live in harmony and who will be harried, who will enjoy tranquility and who will suffer, who will be impoverished and who will be enriched, who will be degraded and who will be exalted. I was profoundly struck this year by the holiness of the service. The Jewish liturgy, in prayers like these, made palpable that we were standing in the presence of the Judge of All, before whom all will one day stand in the Final Judgment. When these prayers are done by a truly called, committed, and skilled Hazzan\/Cantor, the sense of deep respect for God himself, of standing in his presence fully known and rightly accused, is profound and overwhelming. It is not that one staggers under a burden of guilt\u2013it is that one is keenly and unambiguously aware of his\/her need for mercy. What holiness! As I listened to the Cantor praying so powerfully, as I followed the liturgy, I did not want the moment to end for I felt myself face to face with the mystery and profound weight of judgment and of mercy, not as ideas, but as ultimate realities. Some will say \"Where was Yeshua in all this?\" I had a somewhat stunning insight about that too, at least it was stunning for me. The Cantor, although sinful, stands before the Ark pleading before God for mercy for the people as the High Priest prayed for the people in the days of the Temple. And in pleading before the throne of heaven for mercy for God's people, the Cantor is in some small but real measure participating in the role of the Messiah, our Great High Priest, who stands in heaven interceding for us on the merits of His atoning death and resurrection. Most of our Jewish people do not yet know that Yeshua is our Great High Priest . . . but we know. In those moments in the synagogue I was more aware then ever of the holiness of God, of our accountability to Him, of how fully we stand indicted in His Presence, and of our primal need for mercy. I was also more appreciative than ever of the atoning sacrifice of our Messiah, who as our Great High Priest, intercedes for us, and pleads for mercy for us on the merit of His shed blood. Yeshua as our Great High Priest is the Representative of the congregation, made like his brethren in every respect, pleading before the throne of God for mercy on behalf of those very much in need of that mercy, and he is our Chazzan, revealing to us the Name\u2013the nature\u2013of God, and leading the congregation in His praise. Let us never forget who it is before whom we stand, and who it is that pleads for mercy on our behalf at so great a price. Did the Jewish People Have the Right to Return to Israel After So Long? Some, like historian Arnold Toynbee, argue that the Jewish people have no right to return to Palestine after so long in exile. How are we to approach and answer this question? In answering this in the second chapter of his A Durable Peace: Israel and Its Place Among the Nations, Benjamin Netanyahu deals with two related issues. First Issue \u2013 How can we say that Israel retains the right? The Jews never relinquished ownership of the land or the right of return. In fact, in liturgy, in literature, in art, poetry, and prayer, as well as in scriptural promise, the return to the Land was a constant lighthouse of hope in the darkness of exile. This right of return for those who never relinquished ownership applies whether others have come in and exercised \"squatters rights\" or whether the land remained completely vacant. Netanyahu compares Israel's case with the case of Spain which succumbed to Muslim conquest in the year 711. The Spaniards never relinquished their claim to the land, reclaiming sovereignty there after 800 long years. During that 800 years the Arabs had developed a rich culture there\u2013nevertheless this did not make them the new owners of the land. As for the issue of returning to a land now occupied, in the case of the Jews who were expelled by others only to reclaim sovereignty in 1948, during the interim of exile, the people who occupied the land never established a state there, a rival claim to ownership, which may not have stood had it been made anyway. Second Issue \u2013 Who expelled the Jews from the Land and who expelled them? The common response is \"the Romans in 70 C.E.\" However, this response is defective. Although many Jews were expelled at that time, the Jews still in the land again rebelled against Roman rule (as in 70 C.E.) in 135 C.E., in what is known as the Bar Kochba rebellion. Nor was that the last time! There was another Jewish rebellion against Rome in 351-352 C.E. This was in particular directed against the rule of Constantius Gallus, brother-in-law of Emperor Constantius II and Caesar of the East. In 614, the Jews of Palestine and of the Diaspora allied with Persia against the Byzantines who had previously occupied the Land. The Jews supplied 20,000 soldiers, Jewish wealth from the Land helped to fund the project, and in exchange for their cooperation, a Jewish governor was appointed over the now liberated Jerusalem. Indeed, sacrifice was resumed on the Temple Mount in this period! So the Jews were not gone yet! Returning then to a comparison between Spain and the Jewish people of Palestine, it took Spain eight centuries to regain sovereignty from the Arab invaders, and the Jews twelve centuries. The Spanish means was fire and blood, while The Jews sought to return peaceably, reclaiming the land, purchasing their own land from absentee Arab landlords in Cairo and Damascus. The land which the the Spaniards regained had been developed by the Arabs who had occupied it: the land which the Jews regained had lain fallow. What Spain and Israel had in common was the continued existence of a people whose country had been conquered who had never given up their rights to their land, with both the Spaniards and the Jews having persistent aspirations that their people would eventually be restored to their natural homeland. Many today complain that the State of Israel was a new invention involving the usurping of Arab rights and land in order for the West to assuage their consciences after the suffering of the Jews during the Holocaust. The facts speak otherwise, The rhythm of exile and return had been long established for many centuries prior to the Holocaust, which served as a final impetus but certainly not and never the sole impetus for Jewish return. On the contrary. We believed that the British would be faithful to their word. In those days England enjoyed a great reputation among the Jews. But it was precisely because we believed that the project could be carried out that we were all the more opposed to it. For so many centuries the Jewish people had made so many sacrifices for this land, had shed their blood for it, had prayed for a thousand years to return to it, had tied their most intimate hopes to its revival\u2013we considered it inconceivable that we would now betray the generations of Jews who had fought and died for this end. It would have rendered the whole of Jewish history meaningless. We had to oppose it. Yes, it makes me proud to be a Jew. As mentioned earlier, I believe that frequently the victimization narrative being promulgated in the name of the Palestinians is a clever, even cunning, propaganda approach designed to undermine Western support of the State of Israel. In his fine book, A Durable Peace: Israel and Its Place Among the Nations, Benjamin Netanyahu offers and substantiates this analysis. This propagandistic ploy has largely been working, except among those who either bury their heads in biblical sand and are therefore impervious to all contemporary situations and arguments, or those informed souls with the access and the will to discover that the narrative being constructed is in many, although sadly, not all cases, a distorted fantasy. These propagandistic narratives are a kind of rhetorical slight of hand whereby the \"magician\" (that is, the proponent of the constructed narrative) directs your attention where he\/she wants it, while hiding from your view what's really going on. As one minor example, the Security Wall controlling access of Palestians to Israeli locations is presented as an Israeli instrument of victimizing the Palestinians. What is not stated is that the wall was erected in response to weekly, and sometimes daily terrorist bombings in the Jewish state, and that since these security measures were taken, those bombings are virtually extinct. Yet many people don't think of that when they evaluate Israel's policies. It is so easy to manipulate people by hiding context from their view. And this is just one of the devices in the Palestinian propaganda bag of tricks. Rivers of ink could be spilled to deal with this phenomenon, but I will have to limit myself to a few observations. I direct you to to a case in point, a quotation from a 2003 document from the World Alliance of Reformed Churches, titled \"Christian Zionism Distorts Faith and Imperils Peace,\" which touches notes found throughout treatments which stigmatize Christian Zionists and Christian Zionism. Read these excerpts slowly, paying special attention to how the author, Wes Granberg-Michaelson, portrays Christian Zionists and what he implies about them. This is like detecting a magician's trick by doggedly watching his\/her hands. Look! We are here \u2013 in Beirut, Cairo, Damascus \u2013 to listen and to learn. In our listening thus far, already we have heard of a new peril that travels from some Christians in the west to this land \u2013 what might be called \"evangelical Zionism.\" This is the belief, held by a group of Christians especially in North America, that the modern state of Israel, including its territorial ambitions, has a direct biblical mandate providing a justification for its political and military actions. This is an horrific straw man argument. Christian Zionism predates the founding of the modern State of Israel by over 100 years, and its convictions are separate from opinions about military action. A few personalities in North America \u2013 such as Jerry Falwell, Pat Robertson and Franklin Graham, have made statements about such beliefs, and also about the nature of Islam, that have attracted wide attention. You need to hear what we, and millions of other Christians in the United States, think about these perspectives. First, understand, please, that proponents of \"evangelical Zionism\" are the extremists. And like extremists everywhere, they attract media attention. I would guess \u2013 and this is only a guess \u2013 that four out of five Americans would regard the statements of such personalities as ill-informed, ill-advised, and irresponsible. Within American political and religious life, such figures and views are regarded as voices on the fringe, on the \"far right\". But from what we have heard thus far in our time with you and with the churches in these lands, it would seem that many believe such voices speak for all US Christians. Nothing could be further from the truth. This is a classic ad hominem argument. It is one of the standard ploys of the Anti-Christian Zionist crowd, linking Christian Zionism to stigmatized and unattractive figures, such as Jerry Falwell, Pat Robertson, John Hagee, Jerry Jenkins of the Left Behind series, and Hal Lindsey, so that Christians, especially of the mainline churches, will avoid the theological position because they do not also want to be labeled strange, fringe, ill-advised, irresponsible, Islamophobic and extremist. This is a deplorable form of argument. Notice what is entirely lacking here is any engagement with the biblical texts upon which people base their views. Evangelical churches in the United States are often vibrant and growing. But they include a wide diversity. Only a portion are influenced by those with a right-wing political agenda, such as Jerry Falwell and Pat Robertson. The majority, while generally conservative in their views, are more moderate, and reject political extremism. And a smaller but growing number of evangelicals have a more progressive outlook, believing that the Bible calls us clearly to address the needs of the poor, the marginalized, and to seek peace and reconciliation \u2013 all essential to being faithful disciples of Jesus. (Found online August 31, 2012 here). Don't miss how strongly he insinuates that Christian Zionists neglect addressing the needs of the poor, the marginalized, substituting preoccupation with an eschatological calendar and land conquest for seeking peace and reconciliation. What nasty, biased rhetoric! And utterly untrue as a generalization about Christian Zionists! Many British political figures also rang in on these matters, a century or more before the Jewish state came to be. Lord Shaftesbury, who also fought against slavery and for the reform of child labor laws, wrote in 1838 that he was \"anxious about the hopes and destinies of the Jewish people. Everything [is] ripe for their return to Palestine. . . . the inherent vitality of the Hebrew race reasserts itself with amazing persistence . . . but the great revival can take place only in the Holy Land.\" Another Christian Zionist. But indifferent to the plight of the poor and suffering? Hardly! A disciple of Pat Robertson and Jerry Falwell? Impossible! The reality of Christian Zionism does a better job matching the biblical text than it does the propaganda of its opponents. Lord Shaftesbury was the premier social reformer of his generation. A superb new book about him and others of the pre-Herzl Christian Zionists may be found here. Lord Lindsay wrote in 1847, hoping that the Jews \"may once again take possession of their native land.\" And many other political figures, on both sides of the Atlantic, expressed similar sentiments on the basis of the biblical identity and rights of the Jewish people. Notice, this was written sixty years prior to the first Zionist Congress, and one hundred years prior to the founding of the State. This is not trendy theological kitchiness: this is conviction based on some familiarity with history and tbe biblical text. Again, there were many more figures whom space forbids our examining in detail, and Netanyahu names some of them. Included among them were William McKinley, Theodore Roosevelt, and William Howard Taft\u2013none of them flighty, fringe, ill-advised, irresponsible, Islamophobic extremists. Not only political figures, but religious figures as well agitated for a Jewish return to Zion prior to the founding of the Modern Jewish State. Netanyahu names a few of them, minor and major. Admit there still exists in the breast of every Jew an unconquerable desire to inhabit the land which was given to their Fathers; a desire, which even a conversion to Christianity does not eradicate. . . . Were the Ottoman occupation of Palestine to vanish, nothing but a miracle would prevent their [the Jews] immediate return. How did he know this? From his reading of Scripture. It would be nearly 100 years before the Ottoman Empire fell, and the 1917 discussions of its disposition led directly to the Balfour Declaration which was to smooth the way for the inevitability Parsons foresaw a century before. And there are many others, not wild eye fanatics, nor military saber rattlers, nor indifferent to the plight of suffering people, who likewise longed for the day of Israel's return. In the prophecy of Ezekiel we have, in the vision of he valley of dry bones and its interpretation, a very full account of the final restoration of Israel. According to the representations of that vision, the restoration is to take place in successive and perfectly distinct stages. Thus, while the prophet saw that before the giving of life to the dry bones which symbolized the house of Israel, before even the clothing of them with flesh and sinews and skin there was first of all, 'a noise and a shaking, and bone came to bone, each bone to his fellow.' That is, he saw, in the first place, a preliminary organization, the necessary antecedent to all that followed. If this feature of the vision means anything, it would seem that it can mean nothing else than this: that a tendency to external organization in the scattered nation, was to be looked for, antecedent and preparatory to their actual reinstatement in their land, and their conversion to God by the power of the Spirit of life. Something of this kind, therefore, according to the prophet, was to be expected as one of the initial stages of the restoration process. [Kellogg, Samuel Henry. The Jews, or Prediction and Fulfillment: an Argument for the Times. Anson D.F. Randolph and Company, 1883]. The facts are, that the founding of the Modern State followed precisely the pattern Kellogg discerned in the prophecies of Ezekiel! And this man was another Christian Zionist whose life of service to the poor in India (on three separate tours of duty, on third of which he died at the age of sixty), underscores the falsity of the stigmatizing labels laid nowadays on Christian Zionists. He was the author of a well known Grammar of the Hindi Language (2nd ed., 1893), of a still well-regarded commentary on Leviticus, and other works as well. No lightweight! Perhaps the most famous of the American restorationists, who foresaw and sought to expedite the return of the Jews to the Land, was William Eugene Blackstone, a fully remarkable man (October 6, 1841 \u2013 November 7, 1935) an American evangelist and Christian Zionist and author of the proto-Zionist Blackstone Memorial of 1891. But before then , he wrote (in 1878) the Premillennial popular text Jesus is Coming. This book sold multi-millions of copies worldwide and was translated into 48 languages. He initially focused on the Restoration of the Jews to the Holy Land as a prelude to their conversion to Christianity, out of a pious wish to hasten the coming of the Messiah; but he increasingly became concerned with the deadly, Russian, government-instigated pogroms and believed that it was necessary to create a Jewish homeland in Palestine. He was, furthermore, persuaded that neither the European nations nor the United States would accept as many Jews as needed to escape from Europe. This was another prophetic man who, like Herzl, saw far in advance where matters were heading for the Jews of Europe. I direct you to that Wikipedia article that you might read about this remarkable man, whom we might well call \"The Christian Herzl.\" See the article here. I direct you also to Netanyahu's book, A Durable Peace: Israel and Its Place Among the Nations, which, on this subject as others has much to teach us that blows away the smoke blown into our eyes by modern propagandistic rhetoric and theological politics. I have already shared with all of you how I feel obliged at this time in my life and in the flow of current events to do some intensive study on the situation in the Middle East, especially related to the bad press Israel has been getting for quite some time. Currently I am reading Benjamin Netanyahu's A Durable Peace: Israel and Its Place Among the Nations and finding it a very good read. In the next few blog posts you'll be reading some of his best ideas. In preparation, let's get some things straight. I don't believe Israel is perfect, and neither do any Israelis I know! But let's keep our perspective here. Which of us would prefer to be a Jew in Syria, Saudi Arabia, or Jordan over being an Arab in Israel? Very few I would guess, if any at all! Yet Israel is routinely positioned as the oppressive force in the area. This positioning is no accident. It is the consequence of a long and cunning propaganda campaign. I'll show why that's so in one or more of these posts. In addition, I don't believe that anything entitles the Jewish State to deal oppressively and inhumanely with any people in their midst, certainly including the Palestinians. But it is a demonstrable fact that the judiciary in Israel holds their citizens and soldiery accountable for misbehavior toward Arabs to a degree impossible to find in analogous circumstances in the Arab world. Name an Arab state in the region whose army or citizenry will face judicial wrath for the abuse of Jewish citizens. You won't find any. I trace Israel's transformation from the status of underdog to that of oppressor to successful propaganda techniques by Palestinian partisans seeking to discredit and eventually destroy the Jewish State. Too many in the West and in the Church have drunk this particular Kool Aid. Netanyahu agrees, and as we sketch the argument of his book and others to be considered here, you will discover why. Today, we begin with his Chapter One, \"The Rise of Zionism.\" It is here that we are introduced to Theodor Herzl (1860-1904), an assimilated Hungarian Jewish journalist, born in Budapest, raised in Vienna, who worked in Paris, and was without doubt God's instrument of destiny. Six aspects of Herzl's character stood out for me as Netanyahu portrayed him. First, Herzl was prophetic. He saw the handwriting on the wall before most were alert enough to do so. His prophetic vision at the turn of the century had three components. The Jews in Europe were in danger due to the rise of anti-Semitism. Although some doubt its impact on him, commonly his awareness of this danger is attributed to his observing how the French responded to the trial of Alfred Dreyfus who was was arrested for treason on 15 October 1894. On 5 January 1895, Dreyfus was summarily convicted in a secret court martial, publicly stripped of his army rank, and sentenced to life imprisonment on Devil's Island in French Guiana. But he had been frame. Still Herzl saw the import of the the avid anti-Semitic rhetoric stirred up by the Dreyfus affair. Europe, even sophisticated France, was not a safe place for Jews. He also had prophetic insight that this kind of turmoil would drive many Jews and Jewish intellectuals to Communism, and that this development would eventually be catastrophic for Europe and for the Jews. Hence, he saw the urgency of forming a Jewish State where Jews could gather safely, develop their communal identity, and defend themselves from harm. Second, not only was Herzl prophetic, he was practical. He not only saw the handwriting on the wall; he also saw what needed to be done. And beyond that, he saw the steps that needed to be taken to accomplish the ends he advocated. This is a remarkable confluence of skills in one man, but Herzl, the secularized Jew, was God's man of destiny. Those who want to discredit Zionism as purely a political movement with nothing of God about it evidence a defective knowledge of Scripture. God routinely accomplishes his ends through events easily dismissed as \"secular.\" Perhaps this is one reason the Book of Esther includes no mention of God, even though His fingerprints are found throughout. Also, who can deny the Edicts of Restoration promulgated by Cyrus the Great whereby the Jews returned from the Babylonian Captivity were an act of God, despite their entirely secular pedigree? Clearly the Bible recognizes no division between sacred and secular when matters of Divine Providence are in view. Truly, \"the Most High rules the kingdom of men and gives it to whom he will\" (Daniel 4:25) and by whatever means He chooses. Third, Herzl's success was in part due to how the Enlightenment had prepared the philosophical climate of the times to value the natural rights and liberties of individuals and nations. This made it far easier to advocate for the propriety of the Jews having their own Land. Fourth, Herzl gathered influential partners. He knew that in order to have impact, he needed highly influential, high profile associates. The first whom he sought out was Max Nordau, an influential Jewish author-journalist, like Herzl, Hungarian, assimilated, and living in Paris as a journalist with the Vienna Neue Freie Press. Although others, thinking Herzl's burgeoning views to be extreme, imagined Nordau would dismiss them, they were wrong. He fully concurred with Herzl's vision, and joined forces with him, eventually becoming co-founder of the World Zionist Organization together with Herzl, and president or vice president of several Zionist congresses. Herzl also won the support of popular British Jewish author, Israel Zangwill, whose added clout gave needed credibility to Herzl's program for change. Fifth, Herzl had precursors, and all of us would do well to become acquainted with these simlarly prophetic, but largely unheralded figures. Simply check Wikipedia as a place to start and learn of Rabbi Yehuda Alkalai of Serbia, who advocated for a Return to Zion in the 1840's, Rabbi Tzvi Hirsch Kalischer of Prussia, who flourished in the 1860's, Moses Hess, who was also the teacher of Karl Marx, Moshe Leib Lilienblum opf Kovno, who was aroused by the anti-Jewish riots of 1880 and 1881 to become conscious of the unsafe position of the Jews \"in exile.\" He wrote of his apprehensions in an article in 1881, pointing to the reestablishment of the Jews in Palestine as the only solution of the Jewish question. In 1883 a committee was organized at Odessa for the colonization of Palestine, Lilienblum serving as \u1e63ecretary and Dr. Leon Pinsker. With the Hibbat Zion conference in Katowice, in which Lilienblum took an earnest and energetic part as secretary, representatives of European Jewry met and discussed the first plans for colonization in Palestine, laying a foundation stone was laid for the Zionist movement. And by the way, Katowice was later to become the birthplace of Pope John Paul II. We already mentioned Leon Pinsker, born in Tomasz\u00f3w Lubelski, Kingdom of Poland, Russian Empire \u2013 1891, died 1891 in Odessa. Pinsker was a physician, visionary and and the founder and leader of the Hovevei Zion, also known as Hibbat Zion (Hebrew: \u05d7\u05d9\u05d1\u05ea \u05e6\u05d9\u05d5\u05df\u200e, Lovers of Zion) movement. In his early years, Pinsker favored the assimilation path and was one of the founders of a Russian language Jewish weekly, but the Odessa pogrom of 1871, and a more extensive wave of anti-Jewish hostilities, some allegedly state-sponsored, from 1891 to 1894 radicalized him so that he no longer believed that mere humanism and enlightenment would defeat antisemitism. In 1884, he organized an international conference of Hibbat Zion in Katowice (Upper Silesia, then part of the Kingdom of Prussia). He wrote a pamphlet, Auto-Emancipation urging the Jewish people to strive for independence and national consciousness. He spoke of Judeophobia, convinced that this pathological, irrational phobia was behind the tragic Jewish diaspora experience. As an antidote, he called for the establishment of a Jewish National Homeland, either in Palestine or elsewhere, and came to agree with Lilienblum that Jew-hatred was rooted in the status of Jews as foreigners everywhere except their original homeland, the Land of Israel. He became one of the founders and a chairman of the Hovevei Zion movement, with the backing of Baron Edmond James de Rothschild. His Auto-Emancipation anticipated some of the parallel thoughts Herzl. All these and more were great men ahead of their time who deserve to be remembered. I urge you all to take a few minutes to research each, and thereby to become not only informed, but also ennobled. March 10, 1896, Herzl is visited by Reverend William Hechler, the Anglican minister for the British Embassy. Hechler had read Herzl's Der Judenstaat [The Jewish State]. The meeting would be central to the eventual legitimization of Herzl and Zionism. Herzl later wrote in his diary \"Next we came to the heart of the business. I said to him: (Theodor Herzl to Rev. William Hechler) I must put myself into direct and publicly known relations with a responsible or non responsible ruler \u2013 that is, with a minister of state or a prince. Then the Jews will believe in me and follow me. The most suitable personage would be the German Kaiser.\" Hechler arranged an extended audience with Frederick I, Grand Duke of Baden, April, 1896. The Grand Duke was the uncle of Kaiser Wilhelm II of Germany. Through the efforts of Hechler and the Grand Duke, Herzl publicly met the Kaiser in 1898. The meeting significantly advanced Herzl's and Zionism legitimacy in Jewish and world opinion. What ambition! What vision! What political savvy! Netanyahu says that Herzl met with the Kaiser no less than three times by October, 1898, a year after the First Zionist Congress. Quite an accomplishment for a Jewish journalist with a passion to rearrange the world! And Herzl accomplished all of his great work in eight short years, from the age of 36 to 44, when he died a premature death. Honor such men! Does Scripture Provide Precedent and Guidelines For Israel and Other Peoples in the Region to Live in Peace? This is another foundational study for understanding what the Bible teaches concerning the Jewish people and the Land of Israel. I did these studies about ten years ago to answer some questions for my own benefit. Both those who agree and who disagree with the premise that today's Jewish people have a divine mandate to dwell in the Land of their ancestors need to come to terms with this data. This study presents certain principles of biblical geo-political philosophy, and was first posted on this blog May 23, 2011. It being reposted now because of its relevance to our current series. Enjoy! Foundational texts: These are texts which later texts rely upon or to which they refer regarding the question under consideration. In this instance we should remain conscious of the fact that there were certain lands that HaShem gave to the children of Israel, and other lands around them that they were forbidden to touch. Of course, Genesis 15 and the very many texts similar to it is instructive, because there HaShem unashamedly states that the lands he is going to give to the children of Israel formerly were inhabited by others. In addition, ultimately it is HaShem who is the owner of these lands, and those who inhabit them do so as tenants [Leviticus 25:23]. This of course is foundational to our"} +{"id":"RedPajamaC4.0019","text":"Welcome Mr Little welcomed members and visitors to this first ordinary meeting of the OGC 2016\/17 session. Fire drill procedures and housekeeping rules were explained and all mobile phones were requested to be silent or off. Mr Little advised that if we were experiencing adverse weather on OGC Ordinary Meeting dates to check with Adelaides on 0141 248 4970. Should the Directors decide to stand down a meeting, Adelaides will be informed and the information will also be posted on Facebook and the Club's Website. Apologies: There were apologies from Joyce McNae, Petrina Cairns and Aileen Kelly. Minutes: At this point we normally would have the Minutes approved from last April's Ordinary Meeting. Due to external circumstances these Minutes will be made available at a later date during the 2016\/17 Session. \"The first was on Thursday May 19th when we had an evening visit to Rouken Glen Park by an Ex Glasgow Corporation double decker bus. Due to a very wet evening, which only let up for a brief time, the majority of us stayed on the bus at Davieland Road and we enjoyed a brief talk by one of the Park Rangers who had kindly agreed to speak to us. Refreshments were provided by Joyce and were very much appreciated\". \"The annual outing of the Club was on June 11th, to Culzean Castle. Again, a very wet day was spent wandering round the grounds and touring the Castle. A stop at Ayr on the way home provided us with time for a meal or snack, depending on your appetite and we were back at Cochrane Street before 8.30pm\". \"On the 11th August, I visited the temporary premises of the Glasgow School of Art which is located in the former Whisky Bond at Dawson Road, Port Dundas. The Art School archives contain many photographs and documents on the architecture of the City. A special display was available on the work of George and Cordelia Oliver who were prolific photographers and painters in the 20th Century, especially Glasgow Street scenes.George also illustrated motorcars for publications etc, and produced art work for the Scottish Omnibuses Group Companies\". \"These archives are available to view by contacting the Glasgow School of Art and arranging an appointment. Jocelyn Grant is the contact and the phone number is 0141 566 1418 or via the Glasgow School of Art Website\". \"Doors Open Day Festival in Glasgow starts on Monday 12th and runs until Sunday 18th September. There are a few booklets available at the desk for anyone who wants to browse through the numerous venues. Some of these places are by booking only and by past experience, places go very quickly\". Secretary's Report: Mr Little asked if members had looked through the slides of exhibitions and forthcoming events on the screen that Club Secretary, Joyce McNae had prepared. OGC new website is now up and running, responding to mobile and tablet devices. Please have a look. Mr Little informed us that tonight's talk was on Mary Barbour, and, if like him, you have never heard of her except in passing that it would be a most interesting talk. He introduced Dr Catriona Burness, historian and researcher and Maria Fyfe, Chair of The Remember Mary Barbour Association\". Dr Catriona Burness told us how delighted she was to be involved with the Remember Mary Barbour Association. We were told that Mary Rough (Barbour) was born 20th February 1875 in the weaving village of Kilbarchan, Renfrewshire. The third of seven children and died 2nd April 1958, aged 83 at Southern General Hospital. 28th August 1896, Mary Rough married David Barbour at Elderslie and lived for a short time in Dumbarton. On 17th October 1897 their first child, David, born a few months after their marriage, died of meningitis at the age of 10 months. When looking through old records we noticed that three children in the same street had also died of meningitis. This loss is likely to have shaped her deep interest in health and housing issues. In 1901 the Barbour family moved to Govan and two more sons are born. \"She first became politically active after joining and becoming an active member of the Kinning Park Co-operative Guild (University for working class women). Her political activism began in earnest during the Glasgow rent strike of 1915, when she actively organised tenant committees and eviction resistance. Willie Gallagher dubbed the rent strikers \"Mrs Barbour's Army\". The government of the day could not withstand the pressure and by the end of the 1915 the Rent Restriction Act was in place. The rent strike's place in history was assured\". \"In 1920 she stood as the Labour candidate for Fairfield ward in Govan, and was elected to Glasgow Town Council, becoming one of the city's first woman councillors. Until her retirement from the Council in 1931, she worked relentlessly on behalf of the working class of her constituency, serving on numerous committees covering the provision of health and welfare services, and led campaigns for free school milk, children's play-parks, municipal wash-houses and Glasgow's first family planning clinic. From 1924-27 she served as Glasgow Corporation's first woman Bailie and was appointed as one of the first woman magistrates in Glasgow\". Maria Fyfe tells us that it wouldn't have been that unusual three years ago to never have heard of Mary Barbour. Maria used to be a member of a socialist choir, one of it's songs was \"Mary Barbour's Army\". It sings about the rent strike but doesn't talk about her life afterwards. This intrigued me as I was familiar with others who were leading social reformers but not Mary, I wanted to find out more. I was in the Pearce Institute when we decided to set up the Mary Barbour Association. \"Direct and forthright, Mary Barbour was a strong, energetic and convincing campaigner who helped to make the world a different place from the one that was in war-torn crisis in 1915. We should remember and commemorate her and the Remember Mary Barbour Campaign aims to raise a statue in her memory\". 2015 and we were looking for sculptors to come forward with their ideas, a shortlist of between four and six being sculpted into a maquette. We had 30 applications, many of them awful! We got it down to 6, then 5 because one of the statues would be out with our budget. The Mary Barbour Five shortlisted sculptors were Andrew Brown, Mark Longworth, Kenny MacKay, Roddy McDowall and Morag McLean. We were looking for public opinion so the maquettes were made available for the public to view on-line and on tour. They could be seen at Elderpark Library, Riverside Museum, Fairfield Heritage Centre, Wheatley House and the Scottish Parliament. The selected sculptor, Andrew Brown was announced from the stage at the Glasgow Gala Concert in February this year. Andrew is about to start on the full scale statue which will be situated at Govan Cross. We are hoping that it will be revealed at International Women's Day on 8th March 2017. Maria thanked us for listening to herself and Catriona and we were invited to ask them any questions we may have. Q How many children did Mary Barbour have, was it just the 2 boys ? A Three boys, two surviving and one dying at ten months. Q Does Mary Barbour have any descendants ? A There are no living descendants, the line died out about ten years ago. I have, however had contact from the other side, the Rough family, some of whom had moved down to Wales. Q Maria and Catriona, could you please tell us where you can donate money to the Mary Barbour Association ? Q Where was Mary residing when she died ? A Mary died in hospital with her husband dying a few months before her. She was still staying in Govan. Q Where is Mary buried ? A Mary's funeral was at Craigton Crematorium in Govan. Q You are both obviously impressed with Mary Barbour but how was she thought of at the time by her neighbours, locals etc. Was she well thought of or is it only retrospectively that she's well thought of ? A Her obituary mentions \"women voluntarily took on hand to do the housework of Mrs Barbour to enable her to devote herself fully to the service of the people\", enabling her to get on with her role as Councillor. That to me speaks for itself. Q Thanks very much for your very informative talk tonight. My wife and I have just put in an offer for a house in Kilbarchan so I hope this is a good omen. Mr Little said that Mary Barbour was a lady very much of her time and the future whom we would welcome with open arms and a cup of tea were she to come in. Stuart introduced OGC Director, Anne White to give the vote of thanks. Anne said, \"I'd like to thank Maria and Catriona for their talk. I've known about Mary for 50 years as I've lived in Govan and I work at Govan Old Parish Church.My father told me about Mary Barbour and I've read about Mary Barbour so I've loved tonight's talk. You brought her to life and it's been like watching a documentary. Thank you so much\". Mr Little apologised for not introducing OGC Director, Brian Henderson earlier in the evening and invited him on to stage to speak to the members. \"Good evening Ladies and Gents, for those of you who don't know me, my name is Brian Henderson and I am a past president of the club. This evening marks the 40th Anniversary on the 9th September of my first Old Glasgow Club talk. I'd like to pay tribute to the late Mr Bill Gallone who was Treasurer of the club when I joined.Bill and I worked very closely in the 70s and into the 80s, when I was Secretary and he was Treasurer. I owe him a great deal of gratitude in terms of my self development.He died January 1986, in his 80th year, his 30th Anniversary was January past. He is greatly missed\". Mr Little thanked Brian and reminded members that hadn't already paid that subscriptions are due for the 2016\/17 session. Next Directors Meeting - October 6th, 6.15pm at Glasgow Unitarian Church, 72 Berkley Street. Next Ordinary Meeting - October 13th, 7.00pm for 7.30pm at Adelaides, Bath Street. Mr Little welcomed members and visitors to the October meeting. there would be a post on the Old Glasgow Club website and Facebook page. There were apologies from Margaret Thom, Anne White, Maureen McRobb, Eileen Campbell and Petrina Cairns. seconded by ?? There were no amendments or matters arising. President's Report : No President's report this evening. OGC new website is now up and running for those of you that haven't seen it. \"It's designed to be mobile friendly. new site, meantime if you need anything from the old site just click the 'link to the old website' button. 'Alphonse Mucha IN QUEST OF BEAUTY' runs from 8th October - 19th February 2017 at Kelvingrove. per cent of the 9,000 strong collection being redisplayed, with basement stores open to the public for the first time. Visitors will also benefit from a new learning space and improved cafe and retail opportunities. 150 bedrooms, a ground floor restaurant and retail space, as well as a publicly accessible rooftop bar. restoration project costing \u00a33.4 million has just been completed on the bridge by Glasgow City Council. Samson, let me introduce him, he'd like to say a few words to us. around 10.30am then please pop in and see us at The Bridgeton Library, Olympia Building. is, it's between Rutherglen and Dalmarnock, near the bridge over the Clyde. sculpture, print, video and public art. inhabitants were deer, badgers and otters. has been fenced off and left in it's natural state as a safe haven for the animals. the outline of a rabbit. cowp for the city. The dump had been used for the disposal of the old Gorbals that was demolished in the 1960s. local naturalists and brave dog walkers. soapstone and getting engaged with the process and the story behind the process. Scotland to progress with a permanent public art project for the loop called 'The Cunningar Stones'. letters sometimes being bunched together when running out of space. The finished stones were returned to the 'Loop' one year later and we are shown lots of informative photographs. fenced to protect the 20,000 new trees, 30,000 shrubs, 40,000 planted bulbs from the deer. Q Hello, I am interested in the geological side of things, the fossils. You mentioned sandstone ? to represent the salmon in the River Clyde. Q Are the pumps Samson and Goliath in a museum ? were the largest and most powerful. Q The photograph we saw of a castle, what castle is it? A The castle in the photograph is Farme Castle. Sadly, it was demolished in the 1960s. Q Do you have any idea the size of the area, as in, how long it would take you to walk round ? round too. It takes around an hour if you follow the paths. there and had been using it. As what, I don't know but I did find lots of empty cans there, like Tennents !! Q Can I ask you, outwith the Cunningar Loop, what is the oldest and most valuable piece of red sandstone ? stands on. The oldest red sandstone in Scotland would maybe have come from the Dumfries area. Q Back to the Cunningar Loop, is it right down to the river ? river. From here you can see on the opposite side of the river the Clyde Walkway and Cycle Path. why, it's people going to the Cunningar Loop. Obviously it's been a great success\". has now become\". So, a big thank you to James for tonight's wonderful talk. September meeting\". We'd like to offer condolences to his family and friends. Next Directors Meeting - Thursday 3rd November, 6.15pm at Unitarian Church, 72 Berkley Street. Welcome : Mr Little welcomed members and visitors to the November meeting and thanked them for coming out on such a cold night. Fired drill procedures and house keeping rules were explained and all mobile phones were requested to be set to silent or turned off. Mr Little advised that now the weather had changed for the worse, members and visitors should be thinking about contingency plans should there be adverse weather conditions. If you have any doubt about a meeting taking place, please phone Adelaides on 0141 248 4970. Should the Directors decide to stand down a meeting, Adelaides will be informed and there will be posts on the Old Glasgow Club website and Facebook page. Apologies : There were apologies from John McKnight, Sallie Marshall, Alastair Ross, Simon Brown, Alison Sannachan and Petrina Cairns. Minutes: The minutes of the last ordinary meeting, held on 10th November were approved and proposed by Jim Russell and seconded by Cameron Lowe. Amendments and Points Arising: A heartfelt apology from Recording Secretary for the autocorrect misspelling of our recently deceased, loyal member of many years, Jim Rainham. This has now been corrected. Vote of thanks last month was given by Bill Crawford and not Bill Henderson. This also has been corrected. There were no points arising. President's Report: Mr Little tells us that the Steamer, TS Queen Mary has returned to Glasgow for the first time since 1977. She will be wintering at Glasgow Science Centre after being towed from Greenock. There's been a fresh bid to gain listed status for the historic Sir John Maxwell Primary School in the Pollokshaws area. It has been lying empty since 2011. Gaining a listed status would give some degree of security to the future of the building. Let's hope they succeed. Mr Little asked \"hands up who likes porridge\"? We may be ahead of ourselves but the 2017 OGC suggested outing will be to 'The Devils Porridge Museum' at Eastriggs near Gretna. It's a great museum about HM Factory Gretna which provided munitions for troops fighting on the front line. It's a good time to visit, with WW1 exhibition running until 2018. After the museum visit we would be heading to Dumfries for our High Tea \/ early dinner, in a vintage bus that we are hoping will take us there. Secretary's Report: Joyce McNae says \"isn't it nice to be thinking of a Summer outing on a night like this\" and talks us through the slides that have been circulating on the screen prior to tonights talk. As previously mentioned, the new OGC website is up and running. Please have a look if you haven't already done so as we're rather pleased with it. We continually tell you about Glasgow website www.whatsonglasgow.co.uk, but there's also a whatsonrenfrewshire.co.uk, a whatsonlanrkshire.co.uk and even one for whatsoninedinburgh.co.uk. 10.30am and a two minute silence will be observed at 11am. There's also an Armistice service taking place in George Square on Sunday, 13th November. Members of the public wishing to attend should gather in George Square at 10.30am. The two minute silence will be observed at 11am at the cenotaph. 10.00-15.30. Entry is free and all are welcome. Glasgow Christmas Markets are on from 10th November - 22nd December in St Enoch Square and 26th November - 29th December in George Square. The listings for the numerous festive shows, shopping and events information can be found at glasgowloveschristmas.com. As usual, lots going on in and around Glasgow's galleries and museums. 'Burrell at Kelvingrove : Joseph Crawhall' runs until July 2017 and 'Alphonse Mucha : In Quest of Beauty' runs until 19th February, to name two. As always, up to date information on current and upcoming exhibitions and events can be found at gla.ac.uk , www.glasgowlife.org\/uk and peoplemakeglasgow.com . Speaker: Mr Little introduces tonight's speaker, Mr Peter Samson. Peter is going to tell us about \"The History of Watt Brothers\". Peter thanks Stuart for his introduction and tells us that he is a consultant for Watt Brothers and is going to tell us the story of the company from 1800s - 2016. \"My job was to drag Watt Brothers into the 21st Century, with their centenary in 2015 in mind. The store had expanded and there was a need to get a website up and running and have a strong social media presence.\" Apparently at one point there were 40 independent stores in Glasgow, Watt Brothers are the only one remaining in Sauchiehall Street. The store is now on it's fourth generation, Willie Watt MD joined at 15 years old and is now 49. He is the great-grandson of store founder, Allan Watt. In the late 1800's Allan Watt, son of a family of Lanarkshire farmers, started a small drapery shop in Elmbank Street to augment the family's declining income. He specialised in selling ribbons and lace. Willie Watt says that he was apparently frugal (read tight). When Willie's Dad, Allan was getting a penny from is Grandpa Allan, it would be given in a clenched fist! In April, 1915, during the First World War, Watt Brothers becomes a limited company and the business moved into the iconic store on the corner of Sauchiehall Street and Hope Street. It was of an era when department stores were designed as places where customers shopped in an atmosphere of luxury. High fashion was the company's staple product and customers flocked to the store for the latest in everything from lingerie to ball gowns. 1929 and a significant extension, with plans drawn up by architects firm Keppie and Henderson (of Charles Rennie Mackintosh fame). The store now boasts six floors that are primarily packed with fashion. The walnut panelling, magnificent ceilings and shop displays made the store a must-visit place for any fashion forward follower of fashion. 1939 and Watt Brothers founder Allan Watt died suddenly aged 73. His son, William takes over the business. A most difficult time to run a business with the Second World War having an impact on business. Government intervention saw their wool supply company taken over to manufacture for the war cause. 1948, Allan, the current MD's Dad took part in the London Olympics, running in the 400 metres relay. He was described in the press as 'Olympic hope among the nylons'. Allan was a major force in driving the business forward in the 50's, 60's and 70's. 1950's, a new Watt Brothers shop opens in the Glasgow suburb of Clarkston. Meanwhile, the Glasgow store extends its fashion into the bridal wold and a stand alone fashion house, Jean Patou is launched in store. A major fashion show attracts big names from all over Europe, it made big headlines and the company's slogan was changed to \"Famous for Exclusive Fashions\". 1960's and the following decades saw other stores open in Lanark, Ayr, Livingston, Hamilton, Falkirk, Irvine, Robroyston, Clydebank and the latest in Port Glasgow 2016.. The current number of stores is 11, Willie has a target of 16. 1993, current owner, Willie Watt, takes over the role of managing director at the age of 26. In 2006 he became sole owner of Watt Brothers after he bought out his siblings.. He has a new vision, is enormously shy but enormously hands on. Willie was sole buyer for the stores until 18 months ago. He has expanded the stores from purely fashion to offering a more varied and interesting stock of brands at reasonable prices. Brands such as Rieker, Pringle, L'Or\u00e9al, Lindt, Calvin Klein, Glenmuir, Remington, to name a few. 2014, Allan Watt, the third generation owner and father of Willie, the current owner died, aged 92. The newest innovation at Watt Brothers has been the opening of the Willow Tea Rooms on the third floor at Watt Brothers, Sauchiehall Street. Over the years the third floor has been a hairdressers, cookware department and luggage department. Willow Tea Rooms stripped it back, opened up the windows, recreated the Mackintosh tearooms and brought the third floor back to it's former glory. Watt Brothers, a quiet unassuming company, now on social media, has a website, got 11 stores and has a likely turnover of \u00a325,000,000 this year. It's single most bestselling item is wool, the company sells 1 million balls of wool a year. What does the future hold apart from the target of another five stores and a knitting\/crochet club in the tearooms....could it be a 5th generation of Watts in the form of another Willie or a Hannah. Peter thanks members and visitors for listening and invites them to ask questions. Q Is the Willow Tea Room only a temporary thing ? A Don't think so as the Willow Tea Rooms seem happy where they are. Hopefully it will continue for quite some time. Q. How did the partnership with the Willow Tea Rooms with Watt Brothers come around ? A Willie and Anne of the Willow Tea Rooms were introduced to each other by a mutual friend. They had a conversation and so the Willow Tea Rooms at Watt Brothers, Sauchiehall Street came to be. Q The wool answered my first question of what is the shops best selling item. Can you tell me what the second bestselling item is ? A Perhaps knitting needles ! Kidding aside, I'm not really sure but I would think that it would be a beauty product. We have a huge demographic of appeal and shopper range from approx 14-90 years old. Of a Saturday morning you can see a lot of teenagers buying brand name beauty products at value prices. Clothing is still also a very important seller, golf-wear, knitwear etc. Our most requested product online is slippers, but they are really only stocked October - December. What's also interesting about the wool , we run Facebook competitions which I was a bit doubtful about at first. I posted one for a \u00a350 wool voucher and the response was incredible. Q You said it was father, son, grandson, great-grandson. Were there other family members involved for it to be called Watt Brothers. A I'm not sure about that, but I think there must have been brothers about at some point to warrant the name. What I do know is that Willie bought out family members, a sister being one and became sole owner in 2006. Q Did I read somewhere that the Company own the premises in the City Centre ? A Yes, they do, and I think that has been a significant factor in being able to run and expand the business for all these years. Q Have Watt Brothers benefited from the sad demise of B.H.S ? A It's difficult to tell but I'm sure they probably have to some extent. Q What happened to all the big lumps of beautiful furniture that was in the store as fixtures and fittings. A There's a huge labyrinth of rooms behind the scene that have an old safe, large tables and big, old pieces of furniture. That could possibly be them. Q When they get to the 16th store do you think they would go as far east as Edinburgh ? A Willie is good at choosing premises and if the correct premises came up then, who knows. Both Edinburgh and Stirling have been talked about. Q Was the building built for the 1915 opening or was it an existing building ? A Good question, I'd need to find out about that. I do know that Sir Hugh Fraser tried to get Willie's father, Allan to come and be chief buyer for House of Fraser. Allan seriously considered it but when it became apparent that Sir Hugh wanted the Watt Brothers Sauchiehall Street store it was not negotiable. The family hold the store dear. It's quite ironic that House of Fraser is now owned by a Chinese company and that Watt Brothers is still family owned. Q Why use Facebook over other mediums ? A Facebook has a far reaching circulation and for a fee you can reach a large amount of people in your area. For instance, a recent Facebook competition we had reached 230,000 people. A local newspaper like the Daily Record has a reach of approximately 160,000 people. Q. Why, and what do you do on social media ? A It's not a heavy sell thing that we do on Facebook, we use it more as a social platform. For instance, we'd post about this talk I'm giving here tonight, stories about people that work for the store, the development of the Willow Tearooms. Social media is a pretty hungry beast, constantly needing updating with store news and new information. Q This is more of an observation that a question. Stores like Watt Brothers used to have chairs dotted about for the elderly or weary shopper. Stores don't have them anymore ! A Yes, things have certainly changed. Patricia Fraser's Mum (daughter of Sir Hugh) talks about the days when there were no gowns out on display in Watt Brothers. You spoke to an assistant, they assessed you and they would decide what they were bringing out for you to try on. Q What type of techniques do you employ to turn a question into a sale. To make people make that decision now ? A Willie goes online to check the pricing, he's very aware that people use search engines to check the cost in several places,p so the pricing is always competitive. Watt Brothers knows that online retail appeals to people, but there are still lots of people like myself who like to go into a shop to browse and compare. You only have to be in town around 3pm on a holiday Monday or Saturday afternoon to see that town is buzzing. It's a social thing, a coffee, a bite to eat and a shop. A Willie focuses on the business and employees. In the Lanark store there are actually third generation employees. Willie is a committed workaholic, you'll not find him on a yacht in the Med, you're more likely to see him at the Wind Farm in East Kilbride. Vote of Thanks: OGC Director, Colin McCormick gives tonight's vote of thanks. \"It is an absolute pleasure to thank Peter for his entertaining and informative talk. I think you can tell the quality of a talk by the amount of questions that are asked, I thought they'd never end ! I worked in a butcher shop and I have a vivid memory of my Gran marching me to Watt Brothers for my Damart thermals. Let me thank Peter in the way we know best, with an OGC membership and a big round of applause\". AOCB: Stuart asks us to spare a thought for those involved in yesterday's Croydon tram disaster which resulted in seven fatalities and at least 50 injured. It is the first tram disaster in the UK since Glasgow, 1959 when the 23 tram ran into a lorry which had been straddling the tram lines, resulting in three deaths and many injured. Stuart wishes us all a safe home and looks forward to seeing us at next months talk, 'Glasgow Womens Library - The Making of a National Treasure' by Adele Patrick. Next Ordinary Meeting - Thursday 8th December. Doors open 7.00pm for 7.30pm talk at Adelaides, Bath Street. Welcome : Mr Little welcomed members and our four visitors along to the last meeting of 2016. The fire drill procedure and house keeping rules were explained and all mobile phones were requested to be turned off or to be on silent. Mr Little advised that now we were coming into Winter, members and visitors should be thinking about contingency plans should there be adverse weather conditions. If you have any doubt about a meeting taking place, please phone Adelaides on 0141 248 4970. Should the Directors decide to stand down a meeting, Adelaides will be informed and there will be posts on the Old Glasgow Club website and Facebook page. Apologies : There were apologies from Isabel Haddow, Dorothy Blair, Maureen McRobb, Ronnie Knox, Sallie Marshall and Cath Wallach. Minutes : There was one amendment to the November minutes. It should have read \"The minutes of the last ordinary meeting, held on the 13th October were approved and proposed by Jim Russell and seconded by Cameron Lowe\" and not \"10th November\" as written. The minutes of the last ordinary meeting, held on 10th November were proposed by Sam Gordon and seconded by Brian Henderson. Secretary's Report : President, Stuart Little read out OGC Secretary, Joyce McNae's report. A reminder was given to visit the OGC's new website, which responds to your mobile device and is up and running, thanks to the technical wizard at the back of the room. Suggested destination for the 2017 club annual Summer outing is to 'The Devils Porridge Museum' at Eastriggs, near Gretna and then on to Dumfries for our High Tea\/ early Dinner. It's a great museum about HM Factory Gretna which provided munitions for troops fighting on the front line and it's a good time to visit, with WW1 exhibition running until 2018. OGC merchandise desk was at the back of the room tonight, being manned by club director Anne White. There's information and stocking fillers available from \u00a31. 'Burrell at Kelvingrove : Joseph Crawhall' runs until July 2017 and 'Alphonse Mucha : In Quest of Beauty' runs until 19th February. Up-to-date information on current and upcoming events can be found at gla.ac.uk, www.glasgowlife.org\/uk and peoplemakeglasgow.com. Glasgow Christmas markets are running until 22nd December at St Enoch Square and 29th December at George Square. Speaker: Mr Little told us that it gave him great pleasure to introduce Adele Patrick, 2015s Evening Times Scotswoman of the Year to talk to us about \"Glasgow Women's Library : the Making of a National Treasure\". Adele is Lifelong Learning and Creative Development Manager at the library. Stuart wondered if appropriate titles in the women's library could be '50 Shades of Lipstick', 'Olivia Twist', 'Davina Copperfield' or 'Harriet Potter'. Adele told us that she is absolutely delighted to be here and so thankful for everyone coming along tonight. Adele, originally from Yorkshire, came to Glasgow as a 17 year old student, about 35 years ago to study Textiles at Glasgow School of Art. Although it was a wonderful city that gave her the warmest of welcomes, it was a very different city to today's city, it was a very masculine city. \"There were things that were triggers for me joining the GWL - Mid 1980's and thinking how can we represent Glasgow, present it to the wider world in a positive light. It seemed difficult to believe that Glasgow could be a cultural beacon as the European City of Culture in 1990\". The press had latched onto the visual arts and came up with \"The Glasgow Boys\". We thought that maybe we should start thinking about the girls ! We were totally ambitious, thought we \"Women In Profile\", set up in a little lane in a backstreet at Garnet Hill (a period before internet) would represent Glasgow women. We knew if we didn't do something, the representation of Glasgow 1990, when the city was on a world stage, would be the pale, male version. During 1990 we had visits from specifically women's libraries. Nurnberg Women's Library had up to date technology and encouraged us to have and collect women's books etc, and, because we are twinned with Nuremberg. GWL opened its first premises on 21st September 1991 in Garnethill, having developed from 'Women In Profile'. Our first premises had a fug of roll up cigarettes and dog ! In 1994 GWL moved to 109 Trongate, Glasgow City Centre to accommodate increased collections, learning activities and user numbers. By 2004 an extra floor had to be rented at 109 Trongate to accommodate all the extra events and ongoing projects. 2006 saw relocation to temporary premises at 81 Parnie Street. 2008 and GWL was awarded funding to create an archive room at the Mitchell Library. GWL stayed at the Mitchell Library until we moved into our premises at Bridgeton 3 years ago. City Council and Clyde Gateway. There was a shortfall of funding so GWL came up with the idea of 'Women on the Shelf', for individual donations to allow anyone to honour a woman special to them by dedicating a shelf or Library section in their name. The renovation project has now been completed, with an events venue that can accommodate 100 people, dedicated archive space, a learning space and a mezzanine floor. Nicola Sturgeon relaunched the library in November 2015 and coined the phrase \"Glasgow Women's Library is truly a national treasure\". \"We are not just a library, we are an Accredited Museum and we work with an incredibly diverse group of people. Unlike a lot of libraries and museums, we have risen from grass roots\". \"As well as a lending library, we hold a wonderful treasure trove of historical and contemporary artifacts and archive materials that celebrate the lives, histories and achievements of women. From Suffragette memorabilia and 1930s dress making patterns to rare 1970s Scottish Women's Liberation newsletters, it's all here\". \"Learning is at the heart of what we do: we deliver over 200 innovative events and activities across Scotland every year, from film screenings to guided walks and core programmes including our Adult Literacy and Numeracy and Black and Minority Ethnic Women's projects\". At present there are around 100 volunteer staff (for the first seven years it was all volunteer staff) and 25 staff. \"I do hope that the Women's Library is a place that you will feel comfortable coming to visit, it's like the Old Glasgow Club, we offer tea and cake. If you aren't able to visit but use social media we are on twitter under GWLhearsme. Little did GWL know that their humble grass roots library with unfunded resources and voluntary staff would turn into a unique, well respected, multi-award winning national organisation and the only Accredited Museum dedicated to women's history in the entire UK. Q. Yes, Adele, I think I speak for all of us in saying that was a wonderful and informative talk. Two things, you are the Evening Times Scotswoman of the year award and The Women's Library is successfully up and running and an accredited museum. What would you consider your bigger achievement ? A Thank you for your kind feedback, I feel that I have the best job in the world. I had a moment when there were more materials than would fit back in my old flat and that changed things. I was very pleased when it did. Also, when we were recognised as having a significant collection, that made me enormously proud and also when you get feedback. One that stands out is one woman who started off developing her reading and writing skills which resulted in her giving an address to the First Minister. Q The word recognised \/ accredited, who accredits ? A Museum Galleries Scotland is given the roll from the Scottish Government to give accreditation. I'm learning more about it as I've now joined the board at Museums Galleries Scotland. It's a rigorous process the museums have to go through to fulfil the requirements for the Accreditation Scheme. Q It's quite the very important system of accrediting bodies that give accreditation to engineers etc. It gives confidence when someone\/ someplace have been accredited ? A In the UK there are a few women's libraries, but they are either embedded in academic institutions or the libraries are still very much grass root organisations, so they divide into two types. On our 25th anniversary we had a very decent piece written in the Guardian newspaper about us. When looking through the comments afterwards we noticed comments from the The Women's Library, which is now housed in the London School of Economics. \"Why Glasgow\", and a note saying that we were not the only accredited women's library in the UK. We told them they had lost their accreditation when they merged with the London School of Economics. So, at the moment we are the only accredited women's library in the UK. Q You say you are mainly self funded, where does the money come from ? A Well, the Heritage Walks which we have developed in other parts of Scotland is partially funded by the Scottish Government. Mixing the Colours, our work on women and sectarianism was funded by the Scottish Government and has developed into work against hate crime. Our Adult Literacy and Numeracy Project is funded by local Government to name a few. We also receive grants from Heritage Lottery Fund, Creative Scotland, Museums Galleries Scotland, Glasgow Life, South Lanarkshire Council. When we first started out we felt quite vulnerable as we didn't have funding in place, it's great that we now have an array of different funders for our dedicated projects. Q You've been very much about the women's aspect of women in your library, do you have any men's books ? A Yes, we do, but they are books about women written by men. We unashamedly showcase women. Occasionally we might highlight men. For instance, we have an upcoming event on 27th January 2017 called 'Herland : Burns Night\/ Woolf Supper, because Virginia Woolf and Robert Burns share the same birthday. Vote of Thanks : \"If Adele would allow a male President to give the vote of thanks. We come here every meeting to hear and learn and we have learned a fantastic amount tonight that I didn't know about. Like Haggis going to Russia, about artists and writers in a safe and encouraging environment, to name a few. You've presented it to us in a passionate and exciting way, so in true OGC fashion let's thank Adele.\" AOCB : The annual OGC Christmas raffle numbers were drawn by club Director Niall and prizes were distributed by club Director Colin. Next Ordinary Meeting : Thursday 12th January. 'Ingrid Shearer - Glasgow Markets'. Doors open 7.00pm for 7.30pm at Adelaides, Bath Street. Close : Mr LIttle thanked the Directors who had donated the prizes for tonight's raffle and on behalf of himself and Directors, wished club members and visitors a Merry Christmas and a Happy New Year. Sadly, this meeting was cancelled due to severe weather warnings broadcast and publicised in the few days before the meeting. The directors had to take the decision well in advance and, in the event, the warnings didn't come to fruition and the weather was just ordinary \"west of Scotland, January dreich!\". The good news is that the topic has been rescheduled into the 2017 \/ 2018 syllabus. Welcome: Mr Little welcomed everyone along to the first meeting of 2017 and apologised for the cancelation of the January meeting due to inclement weather. The fire drill procedure and house keeping rules were explained and all mobile phones were requested to be turned off or to be on silent mode. Adelaides on 0141 248 4970. Should the Directors decide to stand down a meeting, Adelaides will be informed and there will be posts on the Old Glasgow Club website and Facebook page. Apologies: There were apologies from Molly Crichton, Colin McCormick and Ian Frame. Minutes: The minutes of the last ordinary meeting, held on 8th December were proposed by Margaret Thom and seconded by Iain Henderson. There were no amendments or matters arising. President's Report: There was no President's report this evening. Secretary's Report: We've had a few new subscribers tonight for the club minutes to be sent electronically via email. Just a reminder if you wish to have them sent to you before the next meeting to give your email address at the sign in desk. If you haven't already done so, please visit the OGC new website. It is up and running and designed to be mobile friendly, available on your phone, tablet, laptop and PC. J.A.S. Memorial Walk, Thursday 18th May: Destination will be confirmed at the next meeting. Tappit Hen Bowling Tournament, Thursday 1st June: this bi-annual event will take place at Kelvingrove Bowling Greens with refreshments (to be confirmed) afterwards. It is free to play on the greens. Names are being taken at the front desk now. You don't have to play and are more than welcome to come along and spectate. Summer Outing to Devil's Porridge Museum, 10th June: The cost of the coach trip and entry to the museum is \u00a321.00 and \u00a320 for concession, respectively. Unfortunately it has not been possible to obtain the use of an older bus for this trip due to a journey of this distance not being suitable for this type of vehicle. We will be stopping in Moffat on the way home. Hopefully we will have a High Tea option available for you by the March meeting. Names are being taken for the trip at the front desk now. Speakers - \"A Night to Remember\" Stuart tells members and visitors that as it is our annual 'members night', it will be a different format to our usual 'ordinary meeting\". Tonight, assorted club members and Directors are going to entertain you on the happenings of 1957 from the comfort of our studio setting on the stage. He invited members that had their backs to the stage to turn their chairs around. Introduction: Club Secretary, Joyce told us \"The year is 1957 and there is quite a change in the air.\" \"The National Health Service is still in its infancy, Queen Elizabeth 2nd is five years into her reign, Harold MacMillan becomes Prime Minister and Buddy Holly recorded \"That'll be the Day\". Closer to home a few babies were born that would have an impact on politics in Scotland. Iain Gray and Johann Lamont of the Scottish Labour Party and Fergus Ewing of the SNP. I mention them in chronological order - not necessarily in preference. Leaving politics aside and moving to football - Gordon Strachan was born in 1957 - in Edinburgh. In fact today is his 60th birthday. Happy birthday Gordy. And it is a 60th Anniversary that gave us the idea for the theme of this evening. 31st August 1957 was the opening night for Scottish Television with a show \"This is Scotland.\" The Club Directors thought this would be a good subject for our Members Evening tonight, entitled \"A Night to Remember.\" John Logie Baird, born in Helensburgh in 1888, attended Glasgow University, was a prominent pioneer of television. In 1927 he transmitted moving pictures from London to the Central Hotel in Glasgow. The home for Scottish Television - STV - was to be the Theatre Royal in Hope Street. So two good Glasgow connections. Naturally there is a massive amount of history linked with Scottish Television and that could have been our entire subject for the evening. But, we thought we would like to highlight some other landmarks of Glasgow in 1957. As such we have contributors to come up to the mic through the evening. All are club members and will be covering transports, the mass radiography campaign, one or two poems and songs. What the Old Glasgow Club was up to in 1957. We have a quiz with prizes. This will take place during the commercial break when refreshments will be served to your table. If you've not already done so, could you make sure you have filled in the refreshments order for each table. Before that we have lots to get through. We have tried to re-create the look of a current magazine programme from STV. September 1957 was the start of the \"One O'clock Gang.\" Described as a show of comedy, music, interviews and information for viewers. It made stars of Larry Marshall, Dorothy Paul, Jimmy Nairn - father of chef Nick - and Charlie Sim. Writing such a show every day meant that the quality was perhaps not always there, but as Larry once declared: \"If you don't like 28 minutes of it, but enjoy 2 minutes of it, then I've done a good job.\" Today if there is a live episode of Casualty, Eastenders or Coronation Street, it is trailed for weeks to build up the anticipation. The One O'Clock Gang was the first daytime variety show of any commercial station in Britain and went out LIVE, running for 1,760 daily programmes each weekday until 1966. We are LIVE here tonight, having had no dress rehearsal so please bear with us. First on - Two people who need no rehearsals. We are very fortunate that two of our members - Cilla and Artie - have had a long association with STV and although not quite 60 years, they are going to share a few memories with us this evening. So folks, if you remember the phrase...\"Sit back and relax, the the \"One O'clock Gang\" or rather the \"Quarter-to-eight Gang!\" STV: Club members Cilla and Artie gave us an entertaining insight and background as to how they got involved with STV, along with photographs and video clips along the way. Their first appearance was \"House Call\", 2.00pm - 2.30pm on 11th May 1978. To appear on STV they needed to become equity members. Always extras and somewhat typecast, usually the couple in the bar in \"Garnock Way\" (late 1970s) and \"Take the High Road\" (ran from 1994-2005). The only exception being when Artie was a reporter in one of the High Road episodes. Cilla and Artie started singing children's songs in 1990 which resulted in ITV commissioning \"Singing Kettle\" for five series from 1995 to 2000. STV have been very supportive throughout their careers but especially with their children's shows. In fact, even though they retired in 2013 STV Glasgow have been showing \"The Singing Kettle\" in the morning from 8.10am-8.20am. \"We've gone from a couple of appearances a year to being on television every morning. Thanks to STV for your support over 41 years.\" Cilla and Artie finished their talk with their reverse number song 19 to 1 \/ 20 to 0 in English, German, Italian, Dutch and Finish. The members just about managed the song in English but left the other languages up to the professionals. Mass X-Ray Campaign: Club Director, Bill gave us a very informative and interesting insight to the anti-tuberculosis Xray campaign that took place in Glasgow on the 11th March over a five week period in 1957. The campaign was a huge feat of organisation and advertising, with over 700,000 people being screened at 37 mobile units, a much higher response than had been anticipated. Bill had images of the crowd of around 10,000 people gathered around George Square where a temporary pavilion had been erected, housing some of the X-ray units. Poem: \"The Glasgow That I Used to Know\" by Adam McNaughton, was read out by club member and director, Anne. Transport: Stuart, club president, gave us an informative insight into Glasgow transport by reading out the 1957 Annual Report, presented to the Corporation each year. It gave us a snapshot of the Transport Department, along with a few relevant images"} +{"id":"RedPajamaC4.0020","text":"The dawning sun shone sleepily across a world which still had much to learn. The vast empty horizons stretched out in every direction, and the silence was consuming. One solitary figure crossed the eastern plains. He had seen nobody in days, but the lack of companionship did not bother him. He had been alone for what seemed an eternity. Methos was a young man, or so his appearance suggested. His dark hair was straight and short, though ragged and unevenly cut. He came from a civilisation which was already nearing its conclusion; but Methos no longer thought of anywhere as home. It had been so long since he had settled anywhere, and he had no plans to end his self imposed exile. Immortality had its price, and it was paid in loneliness. The first signs of civilisation were beginning to show themselves on the plain; marks which suggested that tents had recently been uprooted, and carried away on horseback. Methos considered changing direction, and avoiding the possibility of contact, but he was running low on food and water, and needed to get a new supply from somewhere. Starvation and thirst could not kill him, but he still wished to avoid them where he could. There was always the possibility that the people he met would turn out to be hostile, but an attack could hardly be fatal. The sun rose higher into the sky, and Methos had been walking for quite some time before he saw the people he was following. A train of horses, travelling at walking pace, and loaded with belongings, was moving just up ahead. A few mounted riders formed a flank guard, but they paid little attention to Methos. Stragglers were not entirely uncommon with a caravan such as this, and since he was merely one man on his own, he could not pose much of a threat. Methos relaxed a little. It was easy to get lost in a crowd. Even though his clothes were different he should not find it hard to be absorbed here. It was better that way. \"You're new.\" The voice came from behind him, and Methos turned. Three men on horseback approached. The leader, a thickset man well past his youth, looked the stranger up and down, taking in the cotton and woollen clothing and the leather sandals. \"Er... yes.\" There seemed little point in saying much else. Methos glanced over the other two men. One was about the same age as the leader, or perhaps slightly younger. The third man was the same age as Methos; or, at least, the age that Methos appeared to be. He had the arrogance of a warrior, and the intelligent eyes of one who had the potential to be something more. He was also a pre-Immortal. \"You're looking for shelter I suppose.\" Methos glanced back to the first man. \"Yes. Yes I am I suppose.\" \"Fine.\" The man nudged his horse onwards, and was gone. The older of his two companions followed, leaving Methos looking up at the younger man who remained. He was dark and wiry, and his clothes, like those of all of his people, were made from animal skins. He swung down from his horse and watched Methos, his eyes cool and appraising. No man really knew what to think when he took the time to look into the eyes of the young man who in truth was ancient. His eyes spoke of old wisdom and experience, but also of the youth in which his body was eternally trapped. \"My name is Methos,\" Methos said, uncertain why he had decided to be so direct. \"Kronos,\" the other man told him. He made a rough gesture after the two men who had left. \"That was Torias, our chieftain. My father.\" That explained the proud stance. \"Where do you come from?\" \"Your weapon is made of iron,\" Kronos observed. \"The outlanders I've met say that iron isn't used in other regions.\" This was true. \"It was made locally,\" Methos replied. \"During my last visit to these parts. I move around a lot.\" He decided to change the subject. \"Do you often have strangers joining your caravan?\" His watchful host shrugged. \"Last one was... four or five moons ago. He was a soothsayer.\" \"He was?\" Methos had a lot of time for people who made predictions. They relied on knowledge which had been ancient long before he was born, and he could therefore only have respect for them. \"And what did he say?\" Kronos made a face. \"He didn't make any sense,\" he said gruffly. \"He told me that I have to die before I can find out who I am.\" Methos smiled. His companion would understand one day. \"It takes a wise man to understand all that the seers tell us,\" he said gravely. \"If it was a simple matter there would be no mystery.\" \"I suppose...\" For a moment Methos considered approaching the matter from another angle. He wondered if some guiding force had directed him towards the caravan, in order to make sure that someone was present when this man experienced his first death. Somebody would have to help him with the superstitions of his people. Kronos, however, seemed to have already lost interest, and Methos had no real intention of raising the subject of immortality before it was completely necessary. He stroked absently at the neck of Kronos' horse. It had no saddle, but wore a bridle of twisted leather, decorated with small beads. \"Do you like them?\" Kronos indicated one. \"This is carved with wild faces to ward off disease.\" \"They're fascinating. What are they made from?\" \"Teeth.\" Kronos indicated the larger beads. \"These are from bears; these smaller ones are wolves' teeth. These ones here are human.\" \"Human?\" Methos wondered if they had fallen out naturally, but somehow doubted that they had. \"Who carves them?\" \"My sister. She's a storyteller.\" Methos nodded. It made sense that such an important position would be filled by the chieftain's daughter. She would be an interesting person to talk to. \"Will I be able to meet her?\" he asked. His companion shrugged. \"I imagine so. She's sure to speak tonight. We always have a gathering around the fire to hear a story or two, about the old battles.\" His eyes acquired a faraway look. \"One day they'll tell stories about me, and how I led the others into battle. Died a glorious death perhaps.\" And woke up a little later feeling very confused, Methos thought wryly. \"A fine ambition,\" he said, remembering the last time that he had fought for his people; the adrenalin, the inner fire, the bloodlust. It had frightened him. Even then, long before he had discovered his immortality, he had not really been afraid for his life; more afraid of what he was capable of, and the knowledge that he could take so many lives so easily, whilst enjoying it so much. Later he had basked in glory as a returning hero. At the time, his ambition had been to lead a war party one day. Now he was not entirely sure if that was really where true glory lay. It would probably take him another long lifetime to decide for sure. An approaching horse interrupted their conversation, and both men turned. The second man from earlier - Torias' shadow - stared down at them, with impatient eyes. \"Kronos, your father awaits you at the head of the train,\" he said curtly. \"Your place is with him, not talking with strangers.\" \"Yes Aran.\" As the other man left, Kronos scowled after him. \"My uncle,\" he said. \"He still treats me like a child. I'll see you later?\" \"Yes, of course.\" Methos watched his new friend swing himself up onto his horse and ride swiftly away. It felt good to experience a sense of comradeship again, and so much better to know that the feeling was for another Immortal. There would not necessarily need to be any awkward partings, or sad endings. He had not realised how much he had missed having somebody to talk to. It had been years since he had really held a serious conversation with anyone. Not since Lara. She had been so understanding, so intelligent, so wonderful. They had spent so much of their time just walking together, talking about anything and everything. Then one day she had been attacked when she was coming to meet him. She had been dead long before he found her. Perhaps it was because he did not really have to face the possibility of his own death, that somehow he found it so hard to handle the deaths of his friends. Maybe he had been right after all, when he had decided to follow the caravan. An Immortal companion could be just what he needed to stop the loneliness from driving him insane. They made a simple camp. A more permanent construction did not seem to be the style of these people. Methos helped to set up some of the tents. Torias had one, and there was another for the camp women and children. The men would sleep outside. In no time the large cooking fires were sending their flames leaping skyward, and Methos settled back to watch the dancing sparks, and to enjoy the smell of roasting meat. He could hear the chattering of children, and the deep voices of the men, the whinnying of horses. \"You can't go to sleep yet.\" It was Kronos, standing above him. Methos smiled, and stretched. \"Sorry. I haven't slept in a while.\" \"Walking by night too?\" Kronos sat down beside Methos. \"Are you running from something?\" \"Not exactly.\" Methos wondered how to phrase it. \"I've been looking for something.\" \"Oh.\" Kronos did not press the point, which was just as well. Methos was not sure how to explain that it was himself that he was searching for; for the meaning of immortality, for his own feelings on it, and for some way of coming to terms with the life of loneliness it seemed to have presented him with. There would be plenty of time in the future for Kronos to discover all that for himself. \"Have your people always been nomadic?\" he asked. The transient life was one that he could sympathise with. \"Not always.\" Kronos drew patterns in the dusty ground with stone. \"Sestia, my sister, could tell you more about it of course, but sometime ago we lived in a great city. My grandfather was an emperor. There was a rebellion, and his followers were cast out. He was killed. One day we'll take the city back.\" \"There aren't many of you.\" \"No...\" Kronos frowned. \"I remember the city, a little. My sister and I were very small when it fell. Our mother is buried there somewhere, so we have to go back eventually.\" He smiled. \"My father says that only barbarians are nomads, but I rather like living like this. I must be a barbarian.\" Remembering the human teeth which decorated the horse's bridle, Methos could have answered in the affirmative, but he merely smiled to himself. \"I don't think I'm a barbarian,\" he said. \"Although I'm sure I've been called worse.\" \"You? You're no barbarian.\" Kronos indicated the sword which hung at Methos' side. \"That blade of yours. It's long and thin. That's not a barbarian's weapon.\" \"I could say the same of yours.\" Methos nodded at Kronos' own sword. The pre-Immortal smiled. \"It's more efficient,\" he said simply. \"Quicker, more accurate. It's harder to use than an axe or a heavy sword, but once you've mastered it, you can do a lot more damage with one of these.\" Methos smiled wryly. The answer didn't surprise him. A warrior's life was all about killing, and finding more and more efficient ways to do it. It was a mentality that he could understand. At heart he was still a warrior, and although there were a lot of the old, violent, ways that he had tried to leave behind, he knew that he had not yet succeeded. Perhaps he never would, entirely. \"Perhaps we should test each other...?\" Kronos, his eyes questioning, toyed with his sword, half drawing it from its sheath. \"I don't think so.\" There was no real risk of course. Even if he was injured, it was unlikely that anyone would get a chance to see the wounds heal; but Methos didn't feel like a fight. Not now, when he was feeling relaxed for the first time in ages, and not with a young man that he had not yet finished assessing. Kronos was a man of his time; ruthless. Fighting was a way of life for him, just as it was for Methos, but where as Methos did it for necessity, Kronos looked as though he enjoyed it. With him, a fight could get serious even if it was originally intended only to be in play. \"Whatever. It's your choice.\" Kronos stood up. \"I have to go. I'm due on perimeter guard.\" \"Oh, right. I'll see you in the morning then.\" Methos was almost sorry as the other man walked away. He had been enjoying their conversation. It had been so long since he had allowed himself to become friendly with somebody, and yet now he was growing close to a complete stranger. He would have to be careful. The evening lengthened into night. A small boy brought Methos some food, smiling shyly before he scuttled back to his playmates. Methos watched him go, a distant half-puzzled smile creeping across his face. For a brief second he thought he remembered himself at that age, standing on the riverbank with his father, learning to catch fish with his hands. It was so distant, so vague, that it seemed more like a half-remembered tale from somebody else's life, but that was just the tricks of his over-taxed memory. He remembered his father laughing when his first fish had leapt from his hands and vanished quickly downstream. It was hard, when the people that you cared about were so far away, and would one day be hidden forever in the darkness of the past. Being amongst these people, with their laughs and their loud voices, and the noisy, playing children, reminded him of so many places where he had lived, and been happy, before he had decided that he could no longer take the pain of repeated loss. To experience all of the happiness again made him wonder if he had really done the right thing when he had turned his back on companionship. Perhaps it was time that he once more found a place where he could belong. Time passed, and the shouts of the children lessened, and then vanished altogether as they fell asleep. The adults began to congregate around the fires, and Methos saw a young woman, tall and vaguely copper coloured, rise to her feet. She wore a long dress, and her long hair was braided. Even without her obvious resemblance to Torias, Kronos' father, it was evident that she was somebody important. Methos watched her with interest. She had to be Sestia. In a soft, musical voice, she began to speak, weaving tales and speaking of legends so ancient that even Methos was hard put to imagine the days of their creation. She spoke of long forgotten magic, and the deeds of painted heroes who had wandered among fearsome beasts, armed with little but their bare hands. She seemed to be speaking to Methos alone, and he closed his eyes, concentrating on her voice, his head filled with images of evil wizards and giant monsters. He began to fall asleep. \"I don't usually have that effect on my audience.\" Methos awoke with a start, and looked up. The storytelling was over, and Sestia stood beside him. She was smiling, apparently amused by his fatigue. \"Was I really that tiresome?\" \"Tiresome? No! Not at all.\" Methos sat up quickly. \"They were wonderful stories, really. I'm afraid I'm just a bit tired, that's all.\" \"A bit tired?\" She laughed., and sat down beside him. \"You look completely exhausted. Kronos says you've been walking for days.\" \"I have, yes. I have to get somewhere.\" \"You do?\" She seemed surprised. \"We never go anywhere. We walk, we travel; but we never arrive.\" \"I know. Kronos told me about your city. Do you really not know where it is?\" \"Oh, we know where it is. We just... can't go there, that's all. We'd be cut to pieces long before we reached it.\" She smiled sadly. \"And how about you? Where is it that you're in such a hurry to get to?\" \"I - I'm trying to get home.\" He turned his head to stare into the nearest fire. \"I left a long time ago, and now I'd like to go back and visit my father's grave, if I can find it. It's been so long since I was there.\" \"I see. I can understand that. I'd like to get the chance to visit my mother's grave.\" She looked questioning. \"Where is your home?\" \"Oh... That way.\" He chose a direction almost at random. It didn't matter where he pointed. He knew where his old home was, but he had no intention of going there. His words had been just wishes, given voice by his desire to make conversation. His father had been dead for so very, very long, and nobody could tell him now which grave was the right one. \"Oh. That means we're travelling in different directions.\" She seemed disappointed. \"I was hoping that you'd stay with us for a while. Visitors bring stories that I've never heard before.\" \"I'm not planning on leaving just yet.\" He leaned back. \"You want stories, do you?\" \"Do you have any?\" She was immediately eager. Stories were her life, her career, and there were few that were new to her. An unheard story would be priceless to such a woman. \"I know a few.\" He smiled suddenly. \"Have you heard about the Immortals?\" \"The Immortals. Legends tell of a group of men and women who can't die. They live forever, fighting each other to try to attain an ultimate goal; a mythical Prize that nobody understands the true meaning of. They can't grow old, and they have no families; just each other.\" \"That's sad.\" She shook her head.\" Nobody should be that alone. I'm glad it's just a story.\" \"Yes. So am I.\" He stared up at the skies, and she took his hand. He glanced up at her, surprised by the openness in her face, and the gentle concern in her eyes. \"Alone? No, not completely. I have... memories. Many memories.\" \"You can't hold memories. They can't keep you warm at night, or talk to you to keep you company. You can't share a joke with a memory.\" \"No, you can't.\" He turned away. It was all happening all over again. A woman, thoughtful and kind; somebody he knew that he could, and perhaps already did, love. He thought of Lara, and before that of other women. Of Zeia, who had grown old; of Meri, who had fallen ill. The pain washed over him again, and he kept his head turned away, not wanting to look at Sestia. He could feel her eyes on him, and could feel her compassion. Why did this have to be so hard? \"It's not a good idea to keep it all inside you, Methos,\" she said finally. \"You shouldn't hide it all away.\" \"I know.\" But no one else could possibly understand, except for another Immortal, and he rarely got a chance to speak to one of them. The world was so empty, and his kind were few and far between. When he did meet one, there was usually little opportunity for friendly conversation. Sestia smiled at his back. \"It's time to turn in,\" she said, her voice still gentle. \"Methos... you're a stranger, and custom dictates that I should welcome you as a member of my family. If you need anything while you're here - anything at all - come to me. I'm always ready to listen.\" \"Thankyou.\" He turned back to watch her go, seeing her tall frame vanish into one of the tents. He wondered if there was a rule about falling in love with the sister of a fellow Immortal. Would it really be fair on her if she had to discover that she was going to grow old, whilst not only Methos, but also her brother, were capable of living forever? Kronos was not yet Immortal, but one day he would be. Sestia would have to face it all then. It was probably not fair for Methos to tell her any sooner than was necessary. He stood up, and walked away from the fires, planning to stretch his legs before returning to sleep. Away from the warmth of the camp's centre, it was cold, and the darkness closed in around him. The vast skies, with their countless tiny lights, stretched out above him. Odd to think that they were the same skies he had always looked at. The world changed, and people came and went, but Methos and the stars remained the same. In the distance he saw Kronos, patrolling the furthest borders of the camp, clearly recognisable by his horse, and by the sword that hung at his side. He considered going to talk with his new friend, but thought better of it. In his present melancholy mood he was no good to anybody, and certainly not to a young fighter without a care in the world. \"When do we make our move?\" The words sounded very close, and Methos turned, wondering who was speaking. Several paces away, some rocks formed a natural barrier, and he wandered closer. A second voice spoke, and he recognised it as belonging to Aran, Kronos' uncle. \"Not yet. We wait a while longer. Reinforcements are on their way.\" \"When do we expect them?\" The first voice spoke again, and Methos tried to get closer, interested now. This sounded like something that needed to be overheard. \"Soon. A few days at most. I'll tell you when. We kill Torias first, and then let the others decide if they're with him or us. His family will have to die of course.\" \"All of them?\" A third voice joined in. \"There'll be uproar if we kill Sestia, and it won't be easy to kill Kronos.\" You can say that again, Methos thought grimly. He waited for the answer. \"Kronos isn't untouchable.\" Aran sounded as though he was smiling. \"He may be the best warrior in the group, but anybody will fall with an unexpected arrow in the back. And as for Sestia... the people may complain, but they'll be quiet unless they want to go the same way.\" There were a few harsh laughs. Methos felt sick to the pit of his stomach. Aran was planning to murder his own family, as part of some plot that obviously had been developed some time previously. \"We've waited a long time for this, Aran. \" A fourth voice entered the conversation, and Methos strained to hear. The man spoke quietly, as if he was more afraid than the others about being overheard. \"It's been a long, long time since the city was overthrown. We should have made our move then, instead of allowing Torias to escape.\" \"They were confused times, Ronas.\" Aran's voice came again. \"We killed the old man. I killed my own sister. It's not my fault that her husband got away with the children.\" \"Those children are the heirs to the city. Our master can't be safe while they're still alive.\" The fourth man evidently considered himself to be superior to Aran in some way, and was trying to assert his authority. \"There are dissenters in the city who still speak of the emperor's descendants, and how they live out here, waiting for a chance to get back. Those stories have to be crushed.\" \"Don't worry.\" Aran, sounding impatient, cut in sharply. \"You'll ride back to the city with Torias' head soon enough, if that's what you want. There won't be a fight if we catch them all by surprise.\" \"There better not be.\" Ronas was silent for a few moments. \"We should kill Kronos before our friends arrive. If he's still alive when the attack gets underway, it'll be harder to gain control of the camp.\" \"That's no problem.\" One of the other men, silent for some time, spoke up. \"I'll see to it that he's lost one day. Tomorrow perhaps, when we're riding out on the flank. We're often well out of sight of the main party. Kronos likes to go off on his own to practice with his weapons. He'll make an easy target.\" \"Good.\" There was a sudden sound, which Methos suspected was Ronas rising to his feet. \"Then I think that concludes our business. We'd better return to the others before we're missed.\" Methos backed off quickly. He had no desire to be caught out now. As he faded into the blackness, he saw the shapes of the four men as they left their meeting place to return to the fires. He frowned, thinking hard. He knew Aran, and he knew the name of one other of the men, but he had no idea who the last two had been. It was not much to go on. All the same, he could hardly keep this to himself. He considered his best form of action. He was a stranger here, and his word would not be taken above that of the chieftain's brother; even thought they were only related by marriage and not by blood. Aran was probably a respected member of the group. Sestia and Kronos had both made friendly overtures towards Methos, and he knew that it would have to be one of them that he spoke to, but should it be the storyteller or the warrior? Kronos had already indicated that he disliked Aran, and Methos had judged him to be the inflammatory sort. Was it sensible to tell him, when his reaction would quite possibly be explosive? On the other hand, it made little sense to tell Sestia. She was respected, obviously, and people would believe her, but what could she herself do? Anyway, her life was not in any immediate danger. She was not to be killed until these mysterious reinforcements arrived. It was Kronos who was to be killed first. Methos was not too concerned over that. Better that the pre-Immortal should experience his first death whilst he was still in the prime of life, rather than when he was older, and less able to fight. All the same, Methos wanted to avoid a death. It would not only cause problems for Kronos, perhaps forcing him to leave his people, but if news of his death got around, the superstitions and fears would make it impossible for him to return and rally his people against Aran. Besides, if he was killed, it would mean that Aran had scored a victory, even if only a small one. Methos didn't want that. He looked around. Kronos was still visible, having completed a full circuit of the camp. Glancing about to make sure that Aran and his followers had gone, Methos hurried across the camp. Kronos swung round to face him, his sword half drawn before he recognised his new friend. \"Methos! What's wrong? I thought you were tired.\" \"I was.\" It was funny how events could push sleep to the back of the mind. \"Kronos, we have to talk.\" \"We do?\" The pre-Immortal shrugged. \"Fine. Go ahead.\" \"I was walking, over there.\" Methos made a rough gesture. \"I heard something. People planning an attack. They mentioned reinforcements, and a plot to kill you and your family. I think it had something to do with the city that you spoke of.\" Kronos frowned. \"These people. Who were they?\" he asked. He spoke with a guarded voice, and Methos realised that he was speaking to a sceptical audience. \"One of them was Aran,\" he said. \"Another was called Ronas. I don't know about the other two. Their names weren't mentioned.\" \"Aran and Ronas?\" Kronos' face darkened. \"I thought you were a friend, Methos. Aran is my uncle, and Ronas is one of our most respected elders. He helped to deliver my sister and I.\" His frown deepened. \"It was a difficult birth by all accounts. Sestia was born first, and they thought that I would die. I owed my life to Ronas before I was even born.\" Methos lowered his eyes. It was faintly ironic that Kronos felt himself bound to this man for a debt that did not exist. He did not yet know about his true identity; could not possibly realise that he owed nothing to Ronas. Presumably, Sestia's younger brother had died that day, all those years ago, and Kronos had been left in his place. He owed his life to nobody. \"I'm sorry Kronos,\" he said, his voice soft. \"I'm just telling you what I heard. I can't tell you why this man would suddenly turn against you, or why Aran would be involved... But I did hear him say that it concerned the city, and Aran is not what you think he is. He said that he killed his sister.\" Kronos reacted suddenly; so suddenly that Methos had no time to move. With a speed worthy of an Immortal, the warrior drew his sword and swung it up, its tip pressing against Methos' neck. \"Aran is a fool,\" Kronos whispered, his voice cold and harsh. \"He likes to pretend he's important. But he's my uncle, and you suggest that he murdered my mother?\" \"Kronos... \" Methos tried to back away, but Kronos merely stepped forward, in order to keep up the pressure on his prisoner's neck. \"I'm just telling you what - \" \"Shut up.\" There was disgust mingled with the anger in Kronos' voice. \"I trusted you. You came here as a stranger and I tried to be your friend. I should kill you now.\" \"Won't I?\" Kronos raised his eyebrows, and Methos saw the anger that shone in the pre-Immortal's eyes. Kronos would think nothing of killing a man - any man - who stood in his way, but Methos still believed that he was safe. \"No. It's custom to take a stranger in as a member of the family. You can't kill me; it would bring dishonour.\" \"Huh.\" Kronos stepped back, lowering his sword slightly. \"What do I need honour for? I'm just a man with no home. A barbarian, remember? Go away, Methos, or I will kill you.\" Methos sighed. He could appreciate the man's disbelief, and could understand his anger. He had been taken in as a guest, and now seemed to be defiling his hosts' hospitality. All the same, he had to get this message across somehow. \"Won't you at least hear me out?\" he asked. \"I know this must be difficult for you to accept, but it is the truth. I swear it. I don't lie, Kronos.\" The icy eyes of the pre-Immortal burned into his, and for a second Methos saw indecision flicker through them. Then Kronos shook his head. \"Anything else, Methos. Anything else and I'd believe you. But Aran and Ronas? It doesn't make any sense. I once saw Aran almost die saving my father from being gored to death by a bull. You expect me to believe that all this time he's been an enemy of my family?\" He shook his head. \"I thought we could be friends. You look like a warrior, you stand like a warrior. Even your eyes shine like a warrior's. I had no idea you'd turn out to be this way.\" He sheathed his sword suddenly, as if no longer caring about the man who confronted him. \"You'd better leave Methos. If you were any other man I'd kill you. I may still do it anyway.\" They stared at each other for a moment. Methos could see everything that he had once been, every thing that he still was, dancing in the strange flames that lit Kronos' eyes. Kronos couldn't kill him because they were too much alike, but all the same, there was no sense in pressing the issue. He considered going to speak to Sestia instead, but there seemed little point. \"Alright.\" He shook his head sadly. \"I'll leave. I'm sorry that I couldn't be more help to you, Kronos, but you'll see in time that I was right.\" He turned to leave. Kronos said nothing more, and Methos left him far behind as he walked on into the night. He was thinking hard. Given what he knew, could he really turn his back on these people? The answer was no, of course. He was in love with Sestia, and he knew it only too well. He could not stay with her, because she was the mortal sister of a fellow Immortal, and he could hardly remain behind with her if Kronos felt compelled to leave once his destiny was revealed. But he could not let her die at the hands of her uncle; that would be against everything that he believed in. He frowned into the darkness. He could wait, and watch, and try to help out when the reinforcements came. He could possibly find them, and stop them from ever meeting up with Aran and the others. Somehow, neither of those plans seemed feasible. He was Immortal, yes, but he was also alone. One man could not stop this. There was only one possible course of action. He had to wait for the attempt on Kronos' life. He would have to follow the caravan, and keep a watch on the pre-Immortal. If possible he would save him, but if not it was no real loss. Death wouldn't hurt Kronos. Methos could not just allow Aran's men to kill him, but if he could not stop them, he would not be too sorry. At least then, Kronos would understand. Aran, the brother by marriage of Torias, lay down beside the fire to sleep. It had been a long day for him, and the discussions with Ronas always left him feeling drained. His day was drawing closer, though, and he gazed up into the sky, watching sparks from the flames leap about above him. Soon, Torias would be dead, and Aran could lead the remainder of these people back to the city that they had been forced to flee. He remembered that day. There had been fires and screaming, and many people had died. He had gone to help with the murder of Razan, the emperor, only to discover his own sister there, and had killed her himself. Later, the burial of his wife had been one of the things that Torias had demanded from the victors. In return he had agreed to leave the city with his children and his followers, and not to return. Aran and Ronas had been sent with him, as observers. Torias had always trusted them implicitly, but he would soon pay for that mistake. Aran smiled, thinking about the day when he would kill Torias himself. The only reason he had been allowed to live this long was because to kill him would cause outrage among his people. Now, for the first time, Aran could be sure of quelling that anger. Back in the city, so many of the supporters of the old regime were dead. Soon Torias and his family would join them, and Aran could prove to his master that his family ties did not make him a security risk. Then he could ride back into the city with his head held high, and make a name for himself that would last for generations. He remembered how his sister had pleaded for her life, saw her horror struck face as she realised that he was going to kill her, and he smiled. To wield the power of life and death was Aran's greatest dream. People would do anything to avoid death; grant him any request. And when he killed them, when he looked into their eyes at the point of death, he knew that it was his hand that had taken their life away. When it came to it, the only thing that any man truly owned was his life, and the greatest power in the world was the power to take that life. Aran craved power. Soon it would be his. Methos shifted his position awkwardly. He lay in the shadow of the rocks, watching Kronos shooting arrows into a makeshift target. It had been hard to keep the pre-Immortal in sight, and Methos cursed himself for not having tried to steal a horse. When he had finally caught up, he had been only too willing to lie in the rocks to recover; but now he was uncomfortable, and it was becoming unpleasantly hot. The rocks reflected the heat back at him, and he began to feel like the meat that had been roasting on the fire the previous night. Kronos, oblivious to the presence of his distant observer, was engrossed in his task, and Methos had to admit that he was good at it. He had already decided that it would be far better to be friends with Kronos than it would be to be his enemy. Kronos sent one final arrow thudding into its target, and shouldered his bow. It was getting late, and soon the sun would be past its zenith. Garon, his friend, had asked him to meet him here, and yet there was still no sign of him. \"Come on Garon. I don't have all day.\" Kronos stared about. looking for some sign of the man he had grown up with. Living in such a small group tended to lead to close relationships being formed, and Kronos and Garon had been like brothers. It was unlike him to let Kronos down, even if it was just by failing to turn up to a meeting. Kronos had no way of knowing that there was another man, several hundred yards away, who was scanning the horizons with equal frustration, waiting for the latecomer to arrive. Behind Kronos, a waterfall bubbled its way down a steep drop in the hillside, mingling with the water of a merry stream. Behind the rocks which framed this idyllic scene, a third man crouched. He was Garon, one of the two men whose names Methos had not heard during the previous night's conversation. He toyed with the bow in his hands, watching Kronos move about, just within effective range. Garon had volunteered for this task, but now, as he sat ready, he could not help thinking of the life that he had shared with the man he was planning to kill. The swimming, the fighting, the hunting. They had been like brothers; but this was war. He had to be ruthless. He stood up and raised his bow, an arrow already fitted against the string. Methos, his discomfort becoming almost unbearable, was shifting his position restlessly, and almost failed to notice Garon rise from his hiding place. His jaw dropped open. He had been waiting for the assassin to arrive - how could he have failed to guess that the man might already be here, waiting for the best opportunity? He leapt to his feet. \"Kronos!\" Hearing his name, Kronos turned and saw Methos emerge from the rocks to his right. He opened his mouth to speak, but realised that the stranger was running towards him. \"Get down!\" Methos shouted the words desperately, suddenly anxious to prevent this unnecessary death, even though it would only be a temporary one. \"What-?\" A sixth sense made Kronos turn, despite his confusion. He saw Garon, bow upraised, and immediately made the mistaken assumption that his fellow tribesman was preparing to kill Methos. He opened his mouth to call - to shout to his old friend, and tell him that this man was not a threat - when he realised that Garon was aiming at him, and not at Methos. He tried to speak, the disbelief over riding everything else that he could possibly have been expected to feel. He saw the arrow leave the bow, knew that there was no time to dodge aside, and looked deep into Garon's eyes. He saw only coldness. Garon, who, like Kronos, had been trained in all forms of weaponry since the days when he could barely walk, had fitted a second arrow to his bow almost as soon as he fired the first. He had no idea where Methos had sprung from, but he was a witness, and could not be allowed to live. The second arrow flew on a course almost identical to its predecessor, and Methos saw it coming. There was little sense in trying to avoid it; he doubted that he could, and it was hardly necessary. It would satisfy Garon if he thought that Methos was dead too, and then he would be unsuspecting later. He saw Kronos fall, left with barely a second before he too succumbed to the bite of an arrow. A second was all that he needed to see the pain and the anger on the other man's face. It was the pain of betrayal, and the last thing that Methos felt before he collapsed was pity. It was evening, and the first cold breeze was beginning to blow. Methos knocked the arrow aside and sat up, glad that the iron point had missed his heart. Being stabbed there really hurt. He pressed his hand against his chest and tried not to cough. There was always a temptation to clear his lungs when he returned to life, but to cough after a wounding like this one would be agony. Kronos lay a few feet away, an arrow sticking out from his chest, where the tip was deeply embedded. Garon was a good shot, and he knew which were the best places to aim for. Methos pulled the arrow out and threw it aside. It might take some time for Kronos to come back to life; first deaths were often the longest. He contemplated building a fire, wondering how far away from here the caravan was camped, and decided to chance it. He never felt at his best when he had been dead for a while, and no doubt Kronos would be even more glad of the warmth when he recovered. Methos built a fire in the rocks he had used as a hiding place, dragging Kronos there when the flames were well sized. He huddled close to them, waiting for the pain in his chest to fade away, and wondering when his companion would awaken. The flames made strange shadows dance on the rocks that surrounded him, and he tried to ignore their disturbing shapes. At his age it was surely time for him to stop being afraid of the dark. Kronos awoke when the night was at its darkest. His eyes flickered open, and he blinked up at the sky, showing surprise, anger and then confusion as memory returned. He sat up suddenly, his eyes fading in and out of focus before they settled on Methos. \"You...\" he said, his voice faint. \"You saved my life.\" \"No I didn't.\" Methos threw some dry wood onto the fore, to ensure that the flames stayed at their brightest. \"But you must have. I mean - somebody did.\" Kronos frowned. \"You called me. I know you did.\" \"Sit still.\" Methos stood up and circled the fire, sitting down beside Kronos. \"I didn't save your life, and that man didn't miss you. I know this is going to be--\" \"Garon.\" Kronos' eyes narrowed, and Methos saw darkness sweep across his companion's face. \"He tried to kill me. He'll pay for that.\" \"Kronos... Listen to me please.\" Methos sympathised, but he had to say what needed to be said. \"There's no sense in trying to persuade me otherwise Methos.\" Kronos stood up, and then sat back down again, gripping his chest. \"Ow!\" \"It'll hurt for a while longer,\" Methos said, \"but it'll soon heal.\" \"What'll heal?\" Kronos looked at his hands, and saw the blood on them, and his eyes dropped to his chest. For the first time he saw the blood stained hole in his shirt, and he looked up at Methos in confusion. \"Garon didn't miss...\" \"Then you - you must have--\" Kronos stumbled to his feet again, backing away slightly as he drew his sword. \"You must have performed some sort of magic. A wound like this isn't one to recover from.\" \"If you want to think of it as magic then go ahead, but it was yours, not mine.\" Methos smiled, hoping that he would look, and sound, encouraging and understanding. \"Kronos, sit down, please. I have something to tell you.\" \"What?\" Kronos sat down, his expression showing distrust. He kept his sword in his hand, and watched Methos carefully. The old Immortal heaved a short sigh. \"I didn't save your life,\" he said. \"The arrow hit you in the chest, and you died, but it didn't kill you.\" Oh, well done Methos, he told himself sarcastically. That was comprehensive. Kronos, unsurprisingly, was looking confused. \"What I mean is - you're not like other people.\" \"I'm... dead?\" Kronos frowned. \"Then you must be too.\" \"Not anymore. Look, just shut up and listen.\" Methos tried to find the best way to explain. \"There are some people in the world who can't die, and you're one of them. Disease, hunger, battle wounds - they can't kill you. Any injury that you receive will heal, and if you die, you'll wake up again after a while.\" He tried to gauge Kronos' reaction. The new Immortal was looking lost, somewhere between scepticism and deep confusion. Methos sighed again, and drew his knife. There was one way to prove this which always worked. \"Watch.\" He drew the knife across the palm of his hand, so that the blood glistened in the firelight. After a few seconds the wound healed. Methos glanced up into Kronos' face, looking hopeful. \"You're... a sorcerer?\" Kronos asked. He sounded more as though he wanted it to be true then as if he believed it. Methos shook his head. \"No. Just an Immortal. And so are you.\" He threw the knife over. \"Try it.\" Kronos picked up the dagger, and watched a drop of blood run down the blade. He gritted his teeth, and repeated Methos' demonstration, staring in transfixion at the cut as it opened on his hand. It healed quickly, and he looked back to Methos. \"It's not quite that simple,\" Methos told him. \"There is one way. You can be beheaded, and that will kill you. There are other Immortals in the world, and they all want to be the only one. They'll try to take your head, but you have to take theirs first.\" \"Then why haven't you tried to kill me?\" \"Because I--\" Methos shrugged. \"Because I like you maybe. And because it wouldn't be fair to kill you right now.\" He smiled. \"You still don't believe me, do you? Not really.\" \"I - don't know what I believe.\" Kronos stared into the fire. \"This morning I believed that Garon was my greatest friend. He was like a brother to me. Then this afternoon he tried to kill me.\" \"Did kill you.\" Their eyes met as Kronos raised his head, and the younger man didn't answer. Instead he asked a question. \"You were telling the truth, weren't you. About Aran and Ronas?\" \"I'm sorry. I should have believed you.\" Methos tried to offer him a consoling smile. \"You didn't know. The question now is what are we going to do about it?\" \"Well you can't handle this on your own, can you?\" Methos stood up. \"And Immortals should stick together.\" \"I thought you said we were supposed to try to kill each other?\" \"I said that others would try to kill you.\" Methos kicked at the edge of the fire. \"One day there will be only one left, and he'll win the Prize - the power to rule the world the world in any way that he chooses. It's a game for fools though. I won't spend my life trying to kill the only family I have just to please some... celestial games master. If you have any sense you'll think the same.\" \"No, not yet, but there will be. With time, there'll be more mortals, and that means that there'll be more Immortals too. It stands to reason. When there are many of us, that's when the battle for the Prize will begin in earnest.\" \"And you don't want this Prize?\" \"Not really, no. You might understand one day Kronos, but the life of an Immortal is very lonely. You can only ever really share yourself with somebody who is the same; and if you're caught up in the fight for the Prize you're killing the only people you have"} +{"id":"RedPajamaC4.0021","text":"I was reading a book about spirituality, and the author went on a tangent about how science is inferior to spirituality. The arguments that followed in favor of this claim were written by someone who clearly has no training or understanding in science. To someone who has an advanced degree in physics, the book's discussion was cringeworthy. Although most high-school textbooks discuss science that is over 200 years old, modern science has grown exponentially in its discoveries. There's much more fact now, which previously was fiction. All disciplines are based on the kinds of questions they ask and the limitations within which the questions can be answered. For example, chemistry, physics, biology, and philosophy ask somewhat different questions. A good question inspires the mind to extend beyond its understanding. A great question stirs something beyond the mind \u2013 a passion and curiousity that cannot be fulfilled by the mental, analytical circuit. Science asks questions that can be answered objectively by anyone \u2013 independent of the person. However, answers to spiritual questions are very much dependent on the person answering them and there is currently no way to objectively verify whether that person has any understanding \u2013 here, the human body\u2013mind, the nervous system, is the measuring instrument. Thus, spirituality is a description and study of human perception. Spirituality is currently personal for this reason \u2013 there is no way to \"prove\" anything except to feel it for oneself. Spirituality becomes more interesting when different people document similar perceptions and understandings, which raises more questions than provides answers. I love studying the writings of sages and yogis and compare them. In everyday language, a theory means a guess. In scientific language, a theory is a model of reality that is well supported by a body of experimental evidence. Scientists often try to reproduce experiments already done to see if they get the same or different results. The bar is high to becoming a \"theory\" in science. A mere guess in scientific circles is called a hypothesis. I often see headlines like \"Scientists now believe\u2026\". Scientists don't \"believe\" anything. Instead, they design careful experiments to measure and see. This is why scientists don't ask questions that cannot be answered objectively, such as \"Why did the universe come into being?\" Or \"Is there God?\" Because these questions cannot be \"measured,\" they are not scientific. That's not being inferior. That's knowing one's limitations. The question is \u2013 Is there anything we can know beyond objective reality (that we can all agree on)? Here, we enter the realm of human perception. However, people have experiences and treat them as if they are truth. People use their experiences to claim some status without having any benchmarks for the validity of their claims. Others believe them at their word (or charisma) and don't even want proof. \"My gut tells me\u2026\" Your gut may not have the honed perception and discernment to tell\u2026. Thus, spirituality is full of half-baked claims spoken as truths \u2013 and many don't care because the claims make them feel good. Feeling good and feeling God are not necessarily the same thing. The subjective nature of spirituality will continue to prevail. People will continue to make claims. And many will continue to believe without trying to replicate these claims for themselves. It presents an interesting dilemma. But, science and spirituality were never incompatible. Spiritual people talk about eliminating doubt. I think that's poor judgement. If the doubt is based on genuine curiosity and not some deepseated insecurity, this doubt is valuable to being able to study and understand one's state. Doubt of this kind makes introspection possible. It would be useful to present objective proof for someone being enlightened vs. another person being unenlightened. Such proof could put many charlatans in their place. Ancient yogis were very scientific about the observations of their states to try to better understand what they have become. I also study my state because I'm curious \u2013 it is not enough for me to live and be lost in it. There are advanced states of perception that make one feel happy and peaceful at the core of being. The advanced state changes the nervous system in a consistent, predictable way. The advanced state is common to (shared by) others in the same state. It will eventually be possible to objectively test for someone being in an advanced state. An enlightened being can 100% of the time tell whether someone else is or is not enlightened. The methods used and a person's readiness to attain advanced states all have key things in common. Should you believe my claims as fact? Of course not. But as more people become enlightened and the time becomes right, there will be a richer understanding of what it all means. I trust in people's curiosity and interest to become more observant of our human potential and how to practically apply it in life. I will continue to study, try, test, and retest to better understand what has occurred with me, but I won't accept subservient acquiescence of others to half-assed claims. Nor will I quietly stand by when people misrepresent and denegrade the scientific method. Those who do should stop taking medications, cease seeing doctors, and throw away all their technologies \u2013 get rid of everything that science and engineering has given them by its meticulous studies. Perhaps they can also learn some actual science before arguing about it or distorting what it is. As for spirituality, as long as the only instrument is one's perception, it will remain a personal journey. One other snag is that spiritual questions go way beyond the limits of the mind. I began to approach the Void without having any understanding of where I was headed. But the Void is not a place. Rather, it is a state where \"being\" is negated. I was annihilated. And within this reverie of neither life nor death was the path of no identity. To sense anything, we must have the proper sensory organs and awakened connections to the web of life. The physical body has sensory abilities that only sense the material world. To sense other planes of existence, we awaken our consciousness in our other bodies, corresponding to these other planes. Each body has its own sensory organs and connections to life. The etheric body is so close to the physical vehicle, it is almost indistinguishable from the physical body. Also, the emotional and mental bodies are well integrated. I can no longer describe what each senses because integration diffuses my ability to differentiate between them. I remember that, at one point, I knew the difference, but it seems trivial now. The awakening of the astral body begets new senses and abilities. So many are enamored with the astral body that they spend lifetimes flying around in it. The astral \"eyes\" do see an incredible vista. But the astral body is just a stepping stone to the soul body, which looks to me like an orb connected by a cord that stems beyond the astral plane. It is clear around the soul body, when compared to the muddy waters of astral machinations that affirm human narcissism and seek ways to control the physical plane. This is the playground of all those practicing magick and flexing their will. The soul body has sensory organs too and they bring awareness of the unity of all souls as a direct understanding. Unless the consciousness can move freely from body to body, it is not possible to sense the information from the corresponding worlds. Thus, it is natural to think these worlds do not exist. The bodies appear to follow a specific progression of awakening, and new knowledge becomes accessible. There is a body beyond the soul body. Another gateway, which I have only recently began to consciously use. As the awareness progresses through the vehicles, the identification \u2013 the sense of \"I\" \u2013 changes dramatically. I wonder how many bodies I will integrate in my lifetime via my consciousness and what I will learn and manifest? When I entered the Void, I intuitively shot pulses of consciousness to my bodies. Thus manifestation and emptiness coexisted \u2013 another paradox. The Void is where we do not look because no body has the eyes to see it. But it is possible to know it and enter it and, in some ways \u2013 never leave it again. This is probably because we all hold the potential of beholding our own dissolution or true roots. The Void is not empty. It's function is to allow us to perceive in perspective what we have constructed ourselves to be throughout lifetimes of arduous and diligent work. I entered the Void and will not leave it again. Now, I must reconfigure myself and my life dramatically after this realization. New structures that are known as \"me\" must arise on the various planes of manifestation. That much is clear. I have not turned on my mind to analyze and translate knowledge into what the physical and nearby bodies can understand because I don't want to break the flow of directly feeling it all at play. Even as I write this, I have no idea how useful it is. But, I am certain it was important to try to express something, at least. The Void lies prior to any manifestation \u2013 prior to concrete forms to lay the foundation for all the processes that we are. It is a realm of pure potential. I wonder how my life will unfold now, as I make my transition into new forms and discard or integrate much of what \"I\" am. Integration is not just making pieces fit \u2013 it is an overhaul and a radical reconfiguration of being. The new perspective has changed everything and I cannot change that. Life is mysterious beyond what I ever imagined. It is beyond our simplistic language to describe what is not part of common consciousness. So, we drop breadcrumbs and maybe that is why most spiritual writing is so cryptic and may even seems ridiculous. Who we think we are is not always in alignment with how we present ourselves. The discord between our self-perception and the feedback we get can be jarring. I don't write to give advice. I just share my experience \u2013 that is really all any of us can do. For over 30 years of my life, I imagined myself as being different than what I really was. I remember wanting to be someone kind and gentle who looked like a supermodel and spent every second of life \"saving the world.\" However, the feedback that I got from the world was that I was obsessive, blunt, and generally too intense to be around. I had the persona of someone who always wanted to be right and to have all the answers. I also had a self-righteous streak and couldn't just let people be to do their thing \u2013 I wanted to \"fix\" them too. I always joke with my students that we are all students at the \"School of Hard Knocks\" \u2013 with free tuition and universal enrollment. Life is constantly giving feedback about what any of us actually project despite our self-views. After years of listening to life and letting go, it's now easy to accept myself the way I am. That's been a difficult journey, for sure. I am still pretty intense, but lost my obsessiveness somewhere. Rather, now I care about some things and couldn't care less about others. Generally, I value people's abilities to experience their lives the way they want to and don't look to \"fix\" them or much of anything else. While being sweet and nice sounds good in theory, it has never worked for me. As a high-school teacher, I deal with nearly 150 students daily \u2013 many of whom don't want to learn anything. I also have kids at home, who occasionally throw attitude my way. To deal with people's obstacles, I tend to throw flames in their direction. Despite the intensity, my classroom is always full of kids \u2013 even during my \"off\" periods. Students tell me that they are terrified of me and also feel that I am kind and \"hilarious.\" That's feedback. Perhaps not how I imagined myself being, but that's what I am. It was hard for me to go through the time of incongruency between what I wanted to become and what I actually was. I no longer wrestle with myself. I do have a gauge for when I have less patience with people and their drama, and I isolate myself until my patience returns. It's become obvious that I need a lot of time to myself and I take those signals seriously. As a child, a psychic told me that I would have two blonde boys. This came to pass. That psychic also told me I would not have lasting marriages. I know it sounds odd that I talked to a psychic as a kid, but that's not so abnormal for Russians. My kids are a very important part of my life \u2013 I naturally want to make them strong and independent, but I am also sensitive to their emotionsl needs and help them deal with stuff as it comes up. As for having a partner, I don't even think about it now. In fact, my prior marriages feel like they happened to someone else and not to me. \"I\" was never married. Maybe I somehow traversed time lines into a different reality\u2026. It may be interesting for some that we live in multiple realities simultaneously, and having somewhat different experiences in parallel. It's not uncommon for our attention to refocus across these realities into another \"version\" of ourselves. Unfortunately, this idea is not well captured in movies \u2013 we don't need physical portals to travel across timelines and only our \"attention\" shifts to a different possibility. Occasionally, our dreams can be bleedthroughs from other realities \u2013 especially recurring dreams. I jumped timelines about a year ago into this one. It wasn't a conscious jump. It was just life taking me here. This is where I will unify all my other existences and complete my karma. The wisdom of the jump is obvious. Would it make sense to willfully jump across timelines? My sense is probably not. However, we can expand our awareness to heal ourselves in all our existences. It may be beneficial to meditate on the root of ourselves that sprouted into different realities \u2013 many very foreign to our current imaginations. There is something to be said for achieving congruency of who we are and merging all of ourselves into a unified consciousness. Living simultaneously in different \"realities\" is another layer of complexity to rebirth and having had past lives. Knowing or living this is not necessary for our individual and collective evolution, and most will gloss over what I describe here as either a \"cool idea\" or just imagination. It may sound like insanity to live with conscious awareness of past and parallel existences. One existence is challenging enough. However, enlightenment does pretty incredible things to broaden our awareness of reality and makes our brains capable of processing all this information without overwhelm. Enlightenment is more than just a figment of the mind and is quite physiological, changing and adapting our nervous systems. I've written before about flash awareness that can take snapshots of fairly complex structures and instantly comprehend these. For me, this ability to process existence continues to open. Changes are still occurring and the transitions are so smooth, I barely notice. Growth is exponential after enlightenment. In the meantime, here I am \u2013 describing an old habit of wanting to be different from what I actually was. It seems so odd now to even have that thought, let alone waking up \u2013 morning after morning \u2013 and trying to be something other than what I was. I don't remember how that felt anymore, but I do recall how uncomfortable that was \u2013 what a way to live. Artists talk about the vanishing point when they draw perspective drawings. Similarly, I see a possibility of convergence of all my lives \u2013 my expressions. Paradoxically, I will \"vanish\" when this occurs, remembered by some and completely forgotten by others. I was reflecting on human history, and a dominant pattern stood out for me as defining the human struggle over millenea. This is the dynamic where a certain group of people feels superior to others and aims to establish its supremacy. Racial and ethnic tensions and battles continue to tear at life even now in numerous regions on Earth. Why does this pattern of establishing dominance arise? Is such a dynamic inevitable as our collective growing pain, or is there a different \u2013 untapped \u2013 approach toward embracing all people as one human race? When a group of people believe that they are superior, these individuals adopt an unshakable confidence in their position. Such a group walks, talks, and behaves as if the entire planet Earth is at their disposal \u2013 literally. Furthermore, the ones taking a dominant position develop derision for those who do not belong to their proclaimed order. Derision and the resulting aggression ultimately breed rebellion of the castigated groups, and war ensues. Not all wars stem from establishing dominance based on claims of superiority, but it is these types of wars that tear up the fabric of our existence like no other wars. While we may battle over limited resources, it is genocide that decisively wounds and degrades our entire way of life \u2013 no matter which side we are on. Just as we have individual egos, there are group egos, and the energy of ego-bound groups is reflected across multiple planes of existence. Truly, the resulting conflict is one of Heaven and Earth, as portrayed by our oversimplified fairy tales about the fight between Good and Evil. I see the ethnic and racial wars as archetypal wars of evolution out of the ego-trapped state, but played out on a larger-than-individual scale. Similar to the way individuals experience an internal battle of feeling separate versus embracing connection to the Divine, this same conflict unfolds for a cluster of egos. There is also the planet-scale Ego, but this process (although quite vivid on the higher planes) remains mostly invisible to humanity on the Earth plane. Thus, there is nothing more to be said about it at this time. The key to healing group-ego conflict lies in the way we would approach our individual enlightenment. After a soul realizes that the Divine is living it, that soul feels its connection to group souls. Do we need to wait for each soul to attain enlightenment before ego-groups and the entire human race feel Divinity as its root? The answer is \"no\" \u2013 we do not need to wait for each individual transformation. While each individual is cultivating awareness and identification with its unique root, the ego-groups are also evolving their consciouness, and \u2013 similarly \u2013 so is the entire human race. This work is ongoing and relentless, and each individual being continuously feels the totality of these influences at play \u2013 even if unconsciously. Self-awareness took time \u2013 cycles of iterative development, group awareness takes time, and planetary self-awareness takes time. Where is this all going? What are we all evolving toward at these different scales and planes of existence? The vision for our evolution has been built into our collective unconscious since the beginning of our time as human souls. Yes, soul-groups have differences from one another. However \u2013 intuitively, we all know that all individuals are to wake up to their potential, and each has equal inherent value \u2013 no one is superior. If an individual does not know this, they will \u2013 eventually. Faith is the trust we place in the ultimate unity of unique and individually awakened parts. While this end state does not yet exist and is unknown (because it is being created by each of our lives and collectives \u2013 as we live), we already know that such a state is free of fear on all levels. Thus, whatever fear is on the physical plane, its counterparts on the the higher planes must also be seen through, understood, and surrendered. Faith is what happens when we let go to what is known unconsciously before it has become conscious. While our current tendency is to predominantly focus on ourselves, we do have times when we feel our ego-groups and intuit the direction of evolution of these groups. We even experience times when we consciously move across boundaries of species and consider animals and plants. This is all evidence that more than our individual process is occurring, and collective and universal processes are ongoing. Individuals can awaken groups, and group-consciousness can awaken individuals. The awesome nature of our existence is all-inclusive, whether we recognize this yet or not. It may or may not be obvious that enlightenment is both for our awakening and also the awakening of groups at various scales. We all benefit from such a multipronnged approach. No one is left behind. Each ethnic war awakens all of us a little more to Human Rights and its higher-plane counterparts. The idea that superior races are possible is dying \u2013 we are over the hump. By working on our individual awakening we also learn to access consciousness at different scales. Each of us participates on many levels simultaneously, and this participation accelerates the whole \u2013 just as the whole accelerates each of us. In the meantime, we must continue to unite in the Earthly processes of establishing human rights for all. This is a messy process and often seems difficult and hopeless. We must trust that, beyond our self-absorbed tendencies, greater forces are at play. By simply attending to such ideas, we are helping to ignite the whole into a conflagration of both individual and collective consciousness. We must continue to engage our attention with what we know is true. We must learn to actively listen to the universe, for It is never silent and speaks in languages fit to each of our multidimensional bodies. Within compex systems, there is always emergence \u2013 an unpredictable state of organization from a seemingly chaotic state. This emergence happens frequently in both natural and synthetic complex systems, as frequently discussed in scientific literature. This is happening to all of us, and we are happening to It. No one will be left behind and honed attention is what is mostly needed. In spiritual networks, it is common to label someone as \"advanced,\" be it the teacher, another practitioner, or oneself. It is pretty common to see someone presenting themselves as spiritually advanced. But how many go further to clarify what being \"advanced\" really means? \"Spirituality\" is a loaded term that is contextualized to philosophy and religion, and conjuring images of crystals, candles, 5 am meditation, yoga, tarot cards, organic foods, and chanting. Yet, it just so happens that true spirituality has no props and all the aforementioned objects and practices do not define spirituality. A spiritual life is available to all and is independent of one's background and belief systems. If this were not true, some of us would be somehow superior to others, and one life would be considered more valuable than another \u2013 how is that possible? \"Advanced\" is a strange term to use with spirituality because it implies being above and even beyond. To the ego, which loves to compare everything and everyone using its meter stick, \"advanced\" means either \"better than me\" or \"beneath me\" (ego is fairly binary). Comparison for purposes of fortifying oneself is a game children play on the playground, picking teams consisting of those most like themselves. Something more unified than the individual is living all of us and, like a light beaming through a prism, is refracting into a rainbow of colors as each of us. The reality is that we can transform our perception of and relationship to what lives us. We are a differentiation of the One living consciousness that is experiencing itself through its many facets. Do we know this? If so, to what degree? Spiritual evolution is a matter of shifting one's attention to identify more and more with the Life that lives us, rather that our bodies, emotions, minds, diseases, and other conditions. No one is faulty at the core. The shifts seem to follow a pattern with common milestones. To identify with something means to know that you are That \u2013 not separate, not worshipping something outside of yourself (and not worshipping yourself either), and not striving toward or pulling in anything because you are That. I understand an \"advanced\" state as being increasingly identified with the unifying principle while maintaining an individual expression of that principle. We can be unique without being separate. Our bodies express our degree of identification with this unified Consciousness through verbal and nonverbal communication. Our bodies are also valuable instruments for accessing and integrating the countless aspects of the one consciousness by happily handing over any clinging to a separate self. The more we surrender ourselves to That, the less we believe we are something superior or extra special. Thus, one naturally becomes humbled by existence as one evolves, while simultaneously understanding more deeply the value of all life. This is not even close to the practice of comparing, labeling, or either celebrating our superiority or wallowing in our self-perceived low attainment. People who don't use \"spiritual\" terminology may very well have undergone a transformation where they have peeled off the layers of separation \u2013 perhaps even more so than those who deftly toss around Sanscrit terms. This fact is often overlooked by those looking for superficial markers of a spiritual life. Someone who did not read the Vedas may be closer to reconfiguring their perceptual mechanism. Transformation, as the name implies, is a fundamental shift in how one experiences life and relates to its processes. Perception changes to the degree that one begins to invent words and imagery to describe what one lives because such concepts do not exist in spoken languages. True transformation is not imagination because the descriptions of the so-called sages (as far back as ancient times) actually match at various key milestones. For example, I have read Buddhist texts about the Watcher after going through several transformations myself to identify with these successive layers of consciousness. The Watcher is a palpable presence that seems to be observing \"you\" thinking, speaking, and doing until you identify with that observer. Then, one finds yet another Watcher. Eventually, there are no more Watchers. How do I know? Because in the incomplete state, a Watcher is tangible \u2013 there is clearly someone watching and seems to be other than yourself. Mostly, people claiming to be aware of their \"consciousness\" are aware of one of such Watcher layers. Once you've felt one Watcher, the rest are more easily recognizable. Their absence is also very obvious, which happens as one goes futher in letting go into Life. The One Life lives us and breathes us, not the other way around. Transformation is a fundamental change in the configuration of our multifaceted body, rather than a honing or refining of an existing configuration. To someone who has gone through the change, it is obvious who else has or has not. An \"advanced\" being cannot prove to others anything \u2013 nor wants to. But such a being can easily see where others are in their evolution toward unification and reidentification. Most important, such a being will not casually make claims about his or her state, lightly choose to become a public figure, or even subtly put down anyone at whatever level of life. I have run into a number of people claiming something about themselves when it is clear that they have not transformed but simply got their life on stable footing. Also, highly tuned intuition or access to certain nonphysical planes of existence are no indicators of how or whether that being identifies. If \"advanced\" means seeing auras or reading people's minds, then we are talking about different types of evolution \u2013 many who have not freed themselves can develop these skills but still remain removed from absorption as the One Life. I am not at all implying that any life stage is more valuable than another. We all have equally important parts to develop by living. We will all make different and valid contributions as our lives unfold. Someone asked me once why bother evolving or transforming if we are all valuable. The answer is simple \u2013 those poised for change will do the work to change \u2013 this will feel like the whole point of their existence, while others will have no interest in doing so. In any case, change is just that \u2013 something different, and neither superior nor inferior. If someone is poised for change \u2013 especially at the critical points of early transformations, a teacher may come and invite one to complete the process. The teacher is an accelerant for something that may take lifetimes to do by oneself. For someone who is on the cusp, why wait aeons when the opportunity presents to move faster? There may be good reasons. A clear expression of oneself supercedes any transformed state. Many advanced beings were seen as faulty because they did not express themselves clearly. Maybe they presented themselves as greedy opportunists or just horny, and this detracted from their contribution to humanity. \"Advanced\" beings, whether hidden or in public view, contribute many things most people will not recognize as contributions by a certain person \u2013 beyond their spiritual talks and pithy wisdom. As one transforms, certain acts of service go on automatic and cannot be not done. In simplest terms, such beings make a difference to multitudes simple by being. They do not care if anyone knows what they really do and who they are. I am a regular Joe. A mom with a job and two kids. I will remain that until my death. Most people won't see me as anything else and it doesn't matter to me. While my intensity is evident, it will be just \"intensity\" to most observers, chalked up to my personality. In the meantime, I work on healing and clarifying my own expression. I want no gaps between my authenticity and what I present in everyday life. Be wary of those who put down the human race or talk about it like a plague \u2013 this is not \"advanced\" behavior. As one gets closer to unification of life, it is impossible to hate or resent it, even while regularly confronting any dysfunction in no uncertain terms. Asserting truth may be seen as anger, but it can be very different from anger \u2013 although the intensity may be easily confused with anger at first glance. Unconditional love becomes not only fundamental, it is simply one's natural state and has little to do with the sticky, clingy \"love\" in most couples. \"Unconditional love,\" despite being misunderstood, is a phrase that still brings hope to humanity and continues to function \u2013 for now. From a 50-thousand-foot view, the human race looks like a giant ant colony, moving piles of dirt from one place to another. As a child, I once asked my father why he worked so hard. In my ignorance, I said to him that he resembled an ant. At the time, I did not understand how much work was required when one was trying to rise out of poverty. Frankly, I did not understand why anyone would want to live at all, given that life looked like some kind of voluntary slavery. The instinct to cling to life at all costs was never a part of my composition. People who were content with their situations didn't inspire me either. They projected an image of having everything they needed and maybe even wanted. However, they lacked that spark of spontaneous and creative joy. I knew even back then that what most called happiness did not even come close to the real thing. Contentment is a fragile state, heavily dependent on life circumstances. If things don't go well, contentment shatters and is supplanted by tears, prayers for help, and suffering. If happiness were real, it had to be independent of life's ups and downs. But how many can say that they are happy when their situations go south and find winter? I was convinced, for awhile, that the answer to happiness was in detachment. I wanted to be immune to emotions completely, and fantasized about being like Mr. Spock on Star Trek. If I felt nothing, nothing could hurt me. And yet, I was highly emotional and mercurial, which frustrated me to no end. Had I not met my last teacher, I may not have ever known what real happiness looks like. It is so much more than even-tempered contentment and detachment. And it requires nothing less than a full-being plunge into life \u2013 an immersion from which there is no return. For nearly a decade, I have been naturally immersed in life. In every daily detail lies an immense opportunity. Every moment is so rich, and our natural state is to be in this \"zone,\" in this \"flow,\" and authentic. This state is truly limitless and unbridled by doubts. At the end of the day, I reflect. Every moment was spent giving of myself spontaneously and fully, and receiving the kind and heartfelt gestures of others. I have no time for anything else. Am I busy, or am I inseparable from living by superficial task orientation? How many use tasks to escape the moment? The day \u2013 and I \u2013 feel full. Nothing is amiss. Nothing is lacking. Although I am sleep-deprived, attending to many daily details, and constantly running around, there is an unshakable stillness and joy. In my household, my kids and I never miss an opportunity to laugh and celebrate connection. It turns out that the journey is all the fun and there is no destination. The destination is an illusion \u2013 a temporary marker for some next step. After the illusion is stripped, it is obvious that evolution is endless, boundless and \u2013 paradoxically \u2013 uniquely customized to each of us. In an awakened state, we are the Divine in motion. We coruscate and gleam an embodied life process that leaves no room for false niceties, tight-lipped smiles, tough fronts, or know-it-all rigidity. Our natural state is freedom. Thus, it becomes literally impossible to waste time or to view tasks as an end goal. Every moment spent being fake or detached is a waste of time. Every moment that is steeped in fear, worry, delusions of grandeur, or false humility is lost forever. Authenticity removes us from time by weaving us deeply into the fabric of existence, and time itself is surrendered. The clock stops or becomes irrelevant, and One becomes lost in service and feels no need to be found. Simple tasks transform into continuous, conscious actions. We transform by letting go of all safety nets, which were really mechanism that bypass life using closed-loop self-absorption \u2013 busyness. The majority of people need to be reminded quite often that their lives are unfolding instead of waiting for a \"working\" routine. It is easy to get into blind habit and lose awareness of what is fresh. Once one embraces their authentic nature, any worry about being ill-fitted for life disappears and only pure awareness and expression remain. Expression is life. It is the dance of a unique soul realizing its relationship to the whole while embodying the whole. When a being is guarded about their expression, they are not free. When a being minces words and is easily embarrassed, they are holding on to something that isn't real. In the full state, there is no concern with being understood or misunderstood because one knows where thoughts and words are born, and how to imbue them with intention. More than a vehicle, the body is a mechanism for constructing conscious relationships. Life is truly all there is, even in the seemingly lifeless. Surrendered awareness knows that nothing is dead and that there is no death. Absolutely everything is life. Busyness is dull. As a child, I wasn't wrong to question task-orientation as a way of living. Neither did I miss the mark when I thought that humanity was sleepwalking and dreaming, but not living. People call death the point when the body gives out, but I see death as a continuum of the degree to which one is immersed and connected to life. One could be highly active but dead, or laying down to rest and vibrantly alive. We all have miles to go before we sleep. But our lives are measured in how authentic we are while moving through the moment. Our busyness is irrelevant when it is an avoidance of life. Life is not indifferent to whether we embrace it or avoid it \u2013 it will continue to communicate the truth until we are ready and able to \"hear\" it. We eventually see through empty acts and discover our natural yearning to let go completely into our unfolding process. The human ego is incredibly challenging to see in action. This mechanism has the ability to blind us to our behaviors and to mask the real intentions under what we project. The ego is so convincing because we think that it is who we are and that it is us who is deciding what to do. In fact, our true yearning remains something we can dismiss or rationalize away. Thus, it is incredibly difficult to transcend the ego. Nearly every person has an ego whether the person accepts this or not. In fact, it is a rather pointless discussion to convince anyone of this fact. By its nature and function, the ego does not want to be seen \u2013 let alone dismantled as the primary driver. While it is more comfortable to believe that one's ego is \"gone,\" premature claims just postpone further growth. A person who is ready to move into the work of dis-identifying with ego will know the truth of the situation on some level. There is also a difference in transcending the ego and dissolving the ego. Transcending the ego relegates its status to a tool, rather than one's identity-shaping mechanism on the lower planes of existence. Dissolving the ego invokes other processes to configure one's relationship to life. The ego is a lens through which we forge an identity that is separate from others. It can be a useful lens for developing oneself in the world. It is necessary to evolve one's body and mind such that they integrate with the life day-to-day. Without a critical mass of this integration, one cannot feel the boundaries of one's perception at all. Although our boundaries exist, these boundaries define who we are and we do not feel any calling to push through anything. The majority of the human race is at this stage of not recognizing that one's entire perspective is custom-made to build a powerful identity. People without a fully formed identity are seen as unsuccessful in the world \u2013 they don't have good \"luck\" with earning an income, romantic relationships, and succumb to fear of real-world pressures. Ironically, one first needs to realize one's ego to be prepared to transcend it. Enlightenment, even in the earliest stages, requires humility. If you think about it, one must be willing to be wrong to be capable of humility. The ego does not like to be wrong, to be \"below,\" or to be anything other than self-concerned and comparative. Some common tactics of the ego include fear, hiding, making excuses, blindness to reality, defensive or offensive maneuvering, control of people or situations, and attempts to convince someone of something. These behaviors are so prevalent in humanity that it is easy to assume these behaviors to be \"just human nature.\" Only when the ego is close to being trascended can one see through it and engage with it on a different level. Then, the ego becomes truly obvious. The ego is so custom tailored to each being that it must be \"decoded\" for each being individually. However, it cannot be \"diagnosed\" by the mind by matching specific behaviors to conclusions. An enlightened being may seem agressive, but the aggression is only the tip of the iceberg of what this being is doing in the moment. An enlightened being may counter a statement without being defensive. Only the intuition of a transcended being can see deep enough to understand the observable behavior, tone, or words. Even written words root down to the person's core and the ego is visible. What is a human being like beyond the ego? Open to what's possible, comfortable with the unknown, both confident and self-questioning, strong, quiet or vivacious, creative without judgement that down-plays the creativity of others, or rational or intuitive. Just like with the egoic persona, it is hard to \"see\" an enlightened being. The difference is, an enlightened being isn't bothered by this or any other projections on him or her. Oddly, one does not need to dedicate hours to meditation, yoga, or chanting to let go of the ego. What happens is that attention becomes tuned to this device throughout the day \u2013 maybe on and off \u2013 until it is finally felt as something \"other\" and not oneself. This attention is incredibly difficult to sustain. Unless a teacher is helping to bring internal dynamics to the fore, people eventually convince themselves of a comfortable truth and move on. That is the dilemma. The ego is not only localized to an individual consciousness, but operates on different scales. Groups have an ego. The human race has an ego. However, without seeing the personal ego, it can be difficult to imagine what is going on at these scales. Each person that is free can assist with global transformation in a way that can be described as one's unique life, but without all the drama. I have a beautiful mind. It's no longer an egotistical statement and just a fact, but this wasn't always the case. The story may be more interesting when I talk about the relationship of mind to enlightenment. I spoke early as a child. Standing in my crib, I babbled intensely \u2013 as if I were giving a passionate talk on my niche topic. As I grew up, I earned the nickname of \"professor\" in the hood. It was not a flattering name, but more of a putdown for knowing facts and reasoning logically \u2013 and not fitting in. Because I grew up in an abusive environment, I frequently looked for ways to escape. My escape was learning new things and solving problems. To this day, I do puzzles or math and physics problems for fun, but the way I approach these puzzles is different than before. My IQ was tested in my 20s and I scored very high. My mind was fluid and it felt fabulous to use it. But, my mind was useless for breaking through into enlightenment. As with any go-to asset, I wrapped my ego around having my intelligence, and the result was a person who relied on intelligence to gain advantage and confirmation of being real. When I met my teacher, I had to face the true reality that I was unable to \"think\" into enlightenment. This frustrated me to no end. My teacher was redirecting me to let go of using my ability to manipulate abstract concepts because enlightenment wasn't a concept. Enlightenment wasn't an experience, an induction, or a deduction. Whenever I thought that I had \"figured it out,\" I was inevitably wrong \u2013 and discouraged. Mind is a poorly defined concept anyway. Is this a combination of our awareness and reasoning abilities? Even the latter is vague. When I view the various vehicles (or \"bodies\") we use on multiple planes of existence, the mind can be viewed as one such vehicle, and the soul another \u2013 there are more. These vehicles are equipped with their own senses and processes and language, much like the physical body, and operate in parallel with the physical body. However, no body is Spirit. In fact, all bodies are inseparable from Spirit and are its expressions. It amazes me when people talk about Spirit as something contained by and separate from any body when, in reality, Spirit is literally everything. Also, what people perceive as Spirit varies greatly from one person to the next. Currently, there is no way to calibrate what each of us is referring to. Nevertheless, we can say that there is something. This something is expressing through all forms but is itself formless and uncontained. During the transformation process, I frequently confused perceptions by the various vehicles as enlightenment. For years, I had to go through the ups of feeling like I understood something to the downs of realizing that I was still incredibly confused. The struggle of wanting to quit at each down is real. The intense desire to have everything squared away and figured out is the reason why so many claim enlightenment without having actually broken through. Enlightenment must be tested. The tests are real. These test results are incontrovertible. Only someone who is enlightened can test enlightenment. Otherwise, an individual is biased by the interpretation of their own perceptions. Letting go of everything that defines us is a lot trickier than we think. In fact, because the ego is the very process of defining ourselves, it won't easily let go of the mechanisms that reinforce identity. Intelligent people will create an identity around intelligence, and similarly for any faculty or quality. The ego uses whatever is available and whatever we hold most dear. So, enlightenment is about letting go of whatever we feel we cannot let go, and the trap is set. When we let go of something, there are typically more things to let go of underneath. Imagine letting go \u2013 surrendering \u2013 something you never thought you could, only to realize that there is yet more to surrender. The will required to continue is immense. Again, the ego is a process \u2013 not a thing. As long as the process is running in the background, we are not free from it and we don't know it, necessarily, until it gives itself away \u2013 it always does, eventually. The ego is obvious to those who no longer run this process, but is mostly hidden for those immersed in the trap. The ego is tricky \u2013 when we are identified with something, we cannot tell apart what is it versus our true nature. When ego is threatened, it will respond in less-than-obvious ways. I feared that letting go of my mind would mean that I would become stupid, so I fought this tooth and nail. What did happen was that I stopped identifying with the mind and the mind became just a tool I use \u2013 or don't use. It is possible to choose when the mind disengages, but this does not result in a lack of intelligence \u2013 counter to my previous concern. Interesting. Popularized meditation techniques are explicit on allowing and observing thoughts without fighting to stop them. Well, imagine not having thoughts without any effort and still being intelligent. You want to reason logically? You can turn that switch on, and now you can allow thought to crank something out. I am amazed I used to think that the process of mind, which I could turn on or off, was me. The state of No Mind is the first level of enlightenment \u2013 a first real freedom. There are others. No Mind is what Buddhist call Sunyata, or emptiness. I guess this is also nirvana. It is a nice, restful state, but it is not complete. After the honeymoon, the transformation process continues and there are more hidden processes to discover and unwind. If we are not careful, we can get stuck in nirvana \u2013 a kind of detachment. This is not the end of the road. Paradoxically, further freedom requires diving into life even deeper and engaging in relationships with others during practice. Having quieter emotional reactivity certainly helps. Eventually, even the entire emotional body (process) morphs into something else. Each subsequent identity is dismantled, circuit by circuit. However, this is not done by the mind. So, what catalyst is responsible? The catalysts are living beings who are running freedom processes and modeling them for others. Those who are ready will engage, others won't. Many undervalue life as it is and believe all are here to \"become enlightened.\" This is simply not true. There is more to life than that. The enlightenment state is not applicable to all people because something else is needed in their lives at this time. Enlightenment leads to being in the world but not of it. It is a letting go of a large degree of involvement in this plane of existence, which most are not here to do. Why scoff at that?"} +{"id":"RedPajamaC4.0022","text":"The Vorlon ambassador is nearly killed by an assassin shortly after arriving at the station, and Commander Sinclair is the prime suspect. Tamlyn Tomita as Lt. Cmdr. Laurel Takashima(*). Blaire Baron as Carolyn Sykes(*). Johnny Sekka as Dr. Benjamin Kyle(*). Patricia Tallman as Lyta Alexander(*). John Fleck as Del Varner. Paul Hampton as the Senator. (*) These characters were originally planned as recurring characters throughout the series, but were replaced for various reasons. Note: There are two versions of \"The Gathering,\" the original one as initially aired in 1993 and a reedited special edition first aired in 1998. Items that only apply to one version are so marked. Earth has been keeping genetic records of telepaths for the last 6 generations. The Psi Corps takes children with psi abilities when they are young and trains them to use this ability in a very strict manner. There are definite rules governing the use of psi. No unauthorized mind scans. No gambling. All races but the Narn have telepathy. The Narn are a young but powerful civilization, with (G'Kar claims) unlimited manpower. The Narn heard about the reason for the Minbari surrender in the Earth-Minbari war - a decision from their Grey Council (a secret group of \"holy men\"). The Minbari are the oldest of the \"five federations,\" and centuries ahead of the others technologically. Londo says to Garibaldi: \"You know why I am here? I'm here to grovel before your wonderful Earth Alliance, in hopes of attaching ourselves to your destiny. [...] There was a time, when this whole quadrant belonged to us! What are we now? Twelve worlds and a thousand monuments to past glories, living off memories and stories, selling trinkets.\" Centauri status is based on family history. Political and personal power must be built up over generations. Takashima used to work at a corrupt mining station on Mars. Refusing to go on the take, she was never going to get promoted out of there. She recounts lashing out and \"breaking the rules\" out of frustration at it all. However, Sinclair was her superior there for a while, and he got her to shape up and play things by the book. Why was Babylon 5 really built, and rebuilt, and rebuilt, and rebuilt, and... rebuilt? Sinclair's story about human stubbornness doesn't hold water. B5 is a monstrous project, especially for a society very recently decimated by war. Yet it was made five times, the fifth time from SCRATCH. Who sabotaged B1-B3, and why? Who vanished B4, and why? How did the assassin get the voice and image of Sinclair in diplomatic dress before he poisoned Kosh? For everyone else he obviously impersonated, we'd seen him in close proximity to them earlier. The assassin-as-Varner pointed a gadget at Lyta in the bazaar. It is widely assumed that this acquired her visual pattern for the changeling net, but it could have been something else. Why did the assassin-as-Varner arrange to make Londo late for the reception? He kept Londo in a public place, making him unframeable. What hold did G'Kar et al. have on her? (see Analysis) Perhaps she was on the take in that corrupt mining colony, and she's still living on the take today. Why was she talking to the assassin-as-Varner, as reported by Garibaldi and Londo? Garibaldi must have asked her at some point, but we never get to see this. How was she involved? (see Analysis) Perhaps her role was only passive - agree to scan Kosh if asked, report any information she gathers (possibly via telepathy). What is the hole in his mind? Is it simply the 24 hour memory loss from his experience on the Line, or something more significant? According to Garibaldi's information, Del Varner would normally stay far away from B5. So, why was he recognized by a local tech (Eric)? Why did they request that the monitors in the docking bay be turned off? Kosh was walking out in public, hidden safely in his encounter suit. How did the poison get through to Kosh? He must have had his hand, or whatever the limb was, completely outside his encounter suit. Perhaps that explains why the Vorlons wanted the monitors turned off; they didn't want anyone else to see Kosh's hand. In that case, why did they want Sinclair to see it? Special Edition (spoiler for a pivotal revelation later in the series): Kosh greeted what he thought was Sinclair by addressing him as \"Entil-zha Valen,\" indicating that he already knew Sinclair in some context. Is there anything to that legend about someone turning to stone when they saw a Vorlon? Have people ever gotten into situations where they could conceivably have seen one? The Vorlons seem to be puppet thugs of the conspirators in the pilot, yet clearly they do some things for their own reasons. Why such secrecy around their technological inferiors? Why break the veil to send an ambassador to B5? For that matter, why agree to ship Sinclair to their world? Surely that would mean him finding out about them. Unless they never intended to bring him there alive, of course. Did Delenn really tell Sinclair everything the Minbari know about the Vorlons? Either way, how much does he know now? Why did they surrender at the Line? It's already pretty clear that Sinclair had Something to do with it. Furthermore, what was the real reason the Minbari were fighting the war to begin with? Why have they fallen so far from power? From Londo's stories it seems they were a great Empire within his lifetime (which may be quite long, for all we know). Why was the access panel outside Varner's quarters busted, by the time Garibaldi arrived? It probably has something to do with the assassin using Takashima's clearance to gain entry. Perhaps the panel keeps the only record, locally, of who's used it, and thus breaking it would prevent the illegal entry from being discovered. The very presence of a changeling net aboard the station invites us to open the question, \"Who else did we see that could have been that Minbari in disguise?\" Why was Lyta Alexander replaced as station telepath? Did she get in trouble for unauthorized mind-scanning after all, or was it because she's been in the mind of a Vorlon? Why has Carolyn drifted out of Sinclair's life? G'Kar et al. wanted to start a war between the EA and the Vorlons. The primary plan was for Kosh to be dead; Takashima's announcement that the Vorlons had forbidden the opening of his suit should have nailed that coffin shut. Framing Sinclair for the murder was probably also part of the primary plan (the Vorlons' request that the bay monitors be turned off could well have been a surprise to them). There may have been a secondary plan to achieve the same results: having Lyta scan Kosh. This could have been foreseen, impromptu, or coincidence. The assassin was Minbari, which indicates a violent faction of the Minbari still exists (cf: \"Deathwalker\"). The goals of that group are unknown, but so are the goals of the mainstream Minbari government. In particular, the Minbari warrior class may have had their own reasons for getting Sinclair sent to the Vorlon homeworld. The assassin used Takashima's palmed security access to gain entry to Varner's quarters. Takashima agreed to Kyle's plan of getting Lyta to scan Kosh even though (by her own story) it went very much against her grain. \"I guess I'm about due\" is hardly a believable reason. Takashima broke into Varner's files. 260 years from now, would someone be able to crack open a technology criminal's secure files in a matter of hours without inside information? There were lots of instances when very recent information was used to further the Plan, for all of which Takashima was in an ideal position to be responsible. The assassin met Kosh at the right docking bay at the right time. In general, the Plan proceeded smoothly in spite of Kosh's 48 hour early arrival (the angriest response we saw from Takashima was to this very discovery). Sinclair was trapped in a lift at just the right time for just long enough, and the record cleared. Someone actually contacted the Vorlons and told them about the poisoning, thus acquiring the predictable response that opening Kosh's suit is verboten. Someone leaked - very quickly - the fact that Sinclair had been fingered by a witness. This is what brought on the Vorlon cruisers. G'Kar found out - again very quickly - that Kosh would recover from the poisoning (\"There has been a complication\"). She seems to have exchanged glances with the real Del Varner as she walked off with Sinclair at the very beginning. The two probably came in on the same ship. Later, she's seen talking to the assassin-as-Varner. Yet the latter scans her image for the changeling net without her knowledge (if that was what he was doing), so their level of cooperation is mixed at most. The assassin, disguised as Lyta, didn't kill her in the ample moment they shared outside the medlab. On the other hand, her conversation with G'Kar within \"privacy\" would almost certainly have been very different if they were in cahoots. So perhaps she was only in contact with Del Varner and\/or the assassin. The assassin didn't need any special clearance to enter Varner's quarters; he was expected. So he must have used Takashima's clearance in order to leave a record of her entry at that time. Since the panel was broken before this could be discovered, this suggests clandestine cross-purposes. \"There is a hole in your mind\" may have been his response to Sinclair's question, \"Why did you do it?\" Interesting. It was not part of the plan for the Minbari to set off his explosives. Else why arrange to be able to get off the station? So, they were just to prevent his capture\/interrogation. He does not appear to be discomfited by Delenn's evasions in their Garden conversations. When he encounters Delenn after escaping the exploding assassin, it would have made sense for him to confront or question her, or at least be suspicious. Instead, he was relaxed and jovial. Later, he made sure Delenn knew he didn't hold her responsible. There were two stones in the stone garden. She evades most of his questions, yet volunteers two big files during the episode, and drops lots of other hints to him. As with her abstention on the council, she seems subject to contrary forces. Keep him in the dark, yet point him toward the light. She is a personally powerful representative of a very powerful race. Yet we don't observe her taking any active hand in the big picture so far. In the B5 council vote to extradite Sinclair to the Vorlon homeworld, an abstention was equivalent to a \"No\" (presumably abstentions are interpreted to mean \"None of the above\" or \"Take no action\", whichever is appropriate). So, what conflict prevented Delenn from explicitly voting against the motion? Special Edition: Delenn claimed she couldn't vote one way or the other because she didn't yet have all the information at hand, and that her orders where Sinclair was concerned were simply to observe, not interfere. He fills Garibaldi's ears with stories of the good old days of conquest. Bygone days, unlike the way things are now. He may be honest, or he may be trying to allay suspicions. More likely the former, since Garibaldi's suspicions don't have much political significance. A heavy drinker and compulsive gambler. Notice his jollity in telling Takashima his transport will submit to the weapons search (now that the assassin has successfully come aboard). True, if she was in cahoots with him, that little exchange was for show, as was their earlier confrontation at Ops. He's nonetheless consistently transparent in his emotional states. Some of her ideas were faultlessly loyal to the EA (eg \"You better take a recorder - the way things are going you may need a witness.\"). So, her heart's in the right place, at least. Self-esteem trouble. He's ready to give up on the investigation after Varner's death. He's used to failure at his other jobs. Losing sight of Varner while questioning Londo. Not talking to Lyta about Varner while it's still relevant. Not noticing all those Takashima timing and information clues. Lets the Commander get into a shooting fight with a superior foe, alone. An alternate introduction was written, but not filmed. When the assassin scans his hand at Varner's door, words are visible on the screen. If you have a lucid pause function on your VCR, you too will be able to read what they say - \"Laurel Takashima Cleared\". Minbari ships have short-range FTL, or cloaking, or jamming (Sinclair: \"They came at us out of nowhere\"). Basically, they can put themselves right where they want to be without Starfuries noticing them en route. Cruisers can \"wait\" in hyperspace outside a jump gate. Unscheduled uses of the jumpgates, at least during this earlier part of B5's history, are practically unheard of. Special Edition: Two plot points, Kyle's use of stims to stay awake and Takashima's use of the Garden to grow coffee, were both transferred to the characters who replaced them in the series. Ed Wasser played C&C technician Guerra, and later went on to play Mr. Morden (first appearing in \"Signs and Portents.\") There's no evidence that the two characters are related, however. Actually, at one point or another, just about *everyone* lied in the course of the pilot...including Sinclair, who lied to G'Kar, and of course Delenn lying to Sinclair in the Garden...and so on. The one thing that I dropped fairly completely due to the delay in getting the series going was the Laurel thread, which has now mutated and become something even more interesting, actually. It's something that's enabled me to now build in a trap door that you won't see for a long time, even though it's sitting there in plain sight. What happened to the old characters on the pilot, not working on the series? jms: On a classified mission (which I hope we will be able to get into at some point), Laurel has been reassigned out on the Rim, and Dr. Kyle is now working with the EA President on the issue of alien migration to Earth, a growing problem to some, a benefit to others. Pat Tallman passed on returning to the B5 project. Our new telepath will be played by Andrea Thompson, with the character name Talia Winters. Much of the Lyta arc will now go to Talia, but there's now a different way of getting her into that arc. Actually, I think we broke [the \"Return of the Jedi\"] record for ships on-screen in the pilot; Ron was rather pleased about it at the time. Will there be a director's cut? The odds are zero, since the first version of the B5 pilot existed only as a computer-graphic file edited movie. It wasn't edited on film, for real, until we'd pared it down. We'd have to go in and totally re-edit and re-score, and I doubt that's going to happen. Beats me, but if you find an uncut version of B5, lemme know, because I'D like one. The problem is that, unlike a motion picture, where you produce a cut on film, which you then trim down, we're editing on computerized image files. We don't get around to finally cutting the film until we've made our final edits. So no complete version ever existed on film. The most that could be done is get those 25 minutes and *build* a new version with that footage...which would require additional scoring, editing, and other stuff. The computerized cut of the pilot is now dumped out of memory, and those portions only exist on a few VHS tapes of marginal quality. Also, the footage in computer file form is *very* low grade, like a poorly scanned gif file, very low resolution. It would be useless on a laser disk. I'm certainly not showing disdain for the missing material; I'm just saying it ain't *there*. Now, if B5 turns out to be a megahit, there may be money set aside to re-edit the pilot some years down the road, but I'm not currently counting on it. My chief concern now has to be the series. There was a reason we gave Londo the pilot opening monologue, yes. And another reason why we're giving Sinclair the opening monologue over credits of the first season, though with some differences. We're also considering rotating any such opening between other cast members as well, but *always* in the past-tense, \"Babylon 5 *was*....\" We're dealing in future history here, and we plan to do some interesting things with that aspect. Yeah, Londo seems like the *least* likely person to do the opening narration for a show like this; you don't even see him for nearly two full acts, and it's the kind of thing you'd expect the Commander to do. Oh, yeah, the \"mission of destruction\" thing ONLY relates to this particular episode, the pilot. It'll be gone from regular episodes. \"Mankind\" was being used by Londo specifically in relation to humans, not sentient aliens including his own race. Earthers. Which was one reason (of many) I wanted his character to be the narrator, someone looking in from the outside. The alien section looked like a zoo! The other point on this is that if you look closely, there are back areas accessible to residents, which can in particular be seen in the insectoid\/antennae'd character's quarters. The idea was that it would be sort of a front porch, where for lack of much else to do, you'd sit out on the porch, watching the passing parade. But the reaction was less than favorable, we had to keep explaining that this proceeds from an alien POV, and so our alien quarters are more like human quarters now, minus the alternate atmosphere stuff. I'm still not quite sure what to think of this. Actually, it's Kosh's ship that comes out of the jump gate backward, engines forward to assist with deceleration. The fighters don't want to be slow-moving targets, so it stands to reason they wouldn't be configured for rapid deceleration. They want to get into position as fast as possible. Kosh's ship had to decelerate in order to dock inside the station. This is a reality of spaceflight...you must both accelerate and decelerate. Both take time. Especially if you're going to dock. Plus there was time involved in setting up the docking procedure, turning over control to Babylon Control, lining up vectors and so on. The fighters didn't have to worry about any of this. They came shooting through the gate and barely slowed at all, speeding over to B5 and taking up position. There have now been several situations in which we've been accused of \"mistakes\" that have, instead, simply been things done scientifically accurately. I have to say (and this isn't directed at you, just more of a general statement), we're not going to hand everyone everything on a silver platter, serving up pablum...the nature of a *science fiction* series is that you should THINK about things. The acceleration\/deceleration thing is one example; some thought about why this would be would have led to the answer. And, as evidenced by other messages here, others have taken the time to look at it from that perspective. Which I think is great. Re: the skin tab\/Kosh's hand\/encounter suit question...one of the reasons I can't wait for the series to get on the air is so that we can make one thing clear, once and for all: it is NOT an error, not a plot hole, it is a plot POINT. It is a question that our *characters* will be asking each other. How can this be? This will come up more than once, starting with \"The Parliament of Dreams\" episode. As for the Vorlon handshake (so to speak)...this will be dealt with in the series. You have to remember that the original plan was to air the pilot and go *immediately* into series, where we'd bring up some of these questions. There simply wasn't room to deal with EVERYTHING in that short pilot...and where we DID try and cover everything, we got gigged for being expositional. Now we have to re-establish a few things since there's been a gap in time...but the poison incident will be raised in \"The Parliament of Dreams\" script to start with, and move on from there. The Senator of the pilot, who was back on Earth, is someone who has in past been someone that Sinclair has come to for backing on things; he's the equivilent of someone on the Armed Services Committee, here as one of those civilian Senators overseeing Earthforce. He would not be in any position to just come in and take over, any more than a Senator visiting a U.S. army base would be in a position to take over the base if there were a problem with the ranking officer. But he might be able to bring some force to bear back in Washington, which might double-back to be of some use. There are civilian branches and military branches, as with today, in which the civilian branch oversees the military, but in very formalized ways. In the script, the privacy mode involved going from a standard looking open booth to what suddenly looked like a flat black cube, which you could neither hear nor see through. The director decided to try the lights. It didn't work. We're dropping it. You're right; the events of the Line are something that Sinclair doesn't much like talking about, and has been advised *against* talking about. When the Minbari surrendered, Earth put the best possible spin on it, tried to make the survivors of the Line look like heroes, but there's a general sense of what happened. And a great deal of dismay over it. Your assumption is correct; the assassin's weapon was a very small one...limited power, and a charge-up sequence that becomes longer the more it's used. If the Minbari had shot Lyta, it would've taken too long for the gun to power-up again for him to shoot Sinclair...and he would've been captured. We slightly expanded the power-up whine for each shot after the first one. You'll note that the first shot, the one that takes out Varner, is almost immediate. Points and fires. Gradually it takes longer, and finally the gun runs out altogether (which is why, though we probably should've been clearer in showing this, the assassin finally went hand-to-hand with Sinclair...the gun was never meant as an assault weapon, more as a derringer, with a few shots in case he got into trouble). As for Sinclair going after the Minbari assassin...there were several reasons for this. First, this was personal for him; if the guy *wasn't* caught, he would be blamed for the death and sent to the Vorlon homeworld. He had something very much at stake. Second, if you have somebody with shapeshifting technology on board, the LAST thing you want is to send in a large group. The tracking of the energy web used for the holographic effect was good, but only to a certain point. It could say \"He's ten feet away,\" but if there's 5 guys within that range, it'll take you just long enough to react for the assassin to wipe out the bunch of you before you figure out which one he is. But if there's only *two* of you, and you hear the shifter is within 10 feet, you know *exactly* who it is and can react accordingly. It seemed logical. Also, you'd want someone there who you knew VERY well, in case there were a replacement...because while someone could emulate a face, they can't replicate memories, and Sinclair or Garibaldi could quickly figure out if the other was an imposter. Yes, I probably could've stopped to explain this...but I figured it was readily apparent, and there was already enough exposition in the pilot to stun a horse. \"If JMS had not mentioned the hole in Sinclair's mind, what would have been the reason for the assassin to try and kill Sinclair?\" Hello...did you see the same movie that I wrote? The assassin was not there to kill Sinclair. He was there to kill Kosh. He tried to kill Kosh. He tried to stay AWAY from Sinclair, did everything in his power to avoid Sinclair, ran from Sinclair, and only finally encountered Sinclair when Sinclair came after HIM. Then it was nominal self-defense. Had the \"hole in the mind\" reference never been made, it would have been clear -- at least clear to every other carbon-based lifeform who saw the movie -- that the assassin 1) came to try and kill Kosh, 2) in the hope of disrupting the purpose of Babylon 5, with the added benefit of 3) if he failed in his mission, setting up Sinclair to take the rap for his actions. At the very end, rather than be captured and interrogated, the Minbari assassin killed himself with an implanted bomb. His comment to Sinclair at that moment was more of an \"Up yours\" comment, designed to shatter Sinclair with the knowledge that he knew something Sinclair didn't. You keep saying he was there to kill Sinclair. He wasn't. He didn't. He didn't try. It makes it hard to have this conversation with you if your comments don't touch reality at any two contiguous points. I never said that the [assassin's] intent wasn't to set up Sinclair; I only said that he wasn't there to *kill* Sinclair. That aspect of making Sinclair the patsy was very much part of the thing. What Kyle suggests...is closer to the truth than might otherwise be suspected. We had filmed a scene -- which never made it into the finished pilot -- where Garibaldi, growing suspicious of his boss -- confronts Sinclair in the core shuttle. One of the alibis he checked out doesn't hold up: Sinclair's. The transport tube computer records don't indicate any delay. Sinclair suggests that there's either a problem with the system, or it's been deliberately altered to remove that information. It was, of course, the latter. Now...stop and think about this for a moment. The Observation Dome has equipment to detect approaching ships. The spider transport approaches without being noticed. The surface of the station would likely have sensors to detect something attaching itself to the hull. Somehow these were over-ridden. The only time that anyone notices, up in the Dome, is later, when Laurel isn't there, interestingly enough. Someone deliberately programmed the transport tube to delay Sinclair. The assassin would have to know this in advance. We saw Londo with the assassin. We also saw Garibaldi, Lyta, Dr. Kyle and -- later -- Sinclair with the assassin, each relating to him in different ways. Who was the one person we never saw with the assassin, whose reactions might have told us something? Who was the one put in charge of the station when Sinclair was pulled out of circulation? We had some...interesting things in mind for this character. Now that another character has come in, some things will be modified, but other elements will come in to replace them. There was an element of saving her own life...and another aspect of all this is that she may not have been acting entirely of her own free will during the first half. There may be some influences that will emerge later. Laurel was not being altogether honest, and was helping to cover the activities of the person who was doing the assassination attempt. This has already been answered; had the character stayed with the show, gradually it would have emerged that the assassin had access to Laurel's codes because she provided them to him. This isn't so much a spoiler, since it concerns an abandoned story like (or, let me rephrase that...a modified story line). I mention this here since I just mentioned it elsewhere, and might as well do so here. Think hard about the pilot for a moment. Whose job is it in the observation dome to monitor incoming ships...but apparently let the spider transport slip through unnoticed? The station's skin should have (and likely did) detect something clamping onto it...but apparently someone over-rode that for the spider transport. Someone had to PRE-arrange access via the computer for the assassin, since it easily palms its way into Varner's quarters. (And what is the name of the person the access computer recognizes?) Someone had to arrange for the transport tube to be delayed, and then *erase* that information from the computer system. Someone who knew *exactly* when the Vorlon ship would be docking. We see, at various times, the following people interacting with the assassin, in different capacities: Garibaldi, Lyta, G'Kar, Londo, Dr. Kyle, and of course, much later, Sinclair. Who did we never see in direct contact with the assassin? Who was put in charge of the station after Sinclair was removed? Do you notice a pattern developing? Do certain things here point to a certain individual...who may, or may not, have been acting on her own volition? And yes, this is something we planned to explore, though it wasn't on a *direct* line to the arc of our story. It definitely impinged upon it, of course. This has been modified due to the change in the character of the Lieutenant Commander, and this now won't go where it was going to go...but we still have some very interesting plans for our secondary character, not at all along the Takashima lines (which is why this isn't a spoiler), but certainly intriguing on their own terms. Now, I didn't say she was a villain. I said that certain things may or may not have been done of her own free will, her own volition. What this means...we'll see. The scruffy person in the Varner files was the same homeless person who we just happen to see sitting right outside Varner's quarters, watching as he moves along. This was played by Ron Thornton, because we wouldn't be seeing him in a major role, we'd just have to know someone was there. Again, this ties into a specific story line that has been modified with a) the departure of Laurel, and b) the length of time since the pilot aired. Who was the homeless man really? It's no longer an issue, but it was related, yes. But only in a very small way. \"Would it be fair to compare the original ST pilot to B5's pilot?\" No, it would not. Because there is nothing in common with them other than that they are both SF. You can compare TNG to DS9 to TOS, because they're in the same universe. Would it be fair to compare Cagney and Lacey with NYPD Blue? After all, they're both cop shows. But in fact, they're not the same kind of cop show; they share the same genre, but there ends the overlap. The two shows are distinct, separate entities, just as Harlan Ellison's work is distinct from Bill Gibson's work, even though both incorporate elements of SF. The ST pilot existed in its own universe, and was primarily an action show. The B5 pilot exists in its own universe, and primarily sets the stage for a political mystery\/intrigue series. It wasn't meant to serve the same functions as the ST pilot. It seems to me that many SF fans continue to compare everything to ST because that's their primary frame of reference, and they continue to apply it whether it's relevant or not. My suggestion...get another frame of reference. Once again, there's a lot of false analogies here in any attempt to compare pilots, as in this TOS and B5 thread. You're talking about transporters and other *technological* items. And you're right, they didn't explain their tech. Neither did we, with the exception of the changling net in the pilot, and only because it was a plot point. We didn't explain how the jump gates worked, how centrifugal force kept the gravity in place, or any of that. The difference isn't *technology*, it's *context*. Once again, B5 is in many ways a *political* story. Consequently it's necessary to explain who the players are in some detail, something that ST didn't have to worry about. If you're reading a political thriller about the U.S. and the (now defunct) USSR, it helps a lot to know who's who. Also, when ST started, there wasn't really a clear agenda, a place that they were going, story-wise. B5 is a novel for TV. And that puts on some pressures and problems other shows don't have. Others may not see it that way, but it isn't their call. It's my call, and I stand behind it, even while seeing some of the flaws in the pilot. All of which again points up the...well, *pointlessness* of trying to compare the two shows. Compare MASH to ALL IN THE FAMILY. They're both comedies. The similarity ends there. Everything doesn't have to be comparable or dissectable (to coin a term) in reference to ST. Let me just, against my better wishes, dive in here for just a moment moment on this discussion. Especially as it relates to your slam against the characters and characterizations on B5. People keep comparing the B5 pilot to either the DS9 pilot or the TNG pilot, often favorably, sometimes less so, but the reality is that the B5 pilot had to suffer under a burden shared by neither of those two other shows: establishing a whole new universe, especially given that the B5 story is more of a political\/action piece in which you really have to understand where everyone's coming from. By the time they got around to making the TNG pilot, just about everyone knew what a Klingon was, what the Federation was, what phasers and teleporters were...this was all established cultural coin. When Jay Leno would make jokes about Klingons on the Carson show (which it still was back then), he didn't have to explain it to anyone. There's 25 years of shared history informing the story. Same in DS9. Thus in neither pilot was that much really or substantially *new* introduced, they didn't have to create the universe from scratch. But that was exactly what was necessary for B5; the relationship between the five various governments is important to understanding the characters, and the show...as is the recent Earth\/Minbari war, which isn't just backstory, it's something that will grow to play an increasingly important role in the series as time passes. So there had to be time spent establishing each of those relationships, the political backstory, the minor players. AND we had to tell a fairly complex story within that framework. After you allocate the history of the B5 universe, for the establishment of the plot, for the establishment of who our various players are in relation to one another, you've got -- at MOST -- 3 minutes left per character out of a 92 minute movie. You can't establish a lot of character in 3 minutes. Which is what strikes me as unfair in this conversation. You're trying to compare 25-30 years of ST in its various incarnations, with its delivery of characterization over A WEEKLY SERIES to a single introductory TV movie of 92 minutes. Plus, the pilot was never meant to be a stand-alone; it was meant to get all the pieces moving, introduce us, and follow up the very next week with *character-oriented stories*. That was always the plan. Had I known that it would be aired by itself, with a long delay until the series, I would have totally restructured it to make it more of a character story, and held off on the heavy background stuff until later. And in addition to THAT, I again point to the 25 minutes of good character stuff that ended up on the cutting room floor because we were over, some of which has been shown to people at conventions. Some of them also felt as you do. They saw the extra footage. And their reaction: \"Oh, so THAT'S who that is!\" And their opinions of the characters did a fast turnaround. So what I'm saying here, fundamentally, is this: let's compare apples to apples and not apples to oranges. You can't compare B5 to either TNG's or DS9's pilots, because they operated in pre-existing universes. You can't compare the level of character you get in a series to a TV movie, because one is 92 minutes long, the other is 22 hours long times the number of seasons run. If you want to compare things, and that's certainly your right, may I suggest a moratorium on this entire discussion until the series comes on the air? That will allow you to compare series to series, which seems just a tad fairer to me. Any seconds? Re: the pilot...I've hashed and rehashed this, and the bottom line is to see what we do in the series and judge the series by the series. The DS9 pilot had to explain very little that wasn't specific to the plotline: you already knew what a Bajorran was, what a wormhole was, what the Federation was, what the Cardassians were, on and on and on. Because they didn't have to introduce any of that, they could spend time on other character moments. We didn't have that luxury in the pilot. We had to do what, in essence, ST has done over 25 years: establish our universe, painting it in broad strokes, as broad're done with that aspect. And now we can do our character-based stories. Which is exactly what we're doing. Each of the characters is being solidly rounded out in the series, showing multiple sides to each character. All I can say is that I think you'll like what we're doing. I wasn't gonna jump in here, but I have to at least answer your question: \"Where's the rest?\" The rest is in the series. You haven't seen the series yet. You're comparing it against 7 years of TNG; rather consider if the ONLY thing you had EVER seen was \"Farpoint.\" We had a massive burden: to build an entire universe, based around a political drama, in basically 90+ minutes not counting commercials. That meant that more time went into exposition and backstory than I'd like. In my view, we've now done that, we've laid the foundation, and now we can sit back and tell stories...*character* based stories. That's what I'm best at, and that's what the writers I've chosen to use on the series are best at. The \"rest\" you ask for is there..in the series. But I'm not asking you to take my word for it. Check out the show. Maybe you'll like it. And maybe you won't. That's showbiz. You don' like it, you don' gotta watch. But I think you'll be pleasantly surprised. The miracle of the B5 pilot is that it got done at *all*, given the odds against us, given a team working together for the first time, without the benefit of an established universe, and actors who had never worked together before who had zero chance for rehearsal. I'm not apologizing for the pilot; it had flaws, but I'm very proud of a lot that's in there. Do the math. You have a little over 90 minutes. You have to introduce 9 major characters in the course of that story. That gives you ten minutes of attention for any one character. Now you've also got to tell the backstory. You've got to establish who the various players are. You've got to put the present-tense story into motion, with beginning, middle and end. And now you're left with maybe 3-4 minutes of \"quality time\" with any one character. If we only had 2 or 3 characters, then it's a very different story...but that isn't the universe we have to work in. Now that the series is going ahead, we can spend an entire *episode* dealing primarily with one character. And do the same for others. We have the time. And that's what's important. One last observation: you repeat the notion that it's all a \"reaction\" to TNG. The treatment and screenply were complete and making the rounds in Hollywood in Spring 1987. The basic material was written in 1986, at a point in some cases when TNG hadn't even *aired* yet. So it could hardly have been written as a reaction to something that hadn't been seen yet, could it? You repeat several times your insistence that I study TNG to see what they did right, use them as a roadmap. Sorry. I have no desire to study TNG. I'm telling a different sort of story, in a different universe. What TNG does right or wrong is more or less irrelevant to that universe. That's like saying that (just to pick two names at random) Orson Scott Card should study Poul Anderson as a roadmap in his own novels. This is utter nonsense. A while ago, I got an email from someone who didn't like the pilot (and it may have been on internet, btw) mainly because of the communication devices. He said, and I'm paraphrasing from memory, that every time someone used the wrist-links, it broke the illusion for him, since we all KNOW that by then the REALITY is that we'll be using the chest communicators that TNG uses, and I should be sure to include that in future episodes as a capitulation to that reality. Sorry...TNG is a roadmap for TNG. Not B5. The VOYAGER pilot is *$23 million*?! The BABYLON 5 pilot was $3.5 million. With $23 million, we could make 1.3 SEASONS of B5. And have a bit of money left over for a wrap party. My feeling here is, don't worry about the show, regarding your overcoming on the pilot. Pilots are good, bad or uneven. What matters in the analysis is the series. You can have a great pilot and a disappointing series. And vice-versa. The series will air. If it's good, people will watch, whatever they may have thought about the pilot. If it ain't good, people won't watch, and deservedly so. In other words, the ball's in our court now. \"The pilot wasn't good. Face it!\" I was asked to keep quite about this until April 23rd, which is when the announcement is to be made at the Nebulas, but now that it's indeed the 23rd, and that announcement either has been made or is being made now, I'm pleased to report that the Babylon 5 pilot movie, \"The Gathering,\" has been nominated for a Hugo. Since we're up against Jurassic Park, I think I pretty much know where THAT award is going...but it is a tremendous honor and everyone involved with the show is very pleased by it. Thanks. As it turns out -- I today saw the list of nominees -- B5 is the ONLY TV-SF nominated for the Hugo. The rest are all feature films (JP, Addams Family, Nightmare Before Christmas, Groundhog Day). Eric...nothing would gladden my heart more than if the B5 pilot won a Hugo (except the series winning a Hugo, which I think is a bit likelier, maybe). It is the highest compliment that can be paid by the SF community of readers and viewers. But one must be realistic, and I just don't see it outpulling Jurassic Park in the ballotting. JP is the proverbial 500 pound gorilla. Or the 50,000 pound T-Rex. Nope, I was nowhere in the pilot, not under makeup, not nohow, not no-way. Nor will I do so in the series. That just ain't my thing. Side-note...Londo baring his teeth had nothing to do with Delenn's vote in \"The Gathering.\" That was gas. Both Christy Marx and Kathryn [Drennan, JMS's wife] can both be *briefly* seen in the pilot movie as BG in the casino...and in the main titles, Kathryn's back is to the camera in the wide downshot, though you really can't make it out well in that one. Also in the montage in the pilot movie, seated at the bar under narration, the fellow with the beard, is art director John Iacovelli. The most entertaining thing for a writer is creating a character; the second most entertaining thing is killing off a character. Believe me, as you'll see in the Fight To The Death in the pilot, I have no problem dropping a body. And as far as I'm concerned, only 2 or 3 characters in this series are indispensible...the rest are open to all kinds of interesting fates. The amount of contact required varies according to the telepath's strength. Lyta at P5 needs a little help. A P10 could nail you from across the room. The encounter suit opened at the touch of a button (you can hear him press the button with a *click*). Only for Lyta did it open on its own. For the record...thtch has something to do with the second trial scene. It's the overhead shot of the courtroom; we didn't have a second establisher, so we used the one of Kyle even though Sinclair was on the stand. Actually, \"beep-beep\" was always there in the script; it was the part where we learn AFTER that that Sinclair only told G'Kar about the homing beacon, didn't really plant it, that came up during filming. Here's one little extra for you: only one person aboard Babylon 5 has any idea of what a Vorlon is, inside that suit, and only one race has had dealings with the Vorlons before. Watch the reception at the end, and see if you notice anything unusual in the way the various people respond to Kosh. How much of the basic \"saga\" is in the pilot? Some...bits and pieces. The problem, always, is that we have a whole new universe to establish, with all the backstory that goes with that. As it is, it's fairly \"information intensive,\" as one person put it. We find out about the Earth\/Minbari war, the curious surrender, Sinclair's past, the missing 24 hours, the relations between the various governments and their own personal agendas, and a hint of what's to come. This while establishing the backstory of all our characters, and telling a story in present time (for them). Actually, the funny thing is, I don't much mind if people who hadn't seen the pilot don't catch the rebroadcast. What we're doing now is SO radically better than the pilot that I almost can't watch it now. Agreed, the pilot movie was much darker...unfortunately, it was SO dark that we actually veered into what're called \"illegal blacks,\" that is, the picture is too dark, and this causes problems with foreign distributers. (This is what they tell me, and through an act of faith I have come to believe them.) We're still about a half-stop or full stop below what's typical. Be advised that many stations, when they broadcast the show, pump up the brightness a *lot*. They just dial it up. Laurel was not standing upside down in relation to the station's rotation. The docking bay, at the center of the station, for zero-g, was above her head, her feet pointed down, toward the rim of the station, in correct orientation. Just FYI. We'd originally planned to go for a more vague sexuality for Delenn; a male physically and primarily in the voice, on top of the natural female movements one gets from an actress. In post-production, however, we couldn't get the voice to sound as good and male as we'd wanted. In addition, a couple of convention showing of a rough cut saw people responding VERY strongly to her voice as it was, so we finally decided to let it stand and change the one reference to \"he\" to \"she,\" and that was the end of it. Delenn was originally going to be a fairly sexually-ambiguous character...a male character, played by a female, with a computer altered voice...but we couldn't make the alteration sound good enough to satisfy us, so we left her a her. Kosh will \"speak\" in the series. After a fashion. But not as you might expect. Suffice to say we've seen the final effect now in the mix of finished episodes, and it's *real* creepy. Okay, okay, 8 days not four...I knew it weren't no 3 weeks, though. The one thing to remember is that travel in hyperspace isn't the main problem; the real problem, time-wise, is the period required to get from a world to its nearest jump gate. It might take 4 days to travel from World X to the gate, and 1 day to B5 in hyperspace...while another race, 1 day from the gate, and 1 day to B5 in hyperspace, only has 2 travel days. Garibaldi was named after the famous Italian war hero of the same name. \"Now that TNT has set a definite date for airing the series, have they given you a 'go'"} +{"id":"RedPajamaC4.0023","text":"0:01 of 1st period - Eric Staal wins face-off versus Evgeni Malkin in neutral zone. 0:21 of 1st period - Shot by Evgeni Malkin. 0:21 of 1st period - Stopped by Marc-Andre Fleury without a rebound. 0:22 of 1st period - Derek Roy wins face-off versus Nik Antropov in Flames zone. 0:39 of 1st period - Shot by Alexander Semin. 0:39 of 1st period - Stopped by Marc-Andre Fleury without a rebound. 0:40 of 1st period - Jeff Carter wins face-off versus Manny Malhotra in Flames zone. 1:04 of 1st period - Shot by Mike Comrie. 1:04 of 1st period - Stopped by Ryan Miller without a rebound. 1:05 of 1st period - Eric Staal wins face-off versus Evgeni Malkin in Avalanche zone. 2:15 of 1st period - Patrick Kane is hit by Rick Nash and loses puck. 2:19 of 1st period - Icing by Nick Schultz. 2:20 of 1st period - Jeff Carter wins face-off versus Derek Roy in Flames zone. 3:31 of 1st period - Icing by Ken Klee. 3:32 of 1st period - Evgeni Malkin wins face-off versus Manny Malhotra in Flames zone. 3:39 of 1st period - Chris Higgins is hit by Jarome Iginla and loses puck. 4:25 of 1st period - Minor Penalty to Jochen Hecht for Hooking. 4:26 of 1st period - Eric Staal wins face-off versus Rick Nash in neutral zone. 5:04 of 1st period - Shot by Eric Brewer. 5:44 of 1st period - Shot by Patrick Kane. 7:07 of 1st period - Scott Hartnell is hit by Jeff Carter and loses puck. 7:19 of 1st period - Icing by Niklas Hagman. 7:20 of 1st period - Jeff Carter wins face-off versus Manny Malhotra in Avalanche zone. 7:55 of 1st period - Icing by Andrei Markov. 7:56 of 1st period - Eric Staal wins face-off versus Evgeni Malkin in Avalanche zone. 7:56 of 1st period - Martin St-Louis is hit by Tomas Kaberle and loses puck. 8:14 of 1st period - Evgeni Malkin is hit by Eric Brewer and loses puck. 8:19 of 1st period - Shot by Jarome Iginla. 8:19 of 1st period - Stopped by Marc-Andre Fleury without a rebound. 8:20 of 1st period - Eric Staal wins face-off versus Nik Antropov in Flames zone. 8:20 of 1st period - Markus Naslund is hit by Nik Antropov and loses puck. 9:11 of 1st period - Colin White is hit by Patrice Bergeron and loses puck. 9:18 of 1st period - Andrei Markov is hit by Manny Malhotra and loses puck. 10:18 of 1st period - Scott Hartnell is hit by Mike VanRyn. 10:31 of 1st period - Shot by Scott Hartnell. 10:31 of 1st period - Stopped by Ryan Miller without a rebound. 10:32 of 1st period - Nik Antropov wins face-off versus Eric Staal in Avalanche zone. 10:32 of 1st period - Nik Antropov is hit by Cory Stillman. 11:12 of 1st period - Icing by Eric Brewer. 11:13 of 1st period - Jeff Carter wins face-off versus Eric Staal in Flames zone. 11:44 of 1st period - Off-side. 11:45 of 1st period - Evgeni Malkin wins face-off versus Manny Malhotra in neutral zone. 11:48 of 1st period - Manny Malhotra is hit by Jarome Iginla and loses puck. 12:19 of 1st period - Shot by Evgeni Malkin. 12:19 of 1st period - Shot Blocked by Ken Klee. 12:21 of 1st period - Shot by Jochen Hecht. 12:21 of 1st period - Stopped by Marc-Andre Fleury with a rebound. 12:33 of 1st period - Icing by Rick Nash. 12:34 of 1st period - Derek Roy wins face-off versus Nik Antropov in Avalanche zone. 12:35 of 1st period - Shot by Patrick Kane. 12:35 of 1st period - Stopped by Ryan Miller with a rebound. 12:39 of 1st period - Shot by Derek Roy. 12:39 of 1st period - Stopped by Ryan Miller without a rebound. 12:40 of 1st period - Jeff Carter wins face-off versus Derek Roy in Avalanche zone. 12:49 of 1st period - Shot by Jeff Carter. 12:49 of 1st period - Shot Blocked by Nick Schultz. 12:59 of 1st period - Shot by Patrick Kane. 12:59 of 1st period - Stopped by Ryan Miller without a rebound. 13:00 of 1st period - Nik Antropov wins face-off versus Derek Roy in Avalanche zone. 13:00 of 1st period - Alexander Semin is hit by Scott Hartnell and loses puck. 13:10 of 1st period - Andrei Kostitsyn is hit by Dan Hamhuis and loses puck. 13:24 of 1st period - Minor Penalty to Dan Hamhuis for Tripping. 13:25 of 1st period - Evgeni Malkin wins face-off versus Eric Staal in Avalanche zone. 13:51 of 1st period - Shot by Eric Brewer. 13:51 of 1st period - Stopped by Ryan Miller with a rebound. 13:58 of 1st period - Icing by Brent Burns. 13:59 of 1st period - Eric Staal wins face-off versus Nik Antropov in Flames zone. 14:03 of 1st period - Cory Stillman is hit by Nik Antropov and loses puck. 15:22 of 1st period - Shot by Cory Stillman. 15:22 of 1st period - Shot Misses the Net. 15:24 of 1st period - Shot by Jay McClement. 15:24 of 1st period - Shot Misses the Net. 15:26 of 1st period - Shot by Chris Higgins. 16:18 of 1st period - Shot by Scott Hartnell. 16:18 of 1st period - Stopped by Ryan Miller without a rebound. 16:19 of 1st period - Nik Antropov wins face-off versus Derek Roy in Avalanche zone. 16:38 of 1st period - Shot by Rick Nash. 16:38 of 1st period - Shot Misses the Net. 17:29 of 1st period - Icing by Andrei Markov. 17:30 of 1st period - Patrice Bergeron wins face-off versus Manny Malhotra in Avalanche zone. 18:04 of 1st period - Shot by Mike Comrie. 18:04 of 1st period - Stopped by Ryan Miller without a rebound. 18:05 of 1st period - Eric Staal wins face-off versus Jeff Carter in Avalanche zone. 18:53 of 1st period - Off-side. 18:54 of 1st period - Derek Roy wins face-off versus Evgeni Malkin in neutral zone. 18:54 of 1st period - Derek Roy is hit by Evgeni Malkin. 18:55 of 1st period - Minor Penalty to Jarome Iginla for Hooking. 18:56 of 1st period - Evgeni Malkin wins face-off versus Derek Roy in neutral zone. 19:11 of 1st period - Tomas Kaberle is hit by Derek Roy and loses puck. 19:46 of 1st period - Icing by Brent Burns. 19:47 of 1st period - Eric Staal wins face-off versus Rick Nash in Flames zone. 0:01 of 2nd period - Eric Staal wins face-off versus Evgeni Malkin in neutral zone. 0:15 of 2nd period - Shot by Rick Nash. 0:15 of 2nd period - Deflect By Nik Antropov. 0:15 of 2nd period - Goal by Nik Antropov - Flames : 0 - Avalanche : 1. 0:16 of 2nd period - Evgeni Malkin wins face-off versus Patrick Kane in neutral zone. 0:22 of 2nd period - Icing by Nick Schultz. 0:23 of 2nd period - Evgeni Malkin wins face-off versus Derek Roy in Flames zone. 0:42 of 2nd period - Chris Higgins is hit by Nik Antropov and loses puck. 0:58 of 2nd period - Martin St-Louis is hit by Mike VanRyn and loses puck. 1:06 of 2nd period - Cory Stillman is hit by Rostislav Klesla and loses puck. 1:11 of 2nd period - Shot by Eric Staal. 1:11 of 2nd period - Shot Blocked by Mike VanRyn. 1:15 of 2nd period - Shot by Martin St-Louis. 1:18 of 2nd period - Cory Stillman is hit by Mike VanRyn and loses puck. 1:31 of 2nd period - Shot by Martin St-Louis. 1:31 of 2nd period - Stopped by Ryan Miller without a rebound. 1:32 of 2nd period - Manny Malhotra wins face-off versus Jochen Hecht in Avalanche zone. 2:35 of 2nd period - Shot by Alexander Semin. 2:35 of 2nd period - Shot Blocked by Ken Klee. 2:47 of 2nd period - Shot by Rick Nash. 2:47 of 2nd period - Stopped by Marc-Andre Fleury without a rebound. 2:48 of 2nd period - Martin Gelinas wins face-off versus Eric Staal in Flames zone. 2:57 of 2nd period - Shot by Jeff Carter. 2:57 of 2nd period - Stopped by Marc-Andre Fleury without a rebound. 2:58 of 2nd period - Jeff Carter wins face-off versus Derek Roy in Flames zone. 3:23 of 2nd period - Icing by Derek Roy. 3:24 of 2nd period - Nik Antropov wins face-off versus Derek Roy in Flames zone. 3:27 of 2nd period - Shot by Rick Nash. 3:27 of 2nd period - Stopped by Marc-Andre Fleury without a rebound. 3:28 of 2nd period - Nik Antropov wins face-off versus Eric Staal in Flames zone. 3:47 of 2nd period - Shot by Rick Nash. 3:49 of 2nd period - Shot by Marek Malik. 3:49 of 2nd period - Shot Misses the Net. 3:53 of 2nd period - Shot by Rick Nash. 3:53 of 2nd period - Stopped by Marc-Andre Fleury without a rebound. 3:54 of 2nd period - Evgeni Malkin wins face-off versus Derek Roy in Flames zone. 4:22 of 2nd period - Shot by Evgeni Malkin. 4:22 of 2nd period - Deflect By Jochen Hecht. 6:01 of 2nd period - Icing by Alexander Semin. 6:02 of 2nd period - Alexander Semin wins face-off versus Patrick Kane in Avalanche zone. 6:39 of 2nd period - Off-side. 6:40 of 2nd period - Eric Staal wins face-off versus Evgeni Malkin in neutral zone. 6:57 of 2nd period - Shot by Evgeni Malkin. 6:57 of 2nd period - Stopped by Marc-Andre Fleury without a rebound. 6:58 of 2nd period - Manny Malhotra wins face-off versus Martin Gelinas in Flames zone. 7:47 of 2nd period - Shot by Derek Roy. 7:47 of 2nd period - Stopped by Ryan Miller with a rebound. 9:31 of 2nd period - Mike Comrie is hit by Dan Hamhuis and loses puck. 9:43 of 2nd period - Minor Penalty to Dan Hamhuis for Hooking. 9:44 of 2nd period - Derek Roy wins face-off versus Rick Nash in Avalanche zone. 9:52 of 2nd period - Shot by Nick Schultz. 9:52 of 2nd period - Stopped by Ryan Miller without a rebound. 9:53 of 2nd period - Derek Roy wins face-off versus Evgeni Malkin in Avalanche zone. 9:56 of 2nd period - Shot by Patrick Kane. 9:56 of 2nd period - Goal by Patrick Kane - Flames : 1 - Avalanche : 1. 9:57 of 2nd period - Patrice Bergeron wins face-off versus Derek Roy in neutral zone. 10:05 of 2nd period - Brent Burns is hit by Andrei Markov and loses puck. 11:18 of 2nd period - Shot by Manny Malhotra. 11:18 of 2nd period - Shot Blocked by Dan Hamhuis. 11:44 of 2nd period - Rostislav Klesla is hit by Mike Comrie and loses puck. 11:56 of 2nd period - Minor Penalty to Patrick Kane for Roughing. 11:57 of 2nd period - Evgeni Malkin wins face-off versus Eric Staal in neutral zone. 12:10 of 2nd period - Shot by Jochen Hecht. 12:10 of 2nd period - Shot Misses the Net. 12:14 of 2nd period - Shot by Tomas Kaberle. 12:14 of 2nd period - Stopped by Marc-Andre Fleury without a rebound. 12:15 of 2nd period - Evgeni Malkin wins face-off versus Derek Roy in Flames zone. 12:22 of 2nd period - Shot by Jochen Hecht. 12:24 of 2nd period - Shot by Andrei Markov. 12:24 of 2nd period - Shot Blocked by Eric Brewer. 12:31 of 2nd period - Icing by Jarome Iginla. 12:32 of 2nd period - Evgeni Malkin wins face-off versus Manny Malhotra in Avalanche zone. 13:51 of 2nd period - Shot by Jarome Iginla. 13:59 of 2nd period - Shot by Chris Higgins. 13:59 of 2nd period - Shot Misses the Net. 14:35 of 2nd period - Shot by Mike Comrie. 14:35 of 2nd period - Shot Misses the Net. 15:08 of 2nd period - Minor Penalty to Jarome Iginla for Roughing. 15:09 of 2nd period - Cory Stillman wins face-off versus Rick Nash in Flames zone. 15:27 of 2nd period - Martin St-Louis is hit by Dan Hamhuis and loses puck. 18:11 of 2nd period - Shot by Evgeni Malkin. 18:12 of 2nd period - Nik Antropov wins face-off versus Patrick Kane in Flames zone. 18:25 of 2nd period - Shot by Alexander Semin. 18:25 of 2nd period - Stopped by Marc-Andre Fleury without a rebound. 18:26 of 2nd period - Martin St-Louis wins face-off versus Nik Antropov in Flames zone. 18:26 of 2nd period - Martin St-Louis is hit by Nik Antropov. 18:32 of 2nd period - Shot by Rick Nash. 18:32 of 2nd period - Stopped by Marc-Andre Fleury without a rebound. 18:33 of 2nd period - Evgeni Malkin wins face-off versus Derek Roy in Flames zone. 18:36 of 2nd period - Shot by Jarome Iginla. 18:36 of 2nd period - Stopped by Marc-Andre Fleury without a rebound. 18:37 of 2nd period - Derek Roy wins face-off versus Patrice Bergeron in Flames zone. 18:37 of 2nd period - Derek Roy is hit by Evgeni Malkin. 18:49 of 2nd period - Shot by Patrick Kane. 18:49 of 2nd period - Shot Misses the Net. 18:53 of 2nd period - Shot by Derek Roy. 18:53 of 2nd period - Stopped by Ryan Miller with a rebound. 18:55 of 2nd period - Shot by Patrick Kane. 18:55 of 2nd period - Shot Misses the Net. 19:30 of 2nd period - Rick Nash is hit by Martin St-Louis and loses puck. 19:58 of 2nd period - Nik Antropov is hit by Martin St-Louis and loses puck. 0:01 of 3rd period - Jeff Carter wins face-off versus Manny Malhotra in neutral zone. 0:18 of 3rd period - Icing by Manny Malhotra. 0:19 of 3rd period - Patrice Bergeron wins face-off versus Manny Malhotra in Flames zone. 0:22 of 3rd period - Shot by Evgeni Malkin. 0:22 of 3rd period - Stopped by Marc-Andre Fleury without a rebound. 0:23 of 3rd period - Derek Roy wins face-off versus Evgeni Malkin in Flames zone. 0:30 of 3rd period - Andrei Markov is hit by Scott Hartnell and loses puck. 0:41 of 3rd period - Shot by Evgeni Malkin. 0:41 of 3rd period - Goal by Evgeni Malkin - Flames : 1 - Avalanche : 2. 0:42 of 3rd period - Nik Antropov wins face-off versus Manny Malhotra in neutral zone. 1:16 of 3rd period - Shot by Alexander Semin. 1:16 of 3rd period - Stopped by Marc-Andre Fleury without a rebound. 1:17 of 3rd period - Eric Staal wins face-off versus Jarome Iginla in Flames zone. 2:41 of 3rd period - Minor Penalty to Martin Gelinas for Hooking. 2:42 of 3rd period - Derek Roy wins face-off versus Rick Nash in neutral zone. 2:51 of 3rd period - Shot by Patrick Kane. 2:55 of 3rd period - Shot by Derek Roy. 2:55 of 3rd period - Stopped by Ryan Miller without a rebound. 2:56 of 3rd period - Rick Nash wins face-off versus Derek Roy in Avalanche zone. 3:09 of 3rd period - Shot by Nick Schultz. 3:09 of 3rd period - Stopped by Ryan Miller without a rebound. 3:09 of 3rd period - Minor Penalty to Dan Hamhuis for Hooking. 3:09 of 3rd period - Major \/ Game Misconduct Penalty to Patrick Kane for Unsportsmanlike conduct. 3:09 of 3rd period - Patrick Kane is ejected from game. 3:10 of 3rd period - Jarome Iginla wins face-off versus Derek Roy in Avalanche zone. 3:23 of 3rd period - Shot by Derek Roy. 3:23 of 3rd period - Goal by Derek Roy - Flames : 2 - Avalanche : 2. 3:24 of 3rd period - Derek Roy wins face-off versus Rick Nash in neutral zone. 5:22 of 3rd period - Shot by Jochen Hecht. 5:22 of 3rd period - Stopped by Marc-Andre Fleury with a rebound. 6:24 of 3rd period - Off-side. 6:25 of 3rd period - Manny Malhotra wins face-off versus Alexander Semin in neutral zone. 6:37 of 3rd period - Minor Penalty to Dan Hamhuis for Holding Stick. 6:38 of 3rd period - Derek Roy wins face-off versus Rick Nash in Avalanche zone. 8:08 of 3rd period - Icing by Nick Schultz. 8:09 of 3rd period - Jochen Hecht wins face-off versus Derek Roy in Flames zone. 8:50 of 3rd period - Shot by Niklas Hagman. 8:50 of 3rd period - Shot Misses the Net. 10:15 of 3rd period - Minor Penalty to Rick Nash for Holding. 10:16 of 3rd period - Jarome Iginla wins face-off versus Eric Staal in neutral zone. 11:38 of 3rd period - Minor Penalty to Jay McClement for Slashing. 11:39 of 3rd period - Manny Malhotra wins face-off versus Jochen Hecht in neutral zone. 11:58 of 3rd period - Shot by Nick Schultz. 11:58 of 3rd period - Shot Blocked by Marek Malik. 12:27 of 3rd period - Chris Higgins is hit by Rick Nash and loses puck. 13:20 of 3rd period - Shot by Alexander Semin. 13:20 of 3rd period - Shot Hit the Post. 13:22 of 3rd period - Shot by Rostislav Klesla. 13:22 of 3rd period - Shot Blocked by Andrew Ference. 13:24 of 3rd period - Shot by Rostislav Klesla. 13:24 of 3rd period - Stopped by Marc-Andre Fleury with a rebound. 13:26 of 3rd period - Shot by Rostislav Klesla. 13:26 of 3rd period - Shot Blocked by Andrew Ference. 13:54 of 3rd period - Shot by Derek Roy. 13:54 of 3rd period - Shot Misses the Net. 14:26 of 3rd period - Sandis Ozolinsh is hit by Chris Higgins and loses puck. 15:24 of 3rd period - Dan Hamhuis is hit by Derek Roy and loses puck. 16:45 of 3rd period - Shot by Andrei Kostitsyn. 16:45 of 3rd period - Stopped by Ryan Miller with a rebound. 16:54 of 3rd period - Icing by Niklas Hagman. 16:55 of 3rd period - Manny Malhotra wins face-off versus Jeff Carter in Avalanche zone. 17:28 of 3rd period - Jeff Carter is hit by Chris Higgins and loses puck. 17:32 of 3rd period - Off-side. 17:33 of 3rd period - Evgeni Malkin wins face-off versus Derek Roy in neutral zone. 17:43 of 3rd period - Icing by Kurt Sauer. 17:44 of 3rd period - Patrice Bergeron wins face-off versus Derek Roy in Flames zone. 18:02 of 3rd period - Shot by Derek Roy. 18:02 of 3rd period - Shot Hit the Post. 19:29 of 3rd period - Shot by Nik Antropov. 19:29 of 3rd period - Stopped by Marc-Andre Fleury without a rebound. 19:30 of 3rd period - Jeff Carter wins face-off versus Manny Malhotra in Flames zone. 19:40 of 3rd period - Icing by Ken Klee. 19:41 of 3rd period - Manny Malhotra wins face-off versus Rick Nash in Flames zone. 19:54 of 3rd period - Shot by Jochen Hecht. 19:56 of 3rd period - Shot by Jochen Hecht. 19:56 of 3rd period - Deflect By Jarome Iginla. 19:56 of 3rd period - Stopped by Marc-Andre Fleury without a rebound. 19:57 of 3rd period - Jeff Carter wins face-off versus Derek Roy in Flames zone. 19:57 of 3rd period - Niklas Hagman is hit by Brent Burns. 0:01 of 1st overtime period - Eric Staal wins face-off versus Evgeni Malkin in neutral zone. 0:13 of 1st overtime period - Shot by Evgeni Malkin. 0:13 of 1st overtime period - Goal by Evgeni Malkin - Flames : 2 - Avalanche : 3. Normal Lineup #1 is on ice for Flames. Normal Lineup #1 is on ice for Avalanche. Eric Staal wins face-off versus Evgeni Malkin in neutral zone. Pass to Cory Stillman. Pass by Cory Stillman intercepted by Tomas Kaberle in Avalanche zone. Pass by Tomas Kaberle intercepted by Martin St-Louis in neutral zone. Pass to Eric Staal in Avalanche zone. Eric Staal loses puck. Free Puck Retrieved by Andrei Markov for Avalanche. Pass to Jarome Iginla. Jarome Iginla moves puck in neutral zone. Jarome Iginla moves puck in Flames zone. Pass to Evgeni Malkin. Shot by Evgeni Malkin. Stopped by Marc-Andre Fleury without a rebound. Normal Lineup #2 is on ice for Flames. Normal Lineup #2 is on ice for Avalanche. Derek Roy wins face-off versus Nik Antropov in Flames zone. Pass to Markus Naslund. Markus Naslund loses puck. Free Puck Retrieved by Dan Hamhuis for Avalanche. Pass to Alexander Semin. Alexander Semin loses puck. Free Puck Retrieved by Dan Hamhuis for Avalanche. Pass to Nik Antropov. Pass to Rick Nash. Pass to Alexander Semin. Shot by Alexander Semin. Stopped by Marc-Andre Fleury without a rebound. Normal Lineup #3 is on ice for Flames. Normal Lineup #3 is on ice for Avalanche. Jeff Carter wins face-off versus Manny Malhotra in Flames zone. Pass to Rostislav Klesla. Pass to Niklas Hagman. Niklas Hagman loses puck. Free Puck Retrieved by Mike Comrie for Flames. Pass to Chris Higgins in neutral zone. Pass to Manny Malhotra in Avalanche zone. Pass to Mike Comrie. Pass to Colin White. Time : 1. Pass to Mike Comrie. Shot by Mike Comrie. Stopped by Ryan Miller without a rebound. Normal Lineup #1 is on ice for Flames. Normal Lineup #1 is on ice for Avalanche. Eric Staal wins face-off versus Evgeni Malkin in Avalanche zone. Pass to Brent Burns. Pass by Brent Burns intercepted by Tomas Kaberle. Pass to Evgeni Malkin in neutral zone. Evgeni Malkin moves puck in Flames zone. Evgeni Malkin loses puck. Free Puck Retrieved by Andrei Markov for Avalanche. Pass to Evgeni Malkin. Pass to Andrei Markov. Pass to Jarome Iginla. Pass to Evgeni Malkin. Pass to Jarome Iginla. Pass to Andrei Markov. Pass to Jarome Iginla. Pass to Evgeni Malkin. Pass to Andrei Markov. Pass by Andrei Markov intercepted by Brent Burns. Pass to Cory Stillman. Pass by Cory Stillman intercepted by Andrei Markov. Pass to Evgeni Malkin. Pass to Andrei Markov. Pass to Jarome Iginla. Pass to Evgeni Malkin. Puck is dumped in Flames zone by Evgeni Malkin. Normal Lineup #2 is on ice for Avalanche. Free Puck Retrieved by Eric Brewer. Pass to Martin St-Louis in neutral zone. Time : 2. Pass to Eric Staal. Eric Staal moves puck in Avalanche zone. Puck is dumped in Avalanche zone by Eric Staal. Normal Lineup #2 is on ice for Flames. Puck retreived by Ryan Miller. Pass to Dan Hamhuis. Pass to Nik Antropov in neutral zone. Puck is dumped in Flames zone by Nik Antropov. Puck retreived by Patrick Kane. Patrick Kane is hit by Rick Nash and loses puck. Free Puck Retrieved by Nick Schultz for Flames. Icing by Nick Schultz. Normal Lineup #3 is on ice for Avalanche. Jeff Carter wins face-off versus Derek Roy in Flames zone. Pass to Mike VanRyn. Pass to Jeff Carter. Pass to Niklas Hagman. Pass by Niklas Hagman intercepted by Nick Schultz. Pass to Patrick Kane. Pass to Derek Roy in neutral zone. Pass by Derek Roy intercepted by Mike VanRyn. Mike VanRyn moves puck in Flames zone. Pass by Mike VanRyn intercepted by Nick Schultz. Pass by Nick Schultz intercepted by Mike VanRyn in neutral zone. Pass to Jeff Carter. Pass by Jeff Carter intercepted by Patrick Kane in Flames zone. Pass by Patrick Kane intercepted by Martin Gelinas in neutral zone. Pass to Jeff Carter in Flames zone. Pass by Jeff Carter intercepted by Derek Roy. Pass to Markus Naslund. Pass to Patrick Kane. Patrick Kane moves puck in neutral zone. Time : 3. Pass to Derek Roy in Avalanche zone. Puck is dumped in Avalanche zone by Derek Roy. Normal Lineup #3 is on ice for Flames. Puck retreived by Rostislav Klesla. Pass by Rostislav Klesla intercepted by Chris Higgins. Pass by Chris Higgins intercepted by Rostislav Klesla. Pass by Rostislav Klesla intercepted by Colin White. Pass by Colin White intercepted by Mike VanRyn. Pass by Mike VanRyn intercepted by Chris Higgins in neutral zone. Puck is dumped in Avalanche zone by Chris Higgins. Puck retreived by Rostislav Klesla. Pass to Mike VanRyn in neutral zone. Mike VanRyn moves puck in Flames zone. Puck is dumped in Flames zone by Mike VanRyn. Normal Lineup #2 is on ice for Avalanche. Free Puck Retrieved by Marc-Andre Fleury. Pass to Colin White. Pass by Colin White intercepted by Dan Hamhuis in neutral zone. Pass by Dan Hamhuis intercepted by Ken Klee in Flames zone. Icing by Ken Klee. Normal Lineup #1 is on ice for Avalanche. Evgeni Malkin wins face-off versus Manny Malhotra in Flames zone. Pass to Jochen Hecht. Pass by Jochen Hecht intercepted by Ken Klee. Pass by Ken Klee intercepted by Jarome Iginla in neutral zone. Puck is dumped in Flames zone by Jarome Iginla. Puck retreived by Chris Higgins. Chris Higgins is hit by Jarome Iginla and loses puck. Free Puck Retrieved by Manny Malhotra for Flames. Pass by Manny Malhotra intercepted by Jochen Hecht in neutral zone. Pass by Jochen Hecht intercepted by Mike Comrie. Pass to Manny Malhotra in Avalanche zone. Pass by Manny Malhotra intercepted by Tomas Kaberle. Pass by Tomas Kaberle intercepted by Manny Malhotra in neutral zone. Pass by Manny Malhotra intercepted by Andrei Markov. Pass to Evgeni Malkin in Flames zone. Pass by Evgeni Malkin intercepted by Colin White. Time : 4. Pass by Colin White intercepted by Jarome Iginla. Pass by Jarome Iginla intercepted by Manny Malhotra. Pass by Manny Malhotra intercepted by Andrei Markov. Pass by Andrei Markov intercepted by Colin White. Pass by Colin White intercepted by Jarome Iginla. Pass by Jarome Iginla intercepted by Colin White. Pass by Colin White intercepted by Andrei Markov in neutral zone. Pass to Tomas Kaberle in Flames zone. Pass by Tomas Kaberle intercepted by Ken Klee. Pass to Chris Higgins in neutral zone. Pass by Chris Higgins intercepted by Andrei Markov in Avalanche zone. Pass to Evgeni Malkin. Pass by Evgeni Malkin intercepted by Mike Comrie in neutral zone. Minor Penalty to Jochen Hecht for Hooking. PowerPlay Lineup #1 is on ice for Flames. Penalty Kill Lineup #2 is on ice for Avalanche. Eric Staal wins face-off versus Rick Nash in neutral zone. Pass to Cory Stillman. Cory Stillman moves puck in Avalanche zone. Pass to Brent Burns. Pass to Eric Staal. Pass by Eric Staal intercepted by Marek Malik. Puck is dumped in Flames zone by Marek Malik. Penalty Kill Lineup #2 is on ice for Avalanche. Free Puck Retrieved by Cory Stillman. Pass to Eric Staal in neutral zone. Pass to Cory Stillman. Puck is dumped in Avalanche zone by Cory Stillman. Puck retreived by Dan Hamhuis. Puck is dumped in Flames zone by Dan Hamhuis. Penalty Kill Lineup #2 is on ice for Avalanche. Free Puck Retrieved by Eric Brewer. Pass to Brent Burns in neutral zone. Brent Burns moves puck in Avalanche zone. Pass to Martin St-Louis. Time : 5. Pass to Eric Brewer. Shot by Eric Brewer. Shot Misses the Net. Free Puck Retrieved by Marek Malik for Avalanche. Puck is dumped in Flames zone by Marek Malik. Penalty Kill Lineup #1 is on ice for Avalanche. Free Puck Retrieved by Marc-Andre Fleury. Pass to Cory Stillman. Pass to Eric Staal in neutral zone. Pass to Cory Stillman in Avalanche zone. Puck is dumped in Avalanche zone by Cory Stillman. PowerPlay Lineup #2 is on ice for Flames. Puck retreived by Ryan Miller. Pass to Tomas Kaberle. Pass to Andrei Markov in neutral zone. Puck is dumped in Flames zone by Andrei Markov. Penalty Kill Lineup #2 is on ice for Avalanche. Free Puck Retrieved by Derek Roy. Pass to Patrick Kane in neutral zone. Pass by Patrick Kane intercepted by Nik Antropov. Puck is dumped in Flames zone by Nik Antropov. Penalty Kill Lineup #1 is on ice for Avalanche. Free Puck Retrieved by Marc-Andre Fleury. Pass to Andrew Ference. Pass by Andrew Ference intercepted by Andrei Markov in neutral zone. Puck is dumped in Flames zone by Andrei Markov. Penalty Kill Lineup #2 is on ice for Avalanche. Free Puck Retrieved by Nick Schultz. Pass to Patrick Kane in neutral zone. Patrick Kane moves puck in Avalanche zone. Shot by Patrick Kane. Shot Misses the Net. Free Puck Retrieved by Andrew Ference for Flames. Pass to Derek Roy. Pass to Patrick Kane. Pass to Derek Roy. Pass to Patrick Kane. Time : 6. Puck is dumped in Avalanche zone by Patrick Kane. PowerPlay Lineup #1 is on ice for Flames. Puck retreived by Nik Antropov. Pass by Nik Antropov intercepted by Eric Brewer in neutral zone. Pass to Cory Stillman in Avalanche zone. Pass to Eric Staal. Pass to Martin St-Louis. Pass to Eric Brewer. Pass by Eric Brewer intercepted by Dan Hamhuis. Puck is dumped in Flames zone by Dan Hamhuis. Penalty Kill Lineup #1 is on ice for Avalanche. Free Puck Retrieved by Marc-Andre Fleury. Pass to Eric Brewer. Pass to Eric Staal in neutral zone. Normal Lineup #3 is on ice for Avalanche. Normal Lineup #4 is on ice for Flames. Puck is dumped in Avalanche zone by Eric Staal. Puck retreived by Niklas Hagman. Pass to Jeff Carter in neutral zone. Jeff Carter moves puck in Flames zone. Pass to Niklas Hagman. Pass to Martin Gelinas. Pass to Jeff Carter. Pass to Mike VanRyn. Pass to Jeff Carter. Pass to Rostislav Klesla. Pass to Niklas Hagman. Time : 7. Niklas Hagman loses puck. Free Puck Retrieved by Andrei Kostitsyn for Flames. Pass to Scott Hartnell in neutral zone. Scott Hartnell is hit by Jeff Carter and loses puck. Free Puck Retrieved by Kurt Sauer for Flames. Kurt Sauer moves puck in Avalanche zone. Puck is dumped in Avalanche zone by Kurt Sauer. Normal Lineup #3 is on ice for Flames. Puck retreived by Ryan Miller. Pass to Niklas Hagman. Icing by Niklas Hagman. Normal Lineup #3 is on ice for Flames. Jeff Carter wins face-off versus Manny Malhotra in Avalanche zone. Pass to Mike VanRyn. Mike VanRyn moves puck in neutral zone. Mike VanRyn moves puck in Flames zone. Puck is dumped in Flames zone by Mike VanRyn. Normal Lineup #1 is on ice for Avalanche. Free Puck Retrieved by Marc-Andre Fleury. Pass to Brent Burns. Pass to Chris Higgins. Pass to Mike Comrie in neutral zone. Mike Comrie moves puck in Avalanche zone. Pass by Mike Comrie intercepted by Jochen Hecht. Pass to Evgeni Malkin. Pass to Andrei Markov in neutral zone. Puck is dumped in Flames zone by Andrei Markov. Puck retreived by Chris Higgins. Pass to Colin White in neutral zone. Colin White moves puck in Avalanche zone. Pass by Colin White intercepted by Tomas Kaberle. Pass to Andrei Markov. Icing by Andrei Markov. Normal Lineup #1 is on ice for Flames. Eric Staal wins face-off versus Evgeni Malkin in Avalanche zone. Pass to Martin St-Louis. Martin St-Louis is hit by Tomas Kaberle and loses puck. Free Puck Retrieved by Tomas Kaberle for Avalanche. Time : 8. Pass to Evgeni Malkin in neutral zone. Pass to Andrei Markov in Flames zone. Pass by Andrei Markov intercepted by Nick Schultz. Pass by Nick Schultz intercepted by Andrei Markov in neutral zone. Pass to Evgeni Malkin in Flames zone. Pass to Jarome Iginla. Pass to Evgeni Malkin. Evgeni Malkin is hit by Eric Brewer and loses puck. Free Puck Retrieved by Tomas Kaberle for Avalanche. Pass to Jarome Iginla. Shot by Jarome Iginla. Stopped by Marc-Andre Fleury without a rebound. Normal Lineup #2 is on ice for Flames. Normal Lineup #2 is on ice for Avalanche. Eric Staal wins face-off versus Nik Antropov in Flames zone. Pass to Markus Naslund. Markus Naslund is hit by Nik Antropov and loses puck. Free Puck Retrieved by Alexander Semin for Avalanche. Pass to Nik Antropov. Pass to Alexander Semin. Pass to Rick Nash. Pass to Nik Antropov. Pass to Marek Malik. Pass to Dan Hamhuis. Pass to Alexander Semin. Pass to Dan Hamhuis. Pass to Alexander Semin. Pass to Rick Nash. Pass to Nik Antropov. Pass to Dan Hamhuis. Pass to Alexander Semin. Puck is dumped in Flames zone by Alexander Semin. Normal Lineup #4 is on ice for Avalanche. Free Puck Retrieved by Markus Naslund. Time : 9. Pass to Patrick Kane in neutral zone. Patrick Kane moves puck in Avalanche zone. Puck is dumped in Avalanche zone by Patrick Kane. Normal Lineup #3 is on ice for Flames. Puck retreived by Andrei Markov. Pass to Geoff Sanderson in neutral zone. Puck is dumped in Flames zone by Geoff Sanderson. Puck retreived by Colin White. Colin White is hit by Patrice Bergeron and loses puck. Free Puck Retrieved by Ken Klee for Flames. Ken Klee moves puck in neutral zone. Puck is dumped in Avalanche zone by Ken Klee. Puck retreived by Andrei Markov. Andrei Markov is hit by Manny Malhotra and loses puck. Free Puck Retrieved by Chris Higgins for Flames. Pass to Mike Comrie. Pass to Manny Malhotra. Pass to Mike Comrie. Pass to Chris Higgins. Pass to Colin White. Pass to Manny Malhotra. Pass to Chris Higgins. Pass to Mike Comrie. Pass to Chris Higgins. Pass to Mike Comrie. Puck is dumped in Avalanche zone by Mike Comrie. Normal Lineup #4 is on ice for Flames. Puck retreived by Geoff Sanderson. Pass to Evgeni Malkin. Evgeni Malkin moves puck in neutral zone. Pass to Geoff Sanderson in Flames zone. Puck is dumped in Flames zone by Geoff Sanderson. Time : 10. Normal Lineup #3 is on ice for Avalanche. Free Puck Retrieved by Andrei Kostitsyn. Pass by Andrei Kostitsyn intercepted by Rostislav Klesla in neutral zone. Pass by Rostislav Klesla intercepted by Kurt Sauer in Flames zone. Pass to Andrei Kostitsyn in neutral zone. Andrei Kostitsyn moves puck in Avalanche zone. Pass to Derek Roy. Pass to Scott Hartnell. Scott Hartnell is hit by Mike VanRyn. Pass to Andrei Kostitsyn. Andrei Kostitsyn loses puck. Free Puck Retrieved by Kurt Sauer for Flames. Pass to Derek Roy. Pass to Scott Hartnell. Shot by Scott Hartnell. Stopped by Ryan Miller without a rebound. Normal Lineup #1 is on ice for Flames. Normal Lineup #2 is on ice for Avalanche. Nik Antropov wins face-off versus Eric Staal in Avalanche zone. Pass to Alexander Semin. Nik Antropov is hit by Cory Stillman. Alexander Semin moves puck in neutral zone. Pass to Dan Hamhuis. Dan Hamhuis moves puck in Flames zone. Dan Hamhuis loses puck. Free Puck Retrieved by Eric Brewer for Flames. Pass to Martin St-Louis in neutral zone. Pass to Brent Burns in Avalanche zone. Pass to Cory Stillman. Pass to Eric Staal. Pass to Martin St-Louis. Pass by Martin St-Louis intercepted by Rick Nash. Time : 11. Pass to Nik Antropov in neutral zone. Pass by Nik Antropov intercepted by Martin St-Louis in Flames zone. Pass to Brent Burns. Pass by Brent Burns intercepted by Nik Antropov in neutral zone. Pass to Marek Malik in Flames zone. Pass by Marek Malik intercepted by Eric Brewer. Icing by Eric Brewer. Normal Lineup #3 is on ice for Avalanche. Jeff Carter wins face-off versus Eric Staal in Flames zone. Pass to Niklas Hagman. Pass by Niklas Hagman intercepted by Eric Brewer. Pass by Eric Brewer intercepted by Mike VanRyn in neutral zone. Pass to Jeff Carter. Pass to Rostislav Klesla in Flames zone. Pass by Rostislav Klesla intercepted by Eric Brewer. Pass to Eric Staal in neutral zone. Pass by Eric Staal intercepted by Niklas Hagman. Pass to Jeff Carter in Flames zone. Pass to Niklas Hagman. Pass to Jeff Carter. Jeff Carter loses puck. Free Puck Retrieved by Niklas Hagman for Avalanche. Pass by Niklas Hagman intercepted by Eric Brewer. Pass to Eric Staal in neutral zone. Off-side. Normal Lineup #3 is on ice for Flames. Normal Lineup #1 is on ice for Avalanche. Evgeni Malkin wins face-off versus Manny Malhotra in neutral zone. Pass to Jarome Iginla. Puck is dumped in Flames zone by Jarome Iginla. Puck retreived by Manny Malhotra. Manny Malhotra is hit by Jarome Iginla and loses puck. Free Puck Retrieved by Jochen Hecht for Avalanche. Pass to Jarome Iginla. Pass by Jarome Iginla intercepted by Chris Higgins. Pass to Colin White in neutral zone. Time : 12. Colin White moves puck in Avalanche zone. Pass by Colin White intercepted by Jarome Iginla. Pass to Andrei Markov in neutral zone. Andrei Markov moves puck in Flames zone. Pass to Jochen Hecht. Pass by Jochen Hecht intercepted by Colin White. Pass by Colin White intercepted by Tomas Kaberle in neutral zone. Pass to Evgeni Malkin in Flames zone. Shot by Evgeni Malkin. Shot Blocked by Ken Klee. Free Puck Retrieved by Jochen Hecht for Avalanche. Shot by Jochen Hecht. Stopped by Marc-Andre Fleury with a rebound. Free Puck Retrieved by Jarome Iginla for Avalanche. Puck is dumped in Flames zone by Jarome Iginla. Normal Lineup #2 is on ice for Avalanche. Free Puck Retrieved by Marc-Andre Fleury. Pass to Chris Higgins. Pass to Manny Malhotra in neutral zone. Puck is dumped in Avalanche zone by Manny Malhotra. Puck retreived by Rick Nash. Icing by Rick Nash. Normal Lineup #2 is on ice for Flames. Derek Roy wins face-off versus Nik Antropov in Avalanche zone. Pass to Patrick Kane. Shot by Patrick Kane. Stopped by Ryan Miller with a rebound. Free Puck Retrieved by Derek Roy for Flames. Shot by Derek Roy. Stopped by Ryan Miller without a rebound. Normal Lineup #2 is on ice for Flames. Normal Lineup #3 is on ice for Avalanche. Jeff Carter wins face-off versus Derek Roy in Avalanche zone. Pass to Rostislav Klesla. Rostislav Klesla moves puck in neutral zone. Rostislav Klesla moves puck in Flames zone. Pass to Jeff Carter. Shot by Jeff Carter. Shot Blocked by Nick Schultz. Free Puck Retrieved by Andrew Ference for Flames. Pass to Markus Naslund in neutral zone. Markus Naslund moves puck in Avalanche zone. Pass to Patrick Kane. Shot by Patrick Kane. Stopped by Ryan Miller without a rebound. Time : 13. Normal Lineup #4 is on ice for Flames. Normal Lineup #2 is on ice for Avalanche. Nik Antropov wins face-off versus Derek Roy in Avalanche zone. Pass to Alexander Semin. Alexander Semin is hit by Scott Hartnell and loses puck. Free Puck Retrieved by Kurt Sauer for Flames. Pass to Derek Roy. Pass to Nick Schultz. Pass to Andrei Kostitsyn. Andrei Kostitsyn is hit by Dan Hamhuis and loses puck. Free Puck Retrieved by Nick Schultz for Flames. Pass to Derek Roy. Pass to Scott Hartnell. Minor Penalty to Dan Hamhuis for Tripping. PowerPlay Lineup #1 is on ice for Flames. Penalty Kill Lineup #1 is on ice for Avalanche. Evgeni Malkin wins face-off versus Eric Staal in Avalanche zone. Pass to Jarome Iginla. Puck is dumped in Flames zone by Jarome Iginla. Penalty Kill Lineup #1 is on ice for Avalanche. Free Puck Retrieved by Marc-Andre Fleury. Pass to Martin St-Louis. Pass to Eric Staal. Pass to Martin St-Louis in neutral zone. Puck is dumped in Avalanche zone by Martin St-Louis. Puck retreived by Evgeni Malkin. Puck is dumped in Flames zone by Evgeni Malkin. Penalty Kill Lineup #2 is on ice for Avalanche. Free Puck Retrieved by Martin St-Louis. Pass to Eric Staal. Pass to Martin St-Louis. Pass to Eric Brewer in neutral zone. Eric Brewer moves puck in Avalanche zone. Shot by Eric Brewer. Stopped by Ryan Miller with a rebound. Free Puck Retrieved by Tomas Kaberle for Avalanche. Puck is dumped in Flames zone by Tomas Kaberle. Penalty Kill Lineup #1 is on ice for Avalanche. Free Puck Retrieved by Marc-Andre Fleury. Pass to Brent Burns. Icing by Brent Burns. Penalty Kill Lineup #2 is on ice for Avalanche. Rick Nash is ejected from face-off, Nik Antropov takes his place. Eric Staal wins face-off versus Nik Antropov in Flames zone. Pass to Cory Stillman. Time : 14. Cory Stillman moves puck in neutral zone. Cory Stillman is hit by Nik Antropov and loses puck. Free Puck Retrieved by Nik Antropov for Avalanche. Puck is dumped in Flames zone by Nik Antropov. Penalty Kill Lineup #1 is on ice for Avalanche. Free Puck Retrieved by Martin St-Louis. Pass to Eric Staal in neutral zone. Pass to Martin St-Louis in Avalanche zone. Puck is dumped in Avalanche zone by Martin St-Louis. PowerPlay Lineup #2 is on ice for Flames. Puck retreived by Ryan Miller. Pass to Tomas Kaberle. Pass to Andrei Markov in neutral zone. Puck is dumped in Flames zone by Andrei Markov. Penalty Kill Lineup #2 is on ice for Avalanche. Free Puck Retrieved by Derek Roy. Pass to Patrick Kane in neutral zone. Patrick Kane moves puck in Avalanche zone. Pass by Patrick Kane intercepted by Rostislav Klesla. Puck is dumped in Flames zone by Rostislav Klesla. Penalty Kill Lineup #1 is on ice for Avalanche. Free Puck Retrieved by Derek Roy. Pass to Patrick Kane in neutral zone. Patrick Kane moves puck in Avalanche zone. Pass to Derek Roy. Pass to Patrick Kane. Pass to Derek Roy. Pass to Andrew Ference. Pass to Derek Roy. Time : 15. Puck is dumped in Avalanche zone by Derek Roy. PowerPlay Lineup #1 is on ice for Flames. Puck retreived by Ryan Miller. Pass to Tomas Kaberle. Pass by Tomas Kaberle intercepted by Martin St-Louis. Pass by Martin St-Louis intercepted by Andrei Markov. Pass to Evgeni Malkin. Puck is dumped in Flames zone by Evgeni Malkin. Penalty Kill Lineup #2 is on ice for Avalanche. Free Puck Retrieved by Ken Klee. Pass to Cory Stillman in neutral zone. Pass by Cory Stillman intercepted by Marek Malik in Avalanche zone. Pass by Marek Malik intercepted by Ken Klee. Pass to Martin St-Louis. Pass to Cory Stillman. Shot by Cory Stillman. Shot Misses the Net. Free Puck Retrieved by Jay McClement for Flames. Normal Lineup #3 is on ice for Avalanche. Normal Lineup #3 is on ice for Flames. Shot by Jay McClement. Shot Misses the Net. Free Puck Retrieved by Chris Higgins for Flames. Shot by Chris Higgins. Shot Misses the Net. Free Puck Retrieved by Ken Klee for Flames. Pass by Ken Klee intercepted by Rostislav Klesla. Pass by Rostislav Klesla intercepted by Colin White in neutral zone. Pass to Chris Higgins in Avalanche zone. Pass to Ken Klee. Pass to Chris Higgins. Pass by Chris Higgins intercepted by Rostislav Klesla. Pass by Rostislav Klesla intercepted by Manny Malhotra. Pass by Manny Malhotra intercepted by Niklas Hagman. Pass by Niklas Hagman intercepted by Mike Comrie in neutral zone. Pass to Chris Higgins in Avalanche zone. Pass by Chris Higgins intercepted by Mike VanRyn. Pass by Mike VanRyn intercepted by Chris Higgins in neutral zone. Pass by Chris Higgins intercepted by Martin Gelinas. Pass by Martin Gelinas intercepted by Manny Malhotra in Flames zone. Pass to Chris Higgins in neutral zone. Time : 16. Pass to Mike Comrie in Avalanche zone. Puck is dumped in Avalanche zone by Mike Comrie. Normal Lineup #4 is on ice for Flames. Puck retreived by Ryan Miller. Pass to Jeff Carter. Pass to Mike VanRyn in neutral zone. Mike VanRyn moves puck in Flames zone. Puck is dumped in Flames zone by Mike VanRyn. Normal Lineup #2 is on ice for Avalanche. Free Puck Retrieved by Brent Burns. Pass to Scott Hartnell in neutral zone. Scott Hartnell moves puck in Avalanche zone. Shot by Scott Hartnell. Stopped by Ryan Miller without a rebound. Normal Lineup #2 is on ice for Flames. Normal Lineup #2 is on ice for Avalanche. Nik Antropov wins face-off versus Derek Roy in Avalanche zone. Pass to Alexander Semin. Alexander Semin moves puck in neutral zone. Pass to Nik Antropov in Flames zone. Pass to Alexander Semin. Pass to Dan Hamhuis. Pass to Rick Nash. Shot by Rick Nash. Shot Misses the Net. Free Puck Retrieved by Markus Naslund for Flames. Pass to Patrick Kane in neutral zone. Pass by Patrick Kane intercepted by Dan Hamhuis in Avalanche zone. Pass to Rick Nash in neutral zone. Puck is dumped in Flames zone by Rick Nash. Puck retreived by Andrew Ference. Pass to Derek Roy. Pass to Patrick Kane in neutral zone. Pass to Andrew Ference in Avalanche zone. Puck is dumped in Avalanche zone by Andrew Ference. Time : 17. Normal Lineup #1 is on ice for Flames. Puck retreived by Dan Hamhuis. Pass by Dan Hamhuis intercepted by Eric Brewer in neutral zone. Pass to Eric Staal in Avalanche zone. Pass by Eric Staal intercepted by Marek Malik. Pass by Marek Malik intercepted by Martin St-Louis in neutral zone. Pass by Martin St-Louis intercepted by Marek Malik in Avalanche zone. Pass by Marek Malik intercepted by Eric Staal in neutral zone. Pass by Eric Staal intercepted by Marek Malik. Pass to Nik Antropov in Flames zone. Puck is dumped in Flames zone by Nik Antropov. Normal Lineup #4 is on ice for Avalanche. Free Puck Retrieved by Eric Brewer. Pass to Martin St-Louis in neutral zone. Puck is dumped in Avalanche zone by Martin St-Louis. Puck retreived by Andrei Markov. Icing by Andrei Markov. Normal Lineup #3 is on ice for Flames. Patrice Bergeron wins face-off versus Manny Malhotra in Avalanche zone. Pass to Evgeni Malkin. Pass to Sandis Ozolinsh in neutral zone. Sandis Ozolinsh moves puck in Flames zone. Sandis Ozolinsh loses puck. Free Puck Retrieved by Andrei Markov for Avalanche. Pass to Patrice Bergeron. Pass to Sandis Ozolinsh. Pass to Patrice Bergeron. Pass by Patrice Bergeron intercepted by Colin White. Pass to Mike Comrie in neutral zone. Mike Comrie moves puck in Avalanche zone. Pass to Manny Malhotra. Pass to Mike Comrie. Time : 18. Shot by Mike Comrie. Stopped by Ryan Miller without a rebound. Normal Lineup #1 is on ice for Flames. Normal Lineup #3 is on ice for Avalanche. Eric Staal wins face-off versus Jeff Carter in Avalanche zone. Pass to Eric Brewer. Pass to Martin St-Louis. Pass by Martin St-Louis intercepted by Jeff Carter. Pass to Niklas Hagman. Niklas Hagman moves puck in neutral zone. Pass to Martin Gelinas. Martin Gelinas moves puck in Flames zone. Pass by Martin Gelinas intercepted by Brent Burns. Pass by Brent Burns intercepted by Martin Gelinas. Pass to Niklas Hagman. Pass to Rostislav Klesla. Pass to Martin Gelinas. Pass by Martin Gelinas intercepted by Brent Burns. Pass to Cory Stillman in neutral zone. Cory Stillman moves puck in Avalanche zone. Puck is dumped in Avalanche zone by Cory Stillman. Normal Lineup #2 is on ice for Flames. Puck retreived by Martin Gelinas. Pass to Niklas Hagman. Niklas Hagman moves puck in neutral zone. Off-side. Normal Lineup #2 is on ice for Flames. Normal Lineup #1 is on ice for Avalanche. Derek Roy wins face-off versus Evgeni Malkin in neutral zone. Pass to Patrick Kane. Derek Roy is hit by Evgeni Malkin. Minor Penalty to Jarome Iginla for Hooking. PowerPlay Lineup #2 is on ice for Flames. Penalty Kill Lineup #1 is on ice for Avalanche. Evgeni Malkin wins face-off versus Derek Roy in neutral zone. Pass to Tomas Kaberle. Puck is dumped in Flames zone by Tomas Kaberle. Time : 19. Penalty Kill Lineup #1 is on ice for Avalanche. Free Puck Retrieved by Marc-Andre Fleury. Pass to Andrew Ference. Pass by Andrew Ference intercepted by Andrei Markov in neutral zone. Puck is dumped in Flames zone by Andrei Markov. Penalty Kill Lineup #1 is on ice for Avalanche. Free Puck Retrieved by Marc-Andre Fleury. Pass to Patrick Kane. Pass to Derek Roy in neutral zone. Puck is dumped in Avalanche zone by Derek Roy. Puck retreived by Tomas Kaberle. Tomas Kaberle is hit by Derek Roy and loses puck. Free Puck Retrieved by Andrew Ference for Flames. Pass to Derek Roy. Pass to Patrick Kane. Pass to Derek Roy. Pass to Patrick Kane. Pass to Chris Higgins. Pass to Patrick Kane. Puck is dumped in Avalanche zone by Patrick Kane. PowerPlay Lineup #1 is on ice for Flames. Puck retreived by Ryan Miller. Pass to Nik Antropov. Pass by Nik Antropov intercepted by Cory Stillman in neutral zone. Puck is dumped in Avalanche zone by Cory Stillman. Puck retreived by Andrei Markov. Puck is dumped in Flames zone by Andrei Markov. Penalty Kill Lineup #2 is on ice for Avalanche. Free Puck Retrieved by Marc-Andre Fleury. Pass to Brent Burns. Icing by Brent Burns. Penalty Kill Lineup #2 is on ice for Avalanche. Eric Staal wins face-off versus Rick Nash in Flames zone. Pass to Eric Brewer. Pass by Eric Brewer intercepted by Dan Hamhuis. Pass to Rick Nash. Puck is dumped in Flames zone by Rick Nash. Penalty Kill Lineup #2 is on ice for Avalanche. Free Puck Retrieved by Eric Brewer. Pass to Eric Staal in neutral zone. PowerPlay Lineup #1 is on ice for Flames. Penalty Kill Lineup #1 is on ice for Avalanche. Eric Staal wins face-off versus Evgeni Malkin in neutral zone. Pass to Brent Burns. Puck is dumped in Avalanche zone by Brent Burns. Puck retreived by Andrei Markov. Puck is dumped in Flames zone by Andrei Markov. Penalty Kill Lineup #2 is on ice for Avalanche. Free Puck Retrieved by Brent Burns. Pass by Brent Burns intercepted by Marek Malik. Pass to Rick Nash. Shot by Rick Nash. Deflect By Nik Antropov. Goal by Nik Antropov - Flames : 0 - Avalanche"} +{"id":"RedPajamaC4.0024","text":"I wrote this as a companion piece to my other Titanic and Californian article (found here). It was whilst writing that, and attempting to put various sightings into some rough chronology that a few ideas occurred to me; I have managed to elaborate further with this speculative proposal about \"The Californian Incident\". I have tried, where possible to synthesize various ideas into a cogent, perhaps definitive discussion of this controversy. To be fair, it should be noted that some of the calculations in this piece are (at best) estimates, and may be slightly out; however, I do believe that the method that I have used is sound. If you spot any errors, or omissions, please email me at the address at the end of this article. How far apart were they? Please note that some textbooks use a value of 1.16 to correct for observation effects.. I have used this alternate coefficient in the calculations on this page; the alternate values are in square brackets. To see the maximum distance that two observers can see each other, just add their respective distances together. So for instance, two lookouts perched 100 feet above the waterline could see a ship's red sidelight 39 feet high, at a maximum distance of 11.4 + 7.1 = 18.5 miles [11.6 + 7.2 = 18.8 miles]. The use of this cumbersome equation is due to the curvature of the earth, and doesn't take into account visibility, light brightness, super-refraction etc, which could curtail or extend the range of eyesight. The key to perhaps understanding the geometry of the Californian-Titanic situation is to relate what each other saw. The Californian saw the Titanic's red sidelight; and the Titanic saw the Californian's sidelights. The Titanic's sidelights were 60 feet above the waterline, as seen by Groves, Gibson and Stone, who were 39 feet high (the height of the Californian's flying bridge) + 6 feet (an estimate of their height) above the water. This gives a total distance to the horizon of 16.5 miles [16.8 miles]. Similarly, for Boxhall et al. on the stricken liner, we get a value of 16.4 miles [16.7 miles]. It may be convenient at this stage to accept the smaller of these two values to enable the two ships to be seen. Note that, any further away and the sidelights would be below the horizon, and hence, invisible. This gives us the maximum distance, but what about the minimum distance? Let me backtrack slightly. In his excellent, if flawed book, Leslie Reade relates in \"The Ship That Stood Still\" how the relative movements of the two ships fit together perfectly. As the Californian slowly swung in the night, so her decklights would match what the Titanic saw perfectly. Although, probably not spotted at this stage, at 12.08, when Stone relived Groves on the Californian, the ship they saw was dead abeam. She would have been showing a green sidelight, her two mastlights (on the fore and main mast, the latter being slightly higher than the former, and about 70 feet apart), and perhaps a couple of other lights, not represented here. The Californian's masthead lights would be about 0.04 degrees (2.6 arc minutes) apart. At 12.35, as he goes below to run his chores, Apprentice Gibson notes that the other ship (Titanic) is 1.5 points before the Californian's starboard beam. The Californian's mastlights would now be 2.5 arc minutes apart. This is approximately ten minutes before the first rocket was fired, and this therefore represents what Boxhall saw as he was waiting for Rowe and Bright to come to the bridge with detonators for the socket signals. The mast lights are displayed distinctly here as Boxhall would be observing them with binoculars, enabling him to make them out. As the 7th rocket was fired, Gibson observes the other ship 2 points on the starboard bow. The mastlights would be separated by 1 arc minute, and would not normally be observable as separate lights. At some point in the evening, the Californian would be seen stem-on, showing all her lights. Finally, Boxhall is able to make out the other ship's red sidelight. Gibson observes the final rocket at 1.40am, 1 point on his starboard bow. The angular separation between the two mastlights is only 0.5 arc minutes. However, Boxhall doesn't see the Californian's red light: to him, it looks like the other ship is only showing her stern light. Similarly, Gibson has also observed that the other ship's port light has now gone too. The Californian, pointing roughly southerly should be showing her port light at this point. The thurst of all this is as follows: I believe that, at this point, their respective red lights are below the horizon (shown as the solid white line). The unfilled circle represents the position of the red light. Can we quantify the distance between the two ships by determining how far Titanic's bridge had dipped? It is possible to estimate it, but obviously there are no exact measurements. However, shortly after Boxhall left the Titanic, Mrs.Thayer noticed that A deck was only 20 feet from the sea. We also have the analysis of Harland and Wolff's marine engineers Bedford and Hackett who give us a value of 5o. I estimate (VERY roughly it should be stressed) that the bridge was only about 35 feet above the waterline at the time Boxhall saw the supposed \"stern\" light. How does this contribute to this analysis? Let us input the values. Firstly, let us assume that the redlights were just about invisible. Boxhall, whose line of sight was 35 + 6 feet above the sea could not see the Californian's red light (39 feet), which gives a distance of 14.4 miles [14.7 miles]. Let us do the same for Gibson: this provides a distance of 14.4 again. Any closer than this, and the red light would be seen. So, this means that the Titanic-Californian distance was between 16.4 [16.7] and 14.4 [14.7] miles. I would tend to place it closer to the shorter distance, as Groves watched the ship approaching from an even further distance away after 11.10. For this analysis, I will use the value of 15 miles as this is more convenient to work with. Sceptics of this work will (quite legitimately) say that no-one on either ship puts the distance so far; most witnesses say 5 or so miles. But let us not forget that these were estimates. Let us cite some examples showing how poor some people were at judging distances at night. Boat 5 was very close to the Titanic; but estimates of how far vary from 100 yards to a full mile. Boat 7 was close by; indeed the two boats tied together at some point during the night and their estimates vary from 300 yards to 1\/2 mile. Evidently, one should not put too much weight on these estimates. It should be noted too that my computed Titanic-Californian distance may be influenced by the actual, rather than calculated values of the height above the waterline. These pictures of the Californian, taken the morning after the distance, show her to be riding slightly high out of the water. However, even an error of 4 feet in this determination only translate to an error of +\/- 0.4 miles in determing the distance. What about the occupants of the lifeboats? Most people who saw the ship off the port bow only report seeing a white light - almost certainly the mastlights \"fused\" into one. This is logical as, from a lower vantage than the boat deck, they would be unable to see the Californian's red and green sidelights. Unfortunately I am unable to state absolutely just how high above the waterline the line of sight in a lifeboat would be. However, the photo below allows us to estimate this value. From the known length (30 feet) of a standard lifeboat, we can guess from this picture than an observer would be 5 1\/2 feet above the waterline. Note that, in this picture, perhaps because of perspective, the crewmember at the tiller seems to nearly 9 feet tall! The crewman is standing up obviously, but let us tread carefully. To me, a value of 5 feet seems reasonable. To see the masthead lights of the Californian, approximately 100 feet above the waterline, the lifeboat would have to be no further than 13.9 [14.1] miles away. Again, close to the maximum 14.4 [14.7] miles distance calculated above. This makes me think that, from the waterline, the mastlights would be \"right of the edge\" of visibility. This may explain why, for instance, Boxhall lost sight of the lights as he rounded the Titanic's stern in boat 2, ending up only 200 feet from the starboard beam of the Titanic. At such a low height above the waterline, an error of +\/- 1 foot equates to 0.3 miles. Only a few people reported seeing the sidelights from the water that night. To see them would require a distance of no more than 9.7 miles. Steward Crawford in boat 8 saw them at one point, as did the Countess of Rothes, seated a foot or two above him, managing the tiller. During the night, boat 8 pulled for the light(s) on the horizon for 3 hours, under the instructions of Captain Smith to land the passengers and return with help. Why would Captain Smith order rowers to deposit passengers on a ship that was too far away to be reached? Desperate men do desperate things. Boat 8 would have had to have rowed about 5 miles: is this possible in the three hours they were underway? The incumbants were pulling diligently, so it may be that they did get close enough to see the sidelights. However, to be fair it should be reported that the lifeboats were rowing into a southerly current which almost certainly would have retarded their progress in fetching help from the unco-operative Californian to the north. . Unfortunately, a noted Titanic ignoramus has cast doubt of the whole matter of what lights were seen from the lifeboats, seeking to narrow the gap between the Titanic and the 'mystery ship.' Coloured lights seen from a low vantage point would indicate that the ships were relatively close. By selective use of testimony, it is argued that the true distance between the two ships was only 8 miles, and not a greater value. 13336. While you were in the [life]boat did you see any light or lights? I did. 13337. What light or lights did you see? I saw a red light first, and then the red light disappeared, and I saw a white one. 13338. What did you think the red light was? I could not say; I put it down to a steamer. The interesting thing about most of the offered testimony is that many of them do not give an indication of where they were, relative to the Titanic, when the coloured lights were seen. Had they been rowing towards the mystery ship, thus closing the distance between the ship and the lifeboat, allowing the coloured light to be seen? He saw: \"Red light first, then red light disappeared, then saw white...Saw red and white at same time at same time at first ...Saw red and white, then red and white disappear, and then white remain...Both disappeared and left white...Both disappeared, then saw white light 10 or 15 minutes later in the same direction. His contradictory statements cast some doubt on what he did see and when. Did he see the red light first as he initially said, or red and white initially? 1566. Did you see any light? Well, I did see a light, a faint side light of another ship. 1569. Where was it?Off my port hand as I was in the (life)boat. Do you mean it was a port light? Was it a red or a green light? A red light - a side light. 1571. Now in what direction from you was it? That is what I wanted to ask - taking the bow of the \"Titanic\"? - Taking it from here it would be the starboard side. 1572. Broad on the starboard side? Yes, from her quarter. 1573. What, astern? - No, as she is left now it would be in that direction. 1574. Right out here? - Yes. 1575. Abaft the beam? - Just the same as she is lying now, on her quarter. 1576. That is where you saw the light? - Yes. 1805. (The Commissioner.) I am not quite clear about it. Did you see this masthead light and this sidelight before you got into the boat? No. 1806. Before you were on the surface of the water? No, I never saw it. 1807. And you saw one of them nine miles away when you were down in the boat? Yes. Lucas seems confused as to what he saw. He says he saw the lights on the starboard side of the Titanic, but we know that the strange ship was on the port side. Lucas is an able bodied seaman, but he talks about the light being on the \"quarter\" - this is to the rear of a ship. Finally, he says that he never saw the lights before he was on the surface of the water. Think about this. He could see further on the boat deck of the Titanic than on the surface of the water. He should have been able to see the red\/green\/white lights. And yet, from a lower vantage point, meaning a closer range, he sees lights from a greater distance. How can this be? It would akin to saying that, free of any visible obstructions, you can see New Jersey from the base of the Empire State Building, but not from the summit! 3502. Then you had not gone very far towards the light? A mile and a half. I am certain we pulled that. 3503. Did this light seem to get fainter or did it disappear suddenly? When we got away (in the lifeboat) it disappeared altogether. 3504. What coloured light was it? I think it was red. I think there were two lights, in fact, a red and a white light. 3505. (Lord Mersey) Are you sure? I can discern any sort of colour, racing, a mile and a quarter off, and I think I could see a red light. 3506. Are you sure? I am certain. It is difficult to know what Johnson means. He says that he pulled for the light when he was in the lifeboat. But then he says that the light \"disappeared altogether\" when he got away in the lifeboat. He could obviously see the light from the Titanic; it only disappeared after he left. Did Johnson mean that \"he pulled away in the direction of the red light? 10801. Were you within sight when the ship went down? We watched all proceedings. 10802. Did you see a light while you were in the (life)boat? A supposed light do you mean? 10803 Yes, we thought there was a ships stern light. 10804. Was it a white light or a coloured light? It was a reddish light. 10809. And did you row towards that light? For a matter of about two hours as hard as we could row. 10807. On which side of the \"Titanic\" was it? Starboard. 10808. On the starboard side; and you thought it was the stern light of a ship going the same way as yourself in advance of you? - Yes. 10810. And did you lose sight of it in the end? - Yes. Was MacKay talking about the light on the Titanic's port bow that everyone else was talking about? If so, why did he say he saw the light on the starboard side of the ship. And is it not possible that the red light was in view because, as he said, he and his colleagues were rowing for two hours for the other vessel, thus approaching her? Did MacKay see anything at all? He refers to the light as \"supposed.\" Even he was not sure what he was seeing! 17847. And before you left the ship's side did Captain Smith give you any directions with regard to a light? - Yes, he pointed to a light on the port side, the two masthead lights of a vessel, and told us to pull for there and land the people and return to the ship. 17848. Did you see those lights yourself? - I did. 17849. And what did you think they were? - I thought they were a vessel with two masthead lights. 17850. A steamer's masthead lights? - Yes. 17853. Having got down to the water's edge did you obey that direction as well as you could? - We did. 17854. And rowed in the direction of that light? - Yes, we pulled all night in the direction of the steamer. We have the same problem here as we did when we referred to Lucas's statements. From a higher view, he sees two mastlights of a vessel but sees the coloured lights from lower down. Perhaps pulling for the lights \"all night\" allowed the side lights to come into visible range? One more valuable point needs to be made, and it is courtesy of Sam Halpern of the Encyclopedia Titanica message board: \"William Lucas went away in Collapsible D. Didn't Collapsible D use the same davits as boat No. 2, the one that Boxhall got away in? That means that Lucas left after Boxhall. But wasn't it Boxhall who said the steamer shut in all her lights and showed what he took to be a stern light before he left the ship? So Lucas could not have seen a red sidelight, nor could James Johnson who was in Boxhall's boat if Boxhall was right about that.\" There are a few other matters of interest, and debate. The Californian's green light was observed by Boxhall and, if his testimony is anything to go by, only through binoculars. Even Fred Fleet, whose eyesight had been tested for responsiveness to colours, only saw a white light. I posted an appeal on the newsgroups to clarify this matter (here) but it never really reached any consensus. On the subject of lights, Lowe saw the Californian's red and mastlights whilst he was preparing lifeboat 1 for lowering. Using the logic as defined above, he should not have been able to see the two white lamps separately, especially as he only give the ship \"a glance\". If I may be slightly flippant, it may be that Lowe had eyesight superior to his fellow officers...? To conclude this section, I propose the following situation, showing that, at 2.20am (in a location that we can be certain that the Titanic sank), the two ships were 15 miles apart. All artists depictions of the Titanic as seen at night show her to fully lit, every porthole blazing light. The collision is generally accepted to have occurred at 11:40pm, when most passengers would have been asleep. Furthermore the lights for companionways and public rooms would have been extinguished for the night. \"a\" denotes the 1st class smoking room, \"b\" denotes the 2nd class smoking room and the Cafe Parisian, \"c\" indicates the 1st class dining saloon and \"d\" is the 1st class lounge. Since they are so close to each other, \"a\" and \"b\" would be observed as a massive glow of light. There would also be navigation lights and a few other cabin lights. How big would such a broadside Titanic be? From 5 miles away, she would be seen to be 1.7 degrees across from bow to stern; at 10 miles, this would be 0.8 degrees; and at 15 miles, 0.6 degrees. A few other things should be raised. As referred to previously, the angular separation at night that enables us to see closely spaced lights is about 3 arc minutes. How does this translate into distance? At 5 miles, any lights within a distance of 13 feet would not be seperable. At 10 miles, the distance would be 27 feet. At 15 miles, the distance would be 40 feet. So, no rows of portholes (as Donkeyman Gill on the Californian said) would be seen. Another matter is just how much of the Titanic could be seen at these distances? At 5 miles, all of the ship could be seen; at 10 miles, everything 4 feet above the Titanic's waterline could be observed; at 15 miles, only those lights 42 feet and above could be seen - that is, the boat deck, and A and B deck lights, from the bridge of the Californian. The Titanic, hardly a massive blaze of light would be showing a glare of lights on her afterdeck (as Gibson said later) - which would be the smoking rooms. Other than a few stray passengers who had stayed awake to see the witching hour in (plus the navigation lights of course), there would be nothing else to see. Titanic researcher George Behe has also written on this subject on his website here. The only downside is, as George says, the model of the Titanic is too brightly lit. I believe the number of lights shown would be even fewer than the black and white retouched graphic as shown on his website. As above, but with the number of lights reduced, showing only patches of light. At this point in the analysis, I would have liked to refer to a fascinating website that partially explains the lack of light as seen by Stone and Gibson. Unfortunately, I cannot locate the website, so I shall briefly summarise it here. Consulting these two pictures of the Titanic's forward boat deck (the officer's quarters and the gymnasium), it should be noted that the deck lights have screens located which prevents any light from being seen, in relative terms, from the forward most portion of the deck. Therefore, another interesting piece of evidence that helps to remove the fantasy of a brightly lit Titanic, rushing to her doom. The numerals refer to the following events: (1) - Titanic sees the iceberg; (2) Titanic tries to dodge the iceberg by attempting a hard-a-starboard and then a hard-a-port manoeuvre and (3) the ship, facing in a northerly direction heads onward for a few more minutes at half speed. Let us examine what Groves on the Californian says about the Titanic when he first saw her. At the British Enquiry, he says that at 11.10, he sees a single white light, which he thought might have been a star rising (therefore, he sees it to the east). At 11.25, Groves sees another masthead light; since Titanic only carried one, he must have been mistaken in some way. By 11.30, Groves reports to the Captain that the \"light\" is a passenger steamer due to the large amount of light showing. At 11.40, the other ship stopped, or seemed to stop. Later Groves seemed to be mildly confused as to whether the lights he had seen were \"put out\" or \"shut out\" for the night - the latter being a common practise by passenger carrying companies as a prompt for the people to \"go to bed\". However, Groves agrees that the other ship might have turned 2 points to port, as the bright white deck lights were now obscured (or had gone out) enabling him to see the red port light. From reading the testimony, it seems clear that the court was using the Titanic's movement prior to the collision (a two point deviation to port) and the time of stopping to fix in their mind that the other ship was the Titanic. This is sensible, but, in my opinion, flawed. A two point turn to port at the time of the collision would not have shut out the Titanic's green light - which Groves never saw. The only way that the red light would be seen is if the Titanic was pointing somewhere between north-west and easterly...and the former option seems credible as he says that the ship was coming up obliquely to the Californian, and was not showing her broadside. Therefore, it makes me believe that when the Titanic was seen to stop by Groves at 11.40, the White Star liner had already manoeuvered in such a way to be pointing north... the collision must have occurred sometime sooner than this, and the \"11:40\" timing must be a coincidence due to the differences in ship's times. If the Californian had seen the Titanic before it started moving in an arc, then heading northward, then she would have been moving slightly south of west - in other words, getting further and further away, and hence making her lights even more indistinct, rather than brighter and clearer. If we take the computer simulation (from the Encyclopedia-Titanica website), then it would take about 6 minutes for the Titanic to come heading North. When Stone came on the bridge at 12.08 to relieve Groves, he saw the other ship and checked its bearing with the compass - which he saw to be SSE, directly on the starboard beam. The compass deviation that night was 2 points, so the bearing would be SE (true). I would direct the reader to the previous section of this piece discussing the amount of light visible to Groves, and later, Stone and Gibson. At 15 miles, only the lights of the boat deck (ie - very few), A deck and B deck would be observable. Regarding the Titanic's movements post-collision, an excellent discussion on a computer simulation can be found here. It is apparent that, when the Titanic performed her big arc, when she came to be heading North, her lattitude was roughly what it was before the collision. After this, she steamed on at half speed. Unfortunately, there is no consensus on how long this occurred. For the sake of discussion, let us assume 10 minutes. At half speed, this amounts to a distance of about 2 miles, which if steamed due north, puts the two ships distance at the time of the collision as being 17 miles. Again, these figures are rough, but illustrative. The main point is that, just after the collision, but before steaming on, more of the Titanic would be hull down (below the horizon), and hence less light would be displayed. An extra 2 miles south would obscure everything 67 feet above the waterline... which means only the mastlight would be seen. It may be that Groves saw nothing of the collision and its immediate aftermath. It now seems likely that Mrs.Roberts' maid was on E-deck. A further hypothesised occupant on these B-deck cabins (the famous Margaret \"Molly\" Brown) could have been located on E-deck too. Of these two cabins, B3 and B5, information is sketchy, but thanks to the generous help of George Behe, the following may be said: Mrs.Roberts may have been trying to get some sleep - in various accounts, she had either \"just dropped off to sleep\", \"was awakened by the crash\" or \"was awake in her cabin when the crash came\". It may be that she was dozing in her cabin with the lights off. Miss Allen had either just retired to her cabin (where Ms.Madill had already gone) or was in the library. It seems possible that, at the time of the collision, this cabin's lights were on. Even so, it provides more credible evidence that the Titanic must have been showing very little light forward of her bows. With regards to other areas of the forward superstructure, I suspect that the bridge would be in a darkened state too. In short, Titanic would appear to be poorly lit, with most, if not all the lights, coming from the right of the port lamp - as Gibson said later. Thanks to data recently discovered for the Olympic in 1929, we know how much light the various areas on the Titanic would show...and it is surprisingly little. Most of the first class areas would have a value of no more than 2 foot-candles, or the equivalent of 2 candles as seen from 1 foot away. How far can a candle by seen at night by the naked eye? We are told that it would be 3 1\/2 miles or less if one takes into account atmospheric absorption; another website suggests a value of 1 mile. Taking the average of these (2 1\/4 miles), and bearing in mind the inverse square law, how many foot candles at 12 miles would be needed to see the Titanic? We get 38 foot candles. With lights contributing from the smoking rooms, companion ways, cabins and state rooms, smoking rooms, reception rooms, and perhaps dining rooms, we can easily exceed this number. The greatest contribution to this would be the 1st and 2nd class smoking rooms (a total of 4 foot candles) and the 1st class reception room (2.2). Due to foreshortening of the Titanic as seen from an oblique angle, these comparatively highly illuminated areas would be seen close to the stern...as Gibson had said under interrogation. This leads us to the heading of the Titanic, as she ultimately \"finished with engines\". Today, the bow section of the wreck lies facing \"slightly east of North\", as Dr.Ballard said shortly after her discovery. A Royal Navy salvage engineer I spoke to said that this would be the heading of the ship before she went down. This leads to a conundrum! George Behe places the Titanic heading slightly north of NNW -in line with Gibson's statement at the British Enquiry. This is quite true, and survivors accounts place the \"white light\" anywhere between 1\/2 point and 4 points off the starboard bow. Of course, it may be advisable to use Boxhall's testimony, since he was observing the other ship for the longest period of time. He says that, at first the other ship was 1\/2 point away, and when he last saw her, she was 2 points away. Of course, both ships were stopped, but the Titanic may have been turning in the drift, giving the impression to Boxhall that the ship he was seeing was steaming off. QM Rowe on the Titanic says that the stern was swinging making the bow face North. However, Pitman, lying close to the ship off the starboard side didn't see the Titanic turning. It should be noted that Pitman was evidently not the most observant of witnesses as he failed to see the ship breaking up as she sank! One final point: Lawrence Beesley, for one, reported that his boat (13) rowed forwards in the direction that the Titanic was heading before she sank - and this turned out to be North-West. Of course, it may be that the Titanic was heading north, or NNE when she sank... this would also have opened up more lights to the observers on the Californian, but not by much. Steward Crawford's evidence also seems to indicate a NW heading of the Titanic. After news of the disaster has broken, and according to Groves, he sees the Carpathia at about 6.50am, abeam on the port side. The Californian cleared the icepack at 6.30am, so, in those twenty minutes, assuming a directly southerly trajectory (and not allowing for the influence of drift which might have helped), she must have made 4.3 miles at 13 knots. It is generally accepted that the drift that night was 1 knot to the south; as the wind came up and the water became choppy towards daybreak, this may have increased. However, it is difficult to quantify this, so let us assume a 1 knot drift that night and day. At 6.50am, the Carpathia would have been at the wreck site, offset by 4.5 hours of drift, placing her at approximately 41o40' North. This places the Californian at 41o44'N as she cleared the icepack at 6.30am. Captain Moore of the Mount Temple saw the Californian crossing from east to west at 6.00am. He places the Californian as being 5-6 miles north of him, and the Carpathia 5-6 miles east, corroborating the Californian's lattitude at 6.00am. Working backwards, we have, at 2.20am, the Californian would have been a further 4.5' North...or roughly at a lattitude of 41o49' North. At 11.40, she would have been nearly 3 miles further North again (41o51' North). When she stopped, at 10.21, she would have been at 41o53' North. This doesn't tally with the estimate I made for the position at the start of this article, as it places a great deal of emphasis on exactly where the Carpathia was relative to the actual sinking location. These values are also suspicious because they would enable the sidelights of both ships to be seen for a greater time than actually occurred. Once pulling away from the Titanic's side, Boxhall in boat 4 wound up on the starboard side, and, lay there watching the ship sink. Boxhall's boat was the first to be picked up shortly after 4.00am, after heading towards her green flares. The occupants in boat 4 reported that they only had one seaman in the boat, which, together with Boxhall's story, makes me think that the boat simply drifted for two hours south -in the current. Certainly, she made no attempt to rescue the dying swimmers. So, Boxhall and his crew must have been to the south. It was about half an hour before the Carpathia picked up any other lifeboats (boat 4 had been picked up as dawn was breaking). Ismay escaped in collapsible boat C, which had headed for the mysterious light on the horizon, and was 3\/4s of a mile, stem-on, when the Titanic went down, somewhere between 35 and 15 minutes after the boat left the ships' side. Boat C pulled for the light, as Rowe said, \"We pulled through the night, but seemed to get no nearer to the lights. So we altered our course back to a boat that was carrying a green light. During that time daylight broke and the Carpathia was in sight.\". It would seem natural to assume that, with an initial heading of north, or north-west, and then turning round and heading for Boat 4, and then the Carpathia (and allowing for the southerly current), boat C was either north or perhaps approximately at Titanic's lattitude. Why do I mention this? Simply because when Ismay boarded the Carpathia, he noticed a clock and it said either quarter to, or quarter past 6. So, we know extremely roughly where the Carpathia was at about 6.00am - at the time the Mount Temple saw her and the Californian. Conversely, if we take the 15 mile distance, at a bearing of SE\/NW to be accurate at all times that night, we can come up with some more co-ordinates, if we say that the Californian was at 41o55'N at 2.20am. We know the Titanic was at a lattitude of 41o47'N when she struck, if she was on track. She steamed Northwards for some time, to end up at some location. However, let us say that this was negligible, as it is difficult to factor in. When the Titanic struck, the Californian would have been at 42o58'N. When Californian stopped at 10.21, this would put her at about 42oN. At 6.00am, she would be at 41o51'N... 7 miles north of the wrecksite. Captain Lord estimated that he was at 42o5'N, 50o7'W when he stopped for the night. I would put him at 42oN, 50o10'W, a difference of 6.3 miles. All these numbers assume a southerly current with no east\/west component. However, Stewarts Pole Star sighting at 7.30pm (giving a lattitude of 42o5.5' N) excepted, the agreement between these numbers is satisfactory. One other thing should be said about the navigation of the Californian. The next day, before resuming her voyage to Boston, Captain Lord and his officers calculated that they had left the Titanic's flotsam at 41o33'N. This has been criticised by researchers and described as an attempt to push the Titanic's overnight position even further south to absolve Lord et al. of blame. However, there is confirmation of this lattitude. At 12.10am, the SS Frankfurt, heading South, saw the Californian emerge from the ice floes directly ahead. The Frankfurt was at 41o35'N at the time. For too long now, the positioning of the Californian with respect to the Titanic has been like a game of \"pin-the-tail-on -the-donkey\". Find the Titanic. Draw a line in whatever direction you want and theres the Californian. Very little attempt has been made to explain the locations, based on what was seen. The \"5 mile\", or \"10 mile\" mantra has been repeated with very little thought by the opponents of Captain Lord. On the other hand, the arguments of Senan Molony, Leslie Harrison et al., although weak, do provide one strong point of discussion. For the Californian to have wound up so far south, would mean a massive error on the part of the stellar observations, steering and\/or drift that night. This, to my mind is impossible. I suspected that the Californian stopped roughly where she said she was, so I was surprised, and delighted to have this confirmed during this analysis. Were it not for various conflicting pieces of testimony, the \"mystery\" should not have endured for as long as it has. With the bulk of the evidence supporting the hypothesis that the two ships were in sight of each other, there are bound to be pieces of the story that don't fit in (such as Groves first seeing the ship well aft of the starboard beam, seemingly putting its motion eastward, and Stone seeing a moving ship whose rockets only went up to half the height of the mastlight). In actual fact, the socket signals from the Titanic went up to 600-800 feet according to available literature from the period. If we take the lower of these two values, then it means that an observer at sea level 28.4 miles from the point of detonation (along the surface of the sea) could see the rockets, depending on the brightness of the explosion. For Captain Lord's supporters to insist that none of the Titanic's rockets were seen means that she must have been this distance away from the Titanic - in fact, if we take the height of Stone and Gibson above the water line, then the distance becomes over 36 miles! Compare this with the distance from the wreck site to Captain Lord's claimed location - approximately 21 miles. It is impossible to imagine anything that would cause such a huge error in navigation to prevent the Californian being outside the range of the rockets. An animation is shown below. The graphic above denotes (left) a lit Titanic as she would be seen from 12-14 miles away; the ship is partially hull down so that the horizon obscures many of the lower decks. The explosion above the Titanic is how far a rocket would be seen to ascend as it attained the minimum height of 600 feet above the deck. The horizontal grey line denotes the horizon. The centre digram shows how far the rockets would ascend, compared to the first graphic, when fired from a distance of 21 miles, the claimed Titanic to Californian distance. The small ship denotes how the Californian (as an example of a \"ship like us\" that Capain Lord claimed to see when he was stopped in ice) would looks when viewed from 5 miles away. This 'Californian' is oriented the same as the lit graphic of the Titanic, with her port light showing. Note two things: the first is that the 'Californian' is roughly the same size as the lit Titanic. Without being able to see all the deck features of the lit Titanic, it would be impossible to make a determination of actual size. The second point is that, even at 21 miles, the rockets would rise well above the 'Californians' decks; how then could 2nd Officer Stone see rockets fired from a great distance but only go up to \"half the height of the mastlight of the other ship\"? How could Stone see low-lying rockets but not ones fired from 21 miles away? The final graphic shows the model of the Titanic that was used to create the 'lit' Titanic image, allowing a comparison of size of the three images. We should bear in mind two important conclusions: the image is an exagerration of the altitude that rockets would reach. For instance, the rockets sent aloft from the 'lit' Titanic would reach an altitude of very nearly half a degree. This is the same width as a full moon and it would be an instructive and valuable exercise for the reader to see from him\/herself just how big this would be when the moon's lower limb is touching the horizon. Another way to view this problem is to observe the rocket explosion graphics from a suitable distance in order to accurately compare the images above with what would have been seen from the Californian. On my computer, the graphic is some 8.5 centimetres in height; to see the images as they would have been seen, one would need to be 33.8 feet (!) away from the computer screen. How high would rockets have to ascend for them to be seen to ascend to no more than half a mastlight, relative to a ship 5 miles away? Trigonometry can assist us, and yields a result of some 90 feet. This is relative to the surface of the sea; relative to the height above the back deck, we find that the rockets would have to reach a height of about 30 feet. This is obviously nonsense, and would pose great risk to the people on the boat deck of the Titanic. The rockets cleared the masts and funnels at least. In fact, this whole point of the brightness of the detonating rockets being more of a deciding factor in their visibility can be qualified by some basic conjectures. Readers are invited to read Dave Gittins website; as a navigator, he approaches various practical Titanic problems from a novel point of view. Consider the Carpathia. Traditional Titanic-lore suggests that she was racing at 17.5 knots during her dash to the north. This is a physical impossibility. Her true speed may have been 14-15 knots. She was about ten miles away from the wreck site when her officers saw Boxhall's green flares, sighted at approx. 3.15am. This was about 1.5 hours after the last rocket was fired. This gives a rough distance from the wreck site of 1.5*(15) + 10 = 32.5 miles at 1.45am. Rockets fired, and reaching a height of 600 feet could be visible for up to 36 miles. Every officer on the bridge of the Carpathia was scanning their direction of travel, looking for icebergs - and they saw no rocket detonations. Conversely, the Californian's Stone and Gibson saw the Carpathia's rockets fired at about 3.15am. If the above essay is correct, then the distance between the Carpathia and the Californian must have been 15 + 10 miles = 25. These rockets were seen, but at the limit of visibility. So, from this, the observable range of the rockets was between 25 and 32.5 miles. Readers may wish to read about the inverse square law to explain how the intensity of light diminishes with distance. A reader has asked, in a confrontational tone, why the Carpathia's company signals were not seen. This is actually a good question, but there is no evidence that they were fired; the only person who mentioned this is Captain Rostron, and absolutely no-one else. With regard to pyrotechnics fired from the rescue ship, Rostron is unclear about whether the rockets from his ship were fired every fifteen minutes, or is response to the green flare from boat 2. This is not a criticism of Rostron; he had a lot to think about that night but it shows that even his testimony, given in good faith, could have an error or two it. Besides, from a person low down in the water on a lifeboat, a flash of light on the horizon could be a rocket or a roman candle; they would have no way to know which is which. Putting these little niggles aside, the only mystery is one of psychology: the relationship between Lord and Stone, and why information just wasn't getting through from the bridge. Why wasn't enough urgency placed on the sighting of rockets? In an interview with Walter Lord, when writing \"A Night to Remember\", Groves recalled Stone as being lazy, and taken to snoozing in his cabins between watches - a man who wasted life, as Groves said. He also said that Stone was afraid of Captain Lord. In such circumstances, Stone may have been the sort of person who didn't want to press the issue, as Groves said to Walter Lord. As Stone said, he simply informed the master (Capt.Lord) of the situation and left him to judge. Lord relied on Stone, the Officer of the Watch. And so, the information just didn't get through. And if Ivan Thompson was correct in his letter to W.Lord, this caused frustration to the men on the bridge: they tried and tried to get the Captain out of the chart room where he was sleeping, as Thompson said. You will note that I have been very sparing in using Stone's testimony or affidavit as it simply doesn't relate to what happened. Similarly, Gill, who I have never trusted, is not regarded here as his story is very flimsy. Regarding the navigational aspects of the case, the two ships were certainly more than 10 miles apart. Had they been any closer, then Boxhall's green flares would have been seen by the Californian crew. Therefore, if I am right, this would make Lord Mersey's 5-10 mile distance estimate very wrong indeed. At 5 miles, the Titanic would be an unmistakeable sight. The only untested part of this theory is whether the ships could see each over such a distance: I have no data on the power output of either ship's navigational lamps. However, an attempt was made to replicate the Titanic- Californian situation in 1996, during the RMS Titanic Inc memorial cruise. Two ships, of intermediate size between that of the Titanic and the Californian were placed 16-19 miles apart and rockets were fired, which reached a height of 750 feet. The rockets were seen, as expected, but so were the mastlights of the other ship, albeit very faint. The cruise liner Royal Majesty observed the proceedings while the research vessel Ocean Voyager fired the rockets. I was intrigued to know how the Ocean Voyager compared to the Titanic. Sadly, details for this ship, which sank in 2002, are scarce, as are pictures. In the end, I had to compare an image of this ship and French vessel \"Nadir\" (2hose dimensions are known) from page 8 of \"Titanic International\"'s Voyage magazine, issue 25. I estimate that the Ocean Voyager is about 240 feet long and the height from waterline to the top of the mast is about 76 feet. Of course, the mast light would be afixed some distance below this. I estimate that the height from water line to the bridge would be approximately 38 feet. Remember that only the mastlight was seen, faintly. I estimate that the top deck of the Royal Majesty (the ship \"doing\" the observing) was about 85 feet above the water, Applying the forumula above, we get that the maximum observing distance from the top deck of the Royal Majesty and the top of the Ocean Voyager's mast would be 20.5 [20.8] miles. So, it would seem that, the lights are visible for quite a fraction of the distance to the observable horizon. And of course, observaing conditions on the 14th and 15th April 1912 were extremely clear. Since the above was written, new information has come to light. Sam Halpern's analysis of the Titanic's mastlight on the Titanic Research and Modelling website shows that, at 17 miles, the light would be as bright as a star with an apparent magnitude of 1: see here. To give an indication as to how bright this is, the two lower left stars in Orion's belt, Alnitak and Alnilam, are magnitude 1.7. Magnitude 1 is twice as bright and would be very noticeable, especially if you bear in mind that the only other star of comparable brightness as seen from the Californian in the south-east would be Antares - also magnitude 1. Titanic's lights would therefore be noticeable and obvious. In fact, Antares would be on the horizon and rising at about the same time that Groves saw the other ship's light at 11.10pm; Antares is in the same direction as this light and would naturally have drawn ones eyes to the ESE. There may come an occasion when I revisit the data in this page; Wikipedia's entry on the observing capability of the human eye at night indicates a 1' angular resolution, much less than the 3 arc-seconds quoted above; time permitting, I need"} +{"id":"RedPajamaC4.0025","text":"Social Security number 183-38-7294 was issued to JOHN B BRUCE, who was born 15 May 1948 and, Death Master File says, died 10 November 1996. Search Archives for JOHN BRUCE. Social Security number 183-38-7297 was issued to JAMES C JONES, who was born 12 August 1947 and, Death Master File says, died 20 November 2010. Social Security number 183-38-7304 was issued to DIANE V ROBERTI, who was born 21 March 1947 and, Death Master File says, died 13 December 1994. Search Archives for DIANE ROBERTI. Social Security number 183-38-7309 was issued to JAMES MCMULLEN, who was born 14 October 1947 and, Death Master File says, died May 1986. Social Security number 183-38-7311 was issued to ADDA CARLISLE, who was born 17 March 1887 and, Death Master File says, died July 1973. Search Archives for ADDA CARLISLE. Social Security number 183-38-7317 was issued to EVELYN B TAYLOR, who was born 12 May 1909 and, Death Master File says, died 17 March 1996. Social Security number 183-38-7324 was issued to LEWIS R KORZINSKI, who was born 23 October 1947 and, Death Master File says, died 28 February 2002. Search Archives for LEWIS KORZINSKI. Social Security number 183-38-7328 was issued to STELLA S RICCI, who was born 13 June 1907 and, Death Master File says, died 16 November 1994. Search Archives for STELLA RICCI. Social Security number 183-38-7340 was issued to J M PREBLES, who was born 03 January 1948 and, Death Master File says, died 15 April 1995. Search Archives for J PREBLES. Social Security number 183-38-7350 was issued to WILLIAM J SCHRAM, who was born 12 October 1949 and, Death Master File says, died 24 November 2010. Search Archives for WILLIAM SCHRAM. Social Security number 183-38-7355 was issued to EMMA HULTMAN, who was born 30 July 1906 and, Death Master File says, died December 1977. Search Archives for EMMA HULTMAN. Social Security number 183-38-7359 was issued to FREDA L RUBEN, who was born 10 July 1913 and, Death Master File says, died 18 January 2004. Search Archives for FREDA RUBEN. Social Security number 183-38-7360 was issued to DIANNA J GUERRANT, who was born 08 June 1946 and, Death Master File says, died 18 May 1992. Search Archives for DIANNA GUERRANT. Social Security number 183-38-7365 was issued to ALMA F BROWN, who was born 30 July 1925 and, Death Master File says, died 19 April 1988. Search Archives for ALMA BROWN. Social Security number 183-38-7367 was issued to KATHERINE KUTSCHER, who was born 02 December 1906 and, Death Master File says, died April 1972. Search Archives for KATHERINE KUTSCHER. Social Security number 183-38-7368 was issued to EDWARD J CIEPLY, who was born 27 October 1947 and, Death Master File says, died 02 January 2001. Search Archives for EDWARD CIEPLY. Social Security number 183-38-7369 was issued to SHERWOOD ROBINSON, who was born 23 August 1946 and, Death Master File says, died 06 September 2004. Search Archives for SHERWOOD ROBINSON. Social Security number 183-38-7378 was issued to ANNA FINLEY, who was born 31 October 1896 and, Death Master File says, died November 1981. Search Archives for ANNA FINLEY. Social Security number 183-38-7383 was issued to LILLIAN RICH, who was born 05 March 1909 and, Death Master File says, died March 1976. Search Archives for LILLIAN RICH. Social Security number 183-38-7384 was issued to HILDA F STOFCHECK, who was born 15 July 1912 and, Death Master File says, died 20 May 1988. Search Archives for HILDA STOFCHECK. Social Security number 183-38-7392 was issued to MYRTLE FLICKINGER, who was born 11 August 1887 and, Death Master File says, died December 1975. Search Archives for MYRTLE FLICKINGER. Social Security number 183-38-7396 was issued to ALLAN H PINKERTON, who was born 21 September 1944 and, Death Master File says, died 27 December 2005. Search Archives for ALLAN PINKERTON. Social Security number 183-38-7397 was issued to ESTELLE L LIGHTNER, who was born 02 March 1910 and, Death Master File says, died 16 September 1991. Search Archives for ESTELLE LIGHTNER. Social Security number 183-38-7400 was issued to DAVID T WESOLEK, who was born 07 December 1947 and, Death Master File says, died 21 May 2006. Search Archives for DAVID WESOLEK. Social Security number 183-38-7407 was issued to ELLWOOD A TEGTMEIER, who was born 18 September 1948 and, Death Master File says, died 22 April 1999. Search Archives for ELLWOOD TEGTMEIER. Social Security number 183-38-7408 was issued to P M WINGERTSAHN, who was born 19 March 1948 and, Death Master File says, died March 1989. Search Archives for P WINGERTSAHN. Social Security number 183-38-7421 was issued to LAURA W MARTIN, who was born 03 October 1914 and, Death Master File says, died 21 November 2010. Social Security number 183-38-7430 was issued to JOSEPH T SOPHER, who was born 09 December 1947 and, Death Master File says, died 27 May 2008. Search Archives for JOSEPH SOPHER. Social Security number 183-38-7448 was issued to KATHRYN BRENEMAN, who was born 29 January 1890 and, Death Master File says, died December 1982. Search Archives for KATHRYN BRENEMAN. Social Security number 183-38-7468 was issued to KATHRYN RUDISON, who was born 18 December 1913 and, Death Master File says, died 27 July 1999. Search Archives for KATHRYN RUDISON. Social Security number 183-38-7475 was issued to JEFFREY L PETERS, who was born 30 September 1960 and, Death Master File says, died 10 August 2010. Search Archives for JEFFREY PETERS. Social Security number 183-38-7476 was issued to JANET L FRY, who was born 12 May 1953 and, Death Master File says, died 29 January 2009. Search Archives for JANET FRY. Social Security number 183-38-7497 was issued to WILLIAM H GRIFFIN, who was born 15 February 1948 and, Death Master File says, died 21 May 2013. Social Security number 183-38-7504 was issued to R H HINDS, who was born 09 September 1945 and, Death Master File says, died May 1989. Search Archives for R HINDS. Social Security number 183-38-7507 was issued to ANNA Z JACOBSON, who was born 10 August 1902 and, Death Master File says, died April 1993. Search Archives for ANNA JACOBSON. Social Security number 183-38-7539 was issued to RICHARD F ALVINO, who was born 28 July 1946 and, Death Master File says, died 01 April 2002. Search Archives for RICHARD ALVINO. Social Security number 183-38-7541 was issued to AGNES BRUTTO, who was born 23 December 1913 and, Death Master File says, died November 1977. Search Archives for AGNES BRUTTO. Social Security number 183-38-7549 was issued to ALICE M GREEN, who was born 09 May 1932 and, Death Master File says, died 02 October 2000. Social Security number 183-38-7558 was issued to J S SCHUSTER, who was born 26 July 1948 and, Death Master File says, died July 1990. Search Archives for J SCHUSTER. Social Security number 183-38-7581 was issued to CECILIA T SUDETIC, who was born 09 October 1910 and, Death Master File says, died 08 November 1997. Search Archives for CECILIA SUDETIC. Social Security number 183-38-7597 was issued to EUGENE R FITZHARRIS, who was born 04 March 1948 and, Death Master File says, died 23 April 1996. Search Archives for EUGENE FITZHARRIS. Social Security number 183-38-7601 was issued to RICHARD F FOUST, who was born 12 September 1949 and, Death Master File says, died 01 September 2011. Search Archives for RICHARD FOUST. Social Security number 183-38-7615 was issued to PATRICIA S DEARTH, who was born 01 July 1946 and, Death Master File says, died 22 November 2007. Search Archives for PATRICIA DEARTH. Social Security number 183-38-7618 was issued to MARIANN E DUERR, who was born 07 August 1948 and, Death Master File says, died 15 November 2008. Search Archives for MARIANN DUERR. Social Security number 183-38-7619 was issued to EMMA WILLIS, who was born 09 June 1901 and, Death Master File says, died March 1983. Search Archives for EMMA WILLIS. Social Security number 183-38-7620 was issued to RACHEEL JOHNSTON, who was born 16 March 1886 and, Death Master File says, died October 1977. Search Archives for RACHEEL JOHNSTON. Social Security number 183-38-7625 was issued to SYLVIA BLOOM, who was born 25 March 1910 and, Death Master File says, died November 1975. Search Archives for SYLVIA BLOOM. Social Security number 183-38-7630 was issued to WILLIAM WIESENFELD, who was born 09 June 1946 and, Death Master File says, died 14 September 2013. Search Archives for WILLIAM WIESENFELD. Social Security number 183-38-7639 was issued to WILLIAM WOODSON, who was born 15 June 1949 and, Death Master File says, died February 1976. Search Archives for WILLIAM WOODSON. Social Security number 183-38-7640 was issued to MELVIN THOMAS, who was born 02 August 1948 and, Death Master File says, died 23 April 2011. Search Archives for MELVIN THOMAS. Social Security number 183-38-7647 was issued to ERNEST HEMMINGWAY, who was born 17 January 1950 and, Death Master File says, died July 1986. Search Archives for ERNEST HEMMINGWAY. Social Security number 183-38-7649 was issued to EVELYN I GITNIK, who was born 19 August 1908 and, Death Master File says, died 29 October 2001. Search Archives for EVELYN GITNIK. Social Security number 183-38-7652 was issued to THOMAS D WELSCH, who was born 24 February 1947 and, Death Master File says, died 08 March 2011. Search Archives for THOMAS WELSCH. Social Security number 183-38-7653 was issued to DENNIS GRACE, who was born 12 June 1949 and, Death Master File says, died 09 January 2002. Search Archives for DENNIS GRACE. Social Security number 183-38-7673 was issued to DAVID L BERGER, who was born 01 February 1951 and, Death Master File says, died 14 August 2004. Social Security number 183-38-7685 was issued to ROBERT J YAKOVICH, who was born 26 October 1949 and, Death Master File says, died 03 June 1996. Search Archives for ROBERT YAKOVICH. Social Security number 183-38-7693 was issued to JUDITH C MUELLER, who was born 18 October 1947 and, Death Master File says, died 19 October 1995. Search Archives for JUDITH MUELLER. Social Security number 183-38-7704 was issued to RICHARD J DZIERSKI, who was born 28 June 1950 and, Death Master File says, died 20 December 2000. Search Archives for RICHARD DZIERSKI. Social Security number 183-38-7714 was issued to IRENE RUFF, who was born 10 September 1918 and, Death Master File says, died February 1981. Search Archives for IRENE RUFF. Social Security number 183-38-7721 was issued to CLAIRE L CARROLL, who was born 14 August 1898 and, Death Master File says, died February 1991. Search Archives for CLAIRE CARROLL. Social Security number 183-38-7722 was issued to CATHERINA CHIEFFE, who was born 17 May 1917 and, Death Master File says, died 19 May 2006. Search Archives for CATHERINA CHIEFFE. Social Security number 183-38-7724 was issued to HEZEKIAH SAUNDERS, who was born 01 September 1895 and, Death Master File says, died March 1972. Search Archives for HEZEKIAH SAUNDERS. Social Security number 183-38-7729 was issued to JOANNE E TRENTINI, who was born 20 June 1947 and, Death Master File says, died 27 September 2006. Search Archives for JOANNE TRENTINI. Social Security number 183-38-7738 was issued to KATIE MAE THOMAS, who was born 13 July 1921 and, Death Master File says, died 06 March 2010. Search Archives for KATIE MAE THOMAS. Social Security number 183-38-7743 was issued to WILLIAM BRITTAIN, who was born 14 December 1946 and, Death Master File says, died September 1977. Search Archives for WILLIAM BRITTAIN. Social Security number 183-38-7748 was issued to WALTER REUTZEL, who was born 02 July 1949 and, Death Master File says, died June 1979. Search Archives for WALTER REUTZEL. Social Security number 183-38-7753 was issued to BEULAH I GRAHAM, who was born 23 April 1910 and, Death Master File says, died 15 November 1995. Search Archives for BEULAH GRAHAM. Social Security number 183-38-7758 was issued to HERBERT COST, who was born 03 September 1905 and, Death Master File says, died July 1981. Search Archives for HERBERT COST. Social Security number 183-38-7759 was issued to MARIE PATTERSON, who was born 06 November 1888 and, Death Master File says, died July 1972. Search Archives for MARIE PATTERSON. Social Security number 183-38-7762 was issued to GEORGE V SAINATO, who was born 05 September 1946 and, Death Master File says, died 08 December 2008. Search Archives for GEORGE SAINATO. Social Security number 183-38-7764 was issued to GARY L WILSON, who was born 23 February 1950 and, Death Master File says, died 06 January 2006. Search Archives for GARY WILSON. Social Security number 183-38-7766 was issued to DAVID A THOMPSON, who was born 27 July 1947 and, Death Master File says, died 24 November 2009. Social Security number 183-38-7767 was issued to HOLBERT E KENNEDY, who was born 10 December 1950 and, Death Master File says, died 22 February 2009. Search Archives for HOLBERT KENNEDY. Social Security number 183-38-7768 was issued to DONNA T BORCHERT, who was born 29 August 1948 and, Death Master File says, died 22 July 2002. Search Archives for DONNA BORCHERT. Social Security number 183-38-7790 was issued to SANDRA HINECK, who was born 26 December 1946 and, Death Master File says, died 08 November 2002. Search Archives for SANDRA HINECK. Social Security number 183-38-7817 was issued to FRANK B AUGUSTINE, who was born 23 April 1948 and, Death Master File says, died April 1992. Social Security number 183-38-7818 was issued to CLARENCE S HENRY, who was born 01 May 1947 and, Death Master File says, died 04 December 2006. Social Security number 183-38-7823 was issued to ROBERT W MCGILLIS, who was born 25 May 1945 and, Death Master File says, died 13 January 1998. Search Archives for ROBERT MCGILLIS. Social Security number 183-38-7824 was issued to BEVERLY A TUCKER, who was born 16 June 1946 and, Death Master File says, died 05 May 2008. Search Archives for BEVERLY TUCKER. Social Security number 183-38-7832 was issued to ALMA M KEIL, who was born 16 April 1908 and, Death Master File says, died 22 April 1988. Search Archives for ALMA KEIL. Social Security number 183-38-7833 was issued to BARBARA WILLIAMS, who was born 10 December 1945 and, Death Master File says, died July 1983. Social Security number 183-38-7836 was issued to AMELIA A GRIMM, who was born 27 May 1908 and, Death Master File says, died 18 December 1996. Search Archives for AMELIA GRIMM. Social Security number 183-38-7838 was issued to D T BRODERICK, who was born 22 November 1944 and, Death Master File says, died 15 November 1989. Search Archives for D BRODERICK. Social Security number 183-38-7850 was issued to ERNEST W WILLETTS, who was born 14 February 1909 and, Death Master File says, died 05 July 1998. Search Archives for ERNEST WILLETTS. Social Security number 183-38-7852 was issued to BRUCE LEY, who was born 04 April 1946 and, Death Master File says, died July 1977. Search Archives for BRUCE LEY. Social Security number 183-38-7853 was issued to MARGARET KAZIMER, who was born 28 December 1908 and, Death Master File says, died December 1991. Search Archives for MARGARET KAZIMER. Social Security number 183-38-7854 was issued to JOHN SHAFFER, who was born 06 December 1907 and, Death Master File says, died February 1987. Search Archives for JOHN SHAFFER. Social Security number 183-38-7855 was issued to ALICE C CHURCHILL, who was born 20 September 1898 and, Death Master File says, died November 1992. Search Archives for ALICE CHURCHILL. Social Security number 183-38-7862 was issued to MARY PAVLIS, who was born 30 June 1906 and, Death Master File says, died 25 September 1989. Search Archives for MARY PAVLIS. Social Security number 183-38-7874 was issued to SARAH HUSSER, who was born 16 February 1895 and, Death Master File says, died July 1979. Search Archives for SARAH HUSSER. Social Security number 183-38-7879 was issued to W W WALD, who was born 05 July 1928 and, Death Master File says, died May 1991. Search Archives for W WALD. Social Security number 183-38-7891 was issued to ANN J GRIMM, who was born 22 November 1911 and, Death Master File says, died 01 December 2006. Search Archives for ANN GRIMM. Social Security number 183-38-7898 was issued to CLIFFORD D EDWARDS, who was born 13 November 1946 and, Death Master File says, died 31 December 2009. Search Archives for CLIFFORD EDWARDS. Social Security number 183-38-7902 was issued to STEPHEN PANKRATIEV, who was born 05 March 1897 and, Death Master File says, died 16 July 1994. Search Archives for STEPHEN PANKRATIEV. Social Security number 183-38-7904 was issued to KATHLEEN N WHITE, who was born 29 August 1947 and, Death Master File says, died 11 November 1999. Search Archives for KATHLEEN WHITE. Social Security number 183-38-7911 was issued to D L BELL, who was born 15 May 1943 and, Death Master File says, died 15 August 1997. Search Archives for D BELL. Social Security number 183-38-7917 was issued to JOHN M VOLK, who was born 26 July 1959 and, Death Master File says, died 24 September 2002. Search Archives for JOHN VOLK. Social Security number 183-38-7928 was issued to JOHN WAYMAN, who was born 18 December 1951 and, Death Master File says, died August 1985. Social Security number 183-38-7935 was issued to LEO J NAGLE, who was born 27 January 1899 and, Death Master File says, died 07 April 1980. Search Archives for LEO NAGLE. Social Security number 183-38-7938 was issued to JOSEPH E FARRELLY, who was born 26 July 1946 and, Death Master File says, died 24 June 2002. Search Archives for JOSEPH FARRELLY. Social Security number 183-38-7942 was issued to BARBARA FOLEY, who was born 03 January 1903 and, Death Master File says, died August 1987. Search Archives for BARBARA FOLEY. Social Security number 183-38-7946 was issued to MARGARET D THOMSON, who was born 16 November 1907 and, Death Master File says, died 04 August 1989. Search Archives for MARGARET THOMSON. Social Security number 183-38-7951 was issued to BEVERLY J LUTHERAN, who was born 07 March 1947 and, Death Master File says, died 28 November 2008. Search Archives for BEVERLY LUTHERAN. Social Security number 183-38-7955 was issued to OLGA M DONAHOE, who was born 16 March 1908 and, Death Master File says, died 07 December 1996. Search Archives for OLGA DONAHOE. Social Security number 183-38-7962 was issued to DORIS COOK, who was born 03 January 1945 and, Death Master File says, died 08 July 2013. Search Archives for DORIS COOK. Social Security number 183-38-7964 was issued to DELPHINE V MOYER, who was born 06 March 1923 and, Death Master File says, died 16 April 2007. Search Archives for DELPHINE MOYER. Social Security number 183-38-7967 was issued to FLORENCE BROOKS, who was born 29 November 1905 and, Death Master File says, died 17 February 1999. Search Archives for FLORENCE BROOKS. Social Security number 183-38-7969 was issued to GEORGIA LAZZARI, who was born 17 December 1891 and, Death Master File says, died May 1980. Search Archives for GEORGIA LAZZARI. Social Security number 183-38-7971 was issued to STANLEY J ROSS, who was born 17 August 1947 and, Death Master File says, died 10 September 2013. Search Archives for STANLEY ROSS. Social Security number 183-38-7972 was issued to BARRY RAYMOND, who was born 01 January 1947 and, Death Master File says, died October 1984. Search Archives for BARRY RAYMOND. Social Security number 183-38-7983 was issued to WILLIAM L KIENTZ, who was born 21 July 1948 and, Death Master File says, died 07 October 1973. Search Archives for WILLIAM KIENTZ. Social Security number 183-38-7986 was issued to ARCHIE GRIFFIN, who was born 14 March 1934 and, Death Master File says, died 15 June 1997. Search Archives for ARCHIE GRIFFIN. Social Security number 183-38-7999 was issued to MARGARET A ANDERSON, who was born 01 July 1914 and, Death Master File says, died 31 December 1999. Social Security number 183-38-8000 was issued to CELESTINA TESSARO, who was born 25 September 1915 and, Death Master File says, died 07 August 2007. Search Archives for CELESTINA TESSARO. Social Security number 183-38-8002 was issued to B R ANNESI, who was born 06 November 1936 and, Death Master File says, died April 1988. Search Archives for B ANNESI. Social Security number 183-38-8014 was issued to P R DAWSON, who was born 25 August 1945 and, Death Master File says, died 15 February 1992. Search Archives for P DAWSON. Social Security number 183-38-8015 was issued to CATHERINE FANNING, who was born 24 June 1881 and, Death Master File says, died July 1970. Search Archives for CATHERINE FANNING. Social Security number 183-38-8021 was issued to NORMA SCHWER, who was born 04 March 1919 and, Death Master File says, died January 1984. Search Archives for NORMA SCHWER. Social Security number 183-38-8025 was issued to ANNE KIRK, who was born 30 November 1945 and, Death Master File says, died December 1985. Search Archives for ANNE KIRK. Social Security number 183-38-8026 was issued to MARIE PROIE, who was born 22 November 1916 and, Death Master File says, died 01 September 2009. Search Archives for MARIE PROIE. Social Security number 183-38-8031 was issued to JOANNE EMELOFF, who was born 21 August 1947 and, Death Master File says, died October 1983. Search Archives for JOANNE EMELOFF. Social Security number 183-38-8032 was issued to MARTIN W RIEGNER, who was born 20 April 1949 and, Death Master File says, died 13 May 2011. Search Archives for MARTIN RIEGNER. Social Security number 183-38-8037 was issued to ALICE GAWS, who was born 30 July 1908 and, Death Master File says, died February 1982. Search Archives for ALICE GAWS. Social Security number 183-38-8060 was issued to RAYMOND C MESICK, who was born 25 May 1946 and, Death Master File says, died 11 December 2005. Search Archives for RAYMOND MESICK. Social Security number 183-38-8068 was issued to ETHEL JONES, who was born 03 June 1887 and, Death Master File says, died November 1976. Social Security number 183-38-8069 was issued to RICHARD LOCKHART, who was born 04 October 1946 and, Death Master File says, died 15 August 1997. Search Archives for RICHARD LOCKHART. Social Security number 183-38-8070 was issued to HARRIET D FILSON, who was born 20 December 1903 and, Death Master File says, died 07 August 1992. Search Archives for HARRIET FILSON. Social Security number 183-38-8072 was issued to JOSEPHINE M SPIEGEL, who was born 17 March 1919 and, Death Master File says, died 07 April 2008. Search Archives for JOSEPHINE SPIEGEL. Social Security number 183-38-8074 was issued to JOSEPH SZCZERBIAK, who was born 28 December 1947 and, Death Master File says, died 04 November 1996. Search Archives for JOSEPH SZCZERBIAK. Social Security number 183-38-8078 was issued to FLORENCE GEBHART, who was born 29 July 1888 and, Death Master File says, died November 1983. Search Archives for FLORENCE GEBHART. Social Security number 183-38-8082 was issued to LINDA A CRAWFORD, who was born 13 March 1945 and, Death Master File says, died 18 October 2003. Search Archives for LINDA CRAWFORD. Social Security number 183-38-8087 was issued to JOHN P JANOTA, who was born 25 August 1947 and, Death Master File says, died 25 May 1998. Search Archives for JOHN JANOTA. Social Security number 183-38-8088 was issued to ROBERT B HEDDLE, who was born 28 July 1948 and, Death Master File says, died 08 February 2001. Search Archives for ROBERT HEDDLE. Social Security number 183-38-8116 was issued to MARGARET CLOVER, who was born 27 June 1914 and, Death Master File says, died July 1979. Search Archives for MARGARET CLOVER. Social Security number 183-38-8119 was issued to ESTHER STUCKEY, who was born 21 August 1906 and, Death Master File says, died March 1982. Search Archives for ESTHER STUCKEY. Social Security number 183-38-8120 was issued to GLENN R SCHNARWILER, who was born 19 May 1947 and, Death Master File says, died 11 September 2006. Search Archives for GLENN SCHNARWILER. Social Security number 183-38-8138 was issued to EDNA P GALLIE, who was born 27 January 1904 and, Death Master File says, died May 1993. Search Archives for EDNA GALLIE. Social Security number 183-38-8145 was issued to ROBERTA R ELTING, who was born 16 February 1910 and, Death Master File says, died 07 October 2002. Search Archives for ROBERTA ELTING. Social Security number 183-38-8150 was issued to ELISABETH PORSE, who was born 02 December 1914 and, Death Master File says, died 05 January 1994. Search Archives for ELISABETH PORSE. Social Security number 183-38-8151 was issued to LAURA WILSON, who was born 22 April 1882 and, Death Master File says, died April 1974. Search Archives for LAURA WILSON. Social Security number 183-38-8152 was issued to EDITH DAWSON, who was born 01 April 1904 and, Death Master File says, died December 1975. Social Security number 183-38-8155 was issued to CHERYL A TURNER, who was born 20 August 1946 and, Death Master File says, died 13 June 2003. Search Archives for CHERYL TURNER. Social Security number 183-38-8161 was issued to KATHLEEN L SENTNER, who was born 11 August 1948 and, Death Master File says, died 31 March 2005. Search Archives for KATHLEEN SENTNER. Social Security number 183-38-8167 was issued to MICHAEL R DZVONIK, who was born 05 July 1946 and, Death Master File says, died 23 July 1993. Search Archives for MICHAEL DZVONIK. Social Security number 183-38-8174 was issued to AGNES NIEDERMEYER, who was born 12 July 1906 and, Death Master File says, died October 1982. Search Archives for AGNES NIEDERMEYER. Social Security number 183-38-8181 was issued to MILIA CHRISTAKOS, who was born 04 July 1937 and, Death Master File says, died April 1992. Search Archives for MILIA CHRISTAKOS. Social Security number 183-38-8182 was issued to ALICE B CUNNINGHAM, who was born 28 November 1909 and, Death Master File says, died 12 July 2002. Social Security number 183-38-8191 was issued to RUTH HAEFNER, who was born 20 December 1906 and, Death Master File says, died June 1986. Search Archives for RUTH HAEFNER. Social Security number 183-38-8204 was issued to MINNIE WAIN, who was born 15 February 1904 and, Death Master File says, died October 1978. Search Archives for MINNIE WAIN. Social Security number 183-38-8205 was issued to HELEN SEIDEL, who was born 15 March 1910 and, Death Master File says, died May 1973. Search Archives for HELEN SEIDEL. Social Security number 183-38-8206 was issued to ETHEL ROHDE, who was born 18 February 1909 and, Death Master File says, died 27 April 1999. Search Archives for ETHEL ROHDE. Social Security number 183-38-8208 was issued to GEORGIA H TAYLOR, who was born 21 August 1915 and, Death Master File says, died 18 September 1988. Search Archives for GEORGIA TAYLOR. Social Security number 183-38-8209 was issued to GREGORY A KOZLOWSKI, who was born 22 October 1949 and, Death Master File says, died 17 July 2011. Search Archives for GREGORY KOZLOWSKI. Social Security number 183-38-8211 was issued to CLARA GNANN, who was born 10 July 1888 and, Death Master File says, died December 1975. Search Archives for CLARA GNANN. Social Security number 183-38-8220 was issued to ANGELINE CAPUTO, who was born 24 December 1907 and, Death Master File says, died 15 March 1997. Search Archives for ANGELINE CAPUTO. Social Security number 183-38-8229 was issued to GARY STARR, who was born 13 July 1945 and, Death Master File says, died March 1987. Search Archives for GARY STARR. Social Security number 183-38-8234 was issued to MICHAEL T HALLIGAN, who was born 07 January 1948 and, Death Master File says, died 08 September 2011. Search Archives for MICHAEL HALLIGAN. Social Security number 183-38-8236 was issued to CHERYLE A RUTHERFORD, who was born 15 May 1947 and, Death Master File says, died 27 May 2011. Search Archives for CHERYLE RUTHERFORD. Social Security number 183-38-8252 was issued to NICHOLAS MARINELLI, who was born 10 November 1947 and, Death Master File says, died 15 June 2002. Search Archives for NICHOLAS MARINELLI. Social Security number 183-38-8258 was issued to LINDA I WULFKUHLE, who was born 18 June 1947 and, Death Master File says, died 31 March 1992. Search Archives for LINDA WULFKUHLE. Social Security number 183-38-8259 was issued to MARGARET LEWANDOSKI, who was born 22 May 1948 and, Death Master File says, died February 1976. Search Archives for MARGARET LEWANDOSKI. Social Security number 183-38-8266 was issued to ANN V CHRISTOF, who was born 17 September 1909 and, Death Master File says, died 02 January 2005. Search Archives for ANN CHRISTOF. Social Security number 183-38-8269 was issued to HILDA KLEIN, who was born 26 August 1910 and, Death Master File says, died December 1982. Search Archives for HILDA KLEIN. Social Security number 183-38-8270 was issued to ETHEL PFLUEGER, who was born 23 July 1903 and, Death Master File says, died 14 September 1994. Search Archives for ETHEL PFLUEGER. Social Security number 183-38-8272 was issued to JOYCE S ROTH, who was born 08 August 1948 and, Death Master File says, died 18 July 2013. Search Archives for JOYCE ROTH. Social Security number 183-38-8289 was issued to H L SCOTT, who was born 04 October 1944 and, Death Master File says, died January 1996. Search Archives for H SCOTT. Social Security number 183-38-8301 was issued to GOLDIE SCHAFFER, who was born 13 September 1896 and, Death Master File says, died September 1977. Search Archives for GOLDIE SCHAFFER. Social Security number 183-38-8327 was issued to PAMULA ANDERSON, who was born 24 March 1944 and, Death Master File says, died January 1982. Search Archives for PAMULA ANDERSON. Social Security number 183-38-8333 was issued to JAMES R DONLEY, who was born 08 April 1945 and, Death Master File says, died 16 December 2004. Social Security number 183-38-8346 was issued to MARTIN A RYGIEL, who was born 14 October 1947 and, Death Master File says, died 18 December 1983. Search Archives for MARTIN RYGIEL. Social Security number 183-38-8347 was issued to JANET L MCKISSICK, who was born 02 February 1948 and, Death Master File says, died 20 February 2010. Search Archives for JANET MCKISSICK. Social Security number 183-38-8348 was issued to DANIEL D SULLIVAN, who was born 27 April 1948 and, Death Master File says, died 19 October 2003. Social Security number 183-38-8355 was issued to ANNA BOLARIS, who was born 21 May 1906 and, Death Master File says, died 14 July 2001. Search Archives for ANNA BOLARIS. Social Security number 183-38-8357 was issued to J J MARTORANO, who was born 04 April 1949 and, Death Master File says, died May 1992. Search Archives for J MARTORANO. Social Security number 183-38-8360 was issued to HENRIETTA COLERICH, who was born 23 January 1909 and, Death Master File says, died September 1984. Search Archives for HENRIETTA COLERICH. Social Security number 183-38-8364 was issued to EDDIE L DYE, who was born 30 June 1947 and, Death Master File says, died 03 April 1997. Search Archives for EDDIE DYE. Social Security number 183-38-8374 was issued to MARY A MALONE, who was born 29 December 1905 and, Death Master File says, died 14 August 1992. Social Security number 183-38-8397 was issued to DANIEL L QUIGLEY, who was born 27 February 1949 and, Death Master File says, died 28 October 2011. Search Archives for DANIEL QUIGLEY. Social Security number 183-38-8410 was issued to OLGA E ERSON, who was born 09 April 1905 and, Death Master File says, died 02 August 1988. Search Archives for OLGA ERSON. Social Security number 183-38-8411 was issued to MATHILDA KUHN, who was born 20 July 1893 and, Death Master File says, died June 1981. Search Archives for MATHILDA KUHN. Social Security number 183-38-8413 was issued to HELEN SESSI, who was born 18 August 1889 and, Death Master File says, died February 1983. Search Archives for HELEN SESSI. Social Security number 183-38-8416 was issued to STELLA B HARRINGTON, who was born 31 May 1906 and, Death Master File says, died 17 July 1994. Search Archives for STELLA HARRINGTON. Social Security number 183-38-8422 was issued to MARY BAKER, who was born 04 July 1910 and, Death Master File says, died August 1978. Social Security number 183-38-8428 was issued to AGNES M PETERNEL, who was born 29 December 1908 and, Death Master File says, died 29 November 2002. Search Archives for AGNES PETERNEL. Social Security number 183-38-8438 was issued to ROBERT L CASEY, who was born 08 June 1945 and, Death Master File says, died 18 September 2006. Search Archives for ROBERT CASEY. Social Security number 183-38-8442 was issued to WILBERT FRIEDEL, who was born 23 August 1922 and, Death Master File says, died 21 July 1997. Search Archives for WILBERT FRIEDEL. Social Security number 183-38-8451 was issued to MOLLIE TRIBBY, who was born 01 October 1888 and, Death Master File says, died January 1975. Search Archives for MOLLIE TRIBBY. Social Security number 183-38-8454 was issued to MARY C BANFIELD, who was born 24 December 1948 and, Death Master File says, died 30 April 1999. Search Archives for MARY BANFIELD. Social Security number 183-38-8459 was issued to MARGARET E GRANER, who was born 20 August 1915 and, Death Master File says, died 14 March 1997. Search Archives for MARGARET GRANER. Social Security number 183-38-8461 was issued to PEARL A DELOSH, who was born 16 January 1947 and, Death Master File says, died 01 August 2002. Search Archives for PEARL DELOSH. Social Security number 183-38-8462 was issued to AGNES RAWA, who was born 29 July 1904 and, Death Master File says, died September 1985. Search Archives for AGNES RAWA. Social Security number 183-38-8465 was issued to JEAN SHAFFER, who was born 26 August 1912 and, Death Master File says, died November 1974. Social Security number 183-38-8468 was issued to BARBARA P KARCH, who was born 23 June 1945 and, Death Master File says, died 12 June 2011. Search Archives for BARBARA KARCH. Social Security number 183-38-8471 was issued to CYNTHIA S LOCKWOOD, who was born 17 March 1951 and, Death Master File says, died 05 December 2007. Search Archives for CYNTHIA LOCKWOOD. Social Security number 183-38-8472 was issued to FLORENCE BURKLEY, who was born 11 August 1889 and, Death Master File says, died January 1987. Search Archives for FLORENCE BURKLEY. Social Security number 183-38-8490 was issued to ROBERT MORSE, who was born 10 June 1950 and, Death Master File says, died May 1980. Search Archives for ROBERT MORSE. Social Security number 183-38-8500 was issued to MILDRED H THORNHILL, who was born 23 July 1916 and, Death Master File says, died December 1989. Search Archives for MILDRED THORNHILL. Social Security number 183-38-8511 was issued to OLLIS K TOWNES, who was born 24 July 1945 and, Death Master File says, died 24 July 2008. Search Archives for OLLIS TOWNES. Social Security number 183-38-8512 was issued to HELEN C HEENAN, who was born 30 June 1913 and, Death Master File says, died 22 June 2000. Search Archives for HELEN HEENAN. Social Security number 183-38-8513 was issued to ROSS A BOGGS, who was born 05 January 1946 and, Death Master File says, died 17 May 2003. Search Archives for ROSS BOGGS. Social Security number 183-38-8520 was issued to EDITH MCKISSOCK, who was born 19 September 1892 and, Death Master File says, died March 1978. Search Archives for EDITH MCKISSOCK. Social Security number 183-38-8521 was issued to GERTRUDE CORBETT, who was born 01 October 1881 and, Death Master File says, died January 1976. Search Archives for GERTRUDE CORBETT. Social Security number 183-38-8523 was issued to RICHARD POWELL, who was born 17 June 1949 and, Death Master File says, died June 1986. Social Security number 183-38-8532 was issued to MARTHA RADOJCICH, who was born 06 May 1885 and, Death Master File says, died July 1973. Search Archives for MARTHA RADOJCICH. Social Security number 183-38-8544 was issued to VADA G NAIRN, who was born 23 October 1906 and, Death Master File says, died 27 December 1993. Search Archives for VADA NAIRN. Social Security number 183-38-8558 was issued to ELENA TOMMARELLO, who was born 18 January 1918 and, Death Master File says, died December 1985. Search Archives for ELENA TOMMARELLO. Social Security number 183-38-8559 was issued to BEATRICE E CARPE, who was born 08 August 1910 and, Death Master File says, died 29 July 2000. Search Archives for BEATRICE CARPE. Social Security number 183-38-8564 was issued to JOSEPH M NOONAN, who was born 23 February 1959 and, Death Master File says, died 24 October 2007. Search Archives for JOSEPH NOONAN. Social Security number 183-38-8565 was issued to ROBERT W SMITH, who was born 15 September 1946 and, Death Master File says, died 12 March 2009. Social Security number 183-38-8566 was issued to MARY SIMANSKI, who was born 28 December 1909 and, Death Master File says, died 01 November 1999. Search Archives for MARY SIMANSKI. Social Security number 183-38-8571 was issued to MARGARET KELSCH, who was born 29 March 1905 and, Death Master File says, died April 1974. Search Archives for MARGARET KELSCH. Social Security number 183-38-8572 was issued to FLORENCE KLEER, who was born 19 September 1907 and, Death Master File says, died June 1971. Search Archives for FLORENCE KLEER. Social Security number 183-38-8576 was issued to RAYMOND P WILHELM, who was born 11 June 1949 and, Death Master File says, died 19 October 2000. Social Security number 183-38-8581 was issued to NANCY L HENDRIX, who was born 17 April 1953 and, Death Master File says, died 19 July 2003. Search Archives for NANCY HENDRIX. Social Security number 183-38-8584 was issued to ROBERT HUNTER, who was born 22 January 1945 and, Death Master File says, died 12 July 2006. Social Security number 183-38-8585 was issued to IRENE HURLEY, who was born 20 December 1898 and, Death Master File says, died May 1977. Social Security number 183-38-8588 was issued to EVALYN E SILLIMAN, who was born 05 July 1908 and, Death Master File says, died 21 February 1991. Search Archives for EVALYN SILLIMAN. Social Security number 183-38-8589 was issued to G W SCHMID, who was born 16 January 1951 and, Death Master File says, died December 1991. Search Archives for G SCHMID. Social Security number 183-38-8590 was issued to ARLENE M ROMAN, who was born 07 August 1944 and, Death Master File says, died 26 April 1997. Search Archives for ARLENE ROMAN. Social Security number 183-38-8593 was issued to RICHARD T LONGMORE, who was born 13 August 1946 and, Death Master File says, died 05 November 2001. Search Archives for RICHARD LONGMORE. Social Security number 183-38-8596 was issued to DANIEL R ROTHERMEL, who was born 30 June 1952 and, Death Master File says, died 04 July 2010. Search Archives for DANIEL ROTHERMEL. Social Security number 183-38-8597 was issued to JERRY S BROWN, who was born 15 September 1947 and, Death Master File says, died 23 July 1999. Social Security number 183-38-8606 was issued to MARY ROSTEK, who was born 22 January 1948 and, Death Master File says, died 05 October 1988. Search Archives for MARY ROSTEK. Social Security number 183-38-8618 was issued to SYBIL A BAIRD, who was born 26 April 1920 and, Death Master File says, died 15 July 1999. Search Archives for SYBIL BAIRD. Social Security number 183-38-8619 was issued to GERALDINE JEFFERSON, who was born 18 August 1912 and, Death Master File says, died 22 March 1999. Search Archives for GERALDINE JEFFERSON. Social Security number 183-38-8620 was issued to NORMA J ISHMAN, who was born 12 April 1928 and, Death Master File says, died 21 November 1996. Search Archives for NORMA ISHMAN. Social Security number 183-38-8629 was issued to CONSTANCE M TERRITO, who was born 20 July 1947 and, Death Master File says, died 19 January 2007. Search Archives for CONSTANCE TERRITO. Social Security number 183-38-8651 was issued to ANTOINETTE H CELLA, who was born 11 July 1914 and, Death Master File says, died 27 February 2006. Search Archives for ANTOINETTE CELLA. Social Security number 183-38-8653 was issued to THOMAS A BARANOWSKI, who was born 09 September 1949 and, Death Master File says, died 03 July 2008. Social Security number 183-38-8654 was issued to RAYMOND DANIELS, who was born 02 March 1948 and, Death Master File says, died July 1977. Social Security number 183-38-8656 was issued to ANNA TORCHIA, who was born 24 September 1910 and, Death Master File says, died 21 May 1998. Search Archives for ANNA TORCHIA. Social Security number 183-38-8659 was issued to ROBERT H SCOTT, who was born 24 June 1950 and, Death Master File says, died 18 September 2011. Social Security number 183-38-8669 was issued to ALVENA MOELLER, who was born 27 September 1909 and, Death Master File says, died March 1972. Search Archives for ALVENA MOELLER. Social Security number 183-38-8672 was issued to BILLIE A TIPTON, who was born 23 December 1946 and, Death Master File says, died 01 October 2013. Search Archives for BILLIE TIPTON. Social Security number 183-38-8673 was issued to MARY TOWNSEND, who was born 02 January 1896 and, Death Master File says, died November 1982. Search Archives for MARY TOWNSEND. Social Security number 183-38-8684 was issued to JAMES SUTTON, who was born 26 March 1947 and, Death Master File says, died 11 February 2010. Search Archives for JAMES SUTTON. Social Security number 183-38-8688 was issued to HELEN KARAS, who was born 12 April 1925 and, Death Master File says, died 03 May 2013. Social Security number 183-38-8689 was issued to JOSEPH T DIPIETRO, who was born 26 December 1946 and, Death Master File says, died 16 December 2007. Social Security number 183-38-8691 was issued to FLORENCE ALLMAN, who was born 02 February 1909 and, Death Master File says, died April 1987. Search Archives for FLORENCE ALLMAN. Social Security number 183-38-8693 was issued to R D ATKINS, who was born 15 October 1959 and, Death Master File says, died January 1995. Search Archives for R ATKINS. Social Security number 183-38-8697 was issued to BARBARA J LANE, who was born 22 September 1944 and, Death Master File says, died 07 September 2011. Search Archives for BARBARA LANE. Social Security number 183-38-8698 was issued to HARRY CAMPBELL, who was born 09 September 1876 and, Death Master File says, died March 1969. Social Security number 183-38-8702 was issued to PAUL G SCHMOTZER, who was born 01 May 1947 and, Death Master File says, died 27 August 2011. Search Archives for PAUL SCHMOTZER. Social Security number 183-38-8711 was issued to CONSTANCE A MCBRIDE, who was born 15 September 1951 and, Death Master File says, died 14 December 2004. Search Archives for CONSTANCE MCBRIDE. Social Security number 183-38-8713 was issued to ROBERT FAUST, who was born 26 January 1948 and, Death Master File says, died August 1984. Search Archives for ROBERT FAUST. Social Security number 183-38-8718 was issued to LOUIS PEARLMAN, who was born 28 May 1892 and, Death Master File says, died March 1987. Search Archives for LOUIS PEARLMAN. Social Security number 183-38-8720 was issued to MARGARET NAUGHTON, who was born 14 July 1895 and, Death Master File says, died May 1982. Search Archives for MARGARET NAUGHTON. Social Security number 183-38-8725 was issued to FRANCIS J CAREY, who was born 27 July 1945 and, Death Master File says, died 01 May 2000. Search Archives for FRANCIS CAREY. Social Security number 183-38-8738 was issued to LINDA D GREENE, who was born 18 November 1948 and, Death Master File says, died 18 December 2004. Search Archives for LINDA GREENE. Social Security number 183-38-8739 was issued to ROGER E STEELE, who was born 09 December 1946 and, Death Master File says, died 08 February 2003. Search Archives for ROGER STEELE. Social Security number 183-38-8741 was issued to DONALD R BUSCH, who was born 14 September 1947 and, Death Master File says, died 31 May 1996. Social Security number 183-38-8744 was issued to CHARLES E HALL, who was born 09 March 1947 and, Death Master File says, died 14 August 2006. Social Security number 183-38-8750 was issued to ELIZABETH MCCARTNEY, who was born 12 October 1893 and, Death Master File says, died November 1974. Search Archives for ELIZABETH MCCARTNEY. Social Security number 183-38-8751 was issued to JEAN M BALDASSERONI, who was born 30 October 1906 and, Death Master File says, died 04 August 1988. Search Archives for JEAN BALDASSERONI. Social Security number 183-38-8752 was issued to EDWARD D SIBSIFSKI, who was born 22 June 1927 and, Death Master File says, died 21 August 2002. Search Archives for EDWARD SIBSIFSKI. Social Security number 183-38-8753 was issued to CARL KNAUSE, who was born 20 June 1946 and, Death Master File says, died 28 May 2009. Search Archives for CARL KNAUSE. Social Security number 183-38-8754 was issued to CHARLES E ROBERTSON, who was born 15 December 1946 and, Death Master File says, died 22 May 2010. Search Archives for CHARLES ROBERTSON. Social Security number 183-38-8757 was issued to THOMAS J SAVKO, who was born 29 October 1949 and, Death Master File says, died 27 February 2010. Search Archives for THOMAS SAVKO. Social Security number 183-38-8758 was issued to JAMES J HOSEK, who was born 14 April 1953 and, Death Master File says, died 04 March 2004. Search Archives for JAMES HOSEK. Social Security number 183-38-8760 was issued to THOMAS V SWOAGER, who was born 03 January 1947 and, Death Master File says, died 23 July 2011. Search Archives for THOMAS SWOAGER. Social Security number 183-38-8765 was issued to LINDA S SEAGREN, who was born 04 September 1946 and, Death Master File says, died 04 October 2011. Search Archives for LINDA SEAGREN. Social Security number 183-38-8766 was issued to NATHALIE BOX, who was born 27 January 1907 and, Death Master File says, died October 1974. Search Archives for NATHALIE BOX. Social Security number 183-38-8771 was issued to LAURA E DAVIS, who was born 20 June 1911 and, Death Master File says, died 01 October 1996. Social Security number 183-38-8774 was issued to DOROTHY M GARLITZ, who was born 21 January 1918 and, Death Master File says, died 21 May 2010. Search Archives for DOROTHY GARLITZ. Social Security number 183-38-8799 was issued to STEPHEN KAPCAR, who was born 22 December 1948 and, Death Master File says, died September 1984. Search Archives for STEPHEN KAPCAR. Social Security number 183-38-8802 was issued to DAVID L KAELIN, who was born 18 November 1946 and, Death Master File says, died 20 August 1985. Search Archives for DAVID KAELIN. Social Security number 183-38-8805 was issued to GERTRUDE FRANCISCUS, who was born 23 April 1907 and, Death Master File says, died September 1977. Search Archives for GERTRUDE FRANCISCUS. Social Security number 183-38-8810 was issued to MARJORIE MELLOTT, who was born 10 August 1948 and, Death Master File says, died February 1981. Search Archives for MARJORIE MELLOTT. Social Security number 183-38-8812 was issued to JAMES T SANFORD, who was born 24 February 1947 and, Death Master File says, died 06 February 2007. Search Archives for JAMES SANFORD. Social Security number 183-38-8826 was issued to DONNA R HASKINS, who was born 28 May 1948 and, Death Master File says, died 17 May 2011. Search Archives for DONNA HASKINS. Social Security number 183-38-8830 was issued to JOHN R WEIDER, who was born 27 October 1948 and, Death Master File says, died 01 November 2011. Search Archives for JOHN WEIDER. Social Security number 183-38-8834 was issued to DAVID B FARENZENA, who was born 03 December 1946 and, Death Master File says, died 08 October 1992. Search Archives for DAVID FARENZENA. Social Security number 183-38-8836 was issued to EUGENE J FRANCISCUS, who was born 18 June 1948 and, Death Master File says, died 17 September 2009. Search Archives for EUGENE FRANCISCUS. Social Security number 183-38-8845 was issued to CYNTHIA A RAHM, who was born 14 April 1948 and, Death Master File says, died 26 December 2004. Search Archives for CYNTHIA RAHM. Social Security number 183-38-8858 was issued to CLARA A DALTON, who was born 10 April 1897 and, Death Master File says, died 10 October 1990. Search Archives for CLARA DALTON. Social Security number 183-38-8864 was issued to ROBERT W NASH, who was born 27 April 1947 and, Death Master File says, died 14 August 1995. Social Security number 183-38-8871 was issued to SANDRA L ABRAHAM, who was born 02 April 1948 and, Death Master File says, died 15 March 2011. Search Archives for SANDRA ABRAHAM. Social Security number 183-38-8878 was issued to CATHERINE WINDHAGER, who was born 13 January 1898 and, Death Master File says, died January 1983. Search Archives for CATHERINE WINDHAGER. Social Security number 183-38-8880 was issued to MARIE KELLER, who was born 22 December 1893 and, Death Master File says, died June 1976. Social Security number 183-38-8882 was issued to CAROL A MCGREGOR, who was born 12 April 1939 and, Death Master File says, died 05 August 2013. Search Archives for CAROL MCGREGOR. Social Security number 183-38-8890 was issued to KIRK D STOWELL, who was born 11 October 1952 and, Death Master File says, died 05 March 2001. Search Archives for KIRK STOWELL. Social Security number 183-38-8904 was issued to LOVIE LINDSEY, who was born 01 January 1950 and, Death Master File says, died February 1979. Search Archives for LOVIE LINDSEY. Social Security number 183-38-8906 was issued to ROBERT A ZUNGLI, who was born 04 December 1941 and, Death Master File says, died 30 June 2001. Search Archives for ROBERT ZUNGLI. Social Security number 183-38-8909 was issued to RUTH A MORDECKI, who was born 20 February 1948 and, Death Master File says, died 18 July 2010. Search Archives for RUTH MORDECKI. Social Security number 183-38-8924 was issued to MARIANNE KEHREN, who was born 03 March 1948 and, Death Master File says, died 15 November 1996. Search Archives for MARIANNE KEHREN. Social Security number 183-38-8927 was issued to JOSEPH M DAWGIELLO, who was born 20 February 1950 and, Death Master File says, died 19 October 2001. Search Archives for JOSEPH DAWGIELLO. Social Security number 183-38-8931 was issued to FERDINAND V MONDINE, who was born 01 December 1946"} +{"id":"RedPajamaC4.0026","text":"Cheap call rates from the UK to landline phone numbers in Angola. Time in the capital of Angola is 05:33. Access number for cheap calls to Angola Landline is 0843 721 1717 (provided by PlanetDial). To make a call, simply dial 0843 721 1717, wait for a prompt then dial the number in Angola, finishing by perssing hash(#) key. Works from any UK landline or mobile. No registration needed or PINs to remember. Calls cost 4.0 pence per minute, plus your phone operator access charge. The call quality of PlanetDial is 95.0%. The provider's accuracy of information (such as active access numbers and actual call rates) is 97.0%. PlanetDial has been found to be a reliable provider. For detailed explanation about information presented in the table read Information Explained. Access number for cheap calls to Angola Landline is 0843 721 3333 (provided by CheapCheapCalls). To make a call, simply dial 0843 721 3333, wait for a prompt then dial the number in Angola, finishing by perssing hash(#) key. Works from any UK landline or mobile. No registration needed or PINs to remember. Calls cost 4.0 pence per minute, plus your phone operator access charge. The call quality of CheapCheapCalls is 95.0%. The provider's accuracy of information (such as active access numbers and actual call rates) is 92.0%. CheapCheapCalls has been found to be a reliable provider. For detailed explanation about information presented in the table read Information Explained. Access number for cheap calls to Angola Landline is 0843 721 4444 (provided by CherryCall). To make a call, simply dial 0843 721 4444, wait for a prompt then dial the number in Angola, finishing by perssing hash(#) key. Works from any UK landline or mobile. No registration needed or PINs to remember. Calls cost 4.0 pence per minute, plus your phone operator access charge. The call quality of CherryCall is 94.0%. The provider's accuracy of information (such as active access numbers and actual call rates) is 95.0%. CherryCall has been found to be a reliable provider. For detailed explanation about information presented in the table read Information Explained. Access number for cheap calls to Angola Landline is 0843 721 1111 (provided by Telecalls). To make a call, simply dial 0843 721 1111, wait for a prompt then dial the number in Angola, finishing by perssing hash(#) key. Works from any UK landline or mobile. No registration needed or PINs to remember. Calls cost 4.0 pence per minute, plus your phone operator access charge. The call quality of Telecalls is 95.0%. The provider's accuracy of information (such as active access numbers and actual call rates) is 92.0%. Telecalls has been found to be a reliable provider. For detailed explanation about information presented in the table read Information Explained. Access number for cheap calls to Angola Landline is 0843 721 7777 (provided by planet numbers). To make a call, simply dial 0843 721 7777, wait for a prompt then dial the number in Angola, finishing by perssing hash(#) key. Works from any UK landline or mobile. No registration needed or PINs to remember. Calls cost 4.0 pence per minute, plus your phone operator access charge. The call quality of planet numbers is 94.0%. The provider's accuracy of information (such as active access numbers and actual call rates) is 91.0%. planet numbers has been found to be a reliable provider. For detailed explanation about information presented in the table read Information Explained. Access number for cheap calls to Angola Landline is 0843 721 0002 (provided by 0844 Call). To make a call, simply dial 0843 721 0002, wait for a prompt then dial the number in Angola, finishing by perssing hash(#) key. Works from any UK landline or mobile. No registration needed or PINs to remember. Calls cost 4.0 pence per minute, plus your phone operator access charge. The call quality of 0844 Call is 94.0%. The provider's accuracy of information (such as active access numbers and actual call rates) is 92.0%. 0844 Call has been found to be a reliable provider. For detailed explanation about information presented in the table read Information Explained. Access number for cheap calls to Angola Landline is 0843 312 0983 (provided by Cheap Calls). To make a call, simply dial 0843 312 0983, wait for a prompt then dial the number in Angola, finishing by perssing hash(#) key. Works from any UK landline or mobile. No registration needed or PINs to remember. Calls cost 4.0 pence per minute, plus your phone operator access charge. The call quality of Cheap Calls is 83.0%. The provider's accuracy of information (such as active access numbers and actual call rates) is 40.0%. Cheap Calls has been found not to be a very reliable provider. For detailed explanation about information presented in the table read Information Explained. Access number for cheap calls to Angola Landline is 0843 841 0025 (provided by doubledial). To make a call, simply dial 0843 841 0025, wait for a prompt then dial the number in Angola, finishing by perssing hash(#) key. Works from any UK landline or mobile. No registration needed or PINs to remember. Calls cost 4.0 pence per minute, plus your phone operator access charge. The call quality of doubledial is 85.0%. The provider's accuracy of information (such as active access numbers and actual call rates) is 50.0%. doubledial has been found not to be a very reliable provider. For detailed explanation about information presented in the table read Information Explained. Access number for cheap calls to Angola Landline is 0844 430 0707 (provided by call2call). To make a call, simply dial 0844 430 0707, wait for a prompt then dial the number in Angola, finishing by perssing hash(#) key. Works from any UK landline or mobile. No registration needed or PINs to remember. Calls cost 4.0 pence per minute, plus your phone operator access charge. The call quality of call2call is 82.0%. The provider's accuracy of information (such as active access numbers and actual call rates) is 20.0%. call2call has been found not to be a very reliable provider. For detailed explanation about information presented in the table read Information Explained. Access number for cheap calls to Angola Landline is 0844 988 8808 (provided by Call Happy). To make a call, simply dial 0844 988 8808, wait for a prompt then dial the number in Angola, finishing by perssing hash(#) key. Works from any UK landline or mobile. No registration needed or PINs to remember. Calls cost 4.0 pence per minute, plus your phone operator access charge. The call quality of Call Happy is 90.0%. The provider's accuracy of information (such as active access numbers and actual call rates) is 70.0%. Call Happy has been found not to be a very reliable provider. For detailed explanation about information presented in the table read Information Explained. Access number for cheap calls to Angola Landline is 0844 988 0009 (provided by 999Talk). To make a call, simply dial 0844 988 0009, wait for a prompt then dial the number in Angola, finishing by perssing hash(#) key. Works from any UK landline or mobile. No registration needed or PINs to remember. Calls cost 4.0 pence per minute, plus your phone operator access charge. The call quality of 999Talk is 85.0%. The provider's accuracy of information (such as active access numbers and actual call rates) is 15.0%. 999Talk has been found not to be a very reliable provider. For detailed explanation about information presented in the table read Information Explained. Access number for cheap calls to Angola Landline is 0843 721 7575 (provided by Sheep Int. Calls). To make a call, simply dial 0843 721 7575, wait for a prompt then dial the number in Angola, finishing by perssing hash(#) key. Works from any UK landline or mobile. No registration needed or PINs to remember. Calls cost 4.0 pence per minute, plus your phone operator access charge. The call quality of Sheep Int. Calls is 94.0%. The provider's accuracy of information (such as active access numbers and actual call rates) is 92.0%. Sheep Int. Calls has been found to be a reliable provider. For detailed explanation about information presented in the table read Information Explained. Access number for cheap calls to Angola Landline is 0845 319 0125 (provided by InstantCall). To make a call, simply dial 0845 319 0125, wait for a prompt then dial the number in Angola, finishing by perssing hash(#) key. Works from any UK landline or mobile. No registration needed or PINs to remember. Calls cost 5.0 pence per minute, plus your phone operator access charge. The call quality of InstantCall is 95.0%. The provider's accuracy of information (such as active access numbers and actual call rates) is 97.0%. InstantCall has been found to be a reliable provider. For detailed explanation about information presented in the table read Information Explained. Access number for cheap calls to Angola Landline is 08449014110 (provided by Budget Dial). To make a call, simply dial 08449014110, wait for a prompt then dial the number in Angola, finishing by perssing hash(#) key. Works from any UK landline or mobile. No registration needed or PINs to remember. Calls cost 5.0 pence per minute, plus your phone operator access charge. The call quality of Budget Dial is 95.0%. The provider's accuracy of information (such as active access numbers and actual call rates) is 97.0%. Budget Dial has been found to be a reliable provider. For detailed explanation about information presented in the table read Information Explained. Access number for cheap calls to Angola Landline is 08449014120 (provided by Cheap Call Rate). To make a call, simply dial 08449014120, wait for a prompt then dial the number in Angola, finishing by perssing hash(#) key. Works from any UK landline or mobile. No registration needed or PINs to remember. Calls cost 5.0 pence per minute, plus your phone operator access charge. The call quality of Cheap Call Rate is 95.0%. The provider's accuracy of information (such as active access numbers and actual call rates) is 95.0%. Cheap Call Rate has been found to be a reliable provider. For detailed explanation about information presented in the table read Information Explained. Access number for cheap calls to Angola Landline is 08449014404 (provided by Simply Fone). To make a call, simply dial 08449014404, wait for a prompt then dial the number in Angola, finishing by perssing hash(#) key. Works from any UK landline or mobile. No registration needed or PINs to remember. Calls cost 5.0 pence per minute, plus your phone operator access charge. The call quality of Simply Fone is 93.0%. The provider's accuracy of information (such as active access numbers and actual call rates) is 90.0%. Simply Fone has been found to be a reliable provider. For detailed explanation about information presented in the table read Information Explained. Access number for cheap calls to Angola Landline is 08449015136 (provided by Topup 2 Call). To make a call, simply dial 08449015136, wait for a prompt then dial the number in Angola, finishing by perssing hash(#) key. Works from any UK landline or mobile. No registration needed or PINs to remember. Calls cost 5.0 pence per minute, plus your phone operator access charge. The call quality of Topup 2 Call is 90.0%. The provider's accuracy of information (such as active access numbers and actual call rates) is 92.0%. Topup 2 Call has been found to be a reliable provider. For detailed explanation about information presented in the table read Information Explained. Access number for cheap calls to Angola Landline is 0843 927 1273 (provided by Talk Cheap). To make a call, simply dial 0843 927 1273, wait for a prompt then dial the number in Angola, finishing by perssing hash(#) key. Works from any UK landline or mobile. No registration needed or PINs to remember. Calls cost 5.0 pence per minute, plus your phone operator access charge. The call quality of Talk Cheap is 87.0%. The provider's accuracy of information (such as active access numbers and actual call rates) is 90.0%. Talk Cheap has been found to be a reliable provider. For detailed explanation about information presented in the table read Information Explained. Access number for cheap calls to Angola Landline is 0844 901 3000 (provided by Auracall). To make a call, simply dial 0844 901 3000, wait for a prompt then dial the number in Angola, finishing by perssing hash(#) key. Works from any UK landline or mobile. No registration needed or PINs to remember. Calls cost 5.0 pence per minute, plus your phone operator access charge. The call quality of Auracall is 90.0%. The provider's accuracy of information (such as active access numbers and actual call rates) is 92.0%. Auracall has been found to be a reliable provider. For detailed explanation about information presented in the table read Information Explained. Access number for cheap calls to Angola Landline is 0843 8900 000 (provided by Dial Cheapest). To make a call, simply dial 0843 8900 000, wait for a prompt then dial the number in Angola, finishing by perssing hash(#) key. Works from any UK landline or mobile. No registration needed or PINs to remember. Calls cost 5.0 pence per minute, plus your phone operator access charge. The call quality of Dial Cheapest is 70.0%. The provider's accuracy of information (such as active access numbers and actual call rates) is 50.0%. Dial Cheapest has been found not to be a very reliable provider. For detailed explanation about information presented in the table read Information Explained. Access number for cheap calls to Angola Landline is 0844 545 0006 (provided by FairCalls). To make a call, simply dial 0844 545 0006, wait for a prompt then dial the number in Angola, finishing by perssing hash(#) key. Works from any UK landline or mobile. No registration needed or PINs to remember. Calls cost 5.0 pence per minute, plus your phone operator access charge. The call quality of FairCalls is 80.0%. The provider's accuracy of information (such as active access numbers and actual call rates) is 10.0%. FairCalls has been found not to be a very reliable provider. For detailed explanation about information presented in the table read Information Explained. Access number for cheap calls to Angola Landline is 08449044205 (provided by Cheap.Int.Calls.To). To make a call, simply dial 08449044205, wait for a prompt then dial the number in Angola, finishing by perssing hash(#) key. Works from any UK landline or mobile. No registration needed or PINs to remember. Calls cost 6.0 pence per minute, plus your phone operator access charge. The call quality of Cheap.Int.Calls.To is 72.0%. The provider's accuracy of information (such as active access numbers and actual call rates) is 55.0%. Cheap.Int.Calls.To has been found not to be a very reliable provider. For detailed explanation about information presented in the table read Information Explained. Access number for cheap calls to Angola Landline is 08449044038 (provided by EasyNetAccess). To make a call, simply dial 08449044038, wait for a prompt then dial the number in Angola, finishing by perssing hash(#) key. Works from any UK landline or mobile. No registration needed or PINs to remember. Calls cost 6.0 pence per minute, plus your phone operator access charge. The call quality of EasyNetAccess is 75.0%. The provider's accuracy of information (such as active access numbers and actual call rates) is 55.0%. EasyNetAccess has been found not to be a very reliable provider. For detailed explanation about information presented in the table read Information Explained. Access number for cheap calls to Angola Landline is 08449044054 (provided by Cheap Phonecall). To make a call, simply dial 08449044054, wait for a prompt then dial the number in Angola, finishing by perssing hash(#) key. Works from any UK landline or mobile. No registration needed or PINs to remember. Calls cost 6.0 pence per minute, plus your phone operator access charge. The call quality of Cheap Phonecall is 73.0%. The provider's accuracy of information (such as active access numbers and actual call rates) is 55.0%. Cheap Phonecall has been found not to be a very reliable provider. For detailed explanation about information presented in the table read Information Explained. Access number for cheap calls to Angola Landline is 08449043904 (provided by Int.Calls from UK). To make a call, simply dial 08449043904, wait for a prompt then dial the number in Angola, finishing by perssing hash(#) key. Works from any UK landline or mobile. No registration needed or PINs to remember. Calls cost 6.0 pence per minute, plus your phone operator access charge. The call quality of Int.Calls from UK is 75.0%. The provider's accuracy of information (such as active access numbers and actual call rates) is 70.0%. Int.Calls from UK has been found not to be a very reliable provider. For detailed explanation about information presented in the table read Information Explained. Access number for cheap calls to Angola Landline is 0844 904 4007 (provided by 123fone). To make a call, simply dial 0844 904 4007, wait for a prompt then dial the number in Angola, finishing by perssing hash(#) key. Works from any UK landline or mobile. No registration needed or PINs to remember. Calls cost 6.0 pence per minute, plus your phone operator access charge. The call quality of 123fone is 75.0%. The provider's accuracy of information (such as active access numbers and actual call rates) is 65.0%. 123fone has been found not to be a very reliable provider. For detailed explanation about information presented in the table read Information Explained. Access number for cheap calls to Angola Landline is 0843 310 0002 (provided by Low Calls). To make a call, simply dial 0843 310 0002, wait for a prompt then dial the number in Angola, finishing by perssing hash(#) key. Works from any UK landline or mobile. No registration needed or PINs to remember. Calls cost 6.0 pence per minute, plus your phone operator access charge. The call quality of Low Calls is 80.0%. The provider's accuracy of information (such as active access numbers and actual call rates) is 64.0%. Low Calls has been found not to be a very reliable provider. For detailed explanation about information presented in the table read Information Explained. Access number for cheap calls to Angola Landline is 0843 310 0003 (provided by Budget Calls). To make a call, simply dial 0843 310 0003, wait for a prompt then dial the number in Angola, finishing by perssing hash(#) key. Works from any UK landline or mobile. No registration needed or PINs to remember. Calls cost 6.0 pence per minute, plus your phone operator access charge. The call quality of Budget Calls is 75.0%. The provider's accuracy of information (such as active access numbers and actual call rates) is 90.0%. Budget Calls has been found to be a reliable provider. For detailed explanation about information presented in the table read Information Explained. Access number for cheap calls to Angola Landline is 0844 578 9700 (provided by First Number). To make a call, simply dial 0844 578 9700, wait for a prompt then dial the number in Angola, finishing by perssing hash(#) key. Works from any UK landline or mobile. No registration needed or PINs to remember. Calls cost 6.0 pence per minute, plus your phone operator access charge. The call quality of First Number is 79.0%. The provider's accuracy of information (such as active access numbers and actual call rates) is 90.0%. First Number has been found to be a reliable provider. For detailed explanation about information presented in the table read Information Explained. Access number for cheap calls to Angola Landline is 08449044069 (provided by Simply Dial). To make a call, simply dial 08449044069, wait for a prompt then dial the number in Angola, finishing by perssing hash(#) key. Works from any UK landline or mobile. No registration needed or PINs to remember. Calls cost 6.0 pence per minute, plus your phone operator access charge. The call quality of Simply Dial is 75.0%. The provider's accuracy of information (such as active access numbers and actual call rates) is 65.0%. Simply Dial has been found not to be a very reliable provider. For detailed explanation about information presented in the table read Information Explained. Access number for cheap calls to Angola Landline is 0844 904 0990 (provided by just-dial). To make a call, simply dial 0844 904 0990, wait for a prompt then dial the number in Angola, finishing by perssing hash(#) key. Works from any UK landline or mobile. No registration needed or PINs to remember. Calls cost 6.0 pence per minute, plus your phone operator access charge. The call quality of just-dial is 70.0%. The provider's accuracy of information (such as active access numbers and actual call rates) is 25.0%. just-dial has been found not to be a very reliable provider. For detailed explanation about information presented in the table read Information Explained. Access number for cheap calls to Angola Landline is 0333 555 2040 (provided by Dial123). To make a call, simply dial 0333 555 2040, wait for a prompt then dial the number in Angola, finishing by perssing hash(#) key. Works from any UK landline or mobile. No registration needed or PINs to remember. Calls cost 6.0 pence per minute, plus your phone operator access charge. The call quality of Dial123 is 65.0%. The provider's accuracy of information (such as active access numbers and actual call rates) is 92.0%. Dial123 has been found not to be a very reliable provider. For detailed explanation about information presented in the table read Information Explained. Access number for cheap calls to Angola Landline is 0871 834 0642 (provided by Instacall). To make a call, simply dial 0871 834 0642, wait for a prompt then dial the number in Angola, finishing by perssing hash(#) key. Works from any UK landline or mobile. No registration needed or PINs to remember. Calls cost 8.0 pence per minute, plus your phone operator access charge. The call quality of Instacall is 75.0%. The provider's accuracy of information (such as active access numbers and actual call rates) is 90.0%. Instacall has been found to be a reliable provider. For detailed explanation about information presented in the table read Information Explained. Access number for cheap calls to Angola Landline is 0871 858 70 30 (provided by 1p minute). To make a call, simply dial 0871 858 70 30, wait for a prompt then dial the number in Angola, finishing by perssing hash(#) key. Works from any UK landline or mobile. No registration needed or PINs to remember. Calls cost 8.0 pence per minute, plus your phone operator access charge. The provider's accuracy of information (such as active access numbers and actual call rates) is 5.0%. 1p minute has been found not to be a very reliable provider. For detailed explanation about information presented in the table read Information Explained. Access number for cheap calls to Angola Landline is 0871 858 60 40 (provided by 4CheapCalling). To make a call, simply dial 0871 858 60 40, wait for a prompt then dial the number in Angola, finishing by perssing hash(#) key. Works from any UK landline or mobile. No registration needed or PINs to remember. Calls cost 8.0 pence per minute, plus your phone operator access charge. The provider's accuracy of information (such as active access numbers and actual call rates) is 10.0%. 4CheapCalling has been found not to be a very reliable provider. For detailed explanation about information presented in the table read Information Explained. Access number for cheap calls to Angola Landline is 0871 858 05 05 (provided by 0.5 Pence). To make a call, simply dial 0871 858 05 05, wait for a prompt then dial the number in Angola, finishing by perssing hash(#) key. Works from any UK landline or mobile. No registration needed or PINs to remember. Calls cost 8.0 pence per minute, plus your phone operator access charge. The provider's accuracy of information (such as active access numbers and actual call rates) is 10.0%. 0.5 Pence has been found not to be a very reliable provider. For detailed explanation about information presented in the table read Information Explained. Access number for cheap calls to Angola Landline is 0871 858 90 10 (provided by AbroadPhone). To make a call, simply dial 0871 858 90 10, wait for a prompt then dial the number in Angola, finishing by perssing hash(#) key. Works from any UK landline or mobile. No registration needed or PINs to remember. Calls cost 8.0 pence per minute, plus your phone operator access charge. The provider's accuracy of information (such as active access numbers and actual call rates) is 10.0%. AbroadPhone has been found not to be a very reliable provider. For detailed explanation about information presented in the table read Information Explained. Access number for cheap calls to Angola Landline is 0871 858 80 20 (provided by AbroadCall). To make a call, simply dial 0871 858 80 20, wait for a prompt then dial the number in Angola, finishing by perssing hash(#) key. Works from any UK landline or mobile. No registration needed or PINs to remember. Calls cost 8.0 pence per minute, plus your phone operator access charge. The provider's accuracy of information (such as active access numbers and actual call rates) is 10.0%. AbroadCall has been found not to be a very reliable provider. For detailed explanation about information presented in the table read Information Explained. Access number for cheap calls to Angola Landline is 0871 858 2473 (provided by Phone Bird). To make a call, simply dial 0871 858 2473, wait for a prompt then dial the number in Angola, finishing by perssing hash(#) key. Works from any UK landline or mobile. No registration needed or PINs to remember. Calls cost 8.0 pence per minute, plus your phone operator access charge. The provider's accuracy of information (such as active access numbers and actual call rates) is 10.0%. Phone Bird has been found not to be a very reliable provider. For detailed explanation about information presented in the table read Information Explained. Access number for cheap calls to Angola Landline is 0871 552 7649 (provided by Easy Call). To make a call, simply dial 0871 552 7649, wait for a prompt then dial the number in Angola, finishing by perssing hash(#) key. Works from any UK landline or mobile. No registration needed or PINs to remember. Calls cost 8.0 pence per minute, plus your phone operator access charge. The call quality of Easy Call is 50.0%. The provider's accuracy of information (such as active access numbers and actual call rates) is 10.0%. Easy Call has been found not to be a very reliable provider. For detailed explanation about information presented in the table read Information Explained. Access number for cheap calls to Angola Landline is 0844 904 2410 (provided by Talk4Longer). To make a call, simply dial 0844 904 2410, wait for a prompt then dial the number in Angola, finishing by perssing hash(#) key. Works from any UK landline or mobile. No registration needed or PINs to remember. Calls cost 8.0 pence per minute, plus your phone operator access charge. Talk4Longer has been found not to be a very reliable provider. For detailed explanation about information presented in the table read Information Explained. Access number for cheap calls to Angola Landline is 0871 537 7747 (provided by Talking Number). To make a call, simply dial 0871 537 7747, wait for a prompt then dial the number in Angola, finishing by perssing hash(#) key. Works from any UK landline or mobile. No registration needed or PINs to remember. Calls cost 8.0 pence per minute, plus your phone operator access charge. The call quality of Talking Number is 77.0%. The provider's accuracy of information (such as active access numbers and actual call rates) is 91.0%. Talking Number has been found to be a reliable provider. For detailed explanation about information presented in the table read Information Explained. Access number for cheap calls to Angola Landline is 0871 635 7752 (provided by Cheap Int. Calls). To make a call, simply dial 0871 635 7752, wait for a prompt then dial the number in Angola, finishing by perssing hash(#) key. Works from any UK landline or mobile. No registration needed or PINs to remember. Calls cost 8.0 pence per minute, plus your phone operator access charge. The call quality of Cheap Int. Calls is 60.0%. The provider's accuracy of information (such as active access numbers and actual call rates) is 20.0%. Cheap Int. Calls has been found not to be a very reliable provider. For detailed explanation about information presented in the table read Information Explained. Access number for cheap calls to Angola Landline is 0871 342 2525 (provided by Clever Rates). To make a call, simply dial 0871 342 2525, wait for a prompt then dial the number in Angola, finishing by perssing hash(#) key. Works from any UK landline or mobile. No registration needed or PINs to remember. Calls cost 9.0 pence per minute, plus your phone operator access charge. The provider's accuracy of information (such as active access numbers and actual call rates) is 10.0%. Clever Rates has been found not to be a very reliable provider. For detailed explanation about information presented in the table read Information Explained. Access number for cheap calls to Angola Landline is 0871 3 422 422 (provided by PennyPhone). To make a call, simply dial 0871 3 422 422, wait for a prompt then dial the number in Angola, finishing by perssing hash(#) key. Works from any UK landline or mobile. No registration needed or PINs to remember. Calls cost 9.0 pence per minute, plus your phone operator access charge. The provider's accuracy of information (such as active access numbers and actual call rates) is 10.0%. PennyPhone has been found not to be a very reliable provider. For detailed explanation about information presented in the table read Information Explained. Access number for cheap calls to Angola Landline is 0870 186 9331 (provided by EvoDial). To make a call, simply dial 0870 186 9331, wait for a prompt then dial the number in Angola, finishing by perssing hash(#) key. Works from any UK landline or mobile. No registration needed or PINs to remember. Calls cost 13.0 pence per minute, plus your phone operator access charge. The call quality of EvoDial is 95.0%. The provider's accuracy of information (such as active access numbers and actual call rates) is 90.0%. EvoDial has been found to be a reliable provider. For detailed explanation about information presented in the table read Information Explained. Access number for cheap calls to Angola Landline is 0911 219 14 14 (provided by CheapCalling). To make a call, simply dial 0911 219 14 14, wait for a prompt then dial the number in Angola, finishing by perssing hash(#) key. Works from any UK landline or mobile. No registration needed or PINs to remember. Calls cost 20.0 pence per minute, plus your phone operator access charge. The call quality of CheapCalling is 85.0%. The provider's accuracy of information (such as active access numbers and actual call rates) is 90.0%. CheapCalling has been found to be a reliable provider. For detailed explanation about information presented in the table read Information Explained. All cheap call rates from the UK to mobile phone numbers in Angola. Time in the capital of Angola is 05:33. Access number for cheap calls to Angola Mobile is 0843 8900 000 (provided by Dial Cheapest). To make a call, simply dial 0843 8900 000, wait for a prompt then dial the number in Angola, finishing by perssing hash(#) key. Works from any UK landline or mobile. No registration needed or PINs to remember. Calls cost 5.0 pence per minute, plus your phone operator access charge. The call quality of Dial Cheapest is 70.0%. The provider's accuracy of information (such as active access numbers and actual call rates) is 50.0%. Dial Cheapest has been found not to be a very reliable provider. For detailed explanation about information presented in the table read Information Explained. Access number for cheap calls to Angola Mobile is 0872 548 1717 (provided by PlanetDial). To make a call, simply dial 0872 548 1717, wait for a prompt then dial the number in Angola, finishing by perssing hash(#) key. Works from any UK landline or mobile. No registration needed or PINs to remember. Calls cost 6.0 pence per minute, plus your phone operator access charge. The call quality of PlanetDial is 95.0%. The provider's accuracy of information (such as active access numbers and actual call rates) is 97.0%. PlanetDial has been found to be a reliable provider. For detailed explanation about information presented in the table read Information Explained. Access number for cheap calls to Angola Mobile is 0872 548 3333 (provided by CheapCheapCalls). To make a call, simply dial 0872 548 3333, wait for a prompt then dial the number in Angola, finishing by perssing hash(#) key. Works from any UK landline or mobile. No registration needed or PINs to remember. Calls cost 6.0 pence per minute, plus your phone operator access charge. The call quality of CheapCheapCalls is 95.0%. The provider's accuracy of information (such as active access numbers and actual call rates) is 92.0%. CheapCheapCalls has been found to be a reliable provider. For detailed explanation about information presented in the table read Information Explained. Access number for cheap calls to Angola Mobile is 0872 548 4444 (provided by CherryCall). To make a call, simply dial 0872 548 4444, wait for a prompt then dial the number in Angola, finishing by perssing hash(#) key. Works from any UK landline or mobile. No registration needed or PINs to remember. Calls cost 6.0 pence per minute, plus your phone operator access charge. The call quality of CherryCall is 94.0%. The provider's accuracy of information (such as active access numbers and actual call rates) is 95.0%. CherryCall has been found to be a reliable provider. For detailed explanation about information presented in the table read Information Explained. Access number for cheap calls to Angola Mobile is 0872 548 1111 (provided by Telecalls). To make a call, simply dial 0872 548 1111, wait for a prompt then dial the number in Angola, finishing by perssing hash(#) key. Works from any UK landline or mobile. No registration needed or PINs to remember. Calls cost 6.0 pence per minute, plus your phone operator access charge. The call quality of Telecalls is 95.0%. The provider's accuracy of information (such as active access numbers and actual call rates) is 92.0%. Telecalls has been found to be a reliable provider. For detailed explanation about information presented in the table read Information Explained. Access number for cheap calls to Angola Mobile is 0872 548 7777 (provided by planet numbers). To make a call, simply dial 0872 548 7777, wait for a prompt then dial the number in Angola, finishing by perssing hash(#) key. Works from any UK landline or mobile. No registration needed or PINs to remember. Calls cost 6.0 pence per minute, plus your phone operator access charge. The call quality of planet numbers is 94.0%. The provider's accuracy of information (such as active access numbers and actual call rates) is 91.0%. planet numbers has been found to be a reliable provider. For detailed explanation about information presented in the table read Information Explained. Access number for cheap calls to Angola Mobile is 0872 548 0002 (provided by 0844 Call). To make a call, simply dial 0872 548 0002, wait for a prompt then dial the number in Angola, finishing by perssing hash(#) key. Works from any UK landline or mobile. No registration needed or PINs to remember. Calls cost 6.0 pence per minute, plus your phone operator access charge. The call quality of 0844 Call is 94.0%. The provider's accuracy of information (such as active access numbers and actual call rates) is 92.0%. 0844 Call has been found to be a reliable provider. For detailed explanation about information presented in the table read Information Explained. Access number for cheap calls to Angola Mobile is 0844 904 4007 (provided by 123fone). To make a call, simply dial 0844 904 4007, wait for a prompt then dial the number in Angola, finishing by perssing hash(#) key. Works from any UK landline or mobile. No registration needed or PINs to remember. Calls cost 6.0 pence per minute, plus your phone operator access charge. The call quality of 123fone is 75.0%. The provider's accuracy of information (such as active access numbers and actual call rates) is 65.0%. 123fone has been found not to be a very reliable provider. For detailed explanation about information presented in the table read Information Explained. Access number for cheap calls to Angola Mobile is 0872 548 7575 (provided by Sheep Int. Calls). To make a call, simply dial 0872 548 7575, wait for a prompt then dial the number in Angola, finishing by perssing hash(#) key. Works from any UK landline or mobile. No registration needed or PINs to remember. Calls cost 6.0 pence per minute, plus your phone operator access charge. The call quality of Sheep Int. Calls is 94.0%. The provider's accuracy of information (such as active access numbers and actual call rates) is 92.0%. Sheep Int. Calls has been found to be a reliable provider. For detailed explanation about information presented in the table read Information Explained. Access number for cheap calls to Angola Mobile is 0871 341 7728 (provided by Easy Call). To make a call, simply dial 0871 341 7728, wait for a prompt then dial the number in Angola, finishing by perssing hash(#) key. Works from any UK landline or mobile. No registration needed or PINs to remember. Calls cost 9.0 pence per minute, plus your phone operator access charge. The call quality of Easy Call is 50.0%. The provider's accuracy of information (such as active access numbers and actual call rates) is 10.0%. Easy Call has been found not to be a very reliable provider. For detailed explanation about information presented in the table read Information Explained. Access number for cheap calls to Angola Mobile is 0871 919 0006 (provided by FairCalls). To make a call, simply dial 0871 919 0006, wait for a prompt then dial the number in Angola, finishing by perssing hash(#) key. Works from any UK landline or mobile. No registration needed or PINs to remember. Calls cost 10.0 pence per minute, plus your phone operator access charge. The call quality of FairCalls is 80.0%. The provider's accuracy of information (such as active access numbers and actual call rates) is 10.0%. FairCalls has been found not to be a very reliable provider. For detailed explanation about information presented in the table read Information Explained. Access number for cheap calls to Angola Mobile is 0871 913 7752 (provided by Cheap Int. Calls). To make a call, simply dial 0871 913 7752, wait for a prompt then dial the number in Angola, finishing by perssing hash(#) key. Works from any UK landline or mobile. No registration needed or PINs to remember. Calls cost 10.0 pence per minute, plus your phone operator access charge. The call quality of Cheap Int. Calls is 60.0%. The provider's accuracy of information (such as active access numbers and actual call rates) is 20.0%. Cheap Int. Calls has been found not to be a very reliable provider. For detailed explanation about information presented in the table read Information Explained. Access number for cheap calls to Angola Mobile is 08706354120 (provided by Cheap Call Rate). To make a call, simply dial 08706354120, wait for a prompt then dial the number in Angola, finishing by perssing hash(#) key. Works from any UK landline or mobile. No registration needed or PINs to remember. Calls cost 13.0 pence per minute, plus your phone operator access charge. The call quality of Cheap Call Rate is 95.0%. The provider's accuracy of information (such as active access numbers and actual call rates) is 95.0%. Cheap Call Rate has been found to be a reliable provider. For detailed explanation about information presented in the table read Information Explained. Access number for cheap calls to Angola Mobile is 08706355136 (provided by Topup 2 Call). To make a call, simply dial 08706355136, wait for a prompt then dial the number in Angola, finishing by perssing hash(#) key. Works from any UK landline or mobile. No registration needed or PINs to remember. Calls cost 13.0 pence per minute, plus your phone operator access charge. The call quality of Topup 2 Call is 90.0%. The provider's accuracy of information (such as active access numbers and actual call rates) is 92.0%. Topup 2 Call has been found to be a reliable provider. For detailed explanation about information presented in the table read Information Explained. Access number for cheap calls to Angola Mobile is 0911 927 2525 (provided by Clever Rates). To make a call, simply dial 0911 927 2525, wait for a prompt then dial the number in Angola, finishing by perssing hash(#) key. Works from any UK landline or mobile. No registration needed or PINs to remember. Calls cost 13.0 pence per minute, plus your phone operator access charge. The provider's accuracy of information (such as active access numbers and actual call rates) is 10.0%. Clever Rates has been found not to be a very reliable provider. For detailed explanation about information presented in the table read Information Explained. Access number for cheap calls to Angola Mobile is 0911 927 0 927 (provided by PennyPhone). To make a call, simply dial 0911 927 0 927, wait for a prompt then dial the number in Angola, finishing by perssing hash(#) key. Works from any UK landline or mobile. No registration needed or PINs to remember. Calls cost 13.0 pence per minute, plus your phone operator access charge. The provider's accuracy of information (such as active access numbers and actual call rates) is 10.0%. PennyPhone has been found not to be a very reliable provider. For detailed explanation about information presented in the table read Information Explained. Access number for cheap calls to Angola Mobile is 0870 635 3000 (provided by Auracall). To make a call, simply dial 0870 635 3000, wait for a prompt then dial the number in Angola, finishing by perssing hash(#) key. Works from any UK landline or mobile. No registration needed or PINs to remember. Calls cost 13.0 pence per minute, plus your phone operator access charge. The call quality of Auracall is 90.0%. The provider's accuracy of information (such as active access numbers and actual call rates) is 92.0%. Auracall has been found to be a reliable provider. For detailed explanation about information presented in the table read Information Explained. Access number for cheap calls to Angola Mobile is 0871 990 0707 (provided by call2call). To make a call, simply dial 0871 990 0707, wait for a prompt then dial the number in Angola, finishing by perssing hash(#) key. Works from any UK landline or mobile. No registration needed or PINs to remember. Calls cost 13.0 pence per minute, plus your phone operator access charge. The call quality of call2call is 82.0%. The provider's accuracy of information (such as active access numbers and actual call rates) is 20.0%. call2call has been found not to be a very reliable provider. For detailed explanation about information presented in the table read Information Explained. Access number for cheap calls to Angola Mobile is 0871 919 8808 (provided by Call Happy). To make a call, simply dial 0871 919 8808, wait for a prompt then dial the number in Angola, finishing by perssing hash(#) key. Works from any UK landline or mobile. No registration needed or PINs to remember. Calls cost 13.0 pence per minute, plus your phone operator access charge. The call quality of Call Happy is 90.0%. The provider's accuracy of information (such as active access numbers and actual call rates) is 70.0%. Call Happy has been found not to be a very reliable provider. For detailed explanation about information presented in the table read Information Explained. Access number for cheap calls to Angola Mobile is 0333 555 2040 (provided by Dial123). To make a call, simply dial 0333 555 2040, wait for a prompt then dial the number in Angola, finishing by perssing hash(#) key. Works from any UK landline or mobile. No registration needed or PINs to remember. Calls cost 13.0 pence per minute, plus your phone operator access charge. The call quality of Dial123 is 65.0%. The provider's accuracy of information (such as active access numbers and actual call rates) is 92.0%. Dial123 has been found not to be a very reliable provider. For detailed explanation about information presented in the table read Information Explained. Access number for cheap calls to Angola Mobile is 09115534110 (provided by Budget Dial). To make a call, simply dial 09115534110, wait for a prompt then dial the number in Angola, finishing by perssing hash(#) key. Works from any UK landline or mobile. No registration needed or PINs to remember. Calls cost 15.0 pence per minute, plus your phone operator access charge. The call quality of Budget Dial is 95.0%. The provider's accuracy of information (such as active access numbers and actual call rates) is 97.0%. Budget Dial has been found to be a reliable provider. For detailed explanation about information presented in the table read Information Explained. Access number for cheap calls to Angola Mobile is 09115534404 (provided by Simply Fone). To make a call, simply dial 09115534404, wait for a prompt then dial the number in Angola, finishing by perssing hash(#) key. Works from any UK landline or mobile. No registration needed or PINs to remember. Calls cost 15.0 pence per minute, plus your phone operator access charge. The call quality of Simply Fone is 93.0%. The provider's accuracy of information (such as active access numbers and actual call rates) is 90.0%. Simply Fone has been found to be a reliable provider. For detailed explanation about information presented in the table read Information Explained. Access number for cheap calls to Angola Mobile is 0913 721 0000 (provided by Cheap Calls). To make a call, simply dial 0913 721 0000, wait for a prompt then dial the number in Angola, finishing by perssing hash(#) key. Works from any UK landline or mobile. No registration needed or PINs to remember. Calls cost 15.0 pence per minute, plus your phone operator access charge. The call quality of Cheap Calls is 83.0%. The provider's accuracy of information (such as active access numbers and actual call rates) is 40.0%. Cheap Calls has been found not to be a very reliable provider. For detailed explanation about information presented in the table read Information Explained. Access number for cheap calls to Angola Mobile is 0911 573 2473 (provided by Phone Bird). To make a call, simply dial 0911 573 2473, wait for a prompt then dial the number in Angola, finishing by perssing hash(#) key. Works from any UK landline or mobile. No registration needed or PINs to remember. Calls cost 15.0 pence per minute, plus your phone operator access charge. The provider's accuracy of information (such as active access numbers and actual call rates) is 10.0%. Phone Bird has been found not to be a very reliable provider. For detailed explanation about information presented in the table read Information Explained. Access number for cheap calls to Angola Mobile is 0911 219 14 14 (provided by CheapCalling). To make a call, simply dial 0911 219 14 14, wait for a prompt then dial the number in Angola, finishing by perssing hash(#) key. Works from any UK landline or mobile. No registration needed or PINs to remember. Calls cost 20.0 pence per minute, plus your phone operator access charge. The call quality of CheapCalling is 85.0%. The provider's accuracy of information (such as active access numbers and actual call rates) is 90.0%. CheapCalling has been found to be a reliable provider. For detailed explanation about information presented in the table read Information Explained. Access number for cheap calls to Angola Mobile is 0901 140 0002 (provided by Low Calls). To make a call, simply dial 0901 140 0002, wait for a prompt then dial the number in Angola, finishing by perssing hash(#) key. Works from any UK landline or mobile. No registration needed or PINs to remember. Calls cost 20.0 pence per minute, plus your phone operator access charge. The call quality of Low Calls is 80.0%. The provider's accuracy of information (such as active access numbers and actual call rates) is 64.0%. Low Calls has been found not to be a very reliable provider. For detailed explanation about information presented in the table read Information Explained. Access number for cheap calls to Angola Mobile is 0901 140 0003 (provided by Budget Calls). To make a call, simply dial 0901 140 0003, wait for a prompt then dial the number in Angola, finishing by perssing hash(#) key. Works from any UK landline or mobile. No registration needed or PINs to remember. Calls cost 20.0 pence per minute, plus your phone operator access charge. The call quality of Budget Calls is 75.0%. The provider's accuracy of information (such as active access numbers and actual call rates) is 90.0%. Budget Calls has been found to be a reliable provider. For detailed explanation about information presented in the table read"} +{"id":"RedPajamaGithub.0000","text":" Constant Field Values (Solr 4.10.3 API)<\/title> <meta name=\"date\" content=\"2014-12-10\"> <link rel=\"stylesheet\" type=\"text\/css\" href=\"stylesheet.css\" title=\"Style\"> <\/head> <body> <script type=\"text\/javascript\"><!-- if (location.href.indexOf('is-external=true') == -1) { parent.document.title=\"Constant Field Values (Solr 4.10.3 API)\"; } \/\/--> <\/script> <noscript> <div>JavaScript is disabled on your browser.<\/div> <\/noscript> <!-- ========= START OF TOP NAVBAR ======= --> <div class=\"topNav\"><a name=\"navbar_top\"> <!-- --> <\/a><a href=\"#skip-navbar_top\" title=\"Skip navigation links\"><\/a><a name=\"navbar_top_firstrow\"> <!-- --> <\/a> <ul class=\"navList\" title=\"Navigation\"> <li><a href=\"overview-summary.html\">Overview<\/a><\/li> <li>Package<\/li> <li>Class<\/li> <li>Use<\/li> <li><a href=\"overview-tree.html\">Tree<\/a><\/li> <li><a href=\"deprecated-list.html\">Deprecated<\/a><\/li> <li><a href=\"help-doc.html\">Help<\/a><\/li> <\/ul> <\/div> <div class=\"subNav\"> <ul class=\"navList\"> <li>Prev<\/li> <li>Next<\/li> <\/ul> <ul class=\"navList\"> <li><a href=\"index.html?constant-values.html\" target=\"_top\">Frames<\/a><\/li> <li><a href=\"constant-values.html\" target=\"_top\">No Frames<\/a><\/li> <\/ul> <ul class=\"navList\" id=\"allclasses_navbar_top\"> <li><a href=\"allclasses-noframe.html\">All Classes<\/a><\/li> <\/ul> <div> <script type=\"text\/javascript\"><!-- allClassesLink = document.getElementById(\"allclasses_navbar_top\"); if(window==top) { allClassesLink.style.display = \"block\"; } else { allClassesLink.style.display = \"none\"; } \/\/--> <\/script> <\/div> <a name=\"skip-navbar_top\"> <!-- --> <\/a><\/div> <!-- ========= END OF TOP NAVBAR ========= --> <div class=\"header\"> <h1 title=\"Constant Field Values\" class=\"title\">Constant Field Values<\/h1> <h2 title=\"Contents\">Contents<\/h2> <ul> <li><a href=\"#org.apache\">org.apache.*<\/a><\/li> <\/ul> <\/div> <div class=\"constantValuesContainer\"><a name=\"org.apache\"> <!-- --> <\/a> <h2 title=\"org.apache\">org.apache.*<\/h2> <ul class=\"blockList\"> <li class=\"blockList\"> <table border=\"0\" cellpadding=\"3\" cellspacing=\"0\" summary=\"Constant Field Values table, listing constant fields, and values\"> <caption><span>org.apache.solr.client.solrj.<a href=\"org\/apache\/solr\/client\/solrj\/SolrQuery.html\" title=\"class in org.apache.solr.client.solrj\">SolrQuery<\/a><\/span><span class=\"tabEnd\"> <\/span><\/caption> <tr> <th class=\"colFirst\" scope=\"col\">Modifier and Type<\/th> <th scope=\"col\">Constant Field<\/th> <th class=\"colLast\" scope=\"col\">Value<\/th> <\/tr> <tbody> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.client.solrj.SolrQuery.DOCID\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/client\/solrj\/SolrQuery.html#DOCID\">DOCID<\/a><\/code><\/td> <td class=\"colLast\"><code>\"_docid_\"<\/code><\/td> <\/tr> <\/tbody> <\/table> <\/li> <\/ul> <ul class=\"blockList\"> <li class=\"blockList\"> <table border=\"0\" cellpadding=\"3\" cellspacing=\"0\" summary=\"Constant Field Values table, listing constant fields, and values\"> <caption><span>org.apache.solr.client.solrj.beans.<a href=\"org\/apache\/solr\/client\/solrj\/beans\/Field.html\" title=\"annotation in org.apache.solr.client.solrj.beans\">Field<\/a><\/span><span class=\"tabEnd\"> <\/span><\/caption> <tr> <th class=\"colFirst\" scope=\"col\">Modifier and Type<\/th> <th scope=\"col\">Constant Field<\/th> <th class=\"colLast\" scope=\"col\">Value<\/th> <\/tr> <tbody> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.client.solrj.beans.Field.DEFAULT\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/client\/solrj\/beans\/Field.html#DEFAULT\">DEFAULT<\/a><\/code><\/td> <td class=\"colLast\"><code>\"#default\"<\/code><\/td> <\/tr> <\/tbody> <\/table> <\/li> <\/ul> <ul class=\"blockList\"> <li class=\"blockList\"> <table border=\"0\" cellpadding=\"3\" cellspacing=\"0\" summary=\"Constant Field Values table, listing constant fields, and values\"> <caption><span>org.apache.solr.client.solrj.impl.<a href=\"org\/apache\/solr\/client\/solrj\/impl\/BinaryResponseParser.html\" title=\"class in org.apache.solr.client.solrj.impl\">BinaryResponseParser<\/a><\/span><span class=\"tabEnd\"> <\/span><\/caption> <tr> <th class=\"colFirst\" scope=\"col\">Modifier and Type<\/th> <th scope=\"col\">Constant Field<\/th> <th class=\"colLast\" scope=\"col\">Value<\/th> <\/tr> <tbody> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.client.solrj.impl.BinaryResponseParser.BINARY_CONTENT_TYPE\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/client\/solrj\/impl\/BinaryResponseParser.html#BINARY_CONTENT_TYPE\">BINARY_CONTENT_TYPE<\/a><\/code><\/td> <td class=\"colLast\"><code>\"application\/octet-stream\"<\/code><\/td> <\/tr> <\/tbody> <\/table> <\/li> <li class=\"blockList\"> <table border=\"0\" cellpadding=\"3\" cellspacing=\"0\" summary=\"Constant Field Values table, listing constant fields, and values\"> <caption><span>org.apache.solr.client.solrj.impl.<a href=\"org\/apache\/solr\/client\/solrj\/impl\/HttpClientUtil.html\" title=\"class in org.apache.solr.client.solrj.impl\">HttpClientUtil<\/a><\/span><span class=\"tabEnd\"> <\/span><\/caption> <tr> <th class=\"colFirst\" scope=\"col\">Modifier and Type<\/th> <th scope=\"col\">Constant Field<\/th> <th class=\"colLast\" scope=\"col\">Value<\/th> <\/tr> <tbody> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.client.solrj.impl.HttpClientUtil.PROP_ALLOW_COMPRESSION\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/client\/solrj\/impl\/HttpClientUtil.html#PROP_ALLOW_COMPRESSION\">PROP_ALLOW_COMPRESSION<\/a><\/code><\/td> <td class=\"colLast\"><code>\"allowCompression\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.client.solrj.impl.HttpClientUtil.PROP_BASIC_AUTH_PASS\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/client\/solrj\/impl\/HttpClientUtil.html#PROP_BASIC_AUTH_PASS\">PROP_BASIC_AUTH_PASS<\/a><\/code><\/td> <td class=\"colLast\"><code>\"httpBasicAuthPassword\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.client.solrj.impl.HttpClientUtil.PROP_BASIC_AUTH_USER\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/client\/solrj\/impl\/HttpClientUtil.html#PROP_BASIC_AUTH_USER\">PROP_BASIC_AUTH_USER<\/a><\/code><\/td> <td class=\"colLast\"><code>\"httpBasicAuthUser\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.client.solrj.impl.HttpClientUtil.PROP_CONNECTION_TIMEOUT\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/client\/solrj\/impl\/HttpClientUtil.html#PROP_CONNECTION_TIMEOUT\">PROP_CONNECTION_TIMEOUT<\/a><\/code><\/td> <td class=\"colLast\"><code>\"connTimeout\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.client.solrj.impl.HttpClientUtil.PROP_FOLLOW_REDIRECTS\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/client\/solrj\/impl\/HttpClientUtil.html#PROP_FOLLOW_REDIRECTS\">PROP_FOLLOW_REDIRECTS<\/a><\/code><\/td> <td class=\"colLast\"><code>\"followRedirects\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.client.solrj.impl.HttpClientUtil.PROP_MAX_CONNECTIONS\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/client\/solrj\/impl\/HttpClientUtil.html#PROP_MAX_CONNECTIONS\">PROP_MAX_CONNECTIONS<\/a><\/code><\/td> <td class=\"colLast\"><code>\"maxConnections\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.client.solrj.impl.HttpClientUtil.PROP_MAX_CONNECTIONS_PER_HOST\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/client\/solrj\/impl\/HttpClientUtil.html#PROP_MAX_CONNECTIONS_PER_HOST\">PROP_MAX_CONNECTIONS_PER_HOST<\/a><\/code><\/td> <td class=\"colLast\"><code>\"maxConnectionsPerHost\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.client.solrj.impl.HttpClientUtil.PROP_SO_TIMEOUT\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/client\/solrj\/impl\/HttpClientUtil.html#PROP_SO_TIMEOUT\">PROP_SO_TIMEOUT<\/a><\/code><\/td> <td class=\"colLast\"><code>\"socketTimeout\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.client.solrj.impl.HttpClientUtil.PROP_USE_RETRY\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/client\/solrj\/impl\/HttpClientUtil.html#PROP_USE_RETRY\">PROP_USE_RETRY<\/a><\/code><\/td> <td class=\"colLast\"><code>\"retry\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.client.solrj.impl.HttpClientUtil.SYS_PROP_CHECK_PEER_NAME\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/client\/solrj\/impl\/HttpClientUtil.html#SYS_PROP_CHECK_PEER_NAME\">SYS_PROP_CHECK_PEER_NAME<\/a><\/code><\/td> <td class=\"colLast\"><code>\"solr.ssl.checkPeerName\"<\/code><\/td> <\/tr> <\/tbody> <\/table> <\/li> <li class=\"blockList\"> <table border=\"0\" cellpadding=\"3\" cellspacing=\"0\" summary=\"Constant Field Values table, listing constant fields, and values\"> <caption><span>org.apache.solr.client.solrj.impl.<a href=\"org\/apache\/solr\/client\/solrj\/impl\/XMLResponseParser.html\" title=\"class in org.apache.solr.client.solrj.impl\">XMLResponseParser<\/a><\/span><span class=\"tabEnd\"> <\/span><\/caption> <tr> <th class=\"colFirst\" scope=\"col\">Modifier and Type<\/th> <th scope=\"col\">Constant Field<\/th> <th class=\"colLast\" scope=\"col\">Value<\/th> <\/tr> <tbody> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.client.solrj.impl.XMLResponseParser.XML_CONTENT_TYPE\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/client\/solrj\/impl\/XMLResponseParser.html#XML_CONTENT_TYPE\">XML_CONTENT_TYPE<\/a><\/code><\/td> <td class=\"colLast\"><code>\"application\/xml; charset=UTF-8\"<\/code><\/td> <\/tr> <\/tbody> <\/table> <\/li> <\/ul> <ul class=\"blockList\"> <li class=\"blockList\"> <table border=\"0\" cellpadding=\"3\" cellspacing=\"0\" summary=\"Constant Field Values table, listing constant fields, and values\"> <caption><span>org.apache.solr.client.solrj.request.<a href=\"org\/apache\/solr\/client\/solrj\/request\/UpdateRequest.html\" title=\"class in org.apache.solr.client.solrj.request\">UpdateRequest<\/a><\/span><span class=\"tabEnd\"> <\/span><\/caption> <tr> <th class=\"colFirst\" scope=\"col\">Modifier and Type<\/th> <th scope=\"col\">Constant Field<\/th> <th class=\"colLast\" scope=\"col\">Value<\/th> <\/tr> <tbody> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.client.solrj.request.UpdateRequest.COMMIT_WITHIN\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/client\/solrj\/request\/UpdateRequest.html#COMMIT_WITHIN\">COMMIT_WITHIN<\/a><\/code><\/td> <td class=\"colLast\"><code>\"cw\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.client.solrj.request.UpdateRequest.MIN_REPFACT\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/client\/solrj\/request\/UpdateRequest.html#MIN_REPFACT\">MIN_REPFACT<\/a><\/code><\/td> <td class=\"colLast\"><code>\"min_rf\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.client.solrj.request.UpdateRequest.OVERWRITE\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/client\/solrj\/request\/UpdateRequest.html#OVERWRITE\">OVERWRITE<\/a><\/code><\/td> <td class=\"colLast\"><code>\"ow\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.client.solrj.request.UpdateRequest.REPFACT\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/client\/solrj\/request\/UpdateRequest.html#REPFACT\">REPFACT<\/a><\/code><\/td> <td class=\"colLast\"><code>\"rf\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.client.solrj.request.UpdateRequest.VER\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/client\/solrj\/request\/UpdateRequest.html#VER\">VER<\/a><\/code><\/td> <td class=\"colLast\"><code>\"ver\"<\/code><\/td> <\/tr> <\/tbody> <\/table> <\/li> <\/ul> <ul class=\"blockList\"> <li class=\"blockList\"> <table border=\"0\" cellpadding=\"3\" cellspacing=\"0\" summary=\"Constant Field Values table, listing constant fields, and values\"> <caption><span>org.apache.solr.client.solrj.util.<a href=\"org\/apache\/solr\/client\/solrj\/util\/ClientUtils.html\" title=\"class in org.apache.solr.client.solrj.util\">ClientUtils<\/a><\/span><span class=\"tabEnd\"> <\/span><\/caption> <tr> <th class=\"colFirst\" scope=\"col\">Modifier and Type<\/th> <th scope=\"col\">Constant Field<\/th> <th class=\"colLast\" scope=\"col\">Value<\/th> <\/tr> <tbody> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.client.solrj.util.ClientUtils.TEXT_XML\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/client\/solrj\/util\/ClientUtils.html#TEXT_XML\">TEXT_XML<\/a><\/code><\/td> <td class=\"colLast\"><code>\"application\/xml; charset=UTF-8\"<\/code><\/td> <\/tr> <\/tbody> <\/table> <\/li> <\/ul> <ul class=\"blockList\"> <li class=\"blockList\"> <table border=\"0\" cellpadding=\"3\" cellspacing=\"0\" summary=\"Constant Field Values table, listing constant fields, and values\"> <caption><span>org.apache.solr.common.cloud.<a href=\"org\/apache\/solr\/common\/cloud\/CompositeIdRouter.html\" title=\"class in org.apache.solr.common.cloud\">CompositeIdRouter<\/a><\/span><span class=\"tabEnd\"> <\/span><\/caption> <tr> <th class=\"colFirst\" scope=\"col\">Modifier and Type<\/th> <th scope=\"col\">Constant Field<\/th> <th class=\"colLast\" scope=\"col\">Value<\/th> <\/tr> <tbody> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.cloud.CompositeIdRouter.bitsSeparator\"> <!-- --> <\/a><code>public static final int<\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/cloud\/CompositeIdRouter.html#bitsSeparator\">bitsSeparator<\/a><\/code><\/td> <td class=\"colLast\"><code>47<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.cloud.CompositeIdRouter.NAME\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/cloud\/CompositeIdRouter.html#NAME\">NAME<\/a><\/code><\/td> <td class=\"colLast\"><code>\"compositeId\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.cloud.CompositeIdRouter.SEPARATOR\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/cloud\/CompositeIdRouter.html#SEPARATOR\">SEPARATOR<\/a><\/code><\/td> <td class=\"colLast\"><code>\"!\"<\/code><\/td> <\/tr> <\/tbody> <\/table> <\/li> <li class=\"blockList\"> <table border=\"0\" cellpadding=\"3\" cellspacing=\"0\" summary=\"Constant Field Values table, listing constant fields, and values\"> <caption><span>org.apache.solr.common.cloud.<a href=\"org\/apache\/solr\/common\/cloud\/DocCollection.html\" title=\"class in org.apache.solr.common.cloud\">DocCollection<\/a><\/span><span class=\"tabEnd\"> <\/span><\/caption> <tr> <th class=\"colFirst\" scope=\"col\">Modifier and Type<\/th> <th scope=\"col\">Constant Field<\/th> <th class=\"colLast\" scope=\"col\">Value<\/th> <\/tr> <tbody> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.cloud.DocCollection.DOC_ROUTER\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/cloud\/DocCollection.html#DOC_ROUTER\">DOC_ROUTER<\/a><\/code><\/td> <td class=\"colLast\"><code>\"router\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.cloud.DocCollection.SHARDS\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/cloud\/DocCollection.html#SHARDS\">SHARDS<\/a><\/code><\/td> <td class=\"colLast\"><code>\"shards\"<\/code><\/td> <\/tr> <\/tbody> <\/table> <\/li> <li class=\"blockList\"> <table border=\"0\" cellpadding=\"3\" cellspacing=\"0\" summary=\"Constant Field Values table, listing constant fields, and values\"> <caption><span>org.apache.solr.common.cloud.<a href=\"org\/apache\/solr\/common\/cloud\/DocRouter.html\" title=\"class in org.apache.solr.common.cloud\">DocRouter<\/a><\/span><span class=\"tabEnd\"> <\/span><\/caption> <tr> <th class=\"colFirst\" scope=\"col\">Modifier and Type<\/th> <th scope=\"col\">Constant Field<\/th> <th class=\"colLast\" scope=\"col\">Value<\/th> <\/tr> <tbody> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.cloud.DocRouter.DEFAULT_NAME\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/cloud\/DocRouter.html#DEFAULT_NAME\">DEFAULT_NAME<\/a><\/code><\/td> <td class=\"colLast\"><code>\"compositeId\"<\/code><\/td> <\/tr> <\/tbody> <\/table> <\/li> <li class=\"blockList\"> <table border=\"0\" cellpadding=\"3\" cellspacing=\"0\" summary=\"Constant Field Values table, listing constant fields, and values\"> <caption><span>org.apache.solr.common.cloud.<a href=\"org\/apache\/solr\/common\/cloud\/ImplicitDocRouter.html\" title=\"class in org.apache.solr.common.cloud\">ImplicitDocRouter<\/a><\/span><span class=\"tabEnd\"> <\/span><\/caption> <tr> <th class=\"colFirst\" scope=\"col\">Modifier and Type<\/th> <th scope=\"col\">Constant Field<\/th> <th class=\"colLast\" scope=\"col\">Value<\/th> <\/tr> <tbody> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.cloud.ImplicitDocRouter.NAME\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/cloud\/ImplicitDocRouter.html#NAME\">NAME<\/a><\/code><\/td> <td class=\"colLast\"><code>\"implicit\"<\/code><\/td> <\/tr> <\/tbody> <\/table> <\/li> <li class=\"blockList\"> <table border=\"0\" cellpadding=\"3\" cellspacing=\"0\" summary=\"Constant Field Values table, listing constant fields, and values\"> <caption><span>org.apache.solr.common.cloud.<a href=\"org\/apache\/solr\/common\/cloud\/PlainIdRouter.html\" title=\"class in org.apache.solr.common.cloud\">PlainIdRouter<\/a><\/span><span class=\"tabEnd\"> <\/span><\/caption> <tr> <th class=\"colFirst\" scope=\"col\">Modifier and Type<\/th> <th scope=\"col\">Constant Field<\/th> <th class=\"colLast\" scope=\"col\">Value<\/th> <\/tr> <tbody> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.cloud.PlainIdRouter.NAME\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/cloud\/PlainIdRouter.html#NAME\">NAME<\/a><\/code><\/td> <td class=\"colLast\"><code>\"plain\"<\/code><\/td> <\/tr> <\/tbody> <\/table> <\/li> <li class=\"blockList\"> <table border=\"0\" cellpadding=\"3\" cellspacing=\"0\" summary=\"Constant Field Values table, listing constant fields, and values\"> <caption><span>org.apache.solr.common.cloud.<a href=\"org\/apache\/solr\/common\/cloud\/ZkStateReader.html\" title=\"class in org.apache.solr.common.cloud\">ZkStateReader<\/a><\/span><span class=\"tabEnd\"> <\/span><\/caption> <tr> <th class=\"colFirst\" scope=\"col\">Modifier and Type<\/th> <th scope=\"col\">Constant Field<\/th> <th class=\"colLast\" scope=\"col\">Value<\/th> <\/tr> <tbody> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.cloud.ZkStateReader.ACTIVE\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/cloud\/ZkStateReader.html#ACTIVE\">ACTIVE<\/a><\/code><\/td> <td class=\"colLast\"><code>\"active\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.cloud.ZkStateReader.ALIASES\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/cloud\/ZkStateReader.html#ALIASES\">ALIASES<\/a><\/code><\/td> <td class=\"colLast\"><code>\"\/aliases.json\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.cloud.ZkStateReader.AUTO_ADD_REPLICAS\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/cloud\/ZkStateReader.html#AUTO_ADD_REPLICAS\">AUTO_ADD_REPLICAS<\/a><\/code><\/td> <td class=\"colLast\"><code>\"autoAddReplicas\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.cloud.ZkStateReader.BASE_URL_PROP\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/cloud\/ZkStateReader.html#BASE_URL_PROP\">BASE_URL_PROP<\/a><\/code><\/td> <td class=\"colLast\"><code>\"base_url\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.cloud.ZkStateReader.CLUSTER_PROPS\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/cloud\/ZkStateReader.html#CLUSTER_PROPS\">CLUSTER_PROPS<\/a><\/code><\/td> <td class=\"colLast\"><code>\"\/clusterprops.json\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.cloud.ZkStateReader.CLUSTER_STATE\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/cloud\/ZkStateReader.html#CLUSTER_STATE\">CLUSTER_STATE<\/a><\/code><\/td> <td class=\"colLast\"><code>\"\/clusterstate.json\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.cloud.ZkStateReader.COLLECTION_PROP\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/cloud\/ZkStateReader.html#COLLECTION_PROP\">COLLECTION_PROP<\/a><\/code><\/td> <td class=\"colLast\"><code>\"collection\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.cloud.ZkStateReader.COLLECTIONS_ZKNODE\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/cloud\/ZkStateReader.html#COLLECTIONS_ZKNODE\">COLLECTIONS_ZKNODE<\/a><\/code><\/td> <td class=\"colLast\"><code>\"\/collections\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.cloud.ZkStateReader.CONFIGNAME_PROP\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/cloud\/ZkStateReader.html#CONFIGNAME_PROP\">CONFIGNAME_PROP<\/a><\/code><\/td> <td class=\"colLast\"><code>\"configName\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.cloud.ZkStateReader.CONFIGS_ZKNODE\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/cloud\/ZkStateReader.html#CONFIGS_ZKNODE\">CONFIGS_ZKNODE<\/a><\/code><\/td> <td class=\"colLast\"><code>\"\/configs\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.cloud.ZkStateReader.CORE_NAME_PROP\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/cloud\/ZkStateReader.html#CORE_NAME_PROP\">CORE_NAME_PROP<\/a><\/code><\/td> <td class=\"colLast\"><code>\"core\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.cloud.ZkStateReader.CORE_NODE_NAME_PROP\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/cloud\/ZkStateReader.html#CORE_NODE_NAME_PROP\">CORE_NODE_NAME_PROP<\/a><\/code><\/td> <td class=\"colLast\"><code>\"core_node_name\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.cloud.ZkStateReader.DOWN\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/cloud\/ZkStateReader.html#DOWN\">DOWN<\/a><\/code><\/td> <td class=\"colLast\"><code>\"down\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.cloud.ZkStateReader.LEADER_ELECT_ZKNODE\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/cloud\/ZkStateReader.html#LEADER_ELECT_ZKNODE\">LEADER_ELECT_ZKNODE<\/a><\/code><\/td> <td class=\"colLast\"><code>\"\/leader_elect\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.cloud.ZkStateReader.LEADER_PROP\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/cloud\/ZkStateReader.html#LEADER_PROP\">LEADER_PROP<\/a><\/code><\/td> <td class=\"colLast\"><code>\"leader\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.cloud.ZkStateReader.LEGACY_CLOUD\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/cloud\/ZkStateReader.html#LEGACY_CLOUD\">LEGACY_CLOUD<\/a><\/code><\/td> <td class=\"colLast\"><code>\"legacyCloud\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.cloud.ZkStateReader.LIVE_NODES_ZKNODE\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/cloud\/ZkStateReader.html#LIVE_NODES_ZKNODE\">LIVE_NODES_ZKNODE<\/a><\/code><\/td> <td class=\"colLast\"><code>\"\/live_nodes\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.cloud.ZkStateReader.MAX_SHARDS_PER_NODE\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/cloud\/ZkStateReader.html#MAX_SHARDS_PER_NODE\">MAX_SHARDS_PER_NODE<\/a><\/code><\/td> <td class=\"colLast\"><code>\"maxShardsPerNode\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.cloud.ZkStateReader.NODE_NAME_PROP\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/cloud\/ZkStateReader.html#NODE_NAME_PROP\">NODE_NAME_PROP<\/a><\/code><\/td> <td class=\"colLast\"><code>\"node_name\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.cloud.ZkStateReader.NUM_SHARDS_PROP\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/cloud\/ZkStateReader.html#NUM_SHARDS_PROP\">NUM_SHARDS_PROP<\/a><\/code><\/td> <td class=\"colLast\"><code>\"numShards\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.cloud.ZkStateReader.RECOVERING\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/cloud\/ZkStateReader.html#RECOVERING\">RECOVERING<\/a><\/code><\/td> <td class=\"colLast\"><code>\"recovering\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.cloud.ZkStateReader.RECOVERY_FAILED\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/cloud\/ZkStateReader.html#RECOVERY_FAILED\">RECOVERY_FAILED<\/a><\/code><\/td> <td class=\"colLast\"><code>\"recovery_failed\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.cloud.ZkStateReader.REPLICA_PROP\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/cloud\/ZkStateReader.html#REPLICA_PROP\">REPLICA_PROP<\/a><\/code><\/td> <td class=\"colLast\"><code>\"replica\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.cloud.ZkStateReader.REPLICATION_FACTOR\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/cloud\/ZkStateReader.html#REPLICATION_FACTOR\">REPLICATION_FACTOR<\/a><\/code><\/td> <td class=\"colLast\"><code>\"replicationFactor\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.cloud.ZkStateReader.ROLES\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/cloud\/ZkStateReader.html#ROLES\">ROLES<\/a><\/code><\/td> <td class=\"colLast\"><code>\"\/roles.json\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.cloud.ZkStateReader.ROLES_PROP\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/cloud\/ZkStateReader.html#ROLES_PROP\">ROLES_PROP<\/a><\/code><\/td> <td class=\"colLast\"><code>\"roles\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.cloud.ZkStateReader.SHARD_ID_PROP\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/cloud\/ZkStateReader.html#SHARD_ID_PROP\">SHARD_ID_PROP<\/a><\/code><\/td> <td class=\"colLast\"><code>\"shard\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.cloud.ZkStateReader.SHARD_LEADERS_ZKNODE\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/cloud\/ZkStateReader.html#SHARD_LEADERS_ZKNODE\">SHARD_LEADERS_ZKNODE<\/a><\/code><\/td> <td class=\"colLast\"><code>\"leaders\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.cloud.ZkStateReader.SHARD_PARENT_PROP\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/cloud\/ZkStateReader.html#SHARD_PARENT_PROP\">SHARD_PARENT_PROP<\/a><\/code><\/td> <td class=\"colLast\"><code>\"shard_parent\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.cloud.ZkStateReader.SHARD_RANGE_PROP\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/cloud\/ZkStateReader.html#SHARD_RANGE_PROP\">SHARD_RANGE_PROP<\/a><\/code><\/td> <td class=\"colLast\"><code>\"shard_range\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.cloud.ZkStateReader.SHARD_STATE_PROP\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/cloud\/ZkStateReader.html#SHARD_STATE_PROP\">SHARD_STATE_PROP<\/a><\/code><\/td> <td class=\"colLast\"><code>\"shard_state\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.cloud.ZkStateReader.STATE_PROP\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/cloud\/ZkStateReader.html#STATE_PROP\">STATE_PROP<\/a><\/code><\/td> <td class=\"colLast\"><code>\"state\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.cloud.ZkStateReader.SYNC\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/cloud\/ZkStateReader.html#SYNC\">SYNC<\/a><\/code><\/td> <td class=\"colLast\"><code>\"sync\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.cloud.ZkStateReader.URL_SCHEME\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/cloud\/ZkStateReader.html#URL_SCHEME\">URL_SCHEME<\/a><\/code><\/td> <td class=\"colLast\"><code>\"urlScheme\"<\/code><\/td> <\/tr> <\/tbody> <\/table> <\/li> <\/ul> <ul class=\"blockList\"> <li class=\"blockList\"> <table border=\"0\" cellpadding=\"3\" cellspacing=\"0\" summary=\"Constant Field Values table, listing constant fields, and values\"> <caption><span>org.apache.solr.common.params.<a href=\"org\/apache\/solr\/common\/params\/AnalysisParams.html\" title=\"interface in org.apache.solr.common.params\">AnalysisParams<\/a><\/span><span class=\"tabEnd\"> <\/span><\/caption> <tr> <th class=\"colFirst\" scope=\"col\">Modifier and Type<\/th> <th scope=\"col\">Constant Field<\/th> <th class=\"colLast\" scope=\"col\">Value<\/th> <\/tr> <tbody> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.AnalysisParams.FIELD_NAME\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/AnalysisParams.html#FIELD_NAME\">FIELD_NAME<\/a><\/code><\/td> <td class=\"colLast\"><code>\"analysis.fieldname\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.AnalysisParams.FIELD_TYPE\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/AnalysisParams.html#FIELD_TYPE\">FIELD_TYPE<\/a><\/code><\/td> <td class=\"colLast\"><code>\"analysis.fieldtype\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.AnalysisParams.FIELD_VALUE\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/AnalysisParams.html#FIELD_VALUE\">FIELD_VALUE<\/a><\/code><\/td> <td class=\"colLast\"><code>\"analysis.fieldvalue\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.AnalysisParams.PREFIX\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/AnalysisParams.html#PREFIX\">PREFIX<\/a><\/code><\/td> <td class=\"colLast\"><code>\"analysis\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.AnalysisParams.QUERY\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/AnalysisParams.html#QUERY\">QUERY<\/a><\/code><\/td> <td class=\"colLast\"><code>\"analysis.query\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.AnalysisParams.SHOW_MATCH\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/AnalysisParams.html#SHOW_MATCH\">SHOW_MATCH<\/a><\/code><\/td> <td class=\"colLast\"><code>\"analysis.showmatch\"<\/code><\/td> <\/tr> <\/tbody> <\/table> <\/li> <li class=\"blockList\"> <table border=\"0\" cellpadding=\"3\" cellspacing=\"0\" summary=\"Constant Field Values table, listing constant fields, and values\"> <caption><span>org.apache.solr.common.params.<a href=\"org\/apache\/solr\/common\/params\/CollectionParams.html\" title=\"interface in org.apache.solr.common.params\">CollectionParams<\/a><\/span><span class=\"tabEnd\"> <\/span><\/caption> <tr> <th class=\"colFirst\" scope=\"col\">Modifier and Type<\/th> <th scope=\"col\">Constant Field<\/th> <th class=\"colLast\" scope=\"col\">Value<\/th> <\/tr> <tbody> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.CollectionParams.ACTION\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/CollectionParams.html#ACTION\">ACTION<\/a><\/code><\/td> <td class=\"colLast\"><code>\"action\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.CollectionParams.NAME\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/CollectionParams.html#NAME\">NAME<\/a><\/code><\/td> <td class=\"colLast\"><code>\"name\"<\/code><\/td> <\/tr> <\/tbody> <\/table> <\/li> <li class=\"blockList\"> <table border=\"0\" cellpadding=\"3\" cellspacing=\"0\" summary=\"Constant Field Values table, listing constant fields, and values\"> <caption><span>org.apache.solr.common.params.<a href=\"org\/apache\/solr\/common\/params\/CommonParams.html\" title=\"interface in org.apache.solr.common.params\">CommonParams<\/a><\/span><span class=\"tabEnd\"> <\/span><\/caption> <tr> <th class=\"colFirst\" scope=\"col\">Modifier and Type<\/th> <th scope=\"col\">Constant Field<\/th> <th class=\"colLast\" scope=\"col\">Value<\/th> <\/tr> <tbody> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.CommonParams.ACTION\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/CommonParams.html#ACTION\">ACTION<\/a><\/code><\/td> <td class=\"colLast\"><code>\"action\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.CommonParams.CACHE\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/CommonParams.html#CACHE\">CACHE<\/a><\/code><\/td> <td class=\"colLast\"><code>\"cache\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.CommonParams.COST\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/CommonParams.html#COST\">COST<\/a><\/code><\/td> <td class=\"colLast\"><code>\"cost\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.CommonParams.DEBUG\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/CommonParams.html#DEBUG\">DEBUG<\/a><\/code><\/td> <td class=\"colLast\"><code>\"debug\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.CommonParams.DEBUG_QUERY\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/CommonParams.html#DEBUG_QUERY\">DEBUG_QUERY<\/a><\/code><\/td> <td class=\"colLast\"><code>\"debugQuery\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.CommonParams.DF\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/CommonParams.html#DF\">DF<\/a><\/code><\/td> <td class=\"colLast\"><code>\"df\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.CommonParams.DISABLE\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/CommonParams.html#DISABLE\">DISABLE<\/a><\/code><\/td> <td class=\"colLast\"><code>\"disable\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.CommonParams.DISTRIB\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/CommonParams.html#DISTRIB\">DISTRIB<\/a><\/code><\/td> <td class=\"colLast\"><code>\"distrib\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.CommonParams.ENABLE\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/CommonParams.html#ENABLE\">ENABLE<\/a><\/code><\/td> <td class=\"colLast\"><code>\"enable\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.CommonParams.EXCLUDE\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/CommonParams.html#EXCLUDE\">EXCLUDE<\/a><\/code><\/td> <td class=\"colLast\"><code>\"ex\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.CommonParams.EXPLAIN_OTHER\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/CommonParams.html#EXPLAIN_OTHER\">EXPLAIN_OTHER<\/a><\/code><\/td> <td class=\"colLast\"><code>\"explainOther\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.CommonParams.EXPLAIN_STRUCT\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/CommonParams.html#EXPLAIN_STRUCT\">EXPLAIN_STRUCT<\/a><\/code><\/td> <td class=\"colLast\"><code>\"debug.explain.structured\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.CommonParams.FIELD\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/CommonParams.html#FIELD\">FIELD<\/a><\/code><\/td> <td class=\"colLast\"><code>\"f\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.CommonParams.FL\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/CommonParams.html#FL\">FL<\/a><\/code><\/td> <td class=\"colLast\"><code>\"fl\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.CommonParams.FQ\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/CommonParams.html#FQ\">FQ<\/a><\/code><\/td> <td class=\"colLast\"><code>\"fq\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.CommonParams.HEADER_ECHO_HANDLER\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/CommonParams.html#HEADER_ECHO_HANDLER\">HEADER_ECHO_HANDLER<\/a><\/code><\/td> <td class=\"colLast\"><code>\"echoHandler\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.CommonParams.HEADER_ECHO_PARAMS\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/CommonParams.html#HEADER_ECHO_PARAMS\">HEADER_ECHO_PARAMS<\/a><\/code><\/td> <td class=\"colLast\"><code>\"echoParams\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.CommonParams.LOG_PARAMS_LIST\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/CommonParams.html#LOG_PARAMS_LIST\">LOG_PARAMS_LIST<\/a><\/code><\/td> <td class=\"colLast\"><code>\"logParamsList\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.CommonParams.NOW\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/CommonParams.html#NOW\">NOW<\/a><\/code><\/td> <td class=\"colLast\"><code>\"NOW\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.CommonParams.OMIT_HEADER\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/CommonParams.html#OMIT_HEADER\">OMIT_HEADER<\/a><\/code><\/td> <td class=\"colLast\"><code>\"omitHeader\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.CommonParams.OUTPUT_KEY\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/CommonParams.html#OUTPUT_KEY\">OUTPUT_KEY<\/a><\/code><\/td> <td class=\"colLast\"><code>\"key\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.CommonParams.PING\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/CommonParams.html#PING\">PING<\/a><\/code><\/td> <td class=\"colLast\"><code>\"ping\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.CommonParams.PING_HANDLER\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/CommonParams.html#PING_HANDLER\">PING_HANDLER<\/a><\/code><\/td> <td class=\"colLast\"><code>\"\/admin\/ping\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.CommonParams.Q\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/CommonParams.html#Q\">Q<\/a><\/code><\/td> <td class=\"colLast\"><code>\"q\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.CommonParams.QT\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/CommonParams.html#QT\">QT<\/a><\/code><\/td> <td class=\"colLast\"><code>\"qt\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.CommonParams.QUERY\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/CommonParams.html#QUERY\">QUERY<\/a><\/code><\/td> <td class=\"colLast\"><code>\"query\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.CommonParams.REQUEST_ID\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/CommonParams.html#REQUEST_ID\">REQUEST_ID<\/a><\/code><\/td> <td class=\"colLast\"><code>\"rid\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.CommonParams.REQUEST_PURPOSE\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/CommonParams.html#REQUEST_PURPOSE\">REQUEST_PURPOSE<\/a><\/code><\/td> <td class=\"colLast\"><code>\"requestPurpose\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.CommonParams.RESULTS\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/CommonParams.html#RESULTS\">RESULTS<\/a><\/code><\/td> <td class=\"colLast\"><code>\"results\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.CommonParams.ROWS\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/CommonParams.html#ROWS\">ROWS<\/a><\/code><\/td> <td class=\"colLast\"><code>\"rows\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.CommonParams.RQ\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/CommonParams.html#RQ\">RQ<\/a><\/code><\/td> <td class=\"colLast\"><code>\"rq\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.CommonParams.SORT\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/CommonParams.html#SORT\">SORT<\/a><\/code><\/td> <td class=\"colLast\"><code>\"sort\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.CommonParams.START\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/CommonParams.html#START\">START<\/a><\/code><\/td> <td class=\"colLast\"><code>\"start\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.CommonParams.STREAM_BODY\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/CommonParams.html#STREAM_BODY\">STREAM_BODY<\/a><\/code><\/td> <td class=\"colLast\"><code>\"stream.body\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.CommonParams.STREAM_CONTENTTYPE\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/CommonParams.html#STREAM_CONTENTTYPE\">STREAM_CONTENTTYPE<\/a><\/code><\/td> <td class=\"colLast\"><code>\"stream.contentType\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.CommonParams.STREAM_FILE\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/CommonParams.html#STREAM_FILE\">STREAM_FILE<\/a><\/code><\/td> <td class=\"colLast\"><code>\"stream.file\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.CommonParams.STREAM_URL\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/CommonParams.html#STREAM_URL\">STREAM_URL<\/a><\/code><\/td> <td class=\"colLast\"><code>\"stream.url\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.CommonParams.TAG\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/CommonParams.html#TAG\">TAG<\/a><\/code><\/td> <td class=\"colLast\"><code>\"tag\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.CommonParams.TERMS\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/CommonParams.html#TERMS\">TERMS<\/a><\/code><\/td> <td class=\"colLast\"><code>\"terms\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.CommonParams.THREADS\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/CommonParams.html#THREADS\">THREADS<\/a><\/code><\/td> <td class=\"colLast\"><code>\"threads\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.CommonParams.TIME_ALLOWED\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/CommonParams.html#TIME_ALLOWED\">TIME_ALLOWED<\/a><\/code><\/td> <td class=\"colLast\"><code>\"timeAllowed\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.CommonParams.TIMING\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/CommonParams.html#TIMING\">TIMING<\/a><\/code><\/td> <td class=\"colLast\"><code>\"timing\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.CommonParams.TR\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/CommonParams.html#TR\">TR<\/a><\/code><\/td> <td class=\"colLast\"><code>\"tr\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.CommonParams.TRACK\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/CommonParams.html#TRACK\">TRACK<\/a><\/code><\/td> <td class=\"colLast\"><code>\"track\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.CommonParams.TZ\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/CommonParams.html#TZ\">TZ<\/a><\/code><\/td> <td class=\"colLast\"><code>\"TZ\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.CommonParams.VALUE\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/CommonParams.html#VALUE\">VALUE<\/a><\/code><\/td> <td class=\"colLast\"><code>\"v\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.CommonParams.VERSION\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/CommonParams.html#VERSION\">VERSION<\/a><\/code><\/td> <td class=\"colLast\"><code>\"version\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.CommonParams.WT\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/CommonParams.html#WT\">WT<\/a><\/code><\/td> <td class=\"colLast\"><code>\"wt\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.CommonParams.XSL\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/CommonParams.html#XSL\">XSL<\/a><\/code><\/td> <td class=\"colLast\"><code>\"xsl\"<\/code><\/td> <\/tr> <\/tbody> <\/table> <\/li> <li class=\"blockList\"> <table border=\"0\" cellpadding=\"3\" cellspacing=\"0\" summary=\"Constant Field Values table, listing constant fields, and values\"> <caption><span>org.apache.solr.common.params.<a href=\"org\/apache\/solr\/common\/params\/CoreAdminParams.html\" title=\"class in org.apache.solr.common.params\">CoreAdminParams<\/a><\/span><span class=\"tabEnd\"> <\/span><\/caption> <tr> <th class=\"colFirst\" scope=\"col\">Modifier and Type<\/th> <th scope=\"col\">Constant Field<\/th> <th class=\"colLast\" scope=\"col\">Value<\/th> <\/tr> <tbody> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.CoreAdminParams.ACTION\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/CoreAdminParams.html#ACTION\">ACTION<\/a><\/code><\/td> <td class=\"colLast\"><code>\"action\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.CoreAdminParams.COLLECTION\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/CoreAdminParams.html#COLLECTION\">COLLECTION<\/a><\/code><\/td> <td class=\"colLast\"><code>\"collection\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.CoreAdminParams.CONFIG\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/CoreAdminParams.html#CONFIG\">CONFIG<\/a><\/code><\/td> <td class=\"colLast\"><code>\"config\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.CoreAdminParams.CONFIGSET\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/CoreAdminParams.html#CONFIGSET\">CONFIGSET<\/a><\/code><\/td> <td class=\"colLast\"><code>\"configSet\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.CoreAdminParams.CORE\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/CoreAdminParams.html#CORE\">CORE<\/a><\/code><\/td> <td class=\"colLast\"><code>\"core\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.CoreAdminParams.CORE_NODE_NAME\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/CoreAdminParams.html#CORE_NODE_NAME\">CORE_NODE_NAME<\/a><\/code><\/td> <td class=\"colLast\"><code>\"coreNodeName\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.CoreAdminParams.DATA_DIR\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/CoreAdminParams.html#DATA_DIR\">DATA_DIR<\/a><\/code><\/td> <td class=\"colLast\"><code>\"dataDir\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.CoreAdminParams.DELETE_DATA_DIR\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/CoreAdminParams.html#DELETE_DATA_DIR\">DELETE_DATA_DIR<\/a><\/code><\/td> <td class=\"colLast\"><code>\"deleteDataDir\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.CoreAdminParams.DELETE_INDEX\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/CoreAdminParams.html#DELETE_INDEX\">DELETE_INDEX<\/a><\/code><\/td> <td class=\"colLast\"><code>\"deleteIndex\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.CoreAdminParams.DELETE_INSTANCE_DIR\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/CoreAdminParams.html#DELETE_INSTANCE_DIR\">DELETE_INSTANCE_DIR<\/a><\/code><\/td> <td class=\"colLast\"><code>\"deleteInstanceDir\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.CoreAdminParams.FILE\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/CoreAdminParams.html#FILE\">FILE<\/a><\/code><\/td> <td class=\"colLast\"><code>\"file\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.CoreAdminParams.INDEX_DIR\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/CoreAdminParams.html#INDEX_DIR\">INDEX_DIR<\/a><\/code><\/td> <td class=\"colLast\"><code>\"indexDir\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.CoreAdminParams.INDEX_INFO\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/CoreAdminParams.html#INDEX_INFO\">INDEX_INFO<\/a><\/code><\/td> <td class=\"colLast\"><code>\"indexInfo\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.CoreAdminParams.INSTANCE_DIR\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/CoreAdminParams.html#INSTANCE_DIR\">INSTANCE_DIR<\/a><\/code><\/td> <td class=\"colLast\"><code>\"instanceDir\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.CoreAdminParams.LOAD_ON_STARTUP\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/CoreAdminParams.html#LOAD_ON_STARTUP\">LOAD_ON_STARTUP<\/a><\/code><\/td> <td class=\"colLast\"><code>\"loadOnStartup\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.CoreAdminParams.NAME\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/CoreAdminParams.html#NAME\">NAME<\/a><\/code><\/td> <td class=\"colLast\"><code>\"name\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.CoreAdminParams.OTHER\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/CoreAdminParams.html#OTHER\">OTHER<\/a><\/code><\/td> <td class=\"colLast\"><code>\"other\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.CoreAdminParams.PERSISTENT\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/CoreAdminParams.html#PERSISTENT\">PERSISTENT<\/a><\/code><\/td> <td class=\"colLast\"><code>\"persistent\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.CoreAdminParams.PROPERTY_PREFIX\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/CoreAdminParams.html#PROPERTY_PREFIX\">PROPERTY_PREFIX<\/a><\/code><\/td> <td class=\"colLast\"><code>\"property.\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.CoreAdminParams.RANGES\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/CoreAdminParams.html#RANGES\">RANGES<\/a><\/code><\/td> <td class=\"colLast\"><code>\"ranges\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.CoreAdminParams.REQUESTID\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/CoreAdminParams.html#REQUESTID\">REQUESTID<\/a><\/code><\/td> <td class=\"colLast\"><code>\"requestid\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.CoreAdminParams.ROLES\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/CoreAdminParams.html#ROLES\">ROLES<\/a><\/code><\/td> <td class=\"colLast\"><code>\"roles\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.CoreAdminParams.SCHEMA\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/CoreAdminParams.html#SCHEMA\">SCHEMA<\/a><\/code><\/td> <td class=\"colLast\"><code>\"schema\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.CoreAdminParams.SHARD\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/CoreAdminParams.html#SHARD\">SHARD<\/a><\/code><\/td> <td class=\"colLast\"><code>\"shard\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.CoreAdminParams.SHARD_PARENT\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/CoreAdminParams.html#SHARD_PARENT\">SHARD_PARENT<\/a><\/code><\/td> <td class=\"colLast\"><code>\"shard.parent\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.CoreAdminParams.SHARD_RANGE\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/CoreAdminParams.html#SHARD_RANGE\">SHARD_RANGE<\/a><\/code><\/td> <td class=\"colLast\"><code>\"shard.range\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.CoreAdminParams.SHARD_STATE\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/CoreAdminParams.html#SHARD_STATE\">SHARD_STATE<\/a><\/code><\/td> <td class=\"colLast\"><code>\"shard.state\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.CoreAdminParams.SRC_CORE\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/CoreAdminParams.html#SRC_CORE\">SRC_CORE<\/a><\/code><\/td> <td class=\"colLast\"><code>\"srcCore\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.CoreAdminParams.TARGET_CORE\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/CoreAdminParams.html#TARGET_CORE\">TARGET_CORE<\/a><\/code><\/td> <td class=\"colLast\"><code>\"targetCore\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.CoreAdminParams.TRANSIENT\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/CoreAdminParams.html#TRANSIENT\">TRANSIENT<\/a><\/code><\/td> <td class=\"colLast\"><code>\"transient\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.CoreAdminParams.ULOG_DIR\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/CoreAdminParams.html#ULOG_DIR\">ULOG_DIR<\/a><\/code><\/td> <td class=\"colLast\"><code>\"ulogDir\"<\/code><\/td> <\/tr> <\/tbody> <\/table> <\/li> <li class=\"blockList\"> <table border=\"0\" cellpadding=\"3\" cellspacing=\"0\" summary=\"Constant Field Values table, listing constant fields, and values\"> <caption><span>org.apache.solr.common.params.<a href=\"org\/apache\/solr\/common\/params\/CursorMarkParams.html\" title=\"interface in org.apache.solr.common.params\">CursorMarkParams<\/a><\/span><span class=\"tabEnd\"> <\/span><\/caption> <tr> <th class=\"colFirst\" scope=\"col\">Modifier and Type<\/th> <th scope=\"col\">Constant Field<\/th> <th class=\"colLast\" scope=\"col\">Value<\/th> <\/tr> <tbody> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.CursorMarkParams.CURSOR_MARK_NEXT\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/CursorMarkParams.html#CURSOR_MARK_NEXT\">CURSOR_MARK_NEXT<\/a><\/code><\/td> <td class=\"colLast\"><code>\"nextCursorMark\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.CursorMarkParams.CURSOR_MARK_PARAM\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/CursorMarkParams.html#CURSOR_MARK_PARAM\">CURSOR_MARK_PARAM<\/a><\/code><\/td> <td class=\"colLast\"><code>\"cursorMark\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.CursorMarkParams.CURSOR_MARK_START\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/CursorMarkParams.html#CURSOR_MARK_START\">CURSOR_MARK_START<\/a><\/code><\/td> <td class=\"colLast\"><code>\"*\"<\/code><\/td> <\/tr> <\/tbody> <\/table> <\/li> <li class=\"blockList\"> <table border=\"0\" cellpadding=\"3\" cellspacing=\"0\" summary=\"Constant Field Values table, listing constant fields, and values\"> <caption><span>org.apache.solr.common.params.<a href=\"org\/apache\/solr\/common\/params\/DisMaxParams.html\" title=\"interface in org.apache.solr.common.params\">DisMaxParams<\/a><\/span><span class=\"tabEnd\"> <\/span><\/caption> <tr> <th class=\"colFirst\" scope=\"col\">Modifier and Type<\/th> <th scope=\"col\">Constant Field<\/th> <th class=\"colLast\" scope=\"col\">Value<\/th> <\/tr> <tbody> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.DisMaxParams.ALTQ\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/DisMaxParams.html#ALTQ\">ALTQ<\/a><\/code><\/td> <td class=\"colLast\"><code>\"q.alt\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.DisMaxParams.BF\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/DisMaxParams.html#BF\">BF<\/a><\/code><\/td> <td class=\"colLast\"><code>\"bf\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.DisMaxParams.BQ\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/DisMaxParams.html#BQ\">BQ<\/a><\/code><\/td> <td class=\"colLast\"><code>\"bq\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.DisMaxParams.GEN\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/DisMaxParams.html#GEN\">GEN<\/a><\/code><\/td> <td class=\"colLast\"><code>\"gen\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.DisMaxParams.MM\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/DisMaxParams.html#MM\">MM<\/a><\/code><\/td> <td class=\"colLast\"><code>\"mm\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.DisMaxParams.PF\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/DisMaxParams.html#PF\">PF<\/a><\/code><\/td> <td class=\"colLast\"><code>\"pf\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.DisMaxParams.PF2\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/DisMaxParams.html#PF2\">PF2<\/a><\/code><\/td> <td class=\"colLast\"><code>\"pf2\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.DisMaxParams.PF3\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/DisMaxParams.html#PF3\">PF3<\/a><\/code><\/td> <td class=\"colLast\"><code>\"pf3\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.DisMaxParams.PS\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/DisMaxParams.html#PS\">PS<\/a><\/code><\/td> <td class=\"colLast\"><code>\"ps\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.DisMaxParams.PS2\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/DisMaxParams.html#PS2\">PS2<\/a><\/code><\/td> <td class=\"colLast\"><code>\"ps2\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.DisMaxParams.PS3\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/DisMaxParams.html#PS3\">PS3<\/a><\/code><\/td> <td class=\"colLast\"><code>\"ps3\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.DisMaxParams.QF\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/DisMaxParams.html#QF\">QF<\/a><\/code><\/td> <td class=\"colLast\"><code>\"qf\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.DisMaxParams.QS\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/DisMaxParams.html#QS\">QS<\/a><\/code><\/td> <td class=\"colLast\"><code>\"qs\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.DisMaxParams.TIE\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/DisMaxParams.html#TIE\">TIE<\/a><\/code><\/td> <td class=\"colLast\"><code>\"tie\"<\/code><\/td> <\/tr> <\/tbody> <\/table> <\/li> <li class=\"blockList\"> <table border=\"0\" cellpadding=\"3\" cellspacing=\"0\" summary=\"Constant Field Values table, listing constant fields, and values\"> <caption><span>org.apache.solr.common.params.<a href=\"org\/apache\/solr\/common\/params\/EventParams.html\" title=\"interface in org.apache.solr.common.params\">EventParams<\/a><\/span><span class=\"tabEnd\"> <\/span><\/caption> <tr> <th class=\"colFirst\" scope=\"col\">Modifier and Type<\/th> <th scope=\"col\">Constant Field<\/th> <th class=\"colLast\" scope=\"col\">Value<\/th> <\/tr> <tbody> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.EventParams.EVENT\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/EventParams.html#EVENT\">EVENT<\/a><\/code><\/td> <td class=\"colLast\"><code>\"event\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.EventParams.FIRST_SEARCHER\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/EventParams.html#FIRST_SEARCHER\">FIRST_SEARCHER<\/a><\/code><\/td> <td class=\"colLast\"><code>\"firstSearcher\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.EventParams.NEW_SEARCHER\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/EventParams.html#NEW_SEARCHER\">NEW_SEARCHER<\/a><\/code><\/td> <td class=\"colLast\"><code>\"newSearcher\"<\/code><\/td> <\/tr> <\/tbody> <\/table> <\/li> <li class=\"blockList\"> <table border=\"0\" cellpadding=\"3\" cellspacing=\"0\" summary=\"Constant Field Values table, listing constant fields, and values\"> <caption><span>org.apache.solr.common.params.<a href=\"org\/apache\/solr\/common\/params\/ExpandParams.html\" title=\"interface in org.apache.solr.common.params\">ExpandParams<\/a><\/span><span class=\"tabEnd\"> <\/span><\/caption> <tr> <th class=\"colFirst\" scope=\"col\">Modifier and Type<\/th> <th scope=\"col\">Constant Field<\/th> <th class=\"colLast\" scope=\"col\">Value<\/th> <\/tr> <tbody> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.ExpandParams.EXPAND\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/ExpandParams.html#EXPAND\">EXPAND<\/a><\/code><\/td> <td class=\"colLast\"><code>\"expand\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.ExpandParams.EXPAND_FIELD\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/ExpandParams.html#EXPAND_FIELD\">EXPAND_FIELD<\/a><\/code><\/td> <td class=\"colLast\"><code>\"expand.field\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.ExpandParams.EXPAND_FQ\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/ExpandParams.html#EXPAND_FQ\">EXPAND_FQ<\/a><\/code><\/td> <td class=\"colLast\"><code>\"expand.fq\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.ExpandParams.EXPAND_Q\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/ExpandParams.html#EXPAND_Q\">EXPAND_Q<\/a><\/code><\/td> <td class=\"colLast\"><code>\"expand.q\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.ExpandParams.EXPAND_ROWS\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/ExpandParams.html#EXPAND_ROWS\">EXPAND_ROWS<\/a><\/code><\/td> <td class=\"colLast\"><code>\"expand.rows\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.ExpandParams.EXPAND_SORT\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/ExpandParams.html#EXPAND_SORT\">EXPAND_SORT<\/a><\/code><\/td> <td class=\"colLast\"><code>\"expand.sort\"<\/code><\/td> <\/tr> <\/tbody> <\/table> <\/li> <li class=\"blockList\"> <table border=\"0\" cellpadding=\"3\" cellspacing=\"0\" summary=\"Constant Field Values table, listing constant fields, and values\"> <caption><span>org.apache.solr.common.params.<a href=\"org\/apache\/solr\/common\/params\/FacetParams.html\" title=\"interface in org.apache.solr.common.params\">FacetParams<\/a><\/span><span class=\"tabEnd\"> <\/span><\/caption> <tr> <th class=\"colFirst\" scope=\"col\">Modifier and Type<\/th> <th scope=\"col\">Constant Field<\/th> <th class=\"colLast\" scope=\"col\">Value<\/th> <\/tr> <tbody> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.FacetParams.FACET\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/FacetParams.html#FACET\">FACET<\/a><\/code><\/td> <td class=\"colLast\"><code>\"facet\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.FacetParams.FACET_DATE\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/FacetParams.html#FACET_DATE\">FACET_DATE<\/a><\/code><\/td> <td class=\"colLast\"><code>\"facet.date\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.FacetParams.FACET_DATE_END\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/FacetParams.html#FACET_DATE_END\">FACET_DATE_END<\/a><\/code><\/td> <td class=\"colLast\"><code>\"facet.date.end\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.FacetParams.FACET_DATE_GAP\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/FacetParams.html#FACET_DATE_GAP\">FACET_DATE_GAP<\/a><\/code><\/td> <td class=\"colLast\"><code>\"facet.date.gap\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.FacetParams.FACET_DATE_HARD_END\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/FacetParams.html#FACET_DATE_HARD_END\">FACET_DATE_HARD_END<\/a><\/code><\/td> <td class=\"colLast\"><code>\"facet.date.hardend\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.FacetParams.FACET_DATE_INCLUDE\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/FacetParams.html#FACET_DATE_INCLUDE\">FACET_DATE_INCLUDE<\/a><\/code><\/td> <td class=\"colLast\"><code>\"facet.date.include\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.FacetParams.FACET_DATE_OTHER\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/FacetParams.html#FACET_DATE_OTHER\">FACET_DATE_OTHER<\/a><\/code><\/td> <td class=\"colLast\"><code>\"facet.date.other\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.FacetParams.FACET_DATE_START\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/FacetParams.html#FACET_DATE_START\">FACET_DATE_START<\/a><\/code><\/td> <td class=\"colLast\"><code>\"facet.date.start\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.FacetParams.FACET_ENUM_CACHE_MINDF\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/FacetParams.html#FACET_ENUM_CACHE_MINDF\">FACET_ENUM_CACHE_MINDF<\/a><\/code><\/td> <td class=\"colLast\"><code>\"facet.enum.cache.minDf\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.FacetParams.FACET_FIELD\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/FacetParams.html#FACET_FIELD\">FACET_FIELD<\/a><\/code><\/td> <td class=\"colLast\"><code>\"facet.field\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.FacetParams.FACET_INTERVAL\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/FacetParams.html#FACET_INTERVAL\">FACET_INTERVAL<\/a><\/code><\/td> <td class=\"colLast\"><code>\"facet.interval\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.FacetParams.FACET_INTERVAL_SET\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/FacetParams.html#FACET_INTERVAL_SET\">FACET_INTERVAL_SET<\/a><\/code><\/td> <td class=\"colLast\"><code>\"facet.interval.set\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.FacetParams.FACET_LIMIT\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/FacetParams.html#FACET_LIMIT\">FACET_LIMIT<\/a><\/code><\/td> <td class=\"colLast\"><code>\"facet.limit\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.FacetParams.FACET_METHOD\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/FacetParams.html#FACET_METHOD\">FACET_METHOD<\/a><\/code><\/td> <td class=\"colLast\"><code>\"facet.method\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.FacetParams.FACET_METHOD_enum\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/FacetParams.html#FACET_METHOD_enum\">FACET_METHOD_enum<\/a><\/code><\/td> <td class=\"colLast\"><code>\"enum\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.FacetParams.FACET_METHOD_fc\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/FacetParams.html#FACET_METHOD_fc\">FACET_METHOD_fc<\/a><\/code><\/td> <td class=\"colLast\"><code>\"fc\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.FacetParams.FACET_METHOD_fcs\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/FacetParams.html#FACET_METHOD_fcs\">FACET_METHOD_fcs<\/a><\/code><\/td> <td class=\"colLast\"><code>\"fcs\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.FacetParams.FACET_MINCOUNT\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/FacetParams.html#FACET_MINCOUNT\">FACET_MINCOUNT<\/a><\/code><\/td> <td class=\"colLast\"><code>\"facet.mincount\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.FacetParams.FACET_MISSING\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/FacetParams.html#FACET_MISSING\">FACET_MISSING<\/a><\/code><\/td> <td class=\"colLast\"><code>\"facet.missing\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.FacetParams.FACET_OFFSET\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/FacetParams.html#FACET_OFFSET\">FACET_OFFSET<\/a><\/code><\/td> <td class=\"colLast\"><code>\"facet.offset\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.FacetParams.FACET_OVERREQUEST\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/FacetParams.html#FACET_OVERREQUEST\">FACET_OVERREQUEST<\/a><\/code><\/td> <td class=\"colLast\"><code>\"facet.overrequest\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.FacetParams.FACET_OVERREQUEST_COUNT\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/FacetParams.html#FACET_OVERREQUEST_COUNT\">FACET_OVERREQUEST_COUNT<\/a><\/code><\/td> <td class=\"colLast\"><code>\"facet.overrequest.count\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.FacetParams.FACET_OVERREQUEST_RATIO\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/FacetParams.html#FACET_OVERREQUEST_RATIO\">FACET_OVERREQUEST_RATIO<\/a><\/code><\/td> <td class=\"colLast\"><code>\"facet.overrequest.ratio\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.FacetParams.FACET_PIVOT\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/FacetParams.html#FACET_PIVOT\">FACET_PIVOT<\/a><\/code><\/td> <td class=\"colLast\"><code>\"facet.pivot\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.FacetParams.FACET_PIVOT_MINCOUNT\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/FacetParams.html#FACET_PIVOT_MINCOUNT\">FACET_PIVOT_MINCOUNT<\/a><\/code><\/td> <td class=\"colLast\"><code>\"facet.pivot.mincount\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.FacetParams.FACET_PREFIX\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/FacetParams.html#FACET_PREFIX\">FACET_PREFIX<\/a><\/code><\/td> <td class=\"colLast\"><code>\"facet.prefix\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.FacetParams.FACET_QUERY\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/FacetParams.html#FACET_QUERY\">FACET_QUERY<\/a><\/code><\/td> <td class=\"colLast\"><code>\"facet.query\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.FacetParams.FACET_RANGE\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/FacetParams.html#FACET_RANGE\">FACET_RANGE<\/a><\/code><\/td> <td class=\"colLast\"><code>\"facet.range\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.FacetParams.FACET_RANGE_END\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/FacetParams.html#FACET_RANGE_END\">FACET_RANGE_END<\/a><\/code><\/td> <td class=\"colLast\"><code>\"facet.range.end\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.FacetParams.FACET_RANGE_GAP\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/FacetParams.html#FACET_RANGE_GAP\">FACET_RANGE_GAP<\/a><\/code><\/td> <td class=\"colLast\"><code>\"facet.range.gap\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.FacetParams.FACET_RANGE_HARD_END\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/FacetParams.html#FACET_RANGE_HARD_END\">FACET_RANGE_HARD_END<\/a><\/code><\/td> <td class=\"colLast\"><code>\"facet.range.hardend\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.FacetParams.FACET_RANGE_INCLUDE\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/FacetParams.html#FACET_RANGE_INCLUDE\">FACET_RANGE_INCLUDE<\/a><\/code><\/td> <td class=\"colLast\"><code>\"facet.range.include\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.FacetParams.FACET_RANGE_OTHER\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/FacetParams.html#FACET_RANGE_OTHER\">FACET_RANGE_OTHER<\/a><\/code><\/td> <td class=\"colLast\"><code>\"facet.range.other\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.FacetParams.FACET_RANGE_START\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/FacetParams.html#FACET_RANGE_START\">FACET_RANGE_START<\/a><\/code><\/td> <td class=\"colLast\"><code>\"facet.range.start\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.FacetParams.FACET_SORT\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/FacetParams.html#FACET_SORT\">FACET_SORT<\/a><\/code><\/td> <td class=\"colLast\"><code>\"facet.sort\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.FacetParams.FACET_SORT_COUNT\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/FacetParams.html#FACET_SORT_COUNT\">FACET_SORT_COUNT<\/a><\/code><\/td> <td class=\"colLast\"><code>\"count\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.FacetParams.FACET_SORT_COUNT_LEGACY\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/FacetParams.html#FACET_SORT_COUNT_LEGACY\">FACET_SORT_COUNT_LEGACY<\/a><\/code><\/td> <td class=\"colLast\"><code>\"true\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.FacetParams.FACET_SORT_INDEX\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/FacetParams.html#FACET_SORT_INDEX\">FACET_SORT_INDEX<\/a><\/code><\/td> <td class=\"colLast\"><code>\"index\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.FacetParams.FACET_SORT_INDEX_LEGACY\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/FacetParams.html#FACET_SORT_INDEX_LEGACY\">FACET_SORT_INDEX_LEGACY<\/a><\/code><\/td> <td class=\"colLast\"><code>\"false\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.FacetParams.FACET_THREADS\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/FacetParams.html#FACET_THREADS\">FACET_THREADS<\/a><\/code><\/td> <td class=\"colLast\"><code>\"facet.threads\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.FacetParams.FACET_ZEROS\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/FacetParams.html#FACET_ZEROS\">FACET_ZEROS<\/a><\/code><\/td> <td class=\"colLast\"><code>\"facet.zeros\"<\/code><\/td> <\/tr> <\/tbody> <\/table> <\/li> <li class=\"blockList\"> <table border=\"0\" cellpadding=\"3\" cellspacing=\"0\" summary=\"Constant Field Values table, listing constant fields, and values\"> <caption><span>org.apache.solr.common.params.<a href=\"org\/apache\/solr\/common\/params\/GroupParams.html\" title=\"interface in org.apache.solr.common.params\">GroupParams<\/a><\/span><span class=\"tabEnd\"> <\/span><\/caption> <tr> <th class=\"colFirst\" scope=\"col\">Modifier and Type<\/th> <th scope=\"col\">Constant Field<\/th> <th class=\"colLast\" scope=\"col\">Value<\/th> <\/tr> <tbody> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.GroupParams.GROUP\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/GroupParams.html#GROUP\">GROUP<\/a><\/code><\/td> <td class=\"colLast\"><code>\"group\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.GroupParams.GROUP_CACHE_PERCENTAGE\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/GroupParams.html#GROUP_CACHE_PERCENTAGE\">GROUP_CACHE_PERCENTAGE<\/a><\/code><\/td> <td class=\"colLast\"><code>\"group.cache.percent\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.GroupParams.GROUP_DISTRIBUTED_FIRST\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/GroupParams.html#GROUP_DISTRIBUTED_FIRST\">GROUP_DISTRIBUTED_FIRST<\/a><\/code><\/td> <td class=\"colLast\"><code>\"group.distributed.first\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.GroupParams.GROUP_DISTRIBUTED_SECOND\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/GroupParams.html#GROUP_DISTRIBUTED_SECOND\">GROUP_DISTRIBUTED_SECOND<\/a><\/code><\/td> <td class=\"colLast\"><code>\"group.distributed.second\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.GroupParams.GROUP_DISTRIBUTED_TOPGROUPS_PREFIX\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/GroupParams.html#GROUP_DISTRIBUTED_TOPGROUPS_PREFIX\">GROUP_DISTRIBUTED_TOPGROUPS_PREFIX<\/a><\/code><\/td> <td class=\"colLast\"><code>\"group.topgroups.\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.GroupParams.GROUP_FACET\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/GroupParams.html#GROUP_FACET\">GROUP_FACET<\/a><\/code><\/td> <td class=\"colLast\"><code>\"group.facet\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.GroupParams.GROUP_FIELD\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/GroupParams.html#GROUP_FIELD\">GROUP_FIELD<\/a><\/code><\/td> <td class=\"colLast\"><code>\"group.field\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.GroupParams.GROUP_FORMAT\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/GroupParams.html#GROUP_FORMAT\">GROUP_FORMAT<\/a><\/code><\/td> <td class=\"colLast\"><code>\"group.format\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.GroupParams.GROUP_FUNC\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/GroupParams.html#GROUP_FUNC\">GROUP_FUNC<\/a><\/code><\/td> <td class=\"colLast\"><code>\"group.func\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.GroupParams.GROUP_LIMIT\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/GroupParams.html#GROUP_LIMIT\">GROUP_LIMIT<\/a><\/code><\/td> <td class=\"colLast\"><code>\"group.limit\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.GroupParams.GROUP_MAIN\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/GroupParams.html#GROUP_MAIN\">GROUP_MAIN<\/a><\/code><\/td> <td class=\"colLast\"><code>\"group.main\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.GroupParams.GROUP_OFFSET\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/GroupParams.html#GROUP_OFFSET\">GROUP_OFFSET<\/a><\/code><\/td> <td class=\"colLast\"><code>\"group.offset\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.GroupParams.GROUP_QUERY\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/GroupParams.html#GROUP_QUERY\">GROUP_QUERY<\/a><\/code><\/td> <td class=\"colLast\"><code>\"group.query\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.GroupParams.GROUP_SORT\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/GroupParams.html#GROUP_SORT\">GROUP_SORT<\/a><\/code><\/td> <td class=\"colLast\"><code>\"group.sort\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.GroupParams.GROUP_TOTAL_COUNT\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/GroupParams.html#GROUP_TOTAL_COUNT\">GROUP_TOTAL_COUNT<\/a><\/code><\/td> <td class=\"colLast\"><code>\"group.ngroups\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.GroupParams.GROUP_TRUNCATE\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/GroupParams.html#GROUP_TRUNCATE\">GROUP_TRUNCATE<\/a><\/code><\/td> <td class=\"colLast\"><code>\"group.truncate\"<\/code><\/td> <\/tr> <\/tbody> <\/table> <\/li> <li class=\"blockList\"> <table border=\"0\" cellpadding=\"3\" cellspacing=\"0\" summary=\"Constant Field Values table, listing constant fields, and values\"> <caption><span>org.apache.solr.common.params.<a href=\"org\/apache\/solr\/common\/params\/HighlightParams.html\" title=\"interface in org.apache.solr.common.params\">HighlightParams<\/a><\/span><span class=\"tabEnd\"> <\/span><\/caption> <tr> <th class=\"colFirst\" scope=\"col\">Modifier and Type<\/th> <th scope=\"col\">Constant Field<\/th> <th class=\"colLast\" scope=\"col\">Value<\/th> <\/tr> <tbody> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.HighlightParams.ALTERNATE_FIELD\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/HighlightParams.html#ALTERNATE_FIELD\">ALTERNATE_FIELD<\/a><\/code><\/td> <td class=\"colLast\"><code>\"hl.alternateField\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.HighlightParams.ALTERNATE_FIELD_LENGTH\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/HighlightParams.html#ALTERNATE_FIELD_LENGTH\">ALTERNATE_FIELD_LENGTH<\/a><\/code><\/td> <td class=\"colLast\"><code>\"hl.maxAlternateFieldLength\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.HighlightParams.BOUNDARY_SCANNER\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/HighlightParams.html#BOUNDARY_SCANNER\">BOUNDARY_SCANNER<\/a><\/code><\/td> <td class=\"colLast\"><code>\"hl.boundaryScanner\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.HighlightParams.BS_CHARS\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/HighlightParams.html#BS_CHARS\">BS_CHARS<\/a><\/code><\/td> <td class=\"colLast\"><code>\"hl.bs.chars\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.HighlightParams.BS_COUNTRY\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/HighlightParams.html#BS_COUNTRY\">BS_COUNTRY<\/a><\/code><\/td> <td class=\"colLast\"><code>\"hl.bs.country\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.HighlightParams.BS_LANGUAGE\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/HighlightParams.html#BS_LANGUAGE\">BS_LANGUAGE<\/a><\/code><\/td> <td class=\"colLast\"><code>\"hl.bs.language\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.HighlightParams.BS_MAX_SCAN\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/HighlightParams.html#BS_MAX_SCAN\">BS_MAX_SCAN<\/a><\/code><\/td> <td class=\"colLast\"><code>\"hl.bs.maxScan\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.HighlightParams.BS_TYPE\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/HighlightParams.html#BS_TYPE\">BS_TYPE<\/a><\/code><\/td> <td class=\"colLast\"><code>\"hl.bs.type\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.HighlightParams.BS_VARIANT\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/HighlightParams.html#BS_VARIANT\">BS_VARIANT<\/a><\/code><\/td> <td class=\"colLast\"><code>\"hl.bs.variant\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.HighlightParams.DEFAULT_SUMMARY\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/HighlightParams.html#DEFAULT_SUMMARY\">DEFAULT_SUMMARY<\/a><\/code><\/td> <td class=\"colLast\"><code>\"hl.defaultSummary\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.HighlightParams.ENCODER\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/HighlightParams.html#ENCODER\">ENCODER<\/a><\/code><\/td> <td class=\"colLast\"><code>\"hl.encoder\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.HighlightParams.FIELD_MATCH\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/HighlightParams.html#FIELD_MATCH\">FIELD_MATCH<\/a><\/code><\/td> <td class=\"colLast\"><code>\"hl.requireFieldMatch\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.HighlightParams.FIELDS\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/HighlightParams.html#FIELDS\">FIELDS<\/a><\/code><\/td> <td class=\"colLast\"><code>\"hl.fl\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.HighlightParams.FORMATTER\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/HighlightParams.html#FORMATTER\">FORMATTER<\/a><\/code><\/td> <td class=\"colLast\"><code>\"hl.formatter\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.HighlightParams.FRAG_LIST_BUILDER\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/HighlightParams.html#FRAG_LIST_BUILDER\">FRAG_LIST_BUILDER<\/a><\/code><\/td> <td class=\"colLast\"><code>\"hl.fragListBuilder\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.HighlightParams.FRAGMENTER\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/HighlightParams.html#FRAGMENTER\">FRAGMENTER<\/a><\/code><\/td> <td class=\"colLast\"><code>\"hl.fragmenter\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.HighlightParams.FRAGMENTS_BUILDER\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/HighlightParams.html#FRAGMENTS_BUILDER\">FRAGMENTS_BUILDER<\/a><\/code><\/td> <td class=\"colLast\"><code>\"hl.fragmentsBuilder\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.HighlightParams.FRAGSIZE\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/HighlightParams.html#FRAGSIZE\">FRAGSIZE<\/a><\/code><\/td> <td class=\"colLast\"><code>\"hl.fragsize\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.HighlightParams.HIGHLIGHT\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/HighlightParams.html#HIGHLIGHT\">HIGHLIGHT<\/a><\/code><\/td> <td class=\"colLast\"><code>\"hl\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.HighlightParams.HIGHLIGHT_MULTI_TERM\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/HighlightParams.html#HIGHLIGHT_MULTI_TERM\">HIGHLIGHT_MULTI_TERM<\/a><\/code><\/td> <td class=\"colLast\"><code>\"hl.highlightMultiTerm\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.HighlightParams.INCREMENT\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/HighlightParams.html#INCREMENT\">INCREMENT<\/a><\/code><\/td> <td class=\"colLast\"><code>\"hl.increment\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.HighlightParams.MAX_CHARS\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/HighlightParams.html#MAX_CHARS\">MAX_CHARS<\/a><\/code><\/td> <td class=\"colLast\"><code>\"hl.maxAnalyzedChars\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.HighlightParams.MAX_MULTIVALUED_TO_EXAMINE\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/HighlightParams.html#MAX_MULTIVALUED_TO_EXAMINE\">MAX_MULTIVALUED_TO_EXAMINE<\/a><\/code><\/td> <td class=\"colLast\"><code>\"hl.maxMultiValuedToExamine\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.HighlightParams.MAX_MULTIVALUED_TO_MATCH\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/HighlightParams.html#MAX_MULTIVALUED_TO_MATCH\">MAX_MULTIVALUED_TO_MATCH<\/a><\/code><\/td> <td class=\"colLast\"><code>\"hl.maxMultiValuedToMatch\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.HighlightParams.MAX_RE_CHARS\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/HighlightParams.html#MAX_RE_CHARS\">MAX_RE_CHARS<\/a><\/code><\/td> <td class=\"colLast\"><code>\"hl.regex.maxAnalyzedChars\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.HighlightParams.MERGE_CONTIGUOUS_FRAGMENTS\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/HighlightParams.html#MERGE_CONTIGUOUS_FRAGMENTS\">MERGE_CONTIGUOUS_FRAGMENTS<\/a><\/code><\/td> <td class=\"colLast\"><code>\"hl.mergeContiguous\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.HighlightParams.MULTI_VALUED_SEPARATOR\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/HighlightParams.html#MULTI_VALUED_SEPARATOR\">MULTI_VALUED_SEPARATOR<\/a><\/code><\/td> <td class=\"colLast\"><code>\"hl.multiValuedSeparatorChar\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.HighlightParams.PATTERN\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/HighlightParams.html#PATTERN\">PATTERN<\/a><\/code><\/td> <td class=\"colLast\"><code>\"hl.regex.pattern\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.HighlightParams.PHRASE_LIMIT\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/HighlightParams.html#PHRASE_LIMIT\">PHRASE_LIMIT<\/a><\/code><\/td> <td class=\"colLast\"><code>\"hl.phraseLimit\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.HighlightParams.PRESERVE_MULTI\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/HighlightParams.html#PRESERVE_MULTI\">PRESERVE_MULTI<\/a><\/code><\/td> <td class=\"colLast\"><code>\"hl.preserveMulti\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.HighlightParams.Q\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/HighlightParams.html#Q\">Q<\/a><\/code><\/td> <td class=\"colLast\"><code>\"hl.q\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.HighlightParams.QPARSER\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/HighlightParams.html#QPARSER\">QPARSER<\/a><\/code><\/td> <td class=\"colLast\"><code>\"hl.qparser\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.HighlightParams.REGEX\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/HighlightParams.html#REGEX\">REGEX<\/a><\/code><\/td> <td class=\"colLast\"><code>\"regex\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.HighlightParams.SCORE\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/HighlightParams.html#SCORE\">SCORE<\/a><\/code><\/td> <td class=\"colLast\"><code>\"score\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.HighlightParams.SCORE_B\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/HighlightParams.html#SCORE_B\">SCORE_B<\/a><\/code><\/td> <td class=\"colLast\"><code>\"hl.score.b\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.HighlightParams.SCORE_K1\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/HighlightParams.html#SCORE_K1\">SCORE_K1<\/a><\/code><\/td> <td class=\"colLast\"><code>\"hl.score.k1\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.HighlightParams.SCORE_PIVOT\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/HighlightParams.html#SCORE_PIVOT\">SCORE_PIVOT<\/a><\/code><\/td> <td class=\"colLast\"><code>\"hl.score.pivot\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.HighlightParams.SIMPLE\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/HighlightParams.html#SIMPLE\">SIMPLE<\/a><\/code><\/td> <td class=\"colLast\"><code>\"simple\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.HighlightParams.SIMPLE_POST\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/HighlightParams.html#SIMPLE_POST\">SIMPLE_POST<\/a><\/code><\/td> <td class=\"colLast\"><code>\"hl.simple.post\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.HighlightParams.SIMPLE_PRE\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/HighlightParams.html#SIMPLE_PRE\">SIMPLE_PRE<\/a><\/code><\/td> <td class=\"colLast\"><code>\"hl.simple.pre\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.HighlightParams.SLOP\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/HighlightParams.html#SLOP\">SLOP<\/a><\/code><\/td> <td class=\"colLast\"><code>\"hl.regex.slop\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.HighlightParams.SNIPPETS\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/HighlightParams.html#SNIPPETS\">SNIPPETS<\/a><\/code><\/td> <td class=\"colLast\"><code>\"hl.snippets\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.HighlightParams.TAG_ELLIPSIS\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/HighlightParams.html#TAG_ELLIPSIS\">TAG_ELLIPSIS<\/a><\/code><\/td> <td class=\"colLast\"><code>\"hl.tag.ellipsis\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.HighlightParams.TAG_POST\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/HighlightParams.html#TAG_POST\">TAG_POST<\/a><\/code><\/td> <td class=\"colLast\"><code>\"hl.tag.post\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.HighlightParams.TAG_PRE\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/HighlightParams.html#TAG_PRE\">TAG_PRE<\/a><\/code><\/td> <td class=\"colLast\"><code>\"hl.tag.pre\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.HighlightParams.USE_FVH\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/HighlightParams.html#USE_FVH\">USE_FVH<\/a><\/code><\/td> <td class=\"colLast\"><code>\"hl.useFastVectorHighlighter\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.HighlightParams.USE_PHRASE_HIGHLIGHTER\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/HighlightParams.html#USE_PHRASE_HIGHLIGHTER\">USE_PHRASE_HIGHLIGHTER<\/a><\/code><\/td> <td class=\"colLast\"><code>\"hl.usePhraseHighlighter\"<\/code><\/td> <\/tr> <\/tbody> <\/table> <\/li> <li class=\"blockList\"> <table border=\"0\" cellpadding=\"3\" cellspacing=\"0\" summary=\"Constant Field Values table, listing constant fields, and values\"> <caption><span>org.apache.solr.common.params.<a href=\"org\/apache\/solr\/common\/params\/MoreLikeThisParams.html\" title=\"interface in org.apache.solr.common.params\">MoreLikeThisParams<\/a><\/span><span class=\"tabEnd\"> <\/span><\/caption> <tr> <th class=\"colFirst\" scope=\"col\">Modifier and Type<\/th> <th scope=\"col\">Constant Field<\/th> <th class=\"colLast\" scope=\"col\">Value<\/th> <\/tr> <tbody> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.MoreLikeThisParams.BOOST\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/MoreLikeThisParams.html#BOOST\">BOOST<\/a><\/code><\/td> <td class=\"colLast\"><code>\"mlt.boost\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.MoreLikeThisParams.DOC_COUNT\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/MoreLikeThisParams.html#DOC_COUNT\">DOC_COUNT<\/a><\/code><\/td> <td class=\"colLast\"><code>\"mlt.count\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.MoreLikeThisParams.INTERESTING_TERMS\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/MoreLikeThisParams.html#INTERESTING_TERMS\">INTERESTING_TERMS<\/a><\/code><\/td> <td class=\"colLast\"><code>\"mlt.interestingTerms\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.MoreLikeThisParams.MATCH_INCLUDE\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/MoreLikeThisParams.html#MATCH_INCLUDE\">MATCH_INCLUDE<\/a><\/code><\/td> <td class=\"colLast\"><code>\"mlt.match.include\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.MoreLikeThisParams.MATCH_OFFSET\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/MoreLikeThisParams.html#MATCH_OFFSET\">MATCH_OFFSET<\/a><\/code><\/td> <td class=\"colLast\"><code>\"mlt.match.offset\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.MoreLikeThisParams.MAX_DOC_FREQ\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/MoreLikeThisParams.html#MAX_DOC_FREQ\">MAX_DOC_FREQ<\/a><\/code><\/td> <td class=\"colLast\"><code>\"mlt.maxdf\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.MoreLikeThisParams.MAX_NUM_TOKENS_PARSED\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/MoreLikeThisParams.html#MAX_NUM_TOKENS_PARSED\">MAX_NUM_TOKENS_PARSED<\/a><\/code><\/td> <td class=\"colLast\"><code>\"mlt.maxntp\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.MoreLikeThisParams.MAX_QUERY_TERMS\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/MoreLikeThisParams.html#MAX_QUERY_TERMS\">MAX_QUERY_TERMS<\/a><\/code><\/td> <td class=\"colLast\"><code>\"mlt.maxqt\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.MoreLikeThisParams.MAX_WORD_LEN\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/MoreLikeThisParams.html#MAX_WORD_LEN\">MAX_WORD_LEN<\/a><\/code><\/td> <td class=\"colLast\"><code>\"mlt.maxwl\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.MoreLikeThisParams.MIN_DOC_FREQ\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/MoreLikeThisParams.html#MIN_DOC_FREQ\">MIN_DOC_FREQ<\/a><\/code><\/td> <td class=\"colLast\"><code>\"mlt.mindf\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.MoreLikeThisParams.MIN_TERM_FREQ\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/MoreLikeThisParams.html#MIN_TERM_FREQ\">MIN_TERM_FREQ<\/a><\/code><\/td> <td class=\"colLast\"><code>\"mlt.mintf\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.MoreLikeThisParams.MIN_WORD_LEN\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/MoreLikeThisParams.html#MIN_WORD_LEN\">MIN_WORD_LEN<\/a><\/code><\/td> <td class=\"colLast\"><code>\"mlt.minwl\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.MoreLikeThisParams.MLT\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/MoreLikeThisParams.html#MLT\">MLT<\/a><\/code><\/td> <td class=\"colLast\"><code>\"mlt\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.MoreLikeThisParams.PREFIX\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/MoreLikeThisParams.html#PREFIX\">PREFIX<\/a><\/code><\/td> <td class=\"colLast\"><code>\"mlt.\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.MoreLikeThisParams.QF\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/MoreLikeThisParams.html#QF\">QF<\/a><\/code><\/td> <td class=\"colLast\"><code>\"mlt.qf\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.MoreLikeThisParams.SIMILARITY_FIELDS\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/MoreLikeThisParams.html#SIMILARITY_FIELDS\">SIMILARITY_FIELDS<\/a><\/code><\/td> <td class=\"colLast\"><code>\"mlt.fl\"<\/code><\/td> <\/tr> <\/tbody> <\/table> <\/li> <li class=\"blockList\"> <table border=\"0\" cellpadding=\"3\" cellspacing=\"0\" summary=\"Constant Field Values table, listing constant fields, and values\"> <caption><span>org.apache.solr.common.params.<a href=\"org\/apache\/solr\/common\/params\/QueryElevationParams.html\" title=\"interface in org.apache.solr.common.params\">QueryElevationParams<\/a><\/span><span class=\"tabEnd\"> <\/span><\/caption> <tr> <th class=\"colFirst\" scope=\"col\">Modifier and Type<\/th> <th scope=\"col\">Constant Field<\/th> <th class=\"colLast\" scope=\"col\">Value<\/th> <\/tr> <tbody> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.QueryElevationParams.EDITORIAL_MARKER_FIELD_NAME\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/QueryElevationParams.html#EDITORIAL_MARKER_FIELD_NAME\">EDITORIAL_MARKER_FIELD_NAME<\/a><\/code><\/td> <td class=\"colLast\"><code>\"editorialMarkerFieldName\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.QueryElevationParams.ENABLE\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/QueryElevationParams.html#ENABLE\">ENABLE<\/a><\/code><\/td> <td class=\"colLast\"><code>\"enableElevation\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.QueryElevationParams.EXCLUDE\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/QueryElevationParams.html#EXCLUDE\">EXCLUDE<\/a><\/code><\/td> <td class=\"colLast\"><code>\"excludeIds\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.QueryElevationParams.EXCLUDE_MARKER_FIELD_NAME\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/QueryElevationParams.html#EXCLUDE_MARKER_FIELD_NAME\">EXCLUDE_MARKER_FIELD_NAME<\/a><\/code><\/td> <td class=\"colLast\"><code>\"excludeMarkerFieldName\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.QueryElevationParams.EXCLUSIVE\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/QueryElevationParams.html#EXCLUSIVE\">EXCLUSIVE<\/a><\/code><\/td> <td class=\"colLast\"><code>\"exclusive\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.QueryElevationParams.FORCE_ELEVATION\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/QueryElevationParams.html#FORCE_ELEVATION\">FORCE_ELEVATION<\/a><\/code><\/td> <td class=\"colLast\"><code>\"forceElevation\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.QueryElevationParams.IDS\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/QueryElevationParams.html#IDS\">IDS<\/a><\/code><\/td> <td class=\"colLast\"><code>\"elevateIds\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.QueryElevationParams.MARK_EXCLUDES\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/QueryElevationParams.html#MARK_EXCLUDES\">MARK_EXCLUDES<\/a><\/code><\/td> <td class=\"colLast\"><code>\"markExcludes\"<\/code><\/td> <\/tr> <\/tbody> <\/table> <\/li> <li class=\"blockList\"> <table border=\"0\" cellpadding=\"3\" cellspacing=\"0\" summary=\"Constant Field Values table, listing constant fields, and values\"> <caption><span>org.apache.solr.common.params.<a href=\"org\/apache\/solr\/common\/params\/ShardParams.html\" title=\"interface in org.apache.solr.common.params\">ShardParams<\/a><\/span><span class=\"tabEnd\"> <\/span><\/caption> <tr> <th class=\"colFirst\" scope=\"col\">Modifier and Type<\/th> <th scope=\"col\">Constant Field<\/th> <th class=\"colLast\" scope=\"col\">Value<\/th> <\/tr> <tbody> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.ShardParams._ROUTE_\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/ShardParams.html#_ROUTE_\">_ROUTE_<\/a><\/code><\/td> <td class=\"colLast\"><code>\"_route_\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.ShardParams.DISTRIB_SINGLE_PASS\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/ShardParams.html#DISTRIB_SINGLE_PASS\">DISTRIB_SINGLE_PASS<\/a><\/code><\/td> <td class=\"colLast\"><code>\"distrib.singlePass\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.ShardParams.IDS\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/ShardParams.html#IDS\">IDS<\/a><\/code><\/td> <td class=\"colLast\"><code>\"ids\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.ShardParams.IS_SHARD\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/ShardParams.html#IS_SHARD\">IS_SHARD<\/a><\/code><\/td> <td class=\"colLast\"><code>\"isShard\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.ShardParams.SHARD_KEYS\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/ShardParams.html#SHARD_KEYS\">SHARD_KEYS<\/a><\/code><\/td> <td class=\"colLast\"><code>\"shard.keys\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.ShardParams.SHARD_URL\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/ShardParams.html#SHARD_URL\">SHARD_URL<\/a><\/code><\/td> <td class=\"colLast\"><code>\"shard.url\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.ShardParams.SHARDS\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/ShardParams.html#SHARDS\">SHARDS<\/a><\/code><\/td> <td class=\"colLast\"><code>\"shards\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.ShardParams.SHARDS_INFO\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/ShardParams.html#SHARDS_INFO\">SHARDS_INFO<\/a><\/code><\/td> <td class=\"colLast\"><code>\"shards.info\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.ShardParams.SHARDS_QT\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/ShardParams.html#SHARDS_QT\">SHARDS_QT<\/a><\/code><\/td> <td class=\"colLast\"><code>\"shards.qt\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.ShardParams.SHARDS_ROWS\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/ShardParams.html#SHARDS_ROWS\">SHARDS_ROWS<\/a><\/code><\/td> <td class=\"colLast\"><code>\"shards.rows\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.ShardParams.SHARDS_START\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/ShardParams.html#SHARDS_START\">SHARDS_START<\/a><\/code><\/td> <td class=\"colLast\"><code>\"shards.start\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.ShardParams.SHARDS_TOLERANT\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/ShardParams.html#SHARDS_TOLERANT\">SHARDS_TOLERANT<\/a><\/code><\/td> <td class=\"colLast\"><code>\"shards.tolerant\"<\/code><\/td> <\/tr> <\/tbody> <\/table> <\/li> <li class=\"blockList\"> <table border=\"0\" cellpadding=\"3\" cellspacing=\"0\" summary=\"Constant Field Values table, listing constant fields, and values\"> <caption><span>org.apache.solr.common.params.<a href=\"org\/apache\/solr\/common\/params\/SimpleParams.html\" title=\"interface in org.apache.solr.common.params\">SimpleParams<\/a><\/span><span class=\"tabEnd\"> <\/span><\/caption> <tr> <th class=\"colFirst\" scope=\"col\">Modifier and Type<\/th> <th scope=\"col\">Constant Field<\/th> <th class=\"colLast\" scope=\"col\">Value<\/th> <\/tr> <tbody> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.SimpleParams.AND_OPERATOR\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/SimpleParams.html#AND_OPERATOR\">AND_OPERATOR<\/a><\/code><\/td> <td class=\"colLast\"><code>\"AND\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.SimpleParams.ESCAPE_OPERATOR\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/SimpleParams.html#ESCAPE_OPERATOR\">ESCAPE_OPERATOR<\/a><\/code><\/td> <td class=\"colLast\"><code>\"ESCAPE\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.SimpleParams.FUZZY_OPERATOR\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/SimpleParams.html#FUZZY_OPERATOR\">FUZZY_OPERATOR<\/a><\/code><\/td> <td class=\"colLast\"><code>\"FUZZY\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.SimpleParams.NEAR_OPERATOR\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/SimpleParams.html#NEAR_OPERATOR\">NEAR_OPERATOR<\/a><\/code><\/td> <td class=\"colLast\"><code>\"NEAR\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.SimpleParams.NOT_OPERATOR\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/SimpleParams.html#NOT_OPERATOR\">NOT_OPERATOR<\/a><\/code><\/td> <td class=\"colLast\"><code>\"NOT\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.SimpleParams.OR_OPERATOR\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/SimpleParams.html#OR_OPERATOR\">OR_OPERATOR<\/a><\/code><\/td> <td class=\"colLast\"><code>\"OR\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.SimpleParams.PHRASE_OPERATOR\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/SimpleParams.html#PHRASE_OPERATOR\">PHRASE_OPERATOR<\/a><\/code><\/td> <td class=\"colLast\"><code>\"PHRASE\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.SimpleParams.PRECEDENCE_OPERATORS\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/SimpleParams.html#PRECEDENCE_OPERATORS\">PRECEDENCE_OPERATORS<\/a><\/code><\/td> <td class=\"colLast\"><code>\"PRECEDENCE\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.SimpleParams.PREFIX_OPERATOR\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/SimpleParams.html#PREFIX_OPERATOR\">PREFIX_OPERATOR<\/a><\/code><\/td> <td class=\"colLast\"><code>\"PREFIX\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.SimpleParams.QF\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/SimpleParams.html#QF\">QF<\/a><\/code><\/td> <td class=\"colLast\"><code>\"qf\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.SimpleParams.QO\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/SimpleParams.html#QO\">QO<\/a><\/code><\/td> <td class=\"colLast\"><code>\"q.operators\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.SimpleParams.WHITESPACE_OPERATOR\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/SimpleParams.html#WHITESPACE_OPERATOR\">WHITESPACE_OPERATOR<\/a><\/code><\/td> <td class=\"colLast\"><code>\"WHITESPACE\"<\/code><\/td> <\/tr> <\/tbody> <\/table> <\/li> <li class=\"blockList\"> <table border=\"0\" cellpadding=\"3\" cellspacing=\"0\" summary=\"Constant Field Values table, listing constant fields, and values\"> <caption><span>org.apache.solr.common.params.<a href=\"org\/apache\/solr\/common\/params\/SpatialParams.html\" title=\"interface in org.apache.solr.common.params\">SpatialParams<\/a><\/span><span class=\"tabEnd\"> <\/span><\/caption> <tr> <th class=\"colFirst\" scope=\"col\">Modifier and Type<\/th> <th scope=\"col\">Constant Field<\/th> <th class=\"colLast\" scope=\"col\">Value<\/th> <\/tr> <tbody> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.SpatialParams.DISTANCE\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/SpatialParams.html#DISTANCE\">DISTANCE<\/a><\/code><\/td> <td class=\"colLast\"><code>\"d\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.SpatialParams.FIELD\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/SpatialParams.html#FIELD\">FIELD<\/a><\/code><\/td> <td class=\"colLast\"><code>\"sfield\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.SpatialParams.MEASURE\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/SpatialParams.html#MEASURE\">MEASURE<\/a><\/code><\/td> <td class=\"colLast\"><code>\"meas\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.SpatialParams.POINT\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/SpatialParams.html#POINT\">POINT<\/a><\/code><\/td> <td class=\"colLast\"><code>\"pt\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.SpatialParams.SPHERE_RADIUS\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/SpatialParams.html#SPHERE_RADIUS\">SPHERE_RADIUS<\/a><\/code><\/td> <td class=\"colLast\"><code>\"sphere_radius\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.SpatialParams.UNITS\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/SpatialParams.html#UNITS\">UNITS<\/a><\/code><\/td> <td class=\"colLast\"><code>\"units\"<\/code><\/td> <\/tr> <\/tbody> <\/table> <\/li> <li class=\"blockList\"> <table border=\"0\" cellpadding=\"3\" cellspacing=\"0\" summary=\"Constant Field Values table, listing constant fields, and values\"> <caption><span>org.apache.solr.common.params.<a href=\"org\/apache\/solr\/common\/params\/SpellingParams.html\" title=\"interface in org.apache.solr.common.params\">SpellingParams<\/a><\/span><span class=\"tabEnd\"> <\/span><\/caption> <tr> <th class=\"colFirst\" scope=\"col\">Modifier and Type<\/th> <th scope=\"col\">Constant Field<\/th> <th class=\"colLast\" scope=\"col\">Value<\/th> <\/tr> <tbody> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.SpellingParams.SPELLCHECK_ACCURACY\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/SpellingParams.html#SPELLCHECK_ACCURACY\">SPELLCHECK_ACCURACY<\/a><\/code><\/td> <td class=\"colLast\"><code>\"spellcheck.accuracy\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.SpellingParams.SPELLCHECK_ALTERNATIVE_TERM_COUNT\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/SpellingParams.html#SPELLCHECK_ALTERNATIVE_TERM_COUNT\">SPELLCHECK_ALTERNATIVE_TERM_COUNT<\/a><\/code><\/td> <td class=\"colLast\"><code>\"spellcheck.alternativeTermCount\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.SpellingParams.SPELLCHECK_BUILD\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/SpellingParams.html#SPELLCHECK_BUILD\">SPELLCHECK_BUILD<\/a><\/code><\/td> <td class=\"colLast\"><code>\"spellcheck.build\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.SpellingParams.SPELLCHECK_COLLATE\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/SpellingParams.html#SPELLCHECK_COLLATE\">SPELLCHECK_COLLATE<\/a><\/code><\/td> <td class=\"colLast\"><code>\"spellcheck.collate\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.SpellingParams.SPELLCHECK_COLLATE_EXTENDED_RESULTS\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/SpellingParams.html#SPELLCHECK_COLLATE_EXTENDED_RESULTS\">SPELLCHECK_COLLATE_EXTENDED_RESULTS<\/a><\/code><\/td> <td class=\"colLast\"><code>\"spellcheck.collateExtendedResults\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.SpellingParams.SPELLCHECK_COLLATE_MAX_COLLECT_DOCS\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/SpellingParams.html#SPELLCHECK_COLLATE_MAX_COLLECT_DOCS\">SPELLCHECK_COLLATE_MAX_COLLECT_DOCS<\/a><\/code><\/td> <td class=\"colLast\"><code>\"spellcheck.collateMaxCollectDocs\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.SpellingParams.SPELLCHECK_COLLATE_PARAM_OVERRIDE\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/SpellingParams.html#SPELLCHECK_COLLATE_PARAM_OVERRIDE\">SPELLCHECK_COLLATE_PARAM_OVERRIDE<\/a><\/code><\/td> <td class=\"colLast\"><code>\"spellcheck.collateParam.\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.SpellingParams.SPELLCHECK_COUNT\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/SpellingParams.html#SPELLCHECK_COUNT\">SPELLCHECK_COUNT<\/a><\/code><\/td> <td class=\"colLast\"><code>\"spellcheck.count\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.SpellingParams.SPELLCHECK_DICT\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/SpellingParams.html#SPELLCHECK_DICT\">SPELLCHECK_DICT<\/a><\/code><\/td> <td class=\"colLast\"><code>\"spellcheck.dictionary\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.SpellingParams.SPELLCHECK_EXTENDED_RESULTS\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/SpellingParams.html#SPELLCHECK_EXTENDED_RESULTS\">SPELLCHECK_EXTENDED_RESULTS<\/a><\/code><\/td> <td class=\"colLast\"><code>\"spellcheck.extendedResults\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.SpellingParams.SPELLCHECK_MAX_COLLATION_EVALUATIONS\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/SpellingParams.html#SPELLCHECK_MAX_COLLATION_EVALUATIONS\">SPELLCHECK_MAX_COLLATION_EVALUATIONS<\/a><\/code><\/td> <td class=\"colLast\"><code>\"spellcheck.maxCollationEvaluations\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.SpellingParams.SPELLCHECK_MAX_COLLATION_TRIES\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/SpellingParams.html#SPELLCHECK_MAX_COLLATION_TRIES\">SPELLCHECK_MAX_COLLATION_TRIES<\/a><\/code><\/td> <td class=\"colLast\"><code>\"spellcheck.maxCollationTries\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.SpellingParams.SPELLCHECK_MAX_COLLATIONS\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/SpellingParams.html#SPELLCHECK_MAX_COLLATIONS\">SPELLCHECK_MAX_COLLATIONS<\/a><\/code><\/td> <td class=\"colLast\"><code>\"spellcheck.maxCollations\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.SpellingParams.SPELLCHECK_MAX_RESULTS_FOR_SUGGEST\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/SpellingParams.html#SPELLCHECK_MAX_RESULTS_FOR_SUGGEST\">SPELLCHECK_MAX_RESULTS_FOR_SUGGEST<\/a><\/code><\/td> <td class=\"colLast\"><code>\"spellcheck.maxResultsForSuggest\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.SpellingParams.SPELLCHECK_ONLY_MORE_POPULAR\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/SpellingParams.html#SPELLCHECK_ONLY_MORE_POPULAR\">SPELLCHECK_ONLY_MORE_POPULAR<\/a><\/code><\/td> <td class=\"colLast\"><code>\"spellcheck.onlyMorePopular\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.SpellingParams.SPELLCHECK_PREFIX\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/SpellingParams.html#SPELLCHECK_PREFIX\">SPELLCHECK_PREFIX<\/a><\/code><\/td> <td class=\"colLast\"><code>\"spellcheck.\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.SpellingParams.SPELLCHECK_Q\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/SpellingParams.html#SPELLCHECK_Q\">SPELLCHECK_Q<\/a><\/code><\/td> <td class=\"colLast\"><code>\"spellcheck.q\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.SpellingParams.SPELLCHECK_RELOAD\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/SpellingParams.html#SPELLCHECK_RELOAD\">SPELLCHECK_RELOAD<\/a><\/code><\/td> <td class=\"colLast\"><code>\"spellcheck.reload\"<\/code><\/td> <\/tr> <\/tbody> <\/table> <\/li> <li class=\"blockList\"> <table border=\"0\" cellpadding=\"3\" cellspacing=\"0\" summary=\"Constant Field Values table, listing constant fields, and values\"> <caption><span>org.apache.solr.common.params.<a href=\"org\/apache\/solr\/common\/params\/StatsParams.html\" title=\"interface in org.apache.solr.common.params\">StatsParams<\/a><\/span><span class=\"tabEnd\"> <\/span><\/caption> <tr> <th class=\"colFirst\" scope=\"col\">Modifier and Type<\/th> <th scope=\"col\">Constant Field<\/th> <th class=\"colLast\" scope=\"col\">Value<\/th> <\/tr> <tbody> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.StatsParams.STATS\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/StatsParams.html#STATS\">STATS<\/a><\/code><\/td> <td class=\"colLast\"><code>\"stats\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.StatsParams.STATS_CALC_DISTINCT\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/StatsParams.html#STATS_CALC_DISTINCT\">STATS_CALC_DISTINCT<\/a><\/code><\/td> <td class=\"colLast\"><code>\"stats.calcdistinct\"<\/code><\/td> <\/tr> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.StatsParams.STATS_FACET\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/StatsParams.html#STATS_FACET\">STATS_FACET<\/a><\/code><\/td> <td class=\"colLast\"><code>\"stats.facet\"<\/code><\/td> <\/tr> <tr class=\"rowColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.StatsParams.STATS_FIELD\"> <!-- --> <\/a><code>public static final <a href=\"http:\/\/download.oracle.com\/javase\/7\/docs\/api\/java\/lang\/String.html?is-external=true\" title=\"class or interface in java.lang\">String<\/a><\/code><\/td> <td><code><a href=\"org\/apache\/solr\/common\/params\/StatsParams.html#STATS_FIELD\">STATS_FIELD<\/a><\/code><\/td> <td class=\"colLast\"><code>\"stats.field\"<\/code><\/td> <\/tr> <\/tbody> <\/table> <\/li> <li class=\"blockList\"> <table border=\"0\" cellpadding=\"3\" cellspacing=\"0\" summary=\"Constant Field Values table, listing constant fields, and values\"> <caption><span>org.apache.solr.common.params.<a href=\"org\/apache\/solr\/common\/params\/TermsParams.html\" title=\"interface in org.apache.solr.common.params\">TermsParams<\/a><\/span><span class=\"tabEnd\"> <\/span><\/caption> <tr> <th class=\"colFirst\" scope=\"col\">Modifier and Type<\/th> <th scope=\"col\">Constant Field<\/th> <th class=\"colLast\" scope=\"col\">Value<\/th> <\/tr> <tbody> <tr class=\"altColor\"> <td class=\"colFirst\"><a name=\"org.apache.solr.common.params.TermsParams.TERMS\"> <!-- -->"} +{"id":"RedPajamaGithub.0001","text":"from __future__ import absolute_import import collections import weakref from .i18n import _ from .node import ( hex, nullrev, ) from . import ( bookmarks as bookmod, bundle2, bundlecaches, changegroup, discovery, error, exchangev2, lock as lockmod, logexchange, narrowspec, obsolete, obsutil, phases, pushkey, pycompat, requirements, scmutil, streamclone, url as urlmod, util, wireprototypes, ) from .utils import ( hashutil, stringutil, urlutil, ) from .interfaces import repository urlerr = util.urlerr urlreq = util.urlreq _NARROWACL_SECTION = b'narrowacl' def readbundle(ui, fh, fname, vfs=None): header = changegroup.readexactly(fh, 4) alg = None if not fname: fname = b\"stream\" if not header.startswith(b'HG') and header.startswith(b'\\0'): fh = changegroup.headerlessfixup(fh, header) header = b\"HG10\" alg = b'UN' elif vfs: fname = vfs.join(fname) magic, version = header[0:2], header[2:4] if magic != b'HG': raise error.Abort(_(b'%s: not a Mercurial bundle') % fname) if version == b'10': if alg is None: alg = changegroup.readexactly(fh, 2) return changegroup.cg1unpacker(fh, alg) elif version.startswith(b'2'): return bundle2.getunbundler(ui, fh, magicstring=magic + version) elif version == b'S1': return streamclone.streamcloneapplier(fh) else: raise error.Abort( _(b'%s: unknown bundle version %s') % (fname, version) ) def getbundlespec(ui, fh): \"\"\"Infer the bundlespec from a bundle file handle. The input file handle is seeked and the original seek position is not restored. \"\"\" def speccompression(alg): try: return util.compengines.forbundletype(alg).bundletype()[0] except KeyError: return None b = readbundle(ui, fh, None) if isinstance(b, changegroup.cg1unpacker): alg = b._type if alg == b'_truncatedBZ': alg = b'BZ' comp = speccompression(alg) if not comp: raise error.Abort(_(b'unknown compression algorithm: %s') % alg) return b'%s-v1' % comp elif isinstance(b, bundle2.unbundle20): if b'Compression' in b.params: comp = speccompression(b.params[b'Compression']) if not comp: raise error.Abort( _(b'unknown compression algorithm: %s') % comp ) else: comp = b'none' version = None for part in b.iterparts(): if part.type == b'changegroup': version = part.params[b'version'] if version in (b'01', b'02'): version = b'v2' else: raise error.Abort( _( b'changegroup version %s does not have ' b'a known bundlespec' ) % version, hint=_(b'try upgrading your Mercurial client'), ) elif part.type == b'stream2' and version is None: # A stream2 part requires to be part of a v2 bundle requirements = urlreq.unquote(part.params[b'requirements']) splitted = requirements.split() params = bundle2._formatrequirementsparams(splitted) return b'none-v2;stream=v2;%s' % params if not version: raise error.Abort( _(b'could not identify changegroup version in bundle') ) return b'%s-%s' % (comp, version) elif isinstance(b, streamclone.streamcloneapplier): requirements = streamclone.readbundle1header(fh)[2] formatted = bundle2._formatrequirementsparams(requirements) return b'none-packed1;%s' % formatted else: raise error.Abort(_(b'unknown bundle type: %s') % b) def _computeoutgoing(repo, heads, common): \"\"\"Computes which revs are outgoing given a set of common and a set of heads. This is a separate function so extensions can have access to the logic. Returns a discovery.outgoing object. \"\"\" cl = repo.changelog if common: hasnode = cl.hasnode common = [n for n in common if hasnode(n)] else: common = [repo.nullid] if not heads: heads = cl.heads() return discovery.outgoing(repo, common, heads) def _checkpublish(pushop): repo = pushop.repo ui = repo.ui behavior = ui.config(b'experimental', b'auto-publish') if pushop.publish or behavior not in (b'warn', b'confirm', b'abort'): return remotephases = listkeys(pushop.remote, b'phases') if not remotephases.get(b'publishing', False): return if pushop.revs is None: published = repo.filtered(b'served').revs(b'not public()') else: published = repo.revs(b'::%ln - public()', pushop.revs) # we want to use pushop.revs in the revset even if they themselves are # secret, but we don't want to have anything that the server won't see # in the result of this expression published &= repo.filtered(b'served') if published: if behavior == b'warn': ui.warn( _(b'%i changesets about to be published\\n') % len(published) ) elif behavior == b'confirm': if ui.promptchoice( _(b'push and publish %i changesets (yn)?$$ &Yes $$ &No') % len(published) ): raise error.CanceledError(_(b'user quit')) elif behavior == b'abort': msg = _(b'push would publish %i changesets') % len(published) hint = _( b\"use --publish or adjust 'experimental.auto-publish'\" b\" config\" ) raise error.Abort(msg, hint=hint) def _forcebundle1(op): \"\"\"return true if a pull\/push must use bundle1 This function is used to allow testing of the older bundle version\"\"\" ui = op.repo.ui # The goal is this config is to allow developer to choose the bundle # version used during exchanged. This is especially handy during test. # Value is a list of bundle version to be picked from, highest version # should be used. # # developer config: devel.legacy.exchange exchange = ui.configlist(b'devel', b'legacy.exchange') forcebundle1 = b'bundle2' not in exchange and b'bundle1' in exchange return forcebundle1 or not op.remote.capable(b'bundle2') class pushoperation(object): \"\"\"A object that represent a single push operation Its purpose is to carry push related state and very common operations. A new pushoperation should be created at the beginning of each push and discarded afterward. \"\"\" def __init__( self, repo, remote, force=False, revs=None, newbranch=False, bookmarks=(), publish=False, pushvars=None, ): # repo we push from self.repo = repo self.ui = repo.ui # repo we push to self.remote = remote # force option provided self.force = force # revs to be pushed (None is \"all\") self.revs = revs # bookmark explicitly pushed self.bookmarks = bookmarks # allow push of new branch self.newbranch = newbranch # step already performed # (used to check what steps have been already performed through bundle2) self.stepsdone = set() # Integer version of the changegroup push result # - None means nothing to push # - 0 means HTTP error # - 1 means we pushed and remote head count is unchanged *or* # we have outgoing changesets but refused to push # - other values as described by addchangegroup() self.cgresult = None # Boolean value for the bookmark push self.bkresult = None # discover.outgoing object (contains common and outgoing data) self.outgoing = None # all remote topological heads before the push self.remoteheads = None # Details of the remote branch pre and post push # # mapping: {'branch': ([remoteheads], # [newheads], # [unsyncedheads], # [discardedheads])} # - branch: the branch name # - remoteheads: the list of remote heads known locally # None if the branch is new # - newheads: the new remote heads (known locally) with outgoing pushed # - unsyncedheads: the list of remote heads unknown locally. # - discardedheads: the list of remote heads made obsolete by the push self.pushbranchmap = None # testable as a boolean indicating if any nodes are missing locally. self.incoming = None # summary of the remote phase situation self.remotephases = None # phases changes that must be pushed along side the changesets self.outdatedphases = None # phases changes that must be pushed if changeset push fails self.fallbackoutdatedphases = None # outgoing obsmarkers self.outobsmarkers = set() # outgoing bookmarks, list of (bm, oldnode | '', newnode | '') self.outbookmarks = [] # transaction manager self.trmanager = None # map { pushkey partid -> callback handling failure} # used to handle exception from mandatory pushkey part failure self.pkfailcb = {} # an iterable of pushvars or None self.pushvars = pushvars # publish pushed changesets self.publish = publish @util.propertycache def futureheads(self): \"\"\"future remote heads if the changeset push succeeds\"\"\" return self.outgoing.ancestorsof @util.propertycache def fallbackheads(self): \"\"\"future remote heads if the changeset push fails\"\"\" if self.revs is None: # not target to push, all common are relevant return self.outgoing.commonheads unfi = self.repo.unfiltered() # I want cheads = heads(::ancestorsof and ::commonheads) # (ancestorsof is revs with secret changeset filtered out) # # This can be expressed as: # cheads = ( (ancestorsof and ::commonheads) # + (commonheads and ::ancestorsof))\" # ) # # while trying to push we already computed the following: # common = (::commonheads) # missing = ((commonheads::ancestorsof) - commonheads) # # We can pick: # * ancestorsof part of common (::commonheads) common = self.outgoing.common rev = self.repo.changelog.index.rev cheads = [node for node in self.revs if rev(node) in common] # and # * commonheads parents on missing revset = unfi.set( b'%ln and parents(roots(%ln))', self.outgoing.commonheads, self.outgoing.missing, ) cheads.extend(c.node() for c in revset) return cheads @property def commonheads(self): \"\"\"set of all common heads after changeset bundle push\"\"\" if self.cgresult: return self.futureheads else: return self.fallbackheads # mapping of message used when pushing bookmark bookmsgmap = { b'update': ( _(b\"updating bookmark %s\\n\"), _(b'updating bookmark %s failed\\n'), ), b'export': ( _(b\"exporting bookmark %s\\n\"), _(b'exporting bookmark %s failed\\n'), ), b'delete': ( _(b\"deleting remote bookmark %s\\n\"), _(b'deleting remote bookmark %s failed\\n'), ), } def push( repo, remote, force=False, revs=None, newbranch=False, bookmarks=(), publish=False, opargs=None, ): \"\"\"Push outgoing changesets (limited by revs) from a local repository to remote. Return an integer: - None means nothing to push - 0 means HTTP error - 1 means we pushed and remote head count is unchanged *or* we have outgoing changesets but refused to push - other values as described by addchangegroup() \"\"\" if opargs is None: opargs = {} pushop = pushoperation( repo, remote, force, revs, newbranch, bookmarks, publish, **pycompat.strkwargs(opargs) ) if pushop.remote.local(): missing = ( set(pushop.repo.requirements) - pushop.remote.local().supported ) if missing: msg = _( b\"required features are not\" b\" supported in the destination:\" b\" %s\" ) % (b', '.join(sorted(missing))) raise error.Abort(msg) if not pushop.remote.canpush(): raise error.Abort(_(b\"destination does not support push\")) if not pushop.remote.capable(b'unbundle'): raise error.Abort( _( b'cannot push: destination does not support the ' b'unbundle wire protocol command' ) ) for category in sorted(bundle2.read_remote_wanted_sidedata(pushop.remote)): # Check that a computer is registered for that category for at least # one revlog kind. for kind, computers in repo._sidedata_computers.items(): if computers.get(category): break else: raise error.Abort( _( b'cannot push: required sidedata category not supported' b\" by this client: '%s'\" ) % pycompat.bytestr(category) ) # get lock as we might write phase data wlock = lock = None try: # bundle2 push may receive a reply bundle touching bookmarks # requiring the wlock. Take it now to ensure proper ordering. maypushback = pushop.ui.configbool(b'experimental', b'bundle2.pushback') if ( (not _forcebundle1(pushop)) and maypushback and not bookmod.bookmarksinstore(repo) ): wlock = pushop.repo.wlock() lock = pushop.repo.lock() pushop.trmanager = transactionmanager( pushop.repo, b'push-response', pushop.remote.url() ) except error.LockUnavailable as err: # source repo cannot be locked. # We do not abort the push, but just disable the local phase # synchronisation. msg = b'cannot lock source repository: %s\\n' % stringutil.forcebytestr( err ) pushop.ui.debug(msg) with wlock or util.nullcontextmanager(): with lock or util.nullcontextmanager(): with pushop.trmanager or util.nullcontextmanager(): pushop.repo.checkpush(pushop) _checkpublish(pushop) _pushdiscovery(pushop) if not pushop.force: _checksubrepostate(pushop) if not _forcebundle1(pushop): _pushbundle2(pushop) _pushchangeset(pushop) _pushsyncphase(pushop) _pushobsolete(pushop) _pushbookmark(pushop) if repo.ui.configbool(b'experimental', b'remotenames'): logexchange.pullremotenames(repo, remote) return pushop # list of steps to perform discovery before push pushdiscoveryorder = [] # Mapping between step name and function # # This exists to help extensions wrap steps if necessary pushdiscoverymapping = {} def pushdiscovery(stepname): \"\"\"decorator for function performing discovery before push The function is added to the step -> function mapping and appended to the list of steps. Beware that decorated function will be added in order (this may matter). You can only use this decorator for a new step, if you want to wrap a step from an extension, change the pushdiscovery dictionary directly.\"\"\" def dec(func): assert stepname not in pushdiscoverymapping pushdiscoverymapping[stepname] = func pushdiscoveryorder.append(stepname) return func return dec def _pushdiscovery(pushop): \"\"\"Run all discovery steps\"\"\" for stepname in pushdiscoveryorder: step = pushdiscoverymapping[stepname] step(pushop) def _checksubrepostate(pushop): \"\"\"Ensure all outgoing referenced subrepo revisions are present locally\"\"\" for n in pushop.outgoing.missing: ctx = pushop.repo[n] if b'.hgsub' in ctx.manifest() and b'.hgsubstate' in ctx.files(): for subpath in sorted(ctx.substate): sub = ctx.sub(subpath) sub.verify(onpush=True) @pushdiscovery(b'changeset') def _pushdiscoverychangeset(pushop): \"\"\"discover the changeset that need to be pushed\"\"\" fci = discovery.findcommonincoming if pushop.revs: commoninc = fci( pushop.repo, pushop.remote, force=pushop.force, ancestorsof=pushop.revs, ) else: commoninc = fci(pushop.repo, pushop.remote, force=pushop.force) common, inc, remoteheads = commoninc fco = discovery.findcommonoutgoing outgoing = fco( pushop.repo, pushop.remote, onlyheads=pushop.revs, commoninc=commoninc, force=pushop.force, ) pushop.outgoing = outgoing pushop.remoteheads = remoteheads pushop.incoming = inc @pushdiscovery(b'phase') def _pushdiscoveryphase(pushop): \"\"\"discover the phase that needs to be pushed (computed for both success and failure case for changesets push)\"\"\" outgoing = pushop.outgoing unfi = pushop.repo.unfiltered() remotephases = listkeys(pushop.remote, b'phases') if ( pushop.ui.configbool(b'ui', b'_usedassubrepo') and remotephases # server supports phases and not pushop.outgoing.missing # no changesets to be pushed and remotephases.get(b'publishing', False) ): # When: # - this is a subrepo push # - and remote support phase # - and no changeset are to be pushed # - and remote is publishing # We may be in issue 3781 case! # We drop the possible phase synchronisation done by # courtesy to publish changesets possibly locally draft # on the remote. pushop.outdatedphases = [] pushop.fallbackoutdatedphases = [] return pushop.remotephases = phases.remotephasessummary( pushop.repo, pushop.fallbackheads, remotephases ) droots = pushop.remotephases.draftroots extracond = b'' if not pushop.remotephases.publishing: extracond = b' and public()' revset = b'heads((%%ln::%%ln) %s)' % extracond # Get the list of all revs draft on remote by public here. # XXX Beware that revset break if droots is not strictly # XXX root we may want to ensure it is but it is costly fallback = list(unfi.set(revset, droots, pushop.fallbackheads)) if not pushop.remotephases.publishing and pushop.publish: future = list( unfi.set( b'%ln and (not public() or %ln::)', pushop.futureheads, droots ) ) elif not outgoing.missing: future = fallback else: # adds changeset we are going to push as draft # # should not be necessary for publishing server, but because of an # issue fixed in xxxxx we have to do it anyway. fdroots = list( unfi.set(b'roots(%ln + %ln::)', outgoing.missing, droots) ) fdroots = [f.node() for f in fdroots] future = list(unfi.set(revset, fdroots, pushop.futureheads)) pushop.outdatedphases = future pushop.fallbackoutdatedphases = fallback @pushdiscovery(b'obsmarker') def _pushdiscoveryobsmarkers(pushop): if not obsolete.isenabled(pushop.repo, obsolete.exchangeopt): return if not pushop.repo.obsstore: return if b'obsolete' not in listkeys(pushop.remote, b'namespaces'): return repo = pushop.repo # very naive computation, that can be quite expensive on big repo. # However: evolution is currently slow on them anyway. nodes = (c.node() for c in repo.set(b'::%ln', pushop.futureheads)) pushop.outobsmarkers = pushop.repo.obsstore.relevantmarkers(nodes) @pushdiscovery(b'bookmarks') def _pushdiscoverybookmarks(pushop): ui = pushop.ui repo = pushop.repo.unfiltered() remote = pushop.remote ui.debug(b\"checking for updated bookmarks\\n\") ancestors = () if pushop.revs: revnums = pycompat.maplist(repo.changelog.rev, pushop.revs) ancestors = repo.changelog.ancestors(revnums, inclusive=True) remotebookmark = bookmod.unhexlifybookmarks(listkeys(remote, b'bookmarks')) explicit = { repo._bookmarks.expandname(bookmark) for bookmark in pushop.bookmarks } comp = bookmod.comparebookmarks(repo, repo._bookmarks, remotebookmark) return _processcompared(pushop, ancestors, explicit, remotebookmark, comp) def _processcompared(pushop, pushed, explicit, remotebms, comp): \"\"\"take decision on bookmarks to push to the remote repo Exists to help extensions alter this behavior. \"\"\" addsrc, adddst, advsrc, advdst, diverge, differ, invalid, same = comp repo = pushop.repo for b, scid, dcid in advsrc: if b in explicit: explicit.remove(b) if not pushed or repo[scid].rev() in pushed: pushop.outbookmarks.append((b, dcid, scid)) # search added bookmark for b, scid, dcid in addsrc: if b in explicit: explicit.remove(b) if bookmod.isdivergent(b): pushop.ui.warn(_(b'cannot push divergent bookmark %s!\\n') % b) pushop.bkresult = 2 else: pushop.outbookmarks.append((b, b'', scid)) # search for overwritten bookmark for b, scid, dcid in list(advdst) + list(diverge) + list(differ): if b in explicit: explicit.remove(b) pushop.outbookmarks.append((b, dcid, scid)) # search for bookmark to delete for b, scid, dcid in adddst: if b in explicit: explicit.remove(b) # treat as \"deleted locally\" pushop.outbookmarks.append((b, dcid, b'')) # identical bookmarks shouldn't get reported for b, scid, dcid in same: if b in explicit: explicit.remove(b) if explicit: explicit = sorted(explicit) # we should probably list all of them pushop.ui.warn( _( b'bookmark %s does not exist on the local ' b'or remote repository!\\n' ) % explicit[0] ) pushop.bkresult = 2 pushop.outbookmarks.sort() def _pushcheckoutgoing(pushop): outgoing = pushop.outgoing unfi = pushop.repo.unfiltered() if not outgoing.missing: # nothing to push scmutil.nochangesfound(unfi.ui, unfi, outgoing.excluded) return False # something to push if not pushop.force: # if repo.obsstore == False --> no obsolete # then, save the iteration if unfi.obsstore: # this message are here for 80 char limit reason mso = _(b\"push includes obsolete changeset: %s!\") mspd = _(b\"push includes phase-divergent changeset: %s!\") mscd = _(b\"push includes content-divergent changeset: %s!\") mst = { b\"orphan\": _(b\"push includes orphan changeset: %s!\"), b\"phase-divergent\": mspd, b\"content-divergent\": mscd, } # If we are to push if there is at least one # obsolete or unstable changeset in missing, at # least one of the missinghead will be obsolete or # unstable. So checking heads only is ok for node in outgoing.ancestorsof: ctx = unfi[node] if ctx.obsolete(): raise error.Abort(mso % ctx) elif ctx.isunstable(): # TODO print more than one instability in the abort # message raise error.Abort(mst[ctx.instabilities()[0]] % ctx) discovery.checkheads(pushop) return True # List of names of steps to perform for an outgoing bundle2, order matters. b2partsgenorder = [] # Mapping between step name and function # # This exists to help extensions wrap steps if necessary b2partsgenmapping = {} def b2partsgenerator(stepname, idx=None): \"\"\"decorator for function generating bundle2 part The function is added to the step -> function mapping and appended to the list of steps. Beware that decorated functions will be added in order (this may matter). You can only use this decorator for new steps, if you want to wrap a step from an extension, attack the b2partsgenmapping dictionary directly.\"\"\" def dec(func): assert stepname not in b2partsgenmapping b2partsgenmapping[stepname] = func if idx is None: b2partsgenorder.append(stepname) else: b2partsgenorder.insert(idx, stepname) return func return dec def _pushb2ctxcheckheads(pushop, bundler): \"\"\"Generate race condition checking parts Exists as an independent function to aid extensions \"\"\" # * 'force' do not check for push race, # * if we don't push anything, there are nothing to check. if not pushop.force and pushop.outgoing.ancestorsof: allowunrelated = b'related' in bundler.capabilities.get( b'checkheads', () ) emptyremote = pushop.pushbranchmap is None if not allowunrelated or emptyremote: bundler.newpart(b'check:heads', data=iter(pushop.remoteheads)) else: affected = set() for branch, heads in pycompat.iteritems(pushop.pushbranchmap): remoteheads, newheads, unsyncedheads, discardedheads = heads if remoteheads is not None: remote = set(remoteheads) affected |= set(discardedheads) & remote affected |= remote - set(newheads) if affected: data = iter(sorted(affected)) bundler.newpart(b'check:updated-heads', data=data) def _pushing(pushop): \"\"\"return True if we are pushing anything\"\"\" return bool( pushop.outgoing.missing or pushop.outdatedphases or pushop.outobsmarkers or pushop.outbookmarks ) @b2partsgenerator(b'check-bookmarks') def _pushb2checkbookmarks(pushop, bundler): \"\"\"insert bookmark move checking\"\"\" if not _pushing(pushop) or pushop.force: return b2caps = bundle2.bundle2caps(pushop.remote) hasbookmarkcheck = b'bookmarks' in b2caps if not (pushop.outbookmarks and hasbookmarkcheck): return data = [] for book, old, new in pushop.outbookmarks: data.append((book, old)) checkdata = bookmod.binaryencode(pushop.repo, data) bundler.newpart(b'check:bookmarks', data=checkdata) @b2partsgenerator(b'check-phases') def _pushb2checkphases(pushop, bundler): \"\"\"insert phase move checking\"\"\" if not _pushing(pushop) or pushop.force: return b2caps = bundle2.bundle2caps(pushop.remote) hasphaseheads = b'heads' in b2caps.get(b'phases', ()) if pushop.remotephases is not None and hasphaseheads: # check that the remote phase has not changed checks = {p: [] for p in phases.allphases} checks[phases.public].extend(pushop.remotephases.publicheads) checks[phases.draft].extend(pushop.remotephases.draftroots) if any(pycompat.itervalues(checks)): for phase in checks: checks[phase].sort() checkdata = phases.binaryencode(checks) bundler.newpart(b'check:phases', data=checkdata) @b2partsgenerator(b'changeset') def _pushb2ctx(pushop, bundler): \"\"\"handle changegroup push through bundle2 addchangegroup result is stored in the ``pushop.cgresult`` attribute. \"\"\" if b'changesets' in pushop.stepsdone: return pushop.stepsdone.add(b'changesets') # Send known heads to the server for race detection. if not _pushcheckoutgoing(pushop): return pushop.repo.prepushoutgoinghooks(pushop) _pushb2ctxcheckheads(pushop, bundler) b2caps = bundle2.bundle2caps(pushop.remote) version = b'01' cgversions = b2caps.get(b'changegroup') if cgversions: # 3.1 and 3.2 ship with an empty value cgversions = [ v for v in cgversions if v in changegroup.supportedoutgoingversions(pushop.repo) ] if not cgversions: raise error.Abort(_(b'no common changegroup version')) version = max(cgversions) remote_sidedata = bundle2.read_remote_wanted_sidedata(pushop.remote) cgstream = changegroup.makestream( pushop.repo, pushop.outgoing, version, b'push', bundlecaps=b2caps, remote_sidedata=remote_sidedata, ) cgpart = bundler.newpart(b'changegroup', data=cgstream) if cgversions: cgpart.addparam(b'version', version) if scmutil.istreemanifest(pushop.repo): cgpart.addparam(b'treemanifest', b'1') if repository.REPO_FEATURE_SIDE_DATA in pushop.repo.features: cgpart.addparam(b'exp-sidedata', b'1') def handlereply(op): \"\"\"extract addchangegroup returns from server reply\"\"\" cgreplies = op.records.getreplies(cgpart.id) assert len(cgreplies[b'changegroup']) == 1 pushop.cgresult = cgreplies[b'changegroup'][0][b'return'] return handlereply @b2partsgenerator(b'phase') def _pushb2phases(pushop, bundler): \"\"\"handle phase push through bundle2\"\"\" if b'phases' in pushop.stepsdone: return b2caps = bundle2.bundle2caps(pushop.remote) ui = pushop.repo.ui legacyphase = b'phases' in ui.configlist(b'devel', b'legacy.exchange') haspushkey = b'pushkey' in b2caps hasphaseheads = b'heads' in b2caps.get(b'phases', ()) if hasphaseheads and not legacyphase: return _pushb2phaseheads(pushop, bundler) elif haspushkey: return _pushb2phasespushkey(pushop, bundler) def _pushb2phaseheads(pushop, bundler): \"\"\"push phase information through a bundle2 - binary part\"\"\" pushop.stepsdone.add(b'phases') if pushop.outdatedphases: updates = {p: [] for p in phases.allphases} updates[0].extend(h.node() for h in pushop.outdatedphases) phasedata = phases.binaryencode(updates) bundler.newpart(b'phase-heads', data=phasedata) def _pushb2phasespushkey(pushop, bundler): \"\"\"push phase information through a bundle2 - pushkey part\"\"\" pushop.stepsdone.add(b'phases') part2node = [] def handlefailure(pushop, exc): targetid = int(exc.partid) for partid, node in part2node: if partid == targetid: raise error.Abort(_(b'updating %s to public failed') % node) enc = pushkey.encode for newremotehead in pushop.outdatedphases: part = bundler.newpart(b'pushkey') part.addparam(b'namespace', enc(b'phases')) part.addparam(b'key', enc(newremotehead.hex())) part.addparam(b'old', enc(b'%d' % phases.draft)) part.addparam(b'new', enc(b'%d' % phases.public)) part2node.append((part.id, newremotehead)) pushop.pkfailcb[part.id] = handlefailure def handlereply(op): for partid, node in part2node: partrep = op.records.getreplies(partid) results = partrep[b'pushkey'] assert len(results) <= 1 msg = None if not results: msg = _(b'server ignored update of %s to public!\\n') % node elif not int(results[0][b'return']): msg = _(b'updating %s to public failed!\\n') % node if msg is not None: pushop.ui.warn(msg) return handlereply @b2partsgenerator(b'obsmarkers') def _pushb2obsmarkers(pushop, bundler): if b'obsmarkers' in pushop.stepsdone: return remoteversions = bundle2.obsmarkersversion(bundler.capabilities) if obsolete.commonversion(remoteversions) is None: return pushop.stepsdone.add(b'obsmarkers') if pushop.outobsmarkers: markers = obsutil.sortedmarkers(pushop.outobsmarkers) bundle2.buildobsmarkerspart(bundler, markers) @b2partsgenerator(b'bookmarks') def _pushb2bookmarks(pushop, bundler): \"\"\"handle bookmark push through bundle2\"\"\" if b'bookmarks' in pushop.stepsdone: return b2caps = bundle2.bundle2caps(pushop.remote) legacy = pushop.repo.ui.configlist(b'devel', b'legacy.exchange') legacybooks = b'bookmarks' in legacy if not legacybooks and b'bookmarks' in b2caps: return _pushb2bookmarkspart(pushop, bundler) elif b'pushkey' in b2caps: return _pushb2bookmarkspushkey(pushop, bundler) def _bmaction(old, new): \"\"\"small utility for bookmark pushing\"\"\" if not old: return b'export' elif not new: return b'delete' return b'update' def _abortonsecretctx(pushop, node, b): \"\"\"abort if a given bookmark points to a secret changeset\"\"\" if node and pushop.repo[node].phase() == phases.secret: raise error.Abort( _(b'cannot push bookmark %s as it points to a secret changeset') % b ) def _pushb2bookmarkspart(pushop, bundler): pushop.stepsdone.add(b'bookmarks') if not pushop.outbookmarks: return allactions = [] data = [] for book, old, new in pushop.outbookmarks: _abortonsecretctx(pushop, new, book) data.append((book, new)) allactions.append((book, _bmaction(old, new))) checkdata = bookmod.binaryencode(pushop.repo, data) bundler.newpart(b'bookmarks', data=checkdata) def handlereply(op): ui = pushop.ui # if success for book, action in allactions: ui.status(bookmsgmap[action][0] % book) return handlereply def _pushb2bookmarkspushkey(pushop, bundler): pushop.stepsdone.add(b'bookmarks') part2book = [] enc = pushkey.encode def handlefailure(pushop, exc): targetid = int(exc.partid) for partid, book, action in part2book: if partid == targetid: raise error.Abort(bookmsgmap[action][1].rstrip() % book) # we should not be called for part we did not generated assert False for book, old, new in pushop.outbookmarks: _abortonsecretctx(pushop, new, book) part = bundler.newpart(b'pushkey') part.addparam(b'namespace', enc(b'bookmarks')) part.addparam(b'key', enc(book)) part.addparam(b'old', enc(hex(old))) part.addparam(b'new', enc(hex(new))) action = b'update' if not old: action = b'export' elif not new: action = b'delete' part2book.append((part.id, book, action)) pushop.pkfailcb[part.id] = handlefailure def handlereply(op): ui = pushop.ui for partid, book, action in part2book: partrep = op.records.getreplies(partid) results = partrep[b'pushkey'] assert len(results) <= 1 if not results: pushop.ui.warn(_(b'server ignored bookmark %s update\\n') % book) else: ret = int(results[0][b'return']) if ret: ui.status(bookmsgmap[action][0] % book) else: ui.warn(bookmsgmap[action][1] % book) if pushop.bkresult is not None: pushop.bkresult = 1 return handlereply @b2partsgenerator(b'pushvars', idx=0) def _getbundlesendvars(pushop, bundler): '''send shellvars via bundle2''' pushvars = pushop.pushvars if pushvars: shellvars = {} for raw in pushvars: if b'=' not in raw: msg = ( b\"unable to parse variable '%s', should follow \" b\"'KEY=VALUE' or 'KEY=' format\" ) raise error.Abort(msg % raw) k, v = raw.split(b'=', 1) shellvars[k] = v part = bundler.newpart(b'pushvars') for key, value in pycompat.iteritems(shellvars): part.addparam(key, value, mandatory=False) def _pushbundle2(pushop): \"\"\"push data to the remote using bundle2 The only currently supported type of data is changegroup but this will evolve in the future.\"\"\" bundler = bundle2.bundle20(pushop.ui, bundle2.bundle2caps(pushop.remote)) pushback = pushop.trmanager and pushop.ui.configbool( b'experimental', b'bundle2.pushback' ) # create reply capability capsblob = bundle2.encodecaps( bundle2.getrepocaps(pushop.repo, allowpushback=pushback, role=b'client') ) bundler.newpart(b'replycaps', data=capsblob) replyhandlers = [] for partgenname in b2partsgenorder: partgen = b2partsgenmapping[partgenname] ret = partgen(pushop, bundler) if callable(ret): replyhandlers.append(ret) # do not push if nothing to push if bundler.nbparts <= 1: return stream = util.chunkbuffer(bundler.getchunks()) try: try: with pushop.remote.commandexecutor() as e: reply = e.callcommand( b'unbundle', { b'bundle': stream, b'heads': [b'force'], b'url': pushop.remote.url(), }, ).result() except error.BundleValueError as exc: raise error.RemoteError(_(b'missing support for %s') % exc) try: trgetter = None if pushback: trgetter = pushop.trmanager.transaction op = bundle2.processbundle(pushop.repo, reply, trgetter) except error.BundleValueError as exc: raise error.RemoteError(_(b'missing support for %s') % exc) except bundle2.AbortFromPart as exc: pushop.ui.error(_(b'remote: %s\\n') % exc) if exc.hint is not None: pushop.ui.error(_(b'remote: %s\\n') % (b'(%s)' % exc.hint)) raise error.RemoteError(_(b'push failed on remote')) except error.PushkeyFailed as exc: partid = int(exc.partid) if partid not in pushop.pkfailcb: raise pushop.pkfailcb[partid](pushop, exc) for rephand in replyhandlers: rephand(op) def _pushchangeset(pushop): \"\"\"Make the actual push of changeset bundle to remote repo\"\"\" if b'changesets' in pushop.stepsdone: return pushop.stepsdone.add(b'changesets') if not _pushcheckoutgoing(pushop): return # Should have verified this in push(). assert pushop.remote.capable(b'unbundle') pushop.repo.prepushoutgoinghooks(pushop) outgoing = pushop.outgoing # TODO: get bundlecaps from remote bundlecaps = None # create a changegroup from local if pushop.revs is None and not ( outgoing.excluded or pushop.repo.changelog.filteredrevs ): # push everything, # use the fast path, no race possible on push cg = changegroup.makechangegroup( pushop.repo, outgoing, b'01', b'push', fastpath=True, bundlecaps=bundlecaps, ) else: cg = changegroup.makechangegroup( pushop.repo, outgoing, b'01', b'push', bundlecaps=bundlecaps ) # apply changegroup to remote # local repo finds heads on server, finds out what # revs it must push. once revs transferred, if server # finds it has different heads (someone else won # commit\/push race), server aborts. if pushop.force: remoteheads = [b'force'] else: remoteheads = pushop.remoteheads # ssh: return remote's addchangegroup() # http: return remote's addchangegroup() or 0 for error pushop.cgresult = pushop.remote.unbundle(cg, remoteheads, pushop.repo.url()) def _pushsyncphase(pushop): \"\"\"synchronise phase information locally and remotely\"\"\" cheads = pushop.commonheads # even when we don't push, exchanging phase data is useful remotephases = listkeys(pushop.remote, b'phases') if ( pushop.ui.configbool(b'ui', b'_usedassubrepo') and remotephases # server supports phases and pushop.cgresult is None # nothing was pushed and remotephases.get(b'publishing', False) ): # When: # - this is a subrepo push # - and remote support phase # - and no changeset was pushed # - and remote is publishing # We may be in issue 3871 case! # We drop the possible phase synchronisation done by # courtesy to publish changesets possibly locally draft # on the remote. remotephases = {b'publishing': b'True'} if not remotephases: # old server or public only reply from non-publishing _localphasemove(pushop, cheads) # don't push any phase data as there is nothing to push else: ana = phases.analyzeremotephases(pushop.repo, cheads, remotephases) pheads, droots = ana ### Apply remote phase on local if remotephases.get(b'publishing', False): _localphasemove(pushop, cheads) else: # publish = False _localphasemove(pushop, pheads) _localphasemove(pushop, cheads, phases.draft) ### Apply local phase on remote if pushop.cgresult: if b'phases' in pushop.stepsdone: # phases already pushed though bundle2 return outdated = pushop.outdatedphases else: outdated = pushop.fallbackoutdatedphases pushop.stepsdone.add(b'phases') # filter heads already turned public by the push outdated = [c for c in outdated if c.node() not in pheads] # fallback to independent pushkey command for newremotehead in outdated: with pushop.remote.commandexecutor() as e: r = e.callcommand( b'pushkey', { b'namespace': b'phases', b'key': newremotehead.hex(), b'old': b'%d' % phases.draft, b'new': b'%d' % phases.public, }, ).result() if not r: pushop.ui.warn( _(b'updating %s to public failed!\\n') % newremotehead ) def _localphasemove(pushop, nodes, phase=phases.public): \"\"\"move <nodes> to <phase> in the local source repo\"\"\" if pushop.trmanager: phases.advanceboundary( pushop.repo, pushop.trmanager.transaction(), phase, nodes ) else: # repo is not locked, do not change any phases! # Informs the user that phases should have been moved when # applicable. actualmoves = [n for n in nodes if phase < pushop.repo[n].phase()] phasestr = phases.phasenames[phase] if actualmoves: pushop.ui.status( _( b'cannot lock source repo, skipping ' b'local %s phase update\\n' ) % phasestr ) def _pushobsolete(pushop): \"\"\"utility function to push obsolete markers to a remote\"\"\" if b'obsmarkers' in pushop.stepsdone: return repo = pushop.repo remote = pushop.remote pushop.stepsdone.add(b'obsmarkers') if pushop.outobsmarkers: pushop.ui.debug(b'try to push obsolete markers to remote\\n') rslts = [] markers = obsutil.sortedmarkers(pushop.outobsmarkers) remotedata = obsolete._pushkeyescape(markers) for key in sorted(remotedata, reverse=True): # reverse sort to ensure we end with dump0 data = remotedata[key] rslts.append(remote.pushkey(b'obsolete', key, b'', data)) if [r for r in rslts if not r]: msg = _(b'failed to push some obsolete markers!\\n') repo.ui.warn(msg) def _pushbookmark(pushop): \"\"\"Update bookmark position on remote\"\"\" if pushop.cgresult == 0 or b'bookmarks' in pushop.stepsdone: return pushop.stepsdone.add(b'bookmarks') ui = pushop.ui remote = pushop.remote for b, old, new in pushop.outbookmarks: action = b'update' if not old: action = b'export' elif not new: action = b'delete' with remote.commandexecutor() as e: r = e.callcommand( b'pushkey', { b'namespace': b'bookmarks', b'key': b, b'old': hex(old), b'new': hex(new), }, ).result() if r: ui.status(bookmsgmap[action][0] % b) else: ui.warn(bookmsgmap[action][1] % b) # discovery can have set the value form invalid entry if pushop.bkresult is not None: pushop.bkresult = 1 class pulloperation(object): \"\"\"A object that represent a single pull operation It purpose is to carry pull related state and very common operation. A new should be created at the beginning of each pull and discarded afterward. \"\"\" def __init__( self, repo, remote, heads=None, force=False, bookmarks=(), remotebookmarks=None, streamclonerequested=None, includepats=None, excludepats=None, depth=None, ): # repo we pull into self.repo = repo # repo we pull from self.remote = remote # revision we try to pull (None is \"all\") self.heads = heads # bookmark pulled explicitly self.explicitbookmarks = [ repo._bookmarks.expandname(bookmark) for bookmark in bookmarks ] # do we force pull? self.force = force # whether a streaming clone was requested self.streamclonerequested = streamclonerequested # transaction manager self.trmanager = None # set of common changeset between local and remote before pull self.common = None # set of pulled head self.rheads = None # list of missing changeset to fetch remotely self.fetch = None # remote bookmarks data self.remotebookmarks = remotebookmarks # result of changegroup pulling (used as return code by pull) self.cgresult = None # list of step already done self.stepsdone = set() # Whether we attempted a clone from pre-generated bundles. self.clonebundleattempted = False # Set of file patterns to include. self.includepats = includepats # Set of file patterns to exclude. self.excludepats = excludepats # Number of ancestor changesets to pull from each pulled head. self.depth = depth @util.propertycache def pulledsubset(self): \"\"\"heads of the set of changeset target by the pull\"\"\" # compute target subset if self.heads is None: # We pulled every thing possible # sync on everything common c = set(self.common) ret = list(self.common) for n in self.rheads: if n not in c: ret.append(n) return ret else: # We pulled a specific subset # sync on this subset return self.heads @util.propertycache def canusebundle2(self): return not _forcebundle1(self) @util.propertycache def remotebundle2caps(self): return bundle2.bundle2caps(self.remote) def gettransaction(self): # deprecated; talk to trmanager directly return self.trmanager.transaction() class transactionmanager(util.transactional): \"\"\"An object to manage the life cycle of a transaction It creates the transaction on demand and calls the appropriate hooks when closing the transaction.\"\"\" def __init__(self, repo, source, url): self.repo = repo self.source = source self.url = url self._tr = None def transaction(self): \"\"\"Return an open transaction object, constructing if necessary\"\"\" if not self._tr: trname = b'%s\\n%s' % (self.source, urlutil.hidepassword(self.url)) self._tr = self.repo.transaction(trname) self._tr.hookargs[b'source'] = self.source self._tr.hookargs[b'url'] = self.url return self._tr def close(self): \"\"\"close transaction if created\"\"\" if self._tr is not None: self._tr.close() def release(self): \"\"\"release transaction if created\"\"\" if self._tr is not None: self._tr.release() def listkeys(remote, namespace): with remote.commandexecutor() as e: return e.callcommand(b'listkeys', {b'namespace': namespace}).result() def _fullpullbundle2(repo, pullop): # The server may send a partial reply, i.e. when inlining # pre-computed bundles. In that case, update the common # set based on the results and pull another bundle. # # There are two indicators that the process is finished: # - no changeset has been added, or # - all remote heads are known locally. # The head check must use the unfiltered view as obsoletion # markers can hide heads. unfi = repo.unfiltered() unficl = unfi.changelog def headsofdiff(h1, h2): \"\"\"Returns heads(h1 % h2)\"\"\" res = unfi.set(b'heads(%ln %% %ln)', h1, h2) return {ctx.node() for ctx in res} def headsofunion(h1, h2): \"\"\"Returns heads((h1 + h2) - null)\"\"\" res = unfi.set(b'heads((%ln + %ln - null))', h1, h2) return {ctx.node() for ctx in res} while True: old_heads = unficl.heads() clstart = len(unficl) _pullbundle2(pullop) if requirements.NARROW_REQUIREMENT in repo.requirements: # XXX narrow clones filter the heads on the server side during # XXX getbundle and result in partial replies as well. # XXX Disable pull bundles in this case as band aid to avoid # XXX extra round trips. break if clstart == len(unficl): break if all(unficl.hasnode(n) for n in pullop.rheads): break new_heads = headsofdiff(unficl.heads(), old_heads) pullop.common = headsofunion(new_heads, pullop.common) pullop.rheads = set(pullop.rheads) - pullop.common def add_confirm_callback(repo, pullop): \"\"\"adds a finalize callback to transaction which can be used to show stats to user and confirm the pull before committing transaction\"\"\" tr = pullop.trmanager.transaction() scmutil.registersummarycallback( repo, tr, txnname=b'pull', as_validator=True ) reporef = weakref.ref(repo.unfiltered()) def prompt(tr): repo = reporef() cm = _(b'accept incoming changes (yn)?$$ &Yes $$ &No') if repo.ui.promptchoice(cm): raise error.Abort(b\"user aborted\") tr.addvalidator(b'900-pull-prompt', prompt) def pull( repo, remote, heads=None, force=False, bookmarks=(), opargs=None, streamclonerequested=None, includepats=None, excludepats=None, depth=None, confirm=None, ): \"\"\"Fetch repository data from a remote. This is the main function used to retrieve data from a remote repository. ``repo`` is the local repository to clone into. ``remote`` is a peer instance. ``heads`` is an iterable of revisions we want to pull. ``None`` (the default) means to pull everything from the remote. ``bookmarks`` is an iterable of bookmarks requesting to be pulled. By default, all remote bookmarks are pulled. ``opargs`` are additional keyword arguments to pass to ``pulloperation`` initialization. ``streamclonerequested`` is a boolean indicating whether a \"streaming clone\" is requested. A \"streaming clone\" is essentially a raw file copy of revlogs from the server. This only works when the local repository is empty. The default value of ``None`` means to respect the server configuration for preferring stream clones. ``includepats`` and ``excludepats`` define explicit file patterns to include and exclude in storage, respectively. If not defined, narrow patterns from the repo instance are used, if available. ``depth`` is an integer indicating the DAG depth of history we're interested in. If defined, for each revision specified in ``heads``, we will fetch up to this many of its ancestors and data associated with them. ``confirm`` is a boolean indicating whether the pull should be confirmed before committing the transaction. This overrides HGPLAIN. Returns the ``pulloperation`` created for this pull. \"\"\" if opargs is None: opargs = {} # We allow the narrow patterns to be passed in explicitly to provide more # flexibility for API consumers. if includepats or excludepats: includepats = includepats or set() excludepats = excludepats or set() else: includepats, excludepats = repo.narrowpats narrowspec.validatepatterns(includepats) narrowspec.validatepatterns(excludepats) pullop = pulloperation( repo, remote, heads, force, bookmarks=bookmarks, streamclonerequested=streamclonerequested, includepats=includepats, excludepats=excludepats, depth=depth, **pycompat.strkwargs(opargs) ) peerlocal = pullop.remote.local() if peerlocal: missing = set(peerlocal.requirements) - pullop.repo.supported if missing: msg = _( b\"required features are not\" b\" supported in the destination:\" b\" %s\" ) % (b', '.join(sorted(missing))) raise error.Abort(msg) for category in repo._wanted_sidedata: # Check that a computer is registered for that category for at least # one revlog kind. for kind, computers in repo._sidedata_computers.items(): if computers.get(category): break else: # This should never happen since repos are supposed to be able to # generate the sidedata they require. raise error.ProgrammingError( _( b'sidedata category requested by local side without local' b\"support: '%s'\" ) % pycompat.bytestr(category) ) pullop.trmanager = transactionmanager(repo, b'pull', remote.url()) wlock = util.nullcontextmanager() if not bookmod.bookmarksinstore(repo): wlock = repo.wlock() with wlock, repo.lock(), pullop.trmanager: if confirm or ( repo.ui.configbool(b\"pull\", b\"confirm\") and not repo.ui.plain() ): add_confirm_callback(repo, pullop) # Use the modern wire protocol, if available. if remote.capable(b'command-changesetdata'): exchangev2.pull(pullop) else: # This should ideally be in _pullbundle2(). However, it needs to run # before discovery to avoid extra work. _maybeapplyclonebundle(pullop) streamclone.maybeperformlegacystreamclone(pullop) _pulldiscovery(pullop) if pullop.canusebundle2: _fullpullbundle2(repo, pullop) _pullchangeset(pullop) _pullphase(pullop) _pullbookmarks(pullop) _pullobsolete(pullop) # storing remotenames if repo.ui.configbool(b'experimental', b'remotenames'): logexchange.pullremotenames(repo, remote) return pullop # list of steps to perform discovery before pull pulldiscoveryorder = [] # Mapping between step name and function # # This exists to help extensions wrap steps if necessary pulldiscoverymapping = {} def pulldiscovery(stepname): \"\"\"decorator for function performing discovery before pull The function is added to the step -> function mapping and appended to the list of steps. Beware that decorated function will be added in order (this may matter). You can only use this decorator for a new step, if you want to wrap a step from an extension, change the pulldiscovery dictionary directly.\"\"\" def dec(func): assert stepname not in pulldiscoverymapping pulldiscoverymapping[stepname] = func pulldiscoveryorder.append(stepname) return func return dec def _pulldiscovery(pullop): \"\"\"Run all discovery steps\"\"\" for stepname in pulldiscoveryorder: step = pulldiscoverymapping[stepname] step(pullop) @pulldiscovery(b'b1:bookmarks') def _pullbookmarkbundle1(pullop): \"\"\"fetch bookmark data in bundle1 case If not using bundle2, we have to fetch bookmarks before changeset discovery to reduce the chance and impact of race conditions.\"\"\" if pullop.remotebookmarks is not None: return if pullop.canusebundle2 and b'listkeys' in pullop.remotebundle2caps: # all known bundle2 servers now support listkeys, but lets be nice with # new implementation. return books = listkeys(pullop.remote, b'bookmarks') pullop.remotebookmarks = bookmod.unhexlifybookmarks(books) @pulldiscovery(b'changegroup') def _pulldiscoverychangegroup(pullop): \"\"\"discovery phase for the pull Current handle changeset discovery only, will change handle all discovery at some point.\"\"\" tmp = discovery.findcommonincoming( pullop.repo, pullop.remote, heads=pullop.heads, force=pullop.force ) common, fetch, rheads = tmp has_node = pullop.repo.unfiltered().changelog.index.has_node if fetch and rheads: # If a remote heads is filtered locally, put in back in common. # # This is a hackish solution to catch most of \"common but locally # hidden situation\". We do not performs discovery on unfiltered # repository because it end up doing a pathological amount of round # trip for w huge amount of changeset we do not care about. # # If a set of such \"common but filtered\" changeset exist on the server # but are not including a remote heads, we'll not be able to detect it, scommon = set(common) for n in rheads: if has_node(n): if n not in scommon: common.append(n) if set(rheads).issubset(set(common)): fetch = [] pullop.common = common pullop.fetch = fetch pullop.rheads = rheads def _pullbundle2(pullop): \"\"\"pull data using bundle2 For now, the only supported data are changegroup.\"\"\" kwargs = {b'bundlecaps': caps20to10(pullop.repo, role=b'client')} # make ui easier to access ui = pullop.repo.ui # At the moment we don't do stream clones over bundle2. If that is # implemented then here's where the check for that will go. streaming = streamclone.canperformstreamclone(pullop, bundle2=True)[0] # declare pull perimeters kwargs[b'common'] = pullop.common kwargs[b'heads'] = pullop.heads or pullop.rheads # check server supports narrow and then adding includepats and excludepats servernarrow = pullop.remote.capable(wireprototypes.NARROWCAP) if servernarrow and pullop.includepats: kwargs[b'includepats'] = pullop.includepats if servernarrow and pullop.excludepats: kwargs[b'excludepats'] = pullop.excludepats if streaming: kwargs[b'cg'] = False kwargs[b'stream'] = True pullop.stepsdone.add(b'changegroup') pullop.stepsdone.add(b'phases') else: # pulling changegroup pullop.stepsdone.add(b'changegroup') kwargs[b'cg'] = pullop.fetch legacyphase = b'phases' in ui.configlist(b'devel', b'legacy.exchange') hasbinaryphase = b'heads' in pullop.remotebundle2caps.get(b'phases', ()) if not legacyphase and hasbinaryphase: kwargs[b'phases'] = True pullop.stepsdone.add(b'phases') if b'listkeys' in pullop.remotebundle2caps: if b'phases' not in pullop.stepsdone: kwargs[b'listkeys'] = [b'phases'] bookmarksrequested = False legacybookmark = b'bookmarks' in ui.configlist(b'devel', b'legacy.exchange') hasbinarybook = b'bookmarks' in pullop.remotebundle2caps if pullop.remotebookmarks is not None: pullop.stepsdone.add(b'request-bookmarks') if ( b'request-bookmarks' not in pullop.stepsdone and pullop.remotebookmarks is None and not legacybookmark and hasbinarybook ): kwargs[b'bookmarks'] = True bookmarksrequested = True if b'listkeys' in pullop.remotebundle2caps: if b'request-bookmarks' not in pullop.stepsdone: # make sure to always includes bookmark data when migrating # `hg incoming --bundle` to using this function. pullop.stepsdone.add(b'request-bookmarks') kwargs.setdefault(b'listkeys', []).append(b'bookmarks') # If this is a full pull \/ clone and the server supports the clone bundles # feature, tell the server whether we attempted a clone bundle. The # presence of this flag indicates the client supports clone bundles. This # will enable the server to treat clients that support clone bundles # differently from those that don't. if ( pullop.remote.capable(b'clonebundles') and pullop.heads is None and list(pullop.common) == [pullop.repo.nullid] ): kwargs[b'cbattempted'] = pullop.clonebundleattempted if streaming: pullop.repo.ui.status(_(b'streaming all changes\\n')) elif not pullop.fetch: pullop.repo.ui.status(_(b\"no changes found\\n\")) pullop.cgresult = 0 else: if pullop.heads is None and list(pullop.common) == [pullop.repo.nullid]: pullop.repo.ui.status(_(b\"requesting all changes\\n\")) if obsolete.isenabled(pullop.repo, obsolete.exchangeopt): remoteversions = bundle2.obsmarkersversion(pullop.remotebundle2caps) if obsolete.commonversion(remoteversions) is not None: kwargs[b'obsmarkers'] = True pullop.stepsdone.add(b'obsmarkers') _pullbundle2extraprepare(pullop, kwargs) remote_sidedata = bundle2.read_remote_wanted_sidedata(pullop.remote) if remote_sidedata: kwargs[b'remote_sidedata'] = remote_sidedata with pullop.remote.commandexecutor() as e: args = dict(kwargs) args[b'source'] = b'pull' bundle = e.callcommand(b'getbundle', args).result() try: op = bundle2.bundleoperation( pullop.repo, pullop.gettransaction, source=b'pull' ) op.modes[b'bookmarks'] = b'records' bundle2.processbundle(pullop.repo, bundle, op=op) except bundle2.AbortFromPart as exc: pullop.repo.ui.error(_(b'remote: abort: %s\\n') % exc) raise error.RemoteError(_(b'pull failed on remote'), hint=exc.hint) except error.BundleValueError as exc: raise error.RemoteError(_(b'missing support for %s') % exc) if pullop.fetch: pullop.cgresult = bundle2.combinechangegroupresults(op) # processing phases change for namespace, value in op.records[b'listkeys']: if namespace == b'phases': _pullapplyphases(pullop, value) # processing bookmark update if bookmarksrequested: books = {} for record in op.records[b'bookmarks']: books[record[b'bookmark']] = record[b\"node\"] pullop.remotebookmarks = books else: for namespace, value in op.records[b'listkeys']: if namespace == b'bookmarks': pullop.remotebookmarks = bookmod.unhexlifybookmarks(value) # bookmark data were either already there or pulled in the bundle if pullop.remotebookmarks is not None: _pullbookmarks(pullop) def _pullbundle2extraprepare(pullop, kwargs): \"\"\"hook function so that extensions can extend the getbundle call\"\"\" def _pullchangeset(pullop): \"\"\"pull changeset from unbundle into the local repo\"\"\" # We delay the open of the transaction as late as possible so we # don't open transaction for nothing or you break future useful # rollback call if b'changegroup' in pullop.stepsdone: return pullop.stepsdone.add(b'changegroup') if not pullop.fetch: pullop.repo.ui.status(_(b\"no changes found\\n\")) pullop.cgresult = 0 return tr = pullop.gettransaction() if pullop.heads is None and list(pullop.common) == [pullop.repo.nullid]: pullop.repo.ui.status(_(b\"requesting all changes\\n\")) elif pullop.heads is None and pullop.remote.capable(b'changegroupsubset'): # issue1320, avoid a race if remote changed after discovery pullop.heads = pullop.rheads if pullop.remote.capable(b'getbundle'): # TODO: get bundlecaps from remote cg = pullop.remote.getbundle( b'pull', common=pullop.common, heads=pullop.heads or pullop.rheads ) elif pullop.heads is None: with pullop.remote.commandexecutor() as e: cg = e.callcommand( b'changegroup', { b'nodes': pullop.fetch, b'source': b'pull', }, ).result() elif not pullop.remote.capable(b'changegroupsubset'): raise error.Abort( _( b\"partial pull cannot be done because \" b\"other repository doesn't support \" b\"changegroupsubset.\" ) ) else: with pullop.remote.commandexecutor() as e: cg = e.callcommand( b'changegroupsubset', { b'bases': pullop.fetch, b'heads': pullop.heads, b'source': b'pull', }, ).result() bundleop = bundle2.applybundle( pullop.repo, cg, tr, b'pull', pullop.remote.url() ) pullop.cgresult = bundle2.combinechangegroupresults(bundleop) def _pullphase(pullop): # Get remote phases data from remote if b'phases' in pullop.stepsdone: return remotephases = listkeys(pullop.remote, b'phases') _pullapplyphases(pullop, remotephases) def _pullapplyphases(pullop, remotephases): \"\"\"apply phase movement from observed remote state\"\"\" if b'phases' in pullop.stepsdone: return pullop.stepsdone.add(b'phases') publishing = bool(remotephases.get(b'publishing', False)) if remotephases and not publishing: # remote is new and non-publishing pheads, _dr = phases.analyzeremotephases( pullop.repo, pullop.pulledsubset, remotephases ) dheads = pullop.pulledsubset else: # Remote is old or publishing all common changesets # should be seen as public pheads = pullop.pulledsubset dheads = [] unfi = pullop.repo.unfiltered() phase = unfi._phasecache.phase rev = unfi.changelog.index.get_rev public = phases.public draft = phases.draft # exclude changesets already public locally and update the others pheads = [pn for pn in pheads if phase(unfi, rev(pn)) > public] if pheads: tr = pullop.gettransaction() phases.advanceboundary(pullop.repo, tr, public, pheads) # exclude changesets already draft locally and update the others dheads = [pn for pn in dheads if phase(unfi, rev(pn)) > draft] if dheads: tr = pullop.gettransaction() phases.advanceboundary(pullop.repo, tr, draft, dheads) def _pullbookmarks(pullop): \"\"\"process the remote bookmark information to update the local one\"\"\" if b'bookmarks' in pullop.stepsdone: return pullop.stepsdone.add(b'bookmarks') repo = pullop.repo remotebookmarks = pullop.remotebookmarks bookmod.updatefromremote( repo.ui, repo, remotebookmarks, pullop.remote.url(), pullop.gettransaction, explicit=pullop.explicitbookmarks, ) def _pullobsolete(pullop): \"\"\"utility function to pull obsolete markers from a remote The `gettransaction` is function that return the pull transaction, creating one if necessary. We return the transaction to inform the calling code that a new transaction have been created (when applicable). Exists mostly to allow overriding for experimentation purpose\"\"\" if b'obsmarkers' in pullop.stepsdone: return pullop.stepsdone.add(b'obsmarkers') tr = None if obsolete.isenabled(pullop.repo, obsolete.exchangeopt): pullop.repo.ui.debug(b'fetching remote obsolete markers\\n') remoteobs = listkeys(pullop.remote, b'obsolete') if b'dump0' in remoteobs: tr = pullop.gettransaction() markers = [] for key in sorted(remoteobs, reverse=True): if key.startswith(b'dump'): data = util.b85decode(remoteobs[key]) version, newmarks = obsolete._readmarkers(data) markers += newmarks if markers: pullop.repo.obsstore.add(tr, markers) pullop.repo.invalidatevolatilesets() return tr def applynarrowacl(repo, kwargs): \"\"\"Apply narrow fetch access control. This massages the named arguments for getbundle wire protocol commands so requested data is filtered through access control rules. \"\"\" ui = repo.ui # TODO this assumes existence of HTTP and is a layering violation. username = ui.shortuser(ui.environ.get(b'REMOTE_USER') or ui.username()) user_includes = ui.configlist( _NARROWACL_SECTION, username + b'.includes', ui.configlist(_NARROWACL_SECTION, b'default.includes'), ) user_excludes = ui.configlist( _NARROWACL_SECTION, username + b'.excludes', ui.configlist(_NARROWACL_SECTION, b'default.excludes'), ) if not user_includes: raise error.Abort( _(b\"%s configuration for user %s is empty\") % (_NARROWACL_SECTION, username) ) user_includes = [ b'path:.' if p == b'*' else b'path:' + p for p in user_includes ] user_excludes = [ b'path:.' if p == b'*' else b'path:' + p for p in user_excludes ] req_includes = set(kwargs.get('includepats', [])) req_excludes = set(kwargs.get('excludepats', [])) req_includes, req_excludes, invalid_includes = narrowspec.restrictpatterns( req_includes, req_excludes, user_includes, user_excludes ) if invalid_includes: raise error.Abort( _(b\"The following includes are not accessible for %s: %s\") % (username, stringutil.pprint(invalid_includes)) ) new_args = {} new_args.update(kwargs) new_args['narrow'] = True new_args['narrow_acl'] = True new_args['includepats'] = req_includes if req_excludes: new_args['excludepats'] = req_excludes return new_args def _computeellipsis(repo, common, heads, known, match, depth=None): \"\"\"Compute the shape of a narrowed DAG. Args: repo: The repository we're transferring. common: The roots of the DAG range we're transferring. May be just [nullid], which means all ancestors of heads. heads: The heads of the DAG range we're transferring. match: The narrowmatcher that allows us to identify relevant changes. depth: If not None, only consider nodes to be full nodes if they are at most depth changesets away from one of heads. Returns: A tuple of (visitnodes, relevant_nodes, ellipsisroots) where: visitnodes: The list of nodes (either full or ellipsis) which need to be sent to the client. relevant_nodes: The set of changelog nodes which change a file inside the narrowspec. The client needs these as non-ellipsis nodes. ellipsisroots: A dict of {rev: parents} that is used in narrowchangegroup to produce ellipsis nodes with the correct parents. \"\"\" cl = repo.changelog mfl = repo.manifestlog clrev = cl.rev commonrevs = {clrev(n) for n in common} | {nullrev} headsrevs = {clrev(n) for n in heads} if depth: revdepth = {h: 0 for h in headsrevs} ellipsisheads = collections.defaultdict(set) ellipsisroots = collections.defaultdict(set) def addroot(head, curchange): \"\"\"Add a root to an ellipsis head, splitting heads with 3 roots.\"\"\" ellipsisroots[head].add(curchange) # Recursively split ellipsis heads with 3 roots by finding the # roots' youngest common descendant which is an elided merge commit. # That descendant takes 2 of the 3 roots as its own, and becomes a # root of the head. while len(ellipsisroots[head]) > 2: child, roots = splithead(head) splitroots(head, child, roots) head = child # Recurse in case we just added a 3rd root def splitroots(head, child, roots): ellipsisroots[head].difference_update(roots) ellipsisroots[head].add(child) ellipsisroots[child].update(roots) ellipsisroots[child].discard(child) def splithead(head): r1, r2, r3 = sorted(ellipsisroots[head]) for nr1, nr2 in ((r2, r3), (r1, r3), (r1, r2)): mid = repo.revs( b'sort(merge() & %d::%d & %d::%d, -rev)', nr1, head, nr2, head ) for j in mid: if j == nr2: return nr2, (nr1, nr2) if j not in ellipsisroots or len(ellipsisroots[j]) < 2: return j, (nr1, nr2) raise error.Abort( _( b'Failed to split up ellipsis node! head: %d, ' b'roots: %d %d %d' ) % (head, r1, r2, r3) ) missing = list(cl.findmissingrevs(common=commonrevs, heads=headsrevs)) visit = reversed(missing) relevant_nodes = set() visitnodes = [cl.node(m) for m in missing] required = set(headsrevs) | known for rev in visit: clrev = cl.changelogrevision(rev) ps = [prev for prev in cl.parentrevs(rev) if prev != nullrev] if depth is not None: curdepth = revdepth[rev] for p in ps: revdepth[p] = min(curdepth + 1, revdepth.get(p, depth + 1)) needed = False shallow_enough = depth is None or revdepth[rev] <= depth if shallow_enough: curmf = mfl[clrev.manifest].read() if ps: # We choose to not trust the changed files list in # changesets because it's not always correct. TODO: could # we trust it for the non-merge case? p1mf = mfl[cl.changelogrevision(ps[0]).manifest].read() needed = bool(curmf.diff(p1mf, match)) if not needed and len(ps) > 1: # For merge changes, the list of changed files is not # helpful, since we need to emit the merge if a file # in the narrow spec has changed on either side of the # merge. As a result, we do a manifest diff to check. p2mf = mfl[cl.changelogrevision(ps[1]).manifest].read() needed = bool(curmf.diff(p2mf, match)) else: # For a root node, we need to include the node if any # files in the node match the narrowspec. needed = any(curmf.walk(match)) if needed: for head in ellipsisheads[rev]: addroot(head, rev) for p in ps: required.add(p) relevant_nodes.add(cl.node(rev)) else: if not ps: ps = [nullrev] if rev in required: for head in ellipsisheads[rev]: addroot(head, rev) for p in ps: ellipsisheads[p].add(rev) else: for p in ps: ellipsisheads[p] |= ellipsisheads[rev] # add common changesets as roots of their reachable ellipsis heads for c in commonrevs: for head in ellipsisheads[c]: addroot(head, c) return visitnodes, relevant_nodes, ellipsisroots def caps20to10(repo, role): \"\"\"return a set with appropriate options to use bundle20 during getbundle\"\"\" caps = {b'HG20'} capsblob = bundle2.encodecaps(bundle2.getrepocaps(repo, role=role)) caps.add(b'bundle2=' + urlreq.quote(capsblob)) return caps # List of names of steps to perform for a bundle2 for getbundle, order matters. getbundle2partsorder = [] # Mapping between step name and function # # This exists to help extensions wrap steps if necessary getbundle2partsmapping = {} def getbundle2partsgenerator(stepname, idx=None): \"\"\"decorator for function generating bundle2 part for getbundle The function is added to the step -> function mapping and appended to the list of steps. Beware that decorated functions will be added in order (this may matter). You can only use this decorator for new steps, if you want to wrap a step from an extension, attack the getbundle2partsmapping dictionary directly.\"\"\" def dec(func): assert stepname not in getbundle2partsmapping getbundle2partsmapping[stepname] = func if idx is None: getbundle2partsorder.append(stepname) else: getbundle2partsorder.insert(idx, stepname) return func return dec def bundle2requested(bundlecaps): if bundlecaps is not None: return any(cap.startswith(b'HG2') for cap in bundlecaps) return False def getbundlechunks( repo, source, heads=None, common=None, bundlecaps=None, remote_sidedata=None, **kwargs ): \"\"\"Return chunks constituting a bundle's raw data. Could be a bundle HG10 or a bundle HG20 depending on bundlecaps passed. Returns a 2-tuple of a dict with metadata about the generated bundle and an iterator over raw chunks (of varying sizes). \"\"\" kwargs = pycompat.byteskwargs(kwargs) info = {} usebundle2 = bundle2requested(bundlecaps) # bundle10 case if not usebundle2: if bundlecaps and not kwargs.get(b'cg', True): raise ValueError( _(b'request for bundle10 must include changegroup') ) if kwargs: raise ValueError( _(b'unsupported getbundle arguments: %s') % b', '.join(sorted(kwargs.keys())) ) outgoing = _computeoutgoing(repo, heads, common) info[b'bundleversion'] = 1 return ( info, changegroup.makestream( repo, outgoing, b'01', source, bundlecaps=bundlecaps, remote_sidedata=remote_sidedata, ), ) # bundle20 case info[b'bundleversion'] = 2 b2caps = {} for bcaps in bundlecaps: if bcaps.startswith(b'bundle2='): blob = urlreq.unquote(bcaps[len(b'bundle2=') :]) b2caps.update(bundle2.decodecaps(blob)) bundler = bundle2.bundle20(repo.ui, b2caps) kwargs[b'heads'] = heads kwargs[b'common'] = common for name in getbundle2partsorder: func = getbundle2partsmapping[name] func( bundler, repo, source, bundlecaps=bundlecaps, b2caps=b2caps, remote_sidedata=remote_sidedata, **pycompat.strkwargs(kwargs) ) info[b'prefercompressed'] = bundler.prefercompressed return info, bundler.getchunks() @getbundle2partsgenerator(b'stream2') def _getbundlestream2(bundler, repo, *args, **kwargs): return bundle2.addpartbundlestream2(bundler, repo, **kwargs) @getbundle2partsgenerator(b'changegroup') def _getbundlechangegrouppart( bundler, repo, source, bundlecaps=None, b2caps=None, heads=None, common=None, remote_sidedata=None, **kwargs ): \"\"\"add a changegroup part to the requested bundle\"\"\" if not kwargs.get('cg', True) or not b2caps: return version = b'01' cgversions = b2caps.get(b'changegroup') if cgversions: # 3.1 and 3.2 ship with an empty value cgversions = [ v for v in cgversions if v in changegroup.supportedoutgoingversions(repo) ] if not cgversions: raise error.Abort(_(b'no common changegroup version')) version = max(cgversions) outgoing = _computeoutgoing(repo, heads, common) if not outgoing.missing: return if kwargs.get('narrow', False): include = sorted(filter(bool,"} +{"id":"RedPajamaGithub.0002","text":"\/\/------------------------------------------------------------------------------ \/\/ <auto-generated> \/\/ This code was generated by a tool. \/\/ Runtime Version:4.0.30319.42000 \/\/ \/\/ Changes to this file may cause incorrect behavior and will be lost if \/\/ the code is regenerated. \/\/ <\/auto-generated> \/\/------------------------------------------------------------------------------ namespace OpenLiveWriter.Localization { using System; \/\/\/ <summary> \/\/\/ A strongly-typed resource class, for looking up localized strings, etc. \/\/\/ <\/summary> \/\/ This class was auto-generated by the StronglyTypedResourceBuilder \/\/ class via a tool like ResGen or Visual Studio. \/\/ To add or remove a member, edit your .ResX file then rerun ResGen \/\/ with the \/str option, or rebuild your VS project. [global::System.CodeDom.Compiler.GeneratedCodeAttribute(\"System.Resources.Tools.StronglyTypedResourceBuilder\", \"4.0.0.0\")] [global::System.Diagnostics.DebuggerNonUserCodeAttribute()] [global::System.Runtime.CompilerServices.CompilerGeneratedAttribute()] public class Images { private static global::System.Resources.ResourceManager resourceMan; private static global::System.Globalization.CultureInfo resourceCulture; [global::System.Diagnostics.CodeAnalysis.SuppressMessageAttribute(\"Microsoft.Performance\", \"CA1811:AvoidUncalledPrivateCode\")] internal Images() { } \/\/\/ <summary> \/\/\/ Returns the cached ResourceManager instance used by this class. \/\/\/ <\/summary> [global::System.ComponentModel.EditorBrowsableAttribute(global::System.ComponentModel.EditorBrowsableState.Advanced)] public static global::System.Resources.ResourceManager ResourceManager { get { if (object.ReferenceEquals(resourceMan, null)) { global::System.Resources.ResourceManager temp = new global::System.Resources.ResourceManager(\"OpenLiveWriter.Localization.Images\", typeof(Images).Assembly); resourceMan = temp; } return resourceMan; } } \/\/\/ <summary> \/\/\/ Overrides the current thread's CurrentUICulture property for all \/\/\/ resource lookups using this strongly typed resource class. \/\/\/ <\/summary> [global::System.ComponentModel.EditorBrowsableAttribute(global::System.ComponentModel.EditorBrowsableState.Advanced)] public static global::System.Globalization.CultureInfo Culture { get { return resourceCulture; } set { resourceCulture = value; } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap About_LargeImage { get { object obj = ResourceManager.GetObject(\"About_LargeImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap About_SmallImage { get { object obj = ResourceManager.GetObject(\"About_SmallImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap Accounts_LargeImage { get { object obj = ResourceManager.GetObject(\"Accounts_LargeImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap Accounts_SmallImage { get { object obj = ResourceManager.GetObject(\"Accounts_SmallImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap AddDecorator { get { object obj = ResourceManager.GetObject(\"AddDecorator\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap AddPlugin { get { object obj = ResourceManager.GetObject(\"AddPlugin\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap AddPlugin_LargeImage { get { object obj = ResourceManager.GetObject(\"AddPlugin_LargeImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap AddPlugin_SmallImage { get { object obj = ResourceManager.GetObject(\"AddPlugin_SmallImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap AddTagProvider_LargeImage { get { object obj = ResourceManager.GetObject(\"AddTagProvider_LargeImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap AddTagProvider_SmallImage { get { object obj = ResourceManager.GetObject(\"AddTagProvider_SmallImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap AddWeblog { get { object obj = ResourceManager.GetObject(\"AddWeblog\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap AddWeblog_LargeImage { get { object obj = ResourceManager.GetObject(\"AddWeblog_LargeImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap AddWeblog_SmallImage { get { object obj = ResourceManager.GetObject(\"AddWeblog_SmallImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap AdjustBottomMargin_LargeImage { get { object obj = ResourceManager.GetObject(\"AdjustBottomMargin_LargeImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap AdjustBottomMargin_SmallImage { get { object obj = ResourceManager.GetObject(\"AdjustBottomMargin_SmallImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap AdjustLeftMargin_LargeImage { get { object obj = ResourceManager.GetObject(\"AdjustLeftMargin_LargeImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap AdjustLeftMargin_SmallImage { get { object obj = ResourceManager.GetObject(\"AdjustLeftMargin_SmallImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap AdjustRightMargin_LargeImage { get { object obj = ResourceManager.GetObject(\"AdjustRightMargin_LargeImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap AdjustRightMargin_SmallImage { get { object obj = ResourceManager.GetObject(\"AdjustRightMargin_SmallImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap AdjustTopMargin_LargeImage { get { object obj = ResourceManager.GetObject(\"AdjustTopMargin_LargeImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap AdjustTopMargin_SmallImage { get { object obj = ResourceManager.GetObject(\"AdjustTopMargin_SmallImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap AlignCenter { get { object obj = ResourceManager.GetObject(\"AlignCenter\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap AlignCenter_LargeImage { get { object obj = ResourceManager.GetObject(\"AlignCenter_LargeImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap AlignCenter_SmallHighContrastImage { get { object obj = ResourceManager.GetObject(\"AlignCenter_SmallHighContrastImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap AlignCenter_SmallImage { get { object obj = ResourceManager.GetObject(\"AlignCenter_SmallImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap AlignLeft { get { object obj = ResourceManager.GetObject(\"AlignLeft\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap AlignLeft_LargeImage { get { object obj = ResourceManager.GetObject(\"AlignLeft_LargeImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap AlignLeft_SmallHighContrastImage { get { object obj = ResourceManager.GetObject(\"AlignLeft_SmallHighContrastImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap AlignLeft_SmallImage { get { object obj = ResourceManager.GetObject(\"AlignLeft_SmallImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap Alignment_Center_48x48 { get { object obj = ResourceManager.GetObject(\"Alignment_Center_48x48\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap Alignment_Inline_48x48 { get { object obj = ResourceManager.GetObject(\"Alignment_Inline_48x48\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap Alignment_Left_48x48 { get { object obj = ResourceManager.GetObject(\"Alignment_Left_48x48\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap Alignment_Right_48x48 { get { object obj = ResourceManager.GetObject(\"Alignment_Right_48x48\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap AlignmentGallery_LargeImage { get { object obj = ResourceManager.GetObject(\"AlignmentGallery_LargeImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap AlignmentGallery_SmallImage { get { object obj = ResourceManager.GetObject(\"AlignmentGallery_SmallImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap AlignRight { get { object obj = ResourceManager.GetObject(\"AlignRight\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap AlignRight_LargeImage { get { object obj = ResourceManager.GetObject(\"AlignRight_LargeImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap AlignRight_SmallHighContrastImage { get { object obj = ResourceManager.GetObject(\"AlignRight_SmallHighContrastImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap AlignRight_SmallImage { get { object obj = ResourceManager.GetObject(\"AlignRight_SmallImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap Blockquote { get { object obj = ResourceManager.GetObject(\"Blockquote\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap Blockquote_LargeHighContrastImage { get { object obj = ResourceManager.GetObject(\"Blockquote_LargeHighContrastImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap Blockquote_LargeImage { get { object obj = ResourceManager.GetObject(\"Blockquote_LargeImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap Blockquote_SmallHighContrastImage { get { object obj = ResourceManager.GetObject(\"Blockquote_SmallHighContrastImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap Blockquote_SmallImage { get { object obj = ResourceManager.GetObject(\"Blockquote_SmallImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap BlogAccount_LargeImage { get { object obj = ResourceManager.GetObject(\"BlogAccount_LargeImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap BlogAccount_SmallImage { get { object obj = ResourceManager.GetObject(\"BlogAccount_SmallImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap BlogProviderButtonsGallery_LargeImage { get { object obj = ResourceManager.GetObject(\"BlogProviderButtonsGallery_LargeImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap BlogProviderButtonsGallery_SmallImage { get { object obj = ResourceManager.GetObject(\"BlogProviderButtonsGallery_SmallImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap BlogProviderShortcutsGroup_LargeImage { get { object obj = ResourceManager.GetObject(\"BlogProviderShortcutsGroup_LargeImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap BlogProviderShortcutsGroup_SmallImage { get { object obj = ResourceManager.GetObject(\"BlogProviderShortcutsGroup_SmallImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap BlogWebPreview_LargeImage { get { object obj = ResourceManager.GetObject(\"BlogWebPreview_LargeImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap BlogWebPreview_SmallImage { get { object obj = ResourceManager.GetObject(\"BlogWebPreview_SmallImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap Bold { get { object obj = ResourceManager.GetObject(\"Bold\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap Bold_LargeHighContrastImage { get { object obj = ResourceManager.GetObject(\"Bold_LargeHighContrastImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap Bold_LargeImage { get { object obj = ResourceManager.GetObject(\"Bold_LargeImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap Bold_SmallHighContrastImage { get { object obj = ResourceManager.GetObject(\"Bold_SmallHighContrastImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap Bold_SmallImage { get { object obj = ResourceManager.GetObject(\"Bold_SmallImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap Bullets { get { object obj = ResourceManager.GetObject(\"Bullets\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap Bullets_LargeHighContrastImage { get { object obj = ResourceManager.GetObject(\"Bullets_LargeHighContrastImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap Bullets_LargeImage { get { object obj = ResourceManager.GetObject(\"Bullets_LargeImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap Bullets_RTL { get { object obj = ResourceManager.GetObject(\"Bullets_RTL\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap Bullets_SmallHighContrastImage { get { object obj = ResourceManager.GetObject(\"Bullets_SmallHighContrastImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap Bullets_SmallImage { get { object obj = ResourceManager.GetObject(\"Bullets_SmallImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap CellProperties_LargeImage { get { object obj = ResourceManager.GetObject(\"CellProperties_LargeImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap CellProperties_SmallImage { get { object obj = ResourceManager.GetObject(\"CellProperties_SmallImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap CheckSpelling { get { object obj = ResourceManager.GetObject(\"CheckSpelling\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap CheckSpelling_LargeImage { get { object obj = ResourceManager.GetObject(\"CheckSpelling_LargeImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap CheckSpelling_SmallImage { get { object obj = ResourceManager.GetObject(\"CheckSpelling_SmallImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap Clear { get { object obj = ResourceManager.GetObject(\"Clear\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap ClearCell { get { object obj = ResourceManager.GetObject(\"ClearCell\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap ClearCell_LargeImage { get { object obj = ResourceManager.GetObject(\"ClearCell_LargeImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap ClearCell_SmallImage { get { object obj = ResourceManager.GetObject(\"ClearCell_SmallImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap ClearFormatting_LargeHighContrastImage { get { object obj = ResourceManager.GetObject(\"ClearFormatting_LargeHighContrastImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap ClearFormatting_LargeImage { get { object obj = ResourceManager.GetObject(\"ClearFormatting_LargeImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap ClearFormatting_SmallHighContrastImage { get { object obj = ResourceManager.GetObject(\"ClearFormatting_SmallHighContrastImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap ClearFormatting_SmallImage { get { object obj = ResourceManager.GetObject(\"ClearFormatting_SmallImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap ClipboardMenu { get { object obj = ResourceManager.GetObject(\"ClipboardMenu\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap Close_LargeImage { get { object obj = ResourceManager.GetObject(\"Close_LargeImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap Close_SmallImage { get { object obj = ResourceManager.GetObject(\"Close_SmallImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap ClosePreview_LargeImage { get { object obj = ResourceManager.GetObject(\"ClosePreview_LargeImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap ClosePreview_SmallImage { get { object obj = ResourceManager.GetObject(\"ClosePreview_SmallImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap Colorize { get { object obj = ResourceManager.GetObject(\"Colorize\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap ColumnProperties_LargeImage { get { object obj = ResourceManager.GetObject(\"ColumnProperties_LargeImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap ColumnProperties_SmallImage { get { object obj = ResourceManager.GetObject(\"ColumnProperties_SmallImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap ConfigureWeblog { get { object obj = ResourceManager.GetObject(\"ConfigureWeblog\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap ConfigureWeblog_LargeImage { get { object obj = ResourceManager.GetObject(\"ConfigureWeblog_LargeImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap ConfigureWeblog_SmallImage { get { object obj = ResourceManager.GetObject(\"ConfigureWeblog_SmallImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap Copy { get { object obj = ResourceManager.GetObject(\"Copy\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap CopyCommand_LargeImage { get { object obj = ResourceManager.GetObject(\"CopyCommand_LargeImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap CopyCommand_SmallImage { get { object obj = ResourceManager.GetObject(\"CopyCommand_SmallImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap CustomSizeGallery_LargeImage { get { object obj = ResourceManager.GetObject(\"CustomSizeGallery_LargeImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap CustomSizeGallery_SmallImage { get { object obj = ResourceManager.GetObject(\"CustomSizeGallery_SmallImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap Cut { get { object obj = ResourceManager.GetObject(\"Cut\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap Cut_LargeImage { get { object obj = ResourceManager.GetObject(\"Cut_LargeImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap Cut_SmallImage { get { object obj = ResourceManager.GetObject(\"Cut_SmallImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap DeleteColumn_LargeImage { get { object obj = ResourceManager.GetObject(\"DeleteColumn_LargeImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap DeleteColumn_SmallImage { get { object obj = ResourceManager.GetObject(\"DeleteColumn_SmallImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap DeleteDraft { get { object obj = ResourceManager.GetObject(\"DeleteDraft\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap DeleteDraft_LargeImage { get { object obj = ResourceManager.GetObject(\"DeleteDraft_LargeImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap DeleteDraft_SmallImage { get { object obj = ResourceManager.GetObject(\"DeleteDraft_SmallImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap DeleteRow_LargeImage { get { object obj = ResourceManager.GetObject(\"DeleteRow_LargeImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap DeleteRow_SmallImage { get { object obj = ResourceManager.GetObject(\"DeleteRow_SmallImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap DeleteTable { get { object obj = ResourceManager.GetObject(\"DeleteTable\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap DeleteTable_LargeImage { get { object obj = ResourceManager.GetObject(\"DeleteTable_LargeImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap DeleteTable_SmallImage { get { object obj = ResourceManager.GetObject(\"DeleteTable_SmallImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap EditTags_LargeImage { get { object obj = ResourceManager.GetObject(\"EditTags_LargeImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap EditTags_SmallImage { get { object obj = ResourceManager.GetObject(\"EditTags_SmallImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap Effects_Black_and_White { get { object obj = ResourceManager.GetObject(\"Effects_Black_and_White\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap Effects_Color_Pop { get { object obj = ResourceManager.GetObject(\"Effects_Color_Pop\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap Effects_Cool { get { object obj = ResourceManager.GetObject(\"Effects_Cool\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap Effects_Coolest { get { object obj = ResourceManager.GetObject(\"Effects_Coolest\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap Effects_Default { get { object obj = ResourceManager.GetObject(\"Effects_Default\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap Effects_Emboss { get { object obj = ResourceManager.GetObject(\"Effects_Emboss\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap Effects_Gaussian { get { object obj = ResourceManager.GetObject(\"Effects_Gaussian\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap Effects_None { get { object obj = ResourceManager.GetObject(\"Effects_None\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap Effects_Recolor { get { object obj = ResourceManager.GetObject(\"Effects_Recolor\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap Effects_Sepia { get { object obj = ResourceManager.GetObject(\"Effects_Sepia\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap Effects_Sharpen { get { object obj = ResourceManager.GetObject(\"Effects_Sharpen\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap Effects_Temperate { get { object obj = ResourceManager.GetObject(\"Effects_Temperate\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap Effects_Warm { get { object obj = ResourceManager.GetObject(\"Effects_Warm\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap Effects_Warmest { get { object obj = ResourceManager.GetObject(\"Effects_Warmest\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap Emoticon_All_Strip { get { object obj = ResourceManager.GetObject(\"Emoticon_All_Strip\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap FindButton_LargeImage { get { object obj = ResourceManager.GetObject(\"FindButton_LargeImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap FindButton_SmallImage { get { object obj = ResourceManager.GetObject(\"FindButton_SmallImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap Font { get { object obj = ResourceManager.GetObject(\"Font\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap FontBackgroundColor_SmallHighContrastImage { get { object obj = ResourceManager.GetObject(\"FontBackgroundColor_SmallHighContrastImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap FontBackgroundColor_SmallImage { get { object obj = ResourceManager.GetObject(\"FontBackgroundColor_SmallImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap FontColor { get { object obj = ResourceManager.GetObject(\"FontColor\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap FontColorPicker_LargeHighContrastImage { get { object obj = ResourceManager.GetObject(\"FontColorPicker_LargeHighContrastImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap FontColorPicker_LargeImage { get { object obj = ResourceManager.GetObject(\"FontColorPicker_LargeImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap FontColorPicker_SmallHighContrastImage { get { object obj = ResourceManager.GetObject(\"FontColorPicker_SmallHighContrastImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap FontColorPicker_SmallImage { get { object obj = ResourceManager.GetObject(\"FontColorPicker_SmallImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap FontGroup_LargeHighContrastImage { get { object obj = ResourceManager.GetObject(\"FontGroup_LargeHighContrastImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap FontGroup_LargeImage { get { object obj = ResourceManager.GetObject(\"FontGroup_LargeImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap FontGroup_SmallHighContrastImage { get { object obj = ResourceManager.GetObject(\"FontGroup_SmallHighContrastImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap FontGroup_SmallImage { get { object obj = ResourceManager.GetObject(\"FontGroup_SmallImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap FormatImageAdjustHeight_LargeImage { get { object obj = ResourceManager.GetObject(\"FormatImageAdjustHeight_LargeImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap FormatImageAdjustHeight_SmallImage { get { object obj = ResourceManager.GetObject(\"FormatImageAdjustHeight_SmallImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap FormatImageAdjustWidth_LargeImage { get { object obj = ResourceManager.GetObject(\"FormatImageAdjustWidth_LargeImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap FormatImageAdjustWidth_SmallImage { get { object obj = ResourceManager.GetObject(\"FormatImageAdjustWidth_SmallImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap FormatImageAltText_LargeImage { get { object obj = ResourceManager.GetObject(\"FormatImageAltText_LargeImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap FormatImageAltText_SmallImage { get { object obj = ResourceManager.GetObject(\"FormatImageAltText_SmallImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap FormatImageLinkOptions_LargeImage { get { object obj = ResourceManager.GetObject(\"FormatImageLinkOptions_LargeImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap FormatImageLinkOptions_SmallImage { get { object obj = ResourceManager.GetObject(\"FormatImageLinkOptions_SmallImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap FormatImageLockAspectRatio_SmallImage { get { object obj = ResourceManager.GetObject(\"FormatImageLockAspectRatio_SmallImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap FormatImagePropertiesGroup_LargeImage { get { object obj = ResourceManager.GetObject(\"FormatImagePropertiesGroup_LargeImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap FormatImagePropertiesGroup_SmallImage { get { object obj = ResourceManager.GetObject(\"FormatImagePropertiesGroup_SmallImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap FormatImageRevertSettings_LargeImage { get { object obj = ResourceManager.GetObject(\"FormatImageRevertSettings_LargeImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap FormatImageRevertSettings_SmallImage { get { object obj = ResourceManager.GetObject(\"FormatImageRevertSettings_SmallImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap FormatImageRotateGroup_LargeImage { get { object obj = ResourceManager.GetObject(\"FormatImageRotateGroup_LargeImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap FormatImageRotateGroup_SmallImage { get { object obj = ResourceManager.GetObject(\"FormatImageRotateGroup_SmallImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap FormatImageSelectLink_LargeImage { get { object obj = ResourceManager.GetObject(\"FormatImageSelectLink_LargeImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap FormatImageSelectLink_SmallImage { get { object obj = ResourceManager.GetObject(\"FormatImageSelectLink_SmallImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap FormatImageSettingsGroup_LargeImage { get { object obj = ResourceManager.GetObject(\"FormatImageSettingsGroup_LargeImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap FormatImageSettingsGroup_SmallImage { get { object obj = ResourceManager.GetObject(\"FormatImageSettingsGroup_SmallImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap FormatImageSizeGroup_LargeImage { get { object obj = ResourceManager.GetObject(\"FormatImageSizeGroup_LargeImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap FormatImageSizeGroup_SmallImage { get { object obj = ResourceManager.GetObject(\"FormatImageSizeGroup_SmallImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap FormatImageStyleGroup_LargeImage { get { object obj = ResourceManager.GetObject(\"FormatImageStyleGroup_LargeImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap FormatImageStyleGroup_SmallImage { get { object obj = ResourceManager.GetObject(\"FormatImageStyleGroup_SmallImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap FormatTableEditingGroup_LargeImage { get { object obj = ResourceManager.GetObject(\"FormatTableEditingGroup_LargeImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap FormatTableEditingGroup_SmallImage { get { object obj = ResourceManager.GetObject(\"FormatTableEditingGroup_SmallImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap FormatTableInsertGroup_SmallImage { get { object obj = ResourceManager.GetObject(\"FormatTableInsertGroup_SmallImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap FormatTableMoveGroup_SmallImage { get { object obj = ResourceManager.GetObject(\"FormatTableMoveGroup_SmallImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap FormatTablePropertiesGroup_SmallImage { get { object obj = ResourceManager.GetObject(\"FormatTablePropertiesGroup_SmallImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap FormatTablePropertiesSplit_LargeImage { get { object obj = ResourceManager.GetObject(\"FormatTablePropertiesSplit_LargeImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap FormatTablePropertiesSplit_SmallImage { get { object obj = ResourceManager.GetObject(\"FormatTablePropertiesSplit_SmallImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap FormatVideoGroup_LargeImage { get { object obj = ResourceManager.GetObject(\"FormatVideoGroup_LargeImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap FormatVideoGroup_SmallImage { get { object obj = ResourceManager.GetObject(\"FormatVideoGroup_SmallImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap Glossary { get { object obj = ResourceManager.GetObject(\"Glossary\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap Help { get { object obj = ResourceManager.GetObject(\"Help\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap Help_LargeImage { get { object obj = ResourceManager.GetObject(\"Help_LargeImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap Help_SmallImage { get { object obj = ResourceManager.GetObject(\"Help_SmallImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap ImageBorderGallery_LargeImage { get { object obj = ResourceManager.GetObject(\"ImageBorderGallery_LargeImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap ImageBorderGallery_SmallImage { get { object obj = ResourceManager.GetObject(\"ImageBorderGallery_SmallImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap ImageBrightness { get { object obj = ResourceManager.GetObject(\"ImageBrightness\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap ImageContrast_LargeImage { get { object obj = ResourceManager.GetObject(\"ImageContrast_LargeImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap ImageContrast_SmallImage { get { object obj = ResourceManager.GetObject(\"ImageContrast_SmallImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap ImageCrop_LargeImage { get { object obj = ResourceManager.GetObject(\"ImageCrop_LargeImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap ImageCrop_SmallImage { get { object obj = ResourceManager.GetObject(\"ImageCrop_SmallImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap ImageEffectsBlurGallery_LargeImage { get { object obj = ResourceManager.GetObject(\"ImageEffectsBlurGallery_LargeImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap ImageEffectsBlurGallery_SmallImage { get { object obj = ResourceManager.GetObject(\"ImageEffectsBlurGallery_SmallImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap ImageEffectsEmbossGallery_LargeImage { get { object obj = ResourceManager.GetObject(\"ImageEffectsEmbossGallery_LargeImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap ImageEffectsEmbossGallery_SmallImage { get { object obj = ResourceManager.GetObject(\"ImageEffectsEmbossGallery_SmallImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap ImageEffectsGallery_LargeImage { get { object obj = ResourceManager.GetObject(\"ImageEffectsGallery_LargeImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap ImageEffectsGallery_SmallImage { get { object obj = ResourceManager.GetObject(\"ImageEffectsGallery_SmallImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap ImageEffectsRecolorGallery_LargeImage { get { object obj = ResourceManager.GetObject(\"ImageEffectsRecolorGallery_LargeImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap ImageEffectsRecolorGallery_SmallImage { get { object obj = ResourceManager.GetObject(\"ImageEffectsRecolorGallery_SmallImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap ImageEffectsSharpenGallery_LargeImage { get { object obj = ResourceManager.GetObject(\"ImageEffectsSharpenGallery_LargeImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap ImageEffectsSharpenGallery_SmallImage { get { object obj = ResourceManager.GetObject(\"ImageEffectsSharpenGallery_SmallImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap ImageReset { get { object obj = ResourceManager.GetObject(\"ImageReset\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap ImageRotate { get { object obj = ResourceManager.GetObject(\"ImageRotate\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap ImageRotateCCW_LargeImage { get { object obj = ResourceManager.GetObject(\"ImageRotateCCW_LargeImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap ImageRotateCCW_SmallImage { get { object obj = ResourceManager.GetObject(\"ImageRotateCCW_SmallImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap ImageRotateCW_LargeImage { get { object obj = ResourceManager.GetObject(\"ImageRotateCW_LargeImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap ImageRotateCW_SmallImage { get { object obj = ResourceManager.GetObject(\"ImageRotateCW_SmallImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap ImageSaveDefaults { get { object obj = ResourceManager.GetObject(\"ImageSaveDefaults\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap ImageSaveDefaults_LargeImage { get { object obj = ResourceManager.GetObject(\"ImageSaveDefaults_LargeImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap ImageSaveDefaults_SmallImage { get { object obj = ResourceManager.GetObject(\"ImageSaveDefaults_SmallImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap ImageTilt_LargeImage { get { object obj = ResourceManager.GetObject(\"ImageTilt_LargeImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap ImageTilt_SmallImage { get { object obj = ResourceManager.GetObject(\"ImageTilt_SmallImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap Indent { get { object obj = ResourceManager.GetObject(\"Indent\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap Indent_SmallHighContrastImage { get { object obj = ResourceManager.GetObject(\"Indent_SmallHighContrastImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap Indent_SmallImage { get { object obj = ResourceManager.GetObject(\"Indent_SmallImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap InsertClearBreak_LargeImage { get { object obj = ResourceManager.GetObject(\"InsertClearBreak_LargeImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap InsertClearBreak_SmallImage { get { object obj = ResourceManager.GetObject(\"InsertClearBreak_SmallImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap InsertColumnLeft { get { object obj = ResourceManager.GetObject(\"InsertColumnLeft\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap InsertColumnLeft_LargeImage { get { object obj = ResourceManager.GetObject(\"InsertColumnLeft_LargeImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap InsertColumnLeft_SmallImage { get { object obj = ResourceManager.GetObject(\"InsertColumnLeft_SmallImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap InsertColumnRight { get { object obj = ResourceManager.GetObject(\"InsertColumnRight\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap InsertColumnRight_LargeImage { get { object obj = ResourceManager.GetObject(\"InsertColumnRight_LargeImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap InsertColumnRight_SmallImage { get { object obj = ResourceManager.GetObject(\"InsertColumnRight_SmallImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap InsertContent { get { object obj = ResourceManager.GetObject(\"InsertContent\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap InsertEmoticon_LargeImage { get { object obj = ResourceManager.GetObject(\"InsertEmoticon_LargeImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap InsertEmoticon_SmallImage { get { object obj = ResourceManager.GetObject(\"InsertEmoticon_SmallImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap InsertExtendedEntry { get { object obj = ResourceManager.GetObject(\"InsertExtendedEntry\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap InsertExtendedEntry_SmallImage { get { object obj = ResourceManager.GetObject(\"InsertExtendedEntry_SmallImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap InsertHorizontalLine_LargeImage { get { object obj = ResourceManager.GetObject(\"InsertHorizontalLine_LargeImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap InsertHorizontalLine_SmallImage { get { object obj = ResourceManager.GetObject(\"InsertHorizontalLine_SmallImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap InsertLink { get { object obj = ResourceManager.GetObject(\"InsertLink\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap InsertLink_LargeImage { get { object obj = ResourceManager.GetObject(\"InsertLink_LargeImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap InsertLink_SmallImage { get { object obj = ResourceManager.GetObject(\"InsertLink_SmallImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap InsertMap_LargeImage { get { object obj = ResourceManager.GetObject(\"InsertMap_LargeImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap InsertMap_SmallImage { get { object obj = ResourceManager.GetObject(\"InsertMap_SmallImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap InsertMenu { get { object obj = ResourceManager.GetObject(\"InsertMenu\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap InsertPicture { get { object obj = ResourceManager.GetObject(\"InsertPicture\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap InsertPictureFromFile_LargeImage { get { object obj = ResourceManager.GetObject(\"InsertPictureFromFile_LargeImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap InsertPictureFromFile_SmallImage { get { object obj = ResourceManager.GetObject(\"InsertPictureFromFile_SmallImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap InsertRowAbove { get { object obj = ResourceManager.GetObject(\"InsertRowAbove\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap InsertRowAbove_LargeImage { get { object obj = ResourceManager.GetObject(\"InsertRowAbove_LargeImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap InsertRowAbove_SmallImage { get { object obj = ResourceManager.GetObject(\"InsertRowAbove_SmallImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap InsertRowBelow { get { object obj = ResourceManager.GetObject(\"InsertRowBelow\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap InsertRowBelow_LargeImage { get { object obj = ResourceManager.GetObject(\"InsertRowBelow_LargeImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap InsertRowBelow_SmallImage { get { object obj = ResourceManager.GetObject(\"InsertRowBelow_SmallImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap InsertTable { get { object obj = ResourceManager.GetObject(\"InsertTable\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap InsertTable_LargeImage { get { object obj = ResourceManager.GetObject(\"InsertTable_LargeImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap InsertTable_SmallImage { get { object obj = ResourceManager.GetObject(\"InsertTable_SmallImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap InsertTable2 { get { object obj = ResourceManager.GetObject(\"InsertTable2\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap InsertTags_LargeImage { get { object obj = ResourceManager.GetObject(\"InsertTags_LargeImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap InsertTags_SmallImage { get { object obj = ResourceManager.GetObject(\"InsertTags_SmallImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap InsertVideoFromFile_LargeImage { get { object obj = ResourceManager.GetObject(\"InsertVideoFromFile_LargeImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap InsertVideoFromFile_SmallImage { get { object obj = ResourceManager.GetObject(\"InsertVideoFromFile_SmallImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap InsertVideoFromService_LargeImage { get { object obj = ResourceManager.GetObject(\"InsertVideoFromService_LargeImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap InsertVideoFromService_SmallImage { get { object obj = ResourceManager.GetObject(\"InsertVideoFromService_SmallImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap InsertVideoFromWeb_LargeImage { get { object obj = ResourceManager.GetObject(\"InsertVideoFromWeb_LargeImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap InsertVideoFromWeb_SmallImage { get { object obj = ResourceManager.GetObject(\"InsertVideoFromWeb_SmallImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap Italic { get { object obj = ResourceManager.GetObject(\"Italic\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap Italic_LargeHighContrastImage { get { object obj = ResourceManager.GetObject(\"Italic_LargeHighContrastImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap Italic_LargeImage { get { object obj = ResourceManager.GetObject(\"Italic_LargeImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap Italic_SmallHighContrastImage { get { object obj = ResourceManager.GetObject(\"Italic_SmallHighContrastImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap Italic_SmallImage { get { object obj = ResourceManager.GetObject(\"Italic_SmallImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap Justify { get { object obj = ResourceManager.GetObject(\"Justify\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap Justify_LargeImage { get { object obj = ResourceManager.GetObject(\"Justify_LargeImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap Justify_SmallHighContrastImage { get { object obj = ResourceManager.GetObject(\"Justify_SmallHighContrastImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap Justify_SmallImage { get { object obj = ResourceManager.GetObject(\"Justify_SmallImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap LTRTextBlock { get { object obj = ResourceManager.GetObject(\"LTRTextBlock\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap LTRTextBlock_LargeImage { get { object obj = ResourceManager.GetObject(\"LTRTextBlock_LargeImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap LTRTextBlock_SmallImage { get { object obj = ResourceManager.GetObject(\"LTRTextBlock_SmallImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap ManagePlugins_LargeImage { get { object obj = ResourceManager.GetObject(\"ManagePlugins_LargeImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap ManagePlugins_SmallImage { get { object obj = ResourceManager.GetObject(\"ManagePlugins_SmallImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap ManageTagProviders_LargeImage { get { object obj = ResourceManager.GetObject(\"ManageTagProviders_LargeImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap ManageTagProviders_SmallImage { get { object obj = ResourceManager.GetObject(\"ManageTagProviders_SmallImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap MapAddPushpin { get { object obj = ResourceManager.GetObject(\"MapAddPushpin\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap MapEditPushpin { get { object obj = ResourceManager.GetObject(\"MapEditPushpin\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap MarginsGroup_LargeImage { get { object obj = ResourceManager.GetObject(\"MarginsGroup_LargeImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap MarginsGroup_SmallImage { get { object obj = ResourceManager.GetObject(\"MarginsGroup_SmallImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap Missing_LargeImage { get { object obj = ResourceManager.GetObject(\"Missing_LargeImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap Missing_SmallImage { get { object obj = ResourceManager.GetObject(\"Missing_SmallImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap MoveColumnLeft { get { object obj = ResourceManager.GetObject(\"MoveColumnLeft\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap MoveColumnLeft_LargeImage { get { object obj = ResourceManager.GetObject(\"MoveColumnLeft_LargeImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap MoveColumnLeft_SmallImage { get { object obj = ResourceManager.GetObject(\"MoveColumnLeft_SmallImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap MoveColumnRight { get { object obj = ResourceManager.GetObject(\"MoveColumnRight\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap MoveColumnRight_LargeImage { get { object obj = ResourceManager.GetObject(\"MoveColumnRight_LargeImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap MoveColumnRight_SmallImage { get { object obj = ResourceManager.GetObject(\"MoveColumnRight_SmallImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap MoveRowDown { get { object obj = ResourceManager.GetObject(\"MoveRowDown\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap MoveRowDown_LargeImage { get { object obj = ResourceManager.GetObject(\"MoveRowDown_LargeImage\", resourceCulture); return ((System.Drawing.Bitmap)(obj)); } } \/\/\/ <summary> \/\/\/ Looks up a localized resource of type System.Drawing.Bitmap. \/\/\/ <\/summary> public static System.Drawing.Bitmap"} +{"id":"RedPajamaGithub.0003","text":"<!DOCTYPE html> <html lang=\"en\"> <head> <meta charset=\"UTF-8\" \/> <meta name=\"robots\" content=\"index, follow, all\" \/> <title>Thelia\\Model\\Base\\CouponVersionQuery | Thelia 2 API<\/title> <link rel=\"stylesheet\" type=\"text\/css\" href=\"..\/..\/..\/css\/bootstrap.min.css\"> <link rel=\"stylesheet\" type=\"text\/css\" href=\"..\/..\/..\/css\/bootstrap-theme.min.css\"> <link rel=\"stylesheet\" type=\"text\/css\" href=\"..\/..\/..\/css\/sami.css\"> <script src=\"..\/..\/..\/js\/jquery-1.11.1.min.js\"><\/script> <script src=\"..\/..\/..\/js\/bootstrap.min.js\"><\/script> <script src=\"..\/..\/..\/js\/typeahead.min.js\"><\/script> <script src=\"..\/..\/..\/sami.js\"><\/script> <meta name=\"MobileOptimized\" content=\"width\"> <meta name=\"HandheldFriendly\" content=\"true\"> <meta name=\"viewport\" content=\"width=device-width,initial-scale=1,maximum-scale=1\"> <\/head> <body id=\"class\" data-name=\"class:Thelia_Model_Base_CouponVersionQuery\" data-root-path=\"..\/..\/..\/\"> <div id=\"content\"> <div id=\"left-column\"> <div id=\"control-panel\"> <form id=\"search-form\" action=\"..\/..\/..\/search.html\" method=\"GET\"> <span class=\"glyphicon glyphicon-search\"><\/span> <input name=\"search\" class=\"typeahead form-control\" type=\"search\" placeholder=\"Search\"> <\/form> <\/div> <div id=\"api-tree\"><\/div> <\/div> <div id=\"right-column\"> <nav id=\"site-nav\" class=\"navbar navbar-default\" role=\"navigation\"> <div class=\"container-fluid\"> <div class=\"navbar-header\"> <button type=\"button\" class=\"navbar-toggle\" data-toggle=\"collapse\" data-target=\"#navbar-elements\"> <span class=\"sr-only\">Toggle navigation<\/span> <span class=\"icon-bar\"><\/span> <span class=\"icon-bar\"><\/span> <span class=\"icon-bar\"><\/span> <\/button> <a class=\"navbar-brand\" href=\"..\/..\/..\/index.html\">Thelia 2 API<\/a> <\/div> <div class=\"collapse navbar-collapse\" id=\"navbar-elements\"> <ul class=\"nav navbar-nav\"> <li><a href=\"..\/..\/..\/classes.html\">Classes<\/a><\/li> <li><a href=\"..\/..\/..\/namespaces.html\">Namespaces<\/a><\/li> <li><a href=\"..\/..\/..\/interfaces.html\">Interfaces<\/a><\/li> <li><a href=\"..\/..\/..\/traits.html\">Traits<\/a><\/li> <li><a href=\"..\/..\/..\/doc-index.html\">Index<\/a><\/li> <li><a href=\"..\/..\/..\/search.html\">Search<\/a><\/li> <\/ul> <\/div> <\/div> <\/nav> <div class=\"namespace-breadcrumbs\"> <ol class=\"breadcrumb\"> <li><span class=\"label label-default\">class<\/span><\/li> <li><a href=\"..\/..\/..\/Thelia.html\">Thelia<\/a><\/li> <li><a href=\"..\/..\/..\/Thelia\/Model.html\">Model<\/a><\/li> <li><a href=\"..\/..\/..\/Thelia\/Model\/Base.html\">Base<\/a><\/li> <li>CouponVersionQuery<\/li> <\/ol> <\/div> <div id=\"page-content\"> <div class=\"page-header\"> <h1>CouponVersionQuery<\/h1> <\/div> <p> class <strong>CouponVersionQuery<\/strong> extends <abbr title=\"Propel\\Runtime\\ActiveQuery\\ModelCriteria\">ModelCriteria<\/abbr> <\/p> <div class=\"description\"> <p>Base class that represents a query for the 'coupon_version' table.<\/p> <\/div> <h2>Methods<\/h2> <div class=\"container-fluid underlined\"> <div class=\"row\"> <div class=\"col-md-2 type\"> <\/div> <div class=\"col-md-8 type\"> <a href=\"#method___construct\">__construct<\/a>( string $dbName = 'thelia', string $modelName = '\\\\Thelia\\\\Model\\\\CouponVersion', string $modelAlias = null) <p>Initializes internal state of \\Thelia\\Model\\Base\\CouponVersionQuery object.<\/p> <\/div> <div class=\"col-md-2\"><\/div> <\/div> <div class=\"row\"> <div class=\"col-md-2 type\"> static  <a href=\"..\/..\/..\/Thelia\/Model\/CouponVersionQuery.html\"><abbr title=\"Thelia\\Model\\CouponVersionQuery\">CouponVersionQuery<\/abbr><\/a> <\/div> <div class=\"col-md-8 type\"> <a href=\"#method_create\">create<\/a>( string $modelAlias = null, <abbr title=\"Propel\\Runtime\\ActiveQuery\\Criteria\">Criteria<\/abbr> $criteria = null) <p>Returns a new ChildCouponVersionQuery object.<\/p> <\/div> <div class=\"col-md-2\"><\/div> <\/div> <div class=\"row\"> <div class=\"col-md-2 type\"> <a href=\"..\/..\/..\/Thelia\/Model\/CouponVersion.html\"><abbr title=\"Thelia\\Model\\CouponVersion\">CouponVersion<\/abbr><\/a>|array|mixed <\/div> <div class=\"col-md-8 type\"> <a href=\"#method_findPk\">findPk<\/a>($key, $con = null) <p>Find object by primary key.<\/p> <\/div> <div class=\"col-md-2\"><\/div> <\/div> <div class=\"row\"> <div class=\"col-md-2 type\"> <abbr title=\"Propel\\Runtime\\Collection\\ObjectCollection\">ObjectCollection<\/abbr>|array|mixed <\/div> <div class=\"col-md-8 type\"> <a href=\"#method_findPks\">findPks<\/a>( array $keys, <abbr title=\"Propel\\Runtime\\Connection\\ConnectionInterface\">ConnectionInterface<\/abbr> $con = null) <p>Find objects by primary key <code> $objs = $c->findPks(array(array(12, 56), array(832, 123), array(123, 456)), $con); <\/code><\/p> <\/div> <div class=\"col-md-2\"><\/div> <\/div> <div class=\"row\"> <div class=\"col-md-2 type\"> <a href=\"..\/..\/..\/Thelia\/Model\/CouponVersionQuery.html\"><abbr title=\"Thelia\\Model\\CouponVersionQuery\">CouponVersionQuery<\/abbr><\/a> <\/div> <div class=\"col-md-8 type\"> <a href=\"#method_filterByPrimaryKey\">filterByPrimaryKey<\/a>( mixed $key) <p>Filter the query by primary key<\/p> <\/div> <div class=\"col-md-2\"><\/div> <\/div> <div class=\"row\"> <div class=\"col-md-2 type\"> <a href=\"..\/..\/..\/Thelia\/Model\/CouponVersionQuery.html\"><abbr title=\"Thelia\\Model\\CouponVersionQuery\">CouponVersionQuery<\/abbr><\/a> <\/div> <div class=\"col-md-8 type\"> <a href=\"#method_filterByPrimaryKeys\">filterByPrimaryKeys<\/a>( array $keys) <p>Filter the query by a list of primary keys<\/p> <\/div> <div class=\"col-md-2\"><\/div> <\/div> <div class=\"row\"> <div class=\"col-md-2 type\"> <a href=\"..\/..\/..\/Thelia\/Model\/CouponVersionQuery.html\"><abbr title=\"Thelia\\Model\\CouponVersionQuery\">CouponVersionQuery<\/abbr><\/a> <\/div> <div class=\"col-md-8 type\"> <a href=\"#method_filterById\">filterById<\/a>( mixed $id = null, string $comparison = null) <p>Filter the query on the id column<\/p> <\/div> <div class=\"col-md-2\"><\/div> <\/div> <div class=\"row\"> <div class=\"col-md-2 type\"> <a href=\"..\/..\/..\/Thelia\/Model\/CouponVersionQuery.html\"><abbr title=\"Thelia\\Model\\CouponVersionQuery\">CouponVersionQuery<\/abbr><\/a> <\/div> <div class=\"col-md-8 type\"> <a href=\"#method_filterByCode\">filterByCode<\/a>( string $code = null, string $comparison = null) <p>Filter the query on the code column<\/p> <\/div> <div class=\"col-md-2\"><\/div> <\/div> <div class=\"row\"> <div class=\"col-md-2 type\"> <a href=\"..\/..\/..\/Thelia\/Model\/CouponVersionQuery.html\"><abbr title=\"Thelia\\Model\\CouponVersionQuery\">CouponVersionQuery<\/abbr><\/a> <\/div> <div class=\"col-md-8 type\"> <a href=\"#method_filterByType\">filterByType<\/a>( string $type = null, string $comparison = null) <p>Filter the query on the type column<\/p> <\/div> <div class=\"col-md-2\"><\/div> <\/div> <div class=\"row\"> <div class=\"col-md-2 type\"> <a href=\"..\/..\/..\/Thelia\/Model\/CouponVersionQuery.html\"><abbr title=\"Thelia\\Model\\CouponVersionQuery\">CouponVersionQuery<\/abbr><\/a> <\/div> <div class=\"col-md-8 type\"> <a href=\"#method_filterBySerializedEffects\">filterBySerializedEffects<\/a>( string $serializedEffects = null, string $comparison = null) <p>Filter the query on the serialized_effects column<\/p> <\/div> <div class=\"col-md-2\"><\/div> <\/div> <div class=\"row\"> <div class=\"col-md-2 type\"> <a href=\"..\/..\/..\/Thelia\/Model\/CouponVersionQuery.html\"><abbr title=\"Thelia\\Model\\CouponVersionQuery\">CouponVersionQuery<\/abbr><\/a> <\/div> <div class=\"col-md-8 type\"> <a href=\"#method_filterByIsEnabled\">filterByIsEnabled<\/a>( boolean|string $isEnabled = null, string $comparison = null) <p>Filter the query on the is_enabled column<\/p> <\/div> <div class=\"col-md-2\"><\/div> <\/div> <div class=\"row\"> <div class=\"col-md-2 type\"> <a href=\"..\/..\/..\/Thelia\/Model\/CouponVersionQuery.html\"><abbr title=\"Thelia\\Model\\CouponVersionQuery\">CouponVersionQuery<\/abbr><\/a> <\/div> <div class=\"col-md-8 type\"> <a href=\"#method_filterByStartDate\">filterByStartDate<\/a>( mixed $startDate = null, string $comparison = null) <p>Filter the query on the start_date column<\/p> <\/div> <div class=\"col-md-2\"><\/div> <\/div> <div class=\"row\"> <div class=\"col-md-2 type\"> <a href=\"..\/..\/..\/Thelia\/Model\/CouponVersionQuery.html\"><abbr title=\"Thelia\\Model\\CouponVersionQuery\">CouponVersionQuery<\/abbr><\/a> <\/div> <div class=\"col-md-8 type\"> <a href=\"#method_filterByExpirationDate\">filterByExpirationDate<\/a>( mixed $expirationDate = null, string $comparison = null) <p>Filter the query on the expiration_date column<\/p> <\/div> <div class=\"col-md-2\"><\/div> <\/div> <div class=\"row\"> <div class=\"col-md-2 type\"> <a href=\"..\/..\/..\/Thelia\/Model\/CouponVersionQuery.html\"><abbr title=\"Thelia\\Model\\CouponVersionQuery\">CouponVersionQuery<\/abbr><\/a> <\/div> <div class=\"col-md-8 type\"> <a href=\"#method_filterByMaxUsage\">filterByMaxUsage<\/a>( mixed $maxUsage = null, string $comparison = null) <p>Filter the query on the max_usage column<\/p> <\/div> <div class=\"col-md-2\"><\/div> <\/div> <div class=\"row\"> <div class=\"col-md-2 type\"> <a href=\"..\/..\/..\/Thelia\/Model\/CouponVersionQuery.html\"><abbr title=\"Thelia\\Model\\CouponVersionQuery\">CouponVersionQuery<\/abbr><\/a> <\/div> <div class=\"col-md-8 type\"> <a href=\"#method_filterByIsCumulative\">filterByIsCumulative<\/a>( boolean|string $isCumulative = null, string $comparison = null) <p>Filter the query on the is_cumulative column<\/p> <\/div> <div class=\"col-md-2\"><\/div> <\/div> <div class=\"row\"> <div class=\"col-md-2 type\"> <a href=\"..\/..\/..\/Thelia\/Model\/CouponVersionQuery.html\"><abbr title=\"Thelia\\Model\\CouponVersionQuery\">CouponVersionQuery<\/abbr><\/a> <\/div> <div class=\"col-md-8 type\"> <a href=\"#method_filterByIsRemovingPostage\">filterByIsRemovingPostage<\/a>( boolean|string $isRemovingPostage = null, string $comparison = null) <p>Filter the query on the is<em>removing<\/em>postage column<\/p> <\/div> <div class=\"col-md-2\"><\/div> <\/div> <div class=\"row\"> <div class=\"col-md-2 type\"> <a href=\"..\/..\/..\/Thelia\/Model\/CouponVersionQuery.html\"><abbr title=\"Thelia\\Model\\CouponVersionQuery\">CouponVersionQuery<\/abbr><\/a> <\/div> <div class=\"col-md-8 type\"> <a href=\"#method_filterByIsAvailableOnSpecialOffers\">filterByIsAvailableOnSpecialOffers<\/a>( boolean|string $isAvailableOnSpecialOffers = null, string $comparison = null) <p>Filter the query on the is<em>available<\/em>on<em>special<\/em>offers column<\/p> <\/div> <div class=\"col-md-2\"><\/div> <\/div> <div class=\"row\"> <div class=\"col-md-2 type\"> <a href=\"..\/..\/..\/Thelia\/Model\/CouponVersionQuery.html\"><abbr title=\"Thelia\\Model\\CouponVersionQuery\">CouponVersionQuery<\/abbr><\/a> <\/div> <div class=\"col-md-8 type\"> <a href=\"#method_filterByIsUsed\">filterByIsUsed<\/a>( boolean|string $isUsed = null, string $comparison = null) <p>Filter the query on the is_used column<\/p> <\/div> <div class=\"col-md-2\"><\/div> <\/div> <div class=\"row\"> <div class=\"col-md-2 type\"> <a href=\"..\/..\/..\/Thelia\/Model\/CouponVersionQuery.html\"><abbr title=\"Thelia\\Model\\CouponVersionQuery\">CouponVersionQuery<\/abbr><\/a> <\/div> <div class=\"col-md-8 type\"> <a href=\"#method_filterBySerializedConditions\">filterBySerializedConditions<\/a>( string $serializedConditions = null, string $comparison = null) <p>Filter the query on the serialized_conditions column<\/p> <\/div> <div class=\"col-md-2\"><\/div> <\/div> <div class=\"row\"> <div class=\"col-md-2 type\"> <a href=\"..\/..\/..\/Thelia\/Model\/CouponVersionQuery.html\"><abbr title=\"Thelia\\Model\\CouponVersionQuery\">CouponVersionQuery<\/abbr><\/a> <\/div> <div class=\"col-md-8 type\"> <a href=\"#method_filterByPerCustomerUsageCount\">filterByPerCustomerUsageCount<\/a>( boolean|string $perCustomerUsageCount = null, string $comparison = null) <p>Filter the query on the per<em>customer<\/em>usage_count column<\/p> <\/div> <div class=\"col-md-2\"><\/div> <\/div> <div class=\"row\"> <div class=\"col-md-2 type\"> <a href=\"..\/..\/..\/Thelia\/Model\/CouponVersionQuery.html\"><abbr title=\"Thelia\\Model\\CouponVersionQuery\">CouponVersionQuery<\/abbr><\/a> <\/div> <div class=\"col-md-8 type\"> <a href=\"#method_filterByCreatedAt\">filterByCreatedAt<\/a>( mixed $createdAt = null, string $comparison = null) <p>Filter the query on the created_at column<\/p> <\/div> <div class=\"col-md-2\"><\/div> <\/div> <div class=\"row\"> <div class=\"col-md-2 type\"> <a href=\"..\/..\/..\/Thelia\/Model\/CouponVersionQuery.html\"><abbr title=\"Thelia\\Model\\CouponVersionQuery\">CouponVersionQuery<\/abbr><\/a> <\/div> <div class=\"col-md-8 type\"> <a href=\"#method_filterByUpdatedAt\">filterByUpdatedAt<\/a>( mixed $updatedAt = null, string $comparison = null) <p>Filter the query on the updated_at column<\/p> <\/div> <div class=\"col-md-2\"><\/div> <\/div> <div class=\"row\"> <div class=\"col-md-2 type\"> <a href=\"..\/..\/..\/Thelia\/Model\/CouponVersionQuery.html\"><abbr title=\"Thelia\\Model\\CouponVersionQuery\">CouponVersionQuery<\/abbr><\/a> <\/div> <div class=\"col-md-8 type\"> <a href=\"#method_filterByVersion\">filterByVersion<\/a>( mixed $version = null, string $comparison = null) <p>Filter the query on the version column<\/p> <\/div> <div class=\"col-md-2\"><\/div> <\/div> <div class=\"row\"> <div class=\"col-md-2 type\"> <a href=\"..\/..\/..\/Thelia\/Model\/CouponVersionQuery.html\"><abbr title=\"Thelia\\Model\\CouponVersionQuery\">CouponVersionQuery<\/abbr><\/a> <\/div> <div class=\"col-md-8 type\"> <a href=\"#method_filterByVersionCreatedAt\">filterByVersionCreatedAt<\/a>( mixed $versionCreatedAt = null, string $comparison = null) <p>Filter the query on the version<em>created<\/em>at column<\/p> <\/div> <div class=\"col-md-2\"><\/div> <\/div> <div class=\"row\"> <div class=\"col-md-2 type\"> <a href=\"..\/..\/..\/Thelia\/Model\/CouponVersionQuery.html\"><abbr title=\"Thelia\\Model\\CouponVersionQuery\">CouponVersionQuery<\/abbr><\/a> <\/div> <div class=\"col-md-8 type\"> <a href=\"#method_filterByVersionCreatedBy\">filterByVersionCreatedBy<\/a>( string $versionCreatedBy = null, string $comparison = null) <p>Filter the query on the version<em>created<\/em>by column<\/p> <\/div> <div class=\"col-md-2\"><\/div> <\/div> <div class=\"row\"> <div class=\"col-md-2 type\"> <a href=\"..\/..\/..\/Thelia\/Model\/CouponVersionQuery.html\"><abbr title=\"Thelia\\Model\\CouponVersionQuery\">CouponVersionQuery<\/abbr><\/a> <\/div> <div class=\"col-md-8 type\"> <a href=\"#method_filterByCoupon\">filterByCoupon<\/a>( <a href=\"..\/..\/..\/Thelia\/Model\/Coupon.html\"><abbr title=\"Thelia\\Model\\Coupon\">Coupon<\/abbr><\/a>|<abbr title=\"Propel\\Runtime\\Collection\\ObjectCollection\">ObjectCollection<\/abbr> $coupon, string $comparison = null) <p>Filter the query by a related \\Thelia\\Model\\Coupon object<\/p> <\/div> <div class=\"col-md-2\"><\/div> <\/div> <div class=\"row\"> <div class=\"col-md-2 type\"> <a href=\"..\/..\/..\/Thelia\/Model\/CouponVersionQuery.html\"><abbr title=\"Thelia\\Model\\CouponVersionQuery\">CouponVersionQuery<\/abbr><\/a> <\/div> <div class=\"col-md-8 type\"> <a href=\"#method_joinCoupon\">joinCoupon<\/a>( string $relationAlias = null, string $joinType = Criteria::INNER_JOIN) <p>Adds a JOIN clause to the query using the Coupon relation<\/p> <\/div> <div class=\"col-md-2\"><\/div> <\/div> <div class=\"row\"> <div class=\"col-md-2 type\"> <a href=\"..\/..\/..\/Thelia\/Model\/CouponQuery.html\"><abbr title=\"Thelia\\Model\\CouponQuery\">CouponQuery<\/abbr><\/a> <\/div> <div class=\"col-md-8 type\"> <a href=\"#method_useCouponQuery\">useCouponQuery<\/a>( string $relationAlias = null, string $joinType = Criteria::INNER_JOIN) <p>Use the Coupon relation Coupon object<\/p> <\/div> <div class=\"col-md-2\"><\/div> <\/div> <div class=\"row\"> <div class=\"col-md-2 type\"> <a href=\"..\/..\/..\/Thelia\/Model\/CouponVersionQuery.html\"><abbr title=\"Thelia\\Model\\CouponVersionQuery\">CouponVersionQuery<\/abbr><\/a> <\/div> <div class=\"col-md-8 type\"> <a href=\"#method_prune\">prune<\/a>( <a href=\"..\/..\/..\/Thelia\/Model\/CouponVersion.html\"><abbr title=\"Thelia\\Model\\CouponVersion\">CouponVersion<\/abbr><\/a> $couponVersion = null) <p>Exclude object from result<\/p> <\/div> <div class=\"col-md-2\"><\/div> <\/div> <div class=\"row\"> <div class=\"col-md-2 type\"> int <\/div> <div class=\"col-md-8 type\"> <a href=\"#method_doDeleteAll\">doDeleteAll<\/a>( <abbr title=\"Thelia\\Model\\Base\\Propel\\Runtime\\Connection\\ConnectionInterface\">ConnectionInterface<\/abbr> $con = null) <p>Deletes all rows from the coupon_version table.<\/p> <\/div> <div class=\"col-md-2\"><\/div> <\/div> <div class=\"row\"> <div class=\"col-md-2 type\"> int <\/div> <div class=\"col-md-8 type\"> <a href=\"#method_delete\">delete<\/a>( <abbr title=\"Thelia\\Model\\Base\\Propel\\Runtime\\Connection\\ConnectionInterface\">ConnectionInterface<\/abbr> $con = null) <p>Performs a DELETE on the database, given a ChildCouponVersion or Criteria object OR a primary key value.<\/p> <\/div> <div class=\"col-md-2\"><\/div> <\/div> <div class=\"row\"> <div class=\"col-md-2 type\"> <abbr title=\"ChildCouponVersionQuery\">ChildCouponVersionQuery<\/abbr> <\/div> <div class=\"col-md-8 type\"> <a href=\"#method_orderById\">orderById<\/a>($order = Criteria::ASC) <p>Order by the id column<\/p> <\/div> <div class=\"col-md-2\"><\/div> <\/div> <div class=\"row\"> <div class=\"col-md-2 type\"> <abbr title=\"ChildCouponVersionQuery\">ChildCouponVersionQuery<\/abbr> <\/div> <div class=\"col-md-8 type\"> <a href=\"#method_orderByCode\">orderByCode<\/a>($order = Criteria::ASC) <p>Order by the code column<\/p> <\/div> <div class=\"col-md-2\"><\/div> <\/div> <div class=\"row\"> <div class=\"col-md-2 type\"> <abbr title=\"ChildCouponVersionQuery\">ChildCouponVersionQuery<\/abbr> <\/div> <div class=\"col-md-8 type\"> <a href=\"#method_orderByType\">orderByType<\/a>($order = Criteria::ASC) <p>Order by the type column<\/p> <\/div> <div class=\"col-md-2\"><\/div> <\/div> <div class=\"row\"> <div class=\"col-md-2 type\"> <abbr title=\"ChildCouponVersionQuery\">ChildCouponVersionQuery<\/abbr> <\/div> <div class=\"col-md-8 type\"> <a href=\"#method_orderBySerializedEffects\">orderBySerializedEffects<\/a>($order = Criteria::ASC) <p>Order by the serialized_effects column<\/p> <\/div> <div class=\"col-md-2\"><\/div> <\/div> <div class=\"row\"> <div class=\"col-md-2 type\"> <abbr title=\"ChildCouponVersionQuery\">ChildCouponVersionQuery<\/abbr> <\/div> <div class=\"col-md-8 type\"> <a href=\"#method_orderByIsEnabled\">orderByIsEnabled<\/a>($order = Criteria::ASC) <p>Order by the is_enabled column<\/p> <\/div> <div class=\"col-md-2\"><\/div> <\/div> <div class=\"row\"> <div class=\"col-md-2 type\"> <abbr title=\"ChildCouponVersionQuery\">ChildCouponVersionQuery<\/abbr> <\/div> <div class=\"col-md-8 type\"> <a href=\"#method_orderByStartDate\">orderByStartDate<\/a>($order = Criteria::ASC) <p>Order by the start_date column<\/p> <\/div> <div class=\"col-md-2\"><\/div> <\/div> <div class=\"row\"> <div class=\"col-md-2 type\"> <abbr title=\"ChildCouponVersionQuery\">ChildCouponVersionQuery<\/abbr> <\/div> <div class=\"col-md-8 type\"> <a href=\"#method_orderByExpirationDate\">orderByExpirationDate<\/a>($order = Criteria::ASC) <p>Order by the expiration_date column<\/p> <\/div> <div class=\"col-md-2\"><\/div> <\/div> <div class=\"row\"> <div class=\"col-md-2 type\"> <abbr title=\"ChildCouponVersionQuery\">ChildCouponVersionQuery<\/abbr> <\/div> <div class=\"col-md-8 type\"> <a href=\"#method_orderByMaxUsage\">orderByMaxUsage<\/a>($order = Criteria::ASC) <p>Order by the max_usage column<\/p> <\/div> <div class=\"col-md-2\"><\/div> <\/div> <div class=\"row\"> <div class=\"col-md-2 type\"> <abbr title=\"ChildCouponVersionQuery\">ChildCouponVersionQuery<\/abbr> <\/div> <div class=\"col-md-8 type\"> <a href=\"#method_orderByIsCumulative\">orderByIsCumulative<\/a>($order = Criteria::ASC) <p>Order by the is_cumulative column<\/p> <\/div> <div class=\"col-md-2\"><\/div> <\/div> <div class=\"row\"> <div class=\"col-md-2 type\"> <abbr title=\"ChildCouponVersionQuery\">ChildCouponVersionQuery<\/abbr> <\/div> <div class=\"col-md-8 type\"> <a href=\"#method_orderByIsRemovingPostage\">orderByIsRemovingPostage<\/a>($order = Criteria::ASC) <p>Order by the is<em>removing<\/em>postage column<\/p> <\/div> <div class=\"col-md-2\"><\/div> <\/div> <div class=\"row\"> <div class=\"col-md-2 type\"> <abbr title=\"ChildCouponVersionQuery\">ChildCouponVersionQuery<\/abbr> <\/div> <div class=\"col-md-8 type\"> <a href=\"#method_orderByIsAvailableOnSpecialOffers\">orderByIsAvailableOnSpecialOffers<\/a>($order = Criteria::ASC) <p>Order by the is<em>available<\/em>on<em>special<\/em>offers column<\/p> <\/div> <div class=\"col-md-2\"><\/div> <\/div> <div class=\"row\"> <div class=\"col-md-2 type\"> <abbr title=\"ChildCouponVersionQuery\">ChildCouponVersionQuery<\/abbr> <\/div> <div class=\"col-md-8 type\"> <a href=\"#method_orderByIsUsed\">orderByIsUsed<\/a>($order = Criteria::ASC) <p>Order by the is_used column<\/p> <\/div> <div class=\"col-md-2\"><\/div> <\/div> <div class=\"row\"> <div class=\"col-md-2 type\"> <abbr title=\"ChildCouponVersionQuery\">ChildCouponVersionQuery<\/abbr> <\/div> <div class=\"col-md-8 type\"> <a href=\"#method_orderBySerializedConditions\">orderBySerializedConditions<\/a>($order = Criteria::ASC) <p>Order by the serialized_conditions column<\/p> <\/div> <div class=\"col-md-2\"><\/div> <\/div> <div class=\"row\"> <div class=\"col-md-2 type\"> <abbr title=\"ChildCouponVersionQuery\">ChildCouponVersionQuery<\/abbr> <\/div> <div class=\"col-md-8 type\"> <a href=\"#method_orderByPerCustomerUsageCount\">orderByPerCustomerUsageCount<\/a>($order = Criteria::ASC) <p>Order by the per<em>customer<\/em>usage_count column<\/p> <\/div> <div class=\"col-md-2\"><\/div> <\/div> <div class=\"row\"> <div class=\"col-md-2 type\"> <abbr title=\"ChildCouponVersionQuery\">ChildCouponVersionQuery<\/abbr> <\/div> <div class=\"col-md-8 type\"> <a href=\"#method_orderByCreatedAt\">orderByCreatedAt<\/a>($order = Criteria::ASC) <p>Order by the created_at column<\/p> <\/div> <div class=\"col-md-2\"><\/div> <\/div> <div class=\"row\"> <div class=\"col-md-2 type\"> <abbr title=\"ChildCouponVersionQuery\">ChildCouponVersionQuery<\/abbr> <\/div> <div class=\"col-md-8 type\"> <a href=\"#method_orderByUpdatedAt\">orderByUpdatedAt<\/a>($order = Criteria::ASC) <p>Order by the updated_at column<\/p> <\/div> <div class=\"col-md-2\"><\/div> <\/div> <div class=\"row\"> <div class=\"col-md-2 type\"> <abbr title=\"ChildCouponVersionQuery\">ChildCouponVersionQuery<\/abbr> <\/div> <div class=\"col-md-8 type\"> <a href=\"#method_orderByVersion\">orderByVersion<\/a>($order = Criteria::ASC) <p>Order by the version column<\/p> <\/div> <div class=\"col-md-2\"><\/div> <\/div> <div class=\"row\"> <div class=\"col-md-2 type\"> <abbr title=\"ChildCouponVersionQuery\">ChildCouponVersionQuery<\/abbr> <\/div> <div class=\"col-md-8 type\"> <a href=\"#method_orderByVersionCreatedAt\">orderByVersionCreatedAt<\/a>($order = Criteria::ASC) <p>Order by the version<em>created<\/em>at column<\/p> <\/div> <div class=\"col-md-2\"><\/div> <\/div> <div class=\"row\"> <div class=\"col-md-2 type\"> <abbr title=\"ChildCouponVersionQuery\">ChildCouponVersionQuery<\/abbr> <\/div> <div class=\"col-md-8 type\"> <a href=\"#method_orderByVersionCreatedBy\">orderByVersionCreatedBy<\/a>($order = Criteria::ASC) <p>Order by the version<em>created<\/em>by column<\/p> <\/div> <div class=\"col-md-2\"><\/div> <\/div> <div class=\"row\"> <div class=\"col-md-2 type\"> <abbr title=\"ChildCouponVersionQuery\">ChildCouponVersionQuery<\/abbr> <\/div> <div class=\"col-md-8 type\"> <a href=\"#method_groupById\">groupById<\/a>() <p>Group by the id column<\/p> <\/div> <div class=\"col-md-2\"><\/div> <\/div> <div class=\"row\"> <div class=\"col-md-2 type\"> <abbr title=\"ChildCouponVersionQuery\">ChildCouponVersionQuery<\/abbr> <\/div> <div class=\"col-md-8 type\"> <a href=\"#method_groupByCode\">groupByCode<\/a>() <p>Group by the code column<\/p> <\/div> <div class=\"col-md-2\"><\/div> <\/div> <div class=\"row\"> <div class=\"col-md-2 type\"> <abbr title=\"ChildCouponVersionQuery\">ChildCouponVersionQuery<\/abbr> <\/div> <div class=\"col-md-8 type\"> <a href=\"#method_groupByType\">groupByType<\/a>() <p>Group by the type column<\/p> <\/div> <div class=\"col-md-2\"><\/div> <\/div> <div class=\"row\"> <div class=\"col-md-2 type\"> <abbr title=\"ChildCouponVersionQuery\">ChildCouponVersionQuery<\/abbr> <\/div> <div class=\"col-md-8 type\"> <a href=\"#method_groupBySerializedEffects\">groupBySerializedEffects<\/a>() <p>Group by the serialized_effects column<\/p> <\/div> <div class=\"col-md-2\"><\/div> <\/div> <div class=\"row\"> <div class=\"col-md-2 type\"> <abbr title=\"ChildCouponVersionQuery\">ChildCouponVersionQuery<\/abbr> <\/div> <div class=\"col-md-8 type\"> <a href=\"#method_groupByIsEnabled\">groupByIsEnabled<\/a>() <p>Group by the is_enabled column<\/p> <\/div> <div class=\"col-md-2\"><\/div> <\/div> <div class=\"row\"> <div class=\"col-md-2 type\"> <abbr title=\"ChildCouponVersionQuery\">ChildCouponVersionQuery<\/abbr> <\/div> <div class=\"col-md-8 type\"> <a href=\"#method_groupByStartDate\">groupByStartDate<\/a>() <p>Group by the start_date column<\/p> <\/div> <div class=\"col-md-2\"><\/div> <\/div> <div class=\"row\"> <div class=\"col-md-2 type\"> <abbr title=\"ChildCouponVersionQuery\">ChildCouponVersionQuery<\/abbr> <\/div> <div class=\"col-md-8 type\"> <a href=\"#method_groupByExpirationDate\">groupByExpirationDate<\/a>() <p>Group by the expiration_date column<\/p> <\/div> <div class=\"col-md-2\"><\/div> <\/div> <div class=\"row\"> <div class=\"col-md-2 type\"> <abbr title=\"ChildCouponVersionQuery\">ChildCouponVersionQuery<\/abbr> <\/div> <div class=\"col-md-8 type\"> <a href=\"#method_groupByMaxUsage\">groupByMaxUsage<\/a>() <p>Group by the max_usage column<\/p> <\/div> <div class=\"col-md-2\"><\/div> <\/div> <div class=\"row\"> <div class=\"col-md-2 type\"> <abbr title=\"ChildCouponVersionQuery\">ChildCouponVersionQuery<\/abbr> <\/div> <div class=\"col-md-8 type\"> <a href=\"#method_groupByIsCumulative\">groupByIsCumulative<\/a>() <p>Group by the is_cumulative column<\/p> <\/div> <div class=\"col-md-2\"><\/div> <\/div> <div class=\"row\"> <div class=\"col-md-2 type\"> <abbr title=\"ChildCouponVersionQuery\">ChildCouponVersionQuery<\/abbr> <\/div> <div class=\"col-md-8 type\"> <a href=\"#method_groupByIsRemovingPostage\">groupByIsRemovingPostage<\/a>() <p>Group by the is<em>removing<\/em>postage column<\/p> <\/div> <div class=\"col-md-2\"><\/div> <\/div> <div class=\"row\"> <div class=\"col-md-2 type\"> <abbr title=\"ChildCouponVersionQuery\">ChildCouponVersionQuery<\/abbr> <\/div> <div class=\"col-md-8 type\"> <a href=\"#method_groupByIsAvailableOnSpecialOffers\">groupByIsAvailableOnSpecialOffers<\/a>() <p>Group by the is<em>available<\/em>on<em>special<\/em>offers column<\/p> <\/div> <div class=\"col-md-2\"><\/div> <\/div> <div class=\"row\"> <div class=\"col-md-2 type\"> <abbr title=\"ChildCouponVersionQuery\">ChildCouponVersionQuery<\/abbr> <\/div> <div class=\"col-md-8 type\"> <a href=\"#method_groupByIsUsed\">groupByIsUsed<\/a>() <p>Group by the is_used column<\/p> <\/div> <div class=\"col-md-2\"><\/div> <\/div> <div class=\"row\"> <div class=\"col-md-2 type\"> <abbr title=\"ChildCouponVersionQuery\">ChildCouponVersionQuery<\/abbr> <\/div> <div class=\"col-md-8 type\"> <a href=\"#method_groupBySerializedConditions\">groupBySerializedConditions<\/a>() <p>Group by the serialized_conditions column<\/p> <\/div> <div class=\"col-md-2\"><\/div> <\/div> <div class=\"row\"> <div class=\"col-md-2 type\"> <abbr title=\"ChildCouponVersionQuery\">ChildCouponVersionQuery<\/abbr> <\/div> <div class=\"col-md-8 type\"> <a href=\"#method_groupByPerCustomerUsageCount\">groupByPerCustomerUsageCount<\/a>() <p>Group by the per<em>customer<\/em>usage_count column<\/p> <\/div> <div class=\"col-md-2\"><\/div> <\/div> <div class=\"row\"> <div class=\"col-md-2 type\"> <abbr title=\"ChildCouponVersionQuery\">ChildCouponVersionQuery<\/abbr> <\/div> <div class=\"col-md-8 type\"> <a href=\"#method_groupByCreatedAt\">groupByCreatedAt<\/a>() <p>Group by the created_at column<\/p> <\/div> <div class=\"col-md-2\"><\/div> <\/div> <div class=\"row\"> <div class=\"col-md-2 type\"> <abbr title=\"ChildCouponVersionQuery\">ChildCouponVersionQuery<\/abbr> <\/div> <div class=\"col-md-8 type\"> <a href=\"#method_groupByUpdatedAt\">groupByUpdatedAt<\/a>() <p>Group by the updated_at column<\/p> <\/div> <div class=\"col-md-2\"><\/div> <\/div> <div class=\"row\"> <div class=\"col-md-2 type\"> <abbr title=\"ChildCouponVersionQuery\">ChildCouponVersionQuery<\/abbr> <\/div> <div class=\"col-md-8 type\"> <a href=\"#method_groupByVersion\">groupByVersion<\/a>() <p>Group by the version column<\/p> <\/div> <div class=\"col-md-2\"><\/div> <\/div> <div class=\"row\"> <div class=\"col-md-2 type\"> <abbr title=\"ChildCouponVersionQuery\">ChildCouponVersionQuery<\/abbr> <\/div> <div class=\"col-md-8 type\"> <a href=\"#method_groupByVersionCreatedAt\">groupByVersionCreatedAt<\/a>() <p>Group by the version<em>created<\/em>at column<\/p> <\/div> <div class=\"col-md-2\"><\/div> <\/div> <div class=\"row\"> <div class=\"col-md-2 type\"> <abbr title=\"ChildCouponVersionQuery\">ChildCouponVersionQuery<\/abbr> <\/div> <div class=\"col-md-8 type\"> <a href=\"#method_groupByVersionCreatedBy\">groupByVersionCreatedBy<\/a>() <p>Group by the version<em>created<\/em>by column<\/p> <\/div> <div class=\"col-md-2\"><\/div> <\/div> <div class=\"row\"> <div class=\"col-md-2 type\"> <abbr title=\"ChildCouponVersionQuery\">ChildCouponVersionQuery<\/abbr> <\/div> <div class=\"col-md-8 type\"> <a href=\"#method_leftJoin\">leftJoin<\/a>($relation) <p>Adds a LEFT JOIN clause to the query<\/p> <\/div> <div class=\"col-md-2\"><\/div> <\/div> <div class=\"row\"> <div class=\"col-md-2 type\"> <abbr title=\"ChildCouponVersionQuery\">ChildCouponVersionQuery<\/abbr> <\/div> <div class=\"col-md-8 type\"> <a href=\"#method_rightJoin\">rightJoin<\/a>($relation) <p>Adds a RIGHT JOIN clause to the query<\/p> <\/div> <div class=\"col-md-2\"><\/div> <\/div> <div class=\"row\"> <div class=\"col-md-2 type\"> <abbr title=\"ChildCouponVersionQuery\">ChildCouponVersionQuery<\/abbr> <\/div> <div class=\"col-md-8 type\"> <a href=\"#method_innerJoin\">innerJoin<\/a>($relation) <p>Adds a INNER JOIN clause to the query<\/p> <\/div> <div class=\"col-md-2\"><\/div> <\/div> <div class=\"row\"> <div class=\"col-md-2 type\"> <abbr title=\"ChildCouponVersionQuery\">ChildCouponVersionQuery<\/abbr> <\/div> <div class=\"col-md-8 type\"> <a href=\"#method_leftJoinCoupon\">leftJoinCoupon<\/a>($relationAlias = null) <p>Adds a LEFT JOIN clause to the query using the Coupon relation<\/p> <\/div> <div class=\"col-md-2\"><\/div> <\/div> <div class=\"row\"> <div class=\"col-md-2 type\"> <abbr title=\"ChildCouponVersionQuery\">ChildCouponVersionQuery<\/abbr> <\/div> <div class=\"col-md-8 type\"> <a href=\"#method_rightJoinCoupon\">rightJoinCoupon<\/a>($relationAlias = null) <p>Adds a RIGHT JOIN clause to the query using the Coupon relation<\/p> <\/div> <div class=\"col-md-2\"><\/div> <\/div> <div class=\"row\"> <div class=\"col-md-2 type\"> <abbr title=\"ChildCouponVersionQuery\">ChildCouponVersionQuery<\/abbr> <\/div> <div class=\"col-md-8 type\"> <a href=\"#method_innerJoinCoupon\">innerJoinCoupon<\/a>($relationAlias = null) <p>Adds a INNER JOIN clause to the query using the Coupon relation<\/p> <\/div> <div class=\"col-md-2\"><\/div> <\/div> <div class=\"row\"> <div class=\"col-md-2 type\"> <abbr title=\"ChildCouponVersion\">ChildCouponVersion<\/abbr> <\/div> <div class=\"col-md-8 type\"> <a href=\"#method_findOne\">findOne<\/a>( <abbr title=\"ConnectionInterface \">ConnectionInterface <\/abbr> $con = null) <p>Return the first ChildCouponVersion matching the query<\/p> <\/div> <div class=\"col-md-2\"><\/div> <\/div> <div class=\"row\"> <div class=\"col-md-2 type\"> <abbr title=\"ChildCouponVersion\">ChildCouponVersion<\/abbr> <\/div> <div class=\"col-md-8 type\"> <a href=\"#method_findOneOrCreate\">findOneOrCreate<\/a>( <abbr title=\"ConnectionInterface \">ConnectionInterface <\/abbr> $con = null) <p>Return the first ChildCouponVersion matching the query, or a new ChildCouponVersion object populated from the query conditions when no match is found<\/p> <\/div> <div class=\"col-md-2\"><\/div> <\/div> <div class=\"row\"> <div class=\"col-md-2 type\"> <abbr title=\"ChildCouponVersion\">ChildCouponVersion<\/abbr> <\/div> <div class=\"col-md-8 type\"> <a href=\"#method_findOneById\">findOneById<\/a>( <abbr title=\"int \">int <\/abbr> $id) <p>Return the first ChildCouponVersion filtered by the id column<\/p> <\/div> <div class=\"col-md-2\"><\/div> <\/div> <div class=\"row\"> <div class=\"col-md-2 type\"> <abbr title=\"ChildCouponVersion\">ChildCouponVersion<\/abbr> <\/div> <div class=\"col-md-8 type\"> <a href=\"#method_findOneByCode\">findOneByCode<\/a>( <abbr title=\"string \">string <\/abbr> $code) <p>Return the first ChildCouponVersion filtered by the code column<\/p> <\/div> <div class=\"col-md-2\"><\/div> <\/div> <div class=\"row\"> <div class=\"col-md-2 type\"> <abbr title=\"ChildCouponVersion\">ChildCouponVersion<\/abbr> <\/div> <div class=\"col-md-8 type\"> <a href=\"#method_findOneByType\">findOneByType<\/a>( <abbr title=\"string \">string <\/abbr> $type) <p>Return the first ChildCouponVersion filtered by the type column<\/p> <\/div> <div class=\"col-md-2\"><\/div> <\/div> <div class=\"row\"> <div class=\"col-md-2 type\"> <abbr title=\"ChildCouponVersion\">ChildCouponVersion<\/abbr> <\/div> <div class=\"col-md-8 type\"> <a href=\"#method_findOneBySerializedEffects\">findOneBySerializedEffects<\/a>( <abbr title=\"string \">string <\/abbr> $serialized_effects) <p>Return the first ChildCouponVersion filtered by the serialized_effects column<\/p> <\/div> <div class=\"col-md-2\"><\/div> <\/div> <div class=\"row\"> <div class=\"col-md-2 type\"> <abbr title=\"ChildCouponVersion\">ChildCouponVersion<\/abbr> <\/div> <div class=\"col-md-8 type\"> <a href=\"#method_findOneByIsEnabled\">findOneByIsEnabled<\/a>( <abbr title=\"boolean \">boolean <\/abbr> $is_enabled) <p>Return the first ChildCouponVersion filtered by the is_enabled column<\/p> <\/div> <div class=\"col-md-2\"><\/div> <\/div> <div class=\"row\"> <div class=\"col-md-2 type\"> <abbr title=\"ChildCouponVersion\">ChildCouponVersion<\/abbr> <\/div> <div class=\"col-md-8 type\"> <a href=\"#method_findOneByStartDate\">findOneByStartDate<\/a>( <abbr title=\"string \">string <\/abbr> $start_date) <p>Return the first ChildCouponVersion filtered by the start_date column<\/p> <\/div> <div class=\"col-md-2\"><\/div> <\/div> <div class=\"row\"> <div class=\"col-md-2 type\"> <abbr title=\"ChildCouponVersion\">ChildCouponVersion<\/abbr> <\/div> <div class=\"col-md-8 type\"> <a href=\"#method_findOneByExpirationDate\">findOneByExpirationDate<\/a>( <abbr title=\"string \">string <\/abbr> $expiration_date) <p>Return the first ChildCouponVersion filtered by the expiration_date column<\/p> <\/div> <div class=\"col-md-2\"><\/div> <\/div> <div class=\"row\"> <div class=\"col-md-2 type\"> <abbr title=\"ChildCouponVersion\">ChildCouponVersion<\/abbr> <\/div> <div class=\"col-md-8 type\"> <a href=\"#method_findOneByMaxUsage\">findOneByMaxUsage<\/a>( <abbr title=\"int \">int <\/abbr> $max_usage) <p>Return the first ChildCouponVersion filtered by the max_usage column<\/p> <\/div> <div class=\"col-md-2\"><\/div> <\/div> <div class=\"row\"> <div class=\"col-md-2 type\"> <abbr title=\"ChildCouponVersion\">ChildCouponVersion<\/abbr> <\/div> <div class=\"col-md-8 type\"> <a href=\"#method_findOneByIsCumulative\">findOneByIsCumulative<\/a>( <abbr title=\"boolean \">boolean <\/abbr> $is_cumulative) <p>Return the first ChildCouponVersion filtered by the is_cumulative column<\/p> <\/div> <div class=\"col-md-2\"><\/div> <\/div> <div class=\"row\"> <div class=\"col-md-2 type\"> <abbr title=\"ChildCouponVersion\">ChildCouponVersion<\/abbr> <\/div> <div class=\"col-md-8 type\"> <a href=\"#method_findOneByIsRemovingPostage\">findOneByIsRemovingPostage<\/a>( <abbr title=\"boolean \">boolean <\/abbr> $is_removing_postage) <p>Return the first ChildCouponVersion filtered by the is<em>removing<\/em>postage column<\/p> <\/div> <div class=\"col-md-2\"><\/div> <\/div> <div class=\"row\"> <div class=\"col-md-2 type\"> <abbr title=\"ChildCouponVersion\">ChildCouponVersion<\/abbr> <\/div> <div class=\"col-md-8 type\"> <a href=\"#method_findOneByIsAvailableOnSpecialOffers\">findOneByIsAvailableOnSpecialOffers<\/a>( <abbr title=\"boolean \">boolean <\/abbr> $is_available_on_special_offers) <p>Return the first ChildCouponVersion filtered by the is<em>available<\/em>on<em>special<\/em>offers column<\/p> <\/div> <div class=\"col-md-2\"><\/div> <\/div> <div class=\"row\"> <div class=\"col-md-2 type\"> <abbr title=\"ChildCouponVersion\">ChildCouponVersion<\/abbr> <\/div> <div class=\"col-md-8 type\"> <a href=\"#method_findOneByIsUsed\">findOneByIsUsed<\/a>( <abbr title=\"boolean \">boolean <\/abbr> $is_used) <p>Return the first ChildCouponVersion filtered by the is_used column<\/p> <\/div> <div class=\"col-md-2\"><\/div> <\/div> <div class=\"row\"> <div class=\"col-md-2 type\"> <abbr title=\"ChildCouponVersion\">ChildCouponVersion<\/abbr> <\/div> <div class=\"col-md-8 type\"> <a href=\"#method_findOneBySerializedConditions\">findOneBySerializedConditions<\/a>( <abbr title=\"string \">string <\/abbr> $serialized_conditions) <p>Return the first ChildCouponVersion filtered by the serialized_conditions column<\/p> <\/div> <div class=\"col-md-2\"><\/div> <\/div> <div class=\"row\"> <div class=\"col-md-2 type\"> <abbr title=\"ChildCouponVersion\">ChildCouponVersion<\/abbr> <\/div> <div class=\"col-md-8 type\"> <a href=\"#method_findOneByPerCustomerUsageCount\">findOneByPerCustomerUsageCount<\/a>( <abbr title=\"boolean \">boolean <\/abbr> $per_customer_usage_count) <p>Return the first ChildCouponVersion filtered by the per<em>customer<\/em>usage_count column<\/p> <\/div> <div class=\"col-md-2\"><\/div> <\/div> <div class=\"row\"> <div class=\"col-md-2 type\"> <abbr title=\"ChildCouponVersion\">ChildCouponVersion<\/abbr> <\/div> <div class=\"col-md-8 type\"> <a href=\"#method_findOneByCreatedAt\">findOneByCreatedAt<\/a>( <abbr title=\"string \">string <\/abbr> $created_at) <p>Return the first ChildCouponVersion filtered by the created_at column<\/p> <\/div> <div class=\"col-md-2\"><\/div> <\/div> <div class=\"row\"> <div class=\"col-md-2 type\"> <abbr title=\"ChildCouponVersion\">ChildCouponVersion<\/abbr> <\/div> <div class=\"col-md-8 type\"> <a href=\"#method_findOneByUpdatedAt\">findOneByUpdatedAt<\/a>( <abbr title=\"string \">string <\/abbr> $updated_at) <p>Return the first ChildCouponVersion filtered by the updated_at column<\/p> <\/div> <div class=\"col-md-2\"><\/div> <\/div> <div class=\"row\"> <div class=\"col-md-2 type\"> <abbr title=\"ChildCouponVersion\">ChildCouponVersion<\/abbr> <\/div> <div class=\"col-md-8 type\"> <a href=\"#method_findOneByVersion\">findOneByVersion<\/a>( <abbr title=\"int \">int <\/abbr> $version) <p>Return the first ChildCouponVersion filtered by the version column<\/p> <\/div> <div class=\"col-md-2\"><\/div> <\/div> <div class=\"row\"> <div class=\"col-md-2 type\"> <abbr title=\"ChildCouponVersion\">ChildCouponVersion<\/abbr> <\/div> <div class=\"col-md-8 type\"> <a href=\"#method_findOneByVersionCreatedAt\">findOneByVersionCreatedAt<\/a>( <abbr title=\"string \">string <\/abbr> $version_created_at) <p>Return the first ChildCouponVersion filtered by the version<em>created<\/em>at column<\/p> <\/div> <div class=\"col-md-2\"><\/div> <\/div> <div class=\"row\"> <div class=\"col-md-2 type\"> <abbr title=\"ChildCouponVersion\">ChildCouponVersion<\/abbr> <\/div> <div class=\"col-md-8 type\"> <a href=\"#method_findOneByVersionCreatedBy\">findOneByVersionCreatedBy<\/a>( <abbr title=\"string \">string <\/abbr> $version_created_by) <p>Return the first ChildCouponVersion filtered by the version<em>created<\/em>by column<\/p> <\/div> <div class=\"col-md-2\"><\/div> <\/div> <div class=\"row\"> <div class=\"col-md-2 type\"> array <\/div> <div class=\"col-md-8 type\"> <a href=\"#method_findById\">findById<\/a>( <abbr title=\"int \">int <\/abbr> $id) <p>Return ChildCouponVersion objects filtered by the id column<\/p> <\/div> <div class=\"col-md-2\"><\/div> <\/div> <div class=\"row\"> <div class=\"col-md-2 type\"> array <\/div> <div class=\"col-md-8 type\"> <a href=\"#method_findByCode\">findByCode<\/a>( <abbr title=\"string \">string <\/abbr> $code) <p>Return ChildCouponVersion objects filtered by the code column<\/p> <\/div> <div class=\"col-md-2\"><\/div> <\/div> <div class=\"row\"> <div class=\"col-md-2 type\"> array <\/div> <div class=\"col-md-8 type\"> <a href=\"#method_findByType\">findByType<\/a>( <abbr title=\"string \">string <\/abbr> $type) <p>Return ChildCouponVersion objects filtered by the type column<\/p> <\/div> <div class=\"col-md-2\"><\/div> <\/div> <div class=\"row\"> <div class=\"col-md-2 type\"> array <\/div> <div class=\"col-md-8 type\"> <a href=\"#method_findBySerializedEffects\">findBySerializedEffects<\/a>( <abbr title=\"string \">string <\/abbr> $serialized_effects) <p>Return ChildCouponVersion objects filtered by the serialized_effects column<\/p> <\/div> <div class=\"col-md-2\"><\/div> <\/div> <div class=\"row\"> <div class=\"col-md-2 type\"> array <\/div> <div class=\"col-md-8 type\"> <a href=\"#method_findByIsEnabled\">findByIsEnabled<\/a>( <abbr title=\"boolean \">boolean <\/abbr> $is_enabled) <p>Return ChildCouponVersion objects filtered by the is_enabled column<\/p> <\/div> <div class=\"col-md-2\"><\/div> <\/div> <div class=\"row\"> <div class=\"col-md-2 type\"> array <\/div> <div class=\"col-md-8 type\"> <a href=\"#method_findByStartDate\">findByStartDate<\/a>( <abbr title=\"string \">string <\/abbr> $start_date) <p>Return ChildCouponVersion objects filtered by the start_date column<\/p> <\/div> <div class=\"col-md-2\"><\/div> <\/div> <div class=\"row\"> <div class=\"col-md-2 type\"> array <\/div> <div class=\"col-md-8 type\"> <a href=\"#method_findByExpirationDate\">findByExpirationDate<\/a>( <abbr title=\"string \">string <\/abbr> $expiration_date) <p>Return ChildCouponVersion objects filtered by the expiration_date column<\/p> <\/div> <div class=\"col-md-2\"><\/div> <\/div> <div class=\"row\"> <div class=\"col-md-2 type\"> array <\/div> <div class=\"col-md-8 type\"> <a href=\"#method_findByMaxUsage\">findByMaxUsage<\/a>( <abbr title=\"int \">int <\/abbr> $max_usage) <p>Return ChildCouponVersion objects filtered by the max_usage column<\/p> <\/div> <div class=\"col-md-2\"><\/div> <\/div> <div class=\"row\"> <div class=\"col-md-2 type\"> array <\/div> <div class=\"col-md-8 type\"> <a href=\"#method_findByIsCumulative\">findByIsCumulative<\/a>( <abbr title=\"boolean \">boolean <\/abbr> $is_cumulative) <p>Return ChildCouponVersion objects filtered by the is_cumulative column<\/p> <\/div> <div class=\"col-md-2\"><\/div> <\/div> <div class=\"row\"> <div class=\"col-md-2 type\"> array <\/div> <div class=\"col-md-8 type\"> <a href=\"#method_findByIsRemovingPostage\">findByIsRemovingPostage<\/a>( <abbr title=\"boolean \">boolean <\/abbr> $is_removing_postage) <p>Return ChildCouponVersion objects filtered by the is<em>removing<\/em>postage column<\/p> <\/div> <div class=\"col-md-2\"><\/div> <\/div> <div class=\"row\"> <div class=\"col-md-2 type\"> array <\/div> <div class=\"col-md-8 type\"> <a href=\"#method_findByIsAvailableOnSpecialOffers\">findByIsAvailableOnSpecialOffers<\/a>( <abbr title=\"boolean \">boolean <\/abbr> $is_available_on_special_offers) <p>Return ChildCouponVersion objects filtered by the is<em>available<\/em>on<em>special<\/em>offers column<\/p> <\/div> <div class=\"col-md-2\"><\/div> <\/div> <div class=\"row\"> <div class=\"col-md-2 type\"> array <\/div> <div class=\"col-md-8 type\"> <a href=\"#method_findByIsUsed\">findByIsUsed<\/a>( <abbr title=\"boolean \">boolean <\/abbr> $is_used) <p>Return ChildCouponVersion objects filtered by the is_used column<\/p> <\/div> <div class=\"col-md-2\"><\/div> <\/div> <div class=\"row\"> <div class=\"col-md-2 type\"> array <\/div> <div class=\"col-md-8 type\"> <a href=\"#method_findBySerializedConditions\">findBySerializedConditions<\/a>( <abbr title=\"string \">string <\/abbr> $serialized_conditions) <p>Return ChildCouponVersion objects filtered by the serialized_conditions column<\/p> <\/div> <div class=\"col-md-2\"><\/div> <\/div> <div class=\"row\"> <div class=\"col-md-2 type\"> array <\/div> <div class=\"col-md-8 type\"> <a href=\"#method_findByPerCustomerUsageCount\">findByPerCustomerUsageCount<\/a>( <abbr title=\"boolean \">boolean <\/abbr> $per_customer_usage_count) <p>Return ChildCouponVersion objects filtered by the per<em>customer<\/em>usage_count column<\/p> <\/div> <div class=\"col-md-2\"><\/div> <\/div> <div class=\"row\"> <div class=\"col-md-2 type\"> array <\/div> <div class=\"col-md-8 type\"> <a href=\"#method_findByCreatedAt\">findByCreatedAt<\/a>( <abbr title=\"string \">string <\/abbr> $created_at) <p>Return ChildCouponVersion objects filtered by the created_at column<\/p> <\/div> <div class=\"col-md-2\"><\/div> <\/div> <div class=\"row\"> <div class=\"col-md-2 type\"> array <\/div> <div class=\"col-md-8 type\"> <a href=\"#method_findByUpdatedAt\">findByUpdatedAt<\/a>( <abbr title=\"string \">string <\/abbr> $updated_at) <p>Return ChildCouponVersion objects filtered by the updated_at column<\/p> <\/div> <div class=\"col-md-2\"><\/div> <\/div> <div class=\"row\"> <div class=\"col-md-2 type\"> array <\/div> <div class=\"col-md-8 type\"> <a href=\"#method_findByVersion\">findByVersion<\/a>( <abbr title=\"int \">int <\/abbr> $version) <p>Return ChildCouponVersion objects filtered by the version column<\/p> <\/div> <div class=\"col-md-2\"><\/div> <\/div> <div class=\"row\"> <div class=\"col-md-2 type\"> array <\/div> <div class=\"col-md-8 type\"> <a href=\"#method_findByVersionCreatedAt\">findByVersionCreatedAt<\/a>( <abbr title=\"string \">string <\/abbr> $version_created_at) <p>Return ChildCouponVersion objects filtered by the version<em>created<\/em>at column<\/p> <\/div> <div class=\"col-md-2\"><\/div> <\/div> <div class=\"row\"> <div class=\"col-md-2 type\"> array <\/div> <div class=\"col-md-8 type\"> <a href=\"#method_findByVersionCreatedBy\">findByVersionCreatedBy<\/a>( <abbr title=\"string \">string <\/abbr> $version_created_by) <p>Return ChildCouponVersion objects filtered by the version<em>created<\/em>by column<\/p> <\/div> <div class=\"col-md-2\"><\/div> <\/div> <\/div> <h2>Details<\/h2> <div id=\"method-details\"> <div class=\"method-item\"> <h3 id=\"method___construct\"> <div class=\"location\">at line 126<\/div> <code> <strong>__construct<\/strong>( string $dbName = 'thelia', string $modelName = '\\\\Thelia\\\\Model\\\\CouponVersion', string $modelAlias = null)<\/code> <\/h3> <div class=\"details\"> <div class=\"method-description\"> <p>Initializes internal state of \\Thelia\\Model\\Base\\CouponVersionQuery object.<\/p> <\/div> <div class=\"tags\"> <h4>Parameters<\/h4> <table class=\"table table-condensed\"> <tr> <td> string<\/td> <td>$dbName<\/td> <td>The database name<\/td> <\/tr> <tr> <td> string<\/td> <td>$modelName<\/td> <td>The phpName of a model, e.g. 'Book'<\/td> <\/tr> <tr> <td> string<\/td> <td>$modelAlias<\/td> <td>The alias for the model in this query, e.g. 'b'<\/td> <\/tr> <\/table> <\/div> <\/div> <\/div> <div class=\"method-item\"> <h3 id=\"method_create\"> <div class=\"location\">at line 139<\/div> <code> static <a href=\"..\/..\/..\/Thelia\/Model\/CouponVersionQuery.html\"><abbr title=\"Thelia\\Model\\CouponVersionQuery\">CouponVersionQuery<\/abbr><\/a> <strong>create<\/strong>( string $modelAlias = null, <abbr title=\"Propel\\Runtime\\ActiveQuery\\Criteria\">Criteria<\/abbr> $criteria = null)<\/code> <\/h3> <div class=\"details\"> <div class=\"method-description\"> <p>Returns a new ChildCouponVersionQuery object.<\/p> <\/div> <div class=\"tags\"> <h4>Parameters<\/h4> <table class=\"table table-condensed\"> <tr> <td> string<\/td> <td>$modelAlias<\/td> <td>The alias of a model in the query<\/td> <\/tr> <tr> <td> <abbr title=\"Propel\\Runtime\\ActiveQuery\\Criteria\">Criteria<\/abbr><\/td> <td>$criteria<\/td> <td>Optional Criteria to build the query from<\/td> <\/tr> <\/table> <h4>Return Value<\/h4> <table class=\"table table-condensed\"> <tr> <td> <a href=\"..\/..\/..\/Thelia\/Model\/CouponVersionQuery.html\"><abbr title=\"Thelia\\Model\\CouponVersionQuery\">CouponVersionQuery<\/abbr><\/a><\/td> <td><\/td> <\/tr> <\/table> <\/div> <\/div> <\/div> <div class=\"method-item\"> <h3 id=\"method_findPk\"> <div class=\"location\">at line 169<\/div> <code> <a href=\"..\/..\/..\/Thelia\/Model\/CouponVersion.html\"><abbr title=\"Thelia\\Model\\CouponVersion\">CouponVersion<\/abbr><\/a>|array|mixed <strong>findPk<\/strong>($key, $con = null)<\/code> <\/h3> <div class=\"details\"> <div class=\"method-description\"> <p>Find object by primary key.<\/p> <p>Propel uses the instance pool to skip the database if the object exists. Go fast if the query is untouched.<\/p> <p><code> $obj = $c->findPk(array(12, 34), $con); <\/code><\/p> <\/div> <div class=\"tags\"> <h4>Parameters<\/h4> <table class=\"table table-condensed\"> <tr> <td><\/td> <td>$key<\/td> <td><\/td> <\/tr> <tr> <td><\/td> <td>$con<\/td> <td><\/td> <\/tr> <\/table> <h4>Return Value<\/h4> <table class=\"table table-condensed\"> <tr> <td> <a href=\"..\/..\/..\/Thelia\/Model\/CouponVersion.html\"><abbr title=\"Thelia\\Model\\CouponVersion\">CouponVersion<\/abbr><\/a>|array|mixed<\/td> <td>the result, formatted by the current formatter<\/td> <\/tr> <\/table> <\/div> <\/div> <\/div> <div class=\"method-item\"> <h3 id=\"method_findPks\"> <div class=\"location\">at line 252<\/div> <code> <abbr title=\"Propel\\Runtime\\Collection\\ObjectCollection\">ObjectCollection<\/abbr>|array|mixed <strong>findPks<\/strong>( array $keys, <abbr title=\"Propel\\Runtime\\Connection\\ConnectionInterface\">ConnectionInterface<\/abbr> $con = null)<\/code> <\/h3> <div class=\"details\"> <div class=\"method-description\"> <p>Find objects by primary key <code> $objs = $c->findPks(array(array(12, 56), array(832, 123), array(123, 456)), $con); <\/code><\/p> <\/div> <div class=\"tags\"> <h4>Parameters<\/h4> <table class=\"table table-condensed\"> <tr> <td> array<\/td> <td>$keys<\/td> <td>Primary keys to use for the query<\/td> <\/tr> <tr> <td> <abbr title=\"Propel\\Runtime\\Connection\\ConnectionInterface\">ConnectionInterface<\/abbr><\/td> <td>$con<\/td> <td>an optional connection object<\/td> <\/tr> <\/table> <h4>Return Value<\/h4> <table class=\"table table-condensed\"> <tr> <td> <abbr title=\"Propel\\Runtime\\Collection\\ObjectCollection\">ObjectCollection<\/abbr>|array|mixed<\/td> <td>the list of results, formatted by the current formatter<\/td> <\/tr> <\/table> <\/div> <\/div> <\/div> <div class=\"method-item\"> <h3 id=\"method_filterByPrimaryKey\"> <div class=\"location\">at line 273<\/div> <code> <a href=\"..\/..\/..\/Thelia\/Model\/CouponVersionQuery.html\"><abbr title=\"Thelia\\Model\\CouponVersionQuery\">CouponVersionQuery<\/abbr><\/a> <strong>filterByPrimaryKey<\/strong>( mixed $key)<\/code> <\/h3> <div class=\"details\"> <div class=\"method-description\"> <p>Filter the query by primary key<\/p> <\/div> <div class=\"tags\"> <h4>Parameters<\/h4> <table class=\"table table-condensed\"> <tr> <td> mixed<\/td> <td>$key<\/td> <td>Primary key to use for the query<\/td> <\/tr> <\/table> <h4>Return Value<\/h4> <table class=\"table table-condensed\"> <tr> <td> <a href=\"..\/..\/..\/Thelia\/Model\/CouponVersionQuery.html\"><abbr title=\"Thelia\\Model\\CouponVersionQuery\">CouponVersionQuery<\/abbr><\/a><\/td> <td>The current query, for fluid interface<\/td> <\/tr> <\/table> <\/div> <\/div> <\/div> <div class=\"method-item\"> <h3 id=\"method_filterByPrimaryKeys\"> <div class=\"location\">at line 288<\/div> <code> <a href=\"..\/..\/..\/Thelia\/Model\/CouponVersionQuery.html\"><abbr title=\"Thelia\\Model\\CouponVersionQuery\">CouponVersionQuery<\/abbr><\/a> <strong>filterByPrimaryKeys<\/strong>( array $keys)<\/code> <\/h3> <div class=\"details\"> <div class=\"method-description\"> <p>Filter the query by a list of primary keys<\/p> <\/div> <div class=\"tags\"> <h4>Parameters<\/h4> <table class=\"table table-condensed\"> <tr> <td> array<\/td> <td>$keys<\/td> <td>The list of primary key to use for the query<\/td> <\/tr> <\/table> <h4>Return Value<\/h4> <table class=\"table table-condensed\"> <tr> <td> <a href=\"..\/..\/..\/Thelia\/Model\/CouponVersionQuery.html\"><abbr title=\"Thelia\\Model\\CouponVersionQuery\">CouponVersionQuery<\/abbr><\/a><\/td> <td>The current query, for fluid interface<\/td> <\/tr> <\/table> <\/div> <\/div> <\/div> <div class=\"method-item\"> <h3 id=\"method_filterById\"> <div class=\"location\">at line 323<\/div> <code> <a href=\"..\/..\/..\/Thelia\/Model\/CouponVersionQuery.html\"><abbr title=\"Thelia\\Model\\CouponVersionQuery\">CouponVersionQuery<\/abbr><\/a> <strong>filterById<\/strong>( mixed $id = null, string $comparison = null)<\/code> <\/h3> <div class=\"details\"> <div class=\"method-description\"> <p>Filter the query on the id column<\/p> <p>Example usage: <code> $query->filterById(1234); \/\/ WHERE id = 1234 $query->filterById(array(12, 34)); \/\/ WHERE id IN (12, 34) $query->filterById(array('min' => 12)); \/\/ WHERE id > 12 <\/code><\/p> <\/div> <div class=\"tags\"> <h4>Parameters<\/h4> <table class=\"table table-condensed\"> <tr> <td> mixed<\/td> <td>$id<\/td> <td>The value to use as filter. Use scalar values for equality. Use array values for in_array() equivalent. Use associative array('min' => $minValue, 'max' => $maxValue) for intervals.<\/td> <\/tr> <tr> <td> string<\/td> <td>$comparison<\/td> <td>Operator to use for the column comparison, defaults to Criteria::EQUAL<\/td> <\/tr> <\/table> <h4>Return Value<\/h4> <table class=\"table table-condensed\"> <tr> <td> <a href=\"..\/..\/..\/Thelia\/Model\/CouponVersionQuery.html\"><abbr title=\"Thelia\\Model\\CouponVersionQuery\">CouponVersionQuery<\/abbr><\/a><\/td> <td>The current query, for fluid interface<\/td> <\/tr> <\/table> <h4>See also<\/h4> <table class=\"table table-condensed\"> <tr> <td>filterByCoupon()<\/td> <td><\/td> <\/tr> <\/table> <\/div> <\/div> <\/div> <div class=\"method-item\"> <h3 id=\"method_filterByCode\"> <div class=\"location\">at line 361<\/div> <code> <a href=\"..\/..\/..\/Thelia\/Model\/CouponVersionQuery.html\"><abbr title=\"Thelia\\Model\\CouponVersionQuery\">CouponVersionQuery<\/abbr><\/a> <strong>filterByCode<\/strong>( string $code = null, string $comparison = null)<\/code> <\/h3> <div class=\"details\"> <div class=\"method-description\"> <p>Filter the query on the code column<\/p> <p>Example usage: <code> $query->filterByCode('fooValue'); \/\/ WHERE code = 'fooValue' $query->filterByCode('%fooValue%'); \/\/ WHERE code LIKE '%fooValue%' <\/code><\/p> <\/div> <div class=\"tags\"> <h4>Parameters<\/h4> <table class=\"table table-condensed\"> <tr> <td> string<\/td> <td>$code<\/td> <td>The value to use as filter. Accepts wildcards (* and % trigger a LIKE)<\/td> <\/tr> <tr> <td> string<\/td> <td>$comparison<\/td> <td>Operator to use for the column comparison, defaults to Criteria::EQUAL<\/td> <\/tr> <\/table> <h4>Return Value<\/h4> <table class=\"table table-condensed\"> <tr> <td> <a href=\"..\/..\/..\/Thelia\/Model\/CouponVersionQuery.html\"><abbr title=\"Thelia\\Model\\CouponVersionQuery\">CouponVersionQuery<\/abbr><\/a><\/td> <td>The current query, for fluid interface<\/td> <\/tr> <\/table> <\/div> <\/div> <\/div> <div class=\"method-item\"> <h3 id=\"method_filterByType\"> <div class=\"location\">at line 390<\/div> <code> <a href=\"..\/..\/..\/Thelia\/Model\/CouponVersionQuery.html\"><abbr title=\"Thelia\\Model\\CouponVersionQuery\">CouponVersionQuery<\/abbr><\/a> <strong>filterByType<\/strong>( string $type = null, string $comparison = null)<\/code> <\/h3> <div class=\"details\"> <div class=\"method-description\"> <p>Filter the query on the type column<\/p> <p>Example usage: <code> $query->filterByType('fooValue'); \/\/ WHERE type = 'fooValue' $query->filterByType('%fooValue%'); \/\/ WHERE type LIKE '%fooValue%' <\/code><\/p> <\/div> <div class=\"tags\"> <h4>Parameters<\/h4> <table class=\"table table-condensed\"> <tr> <td> string<\/td> <td>$type<\/td> <td>The value to use as filter. Accepts wildcards (* and % trigger a LIKE)<\/td> <\/tr> <tr> <td> string<\/td> <td>$comparison<\/td> <td>Operator to use for the column comparison, defaults to Criteria::EQUAL<\/td> <\/tr> <\/table> <h4>Return Value<\/h4> <table class=\"table table-condensed\"> <tr> <td> <a href=\"..\/..\/..\/Thelia\/Model\/CouponVersionQuery.html\"><abbr title=\"Thelia\\Model\\CouponVersionQuery\">CouponVersionQuery<\/abbr><\/a><\/td> <td>The current query, for fluid interface<\/td> <\/tr> <\/table> <\/div> <\/div> <\/div> <div class=\"method-item\"> <h3 id=\"method_filterBySerializedEffects\"> <div class=\"location\">at line 419<\/div> <code> <a href=\"..\/..\/..\/Thelia\/Model\/CouponVersionQuery.html\"><abbr title=\"Thelia\\Model\\CouponVersionQuery\">CouponVersionQuery<\/abbr><\/a> <strong>filterBySerializedEffects<\/strong>( string $serializedEffects = null, string $comparison = null)<\/code> <\/h3> <div class=\"details\"> <div class=\"method-description\"> <p>Filter the query on the serialized_effects column<\/p> <p>Example usage: <code> $query->filterBySerializedEffects('fooValue'); \/\/ WHERE serialized<em>effects = 'fooValue' $query->filterBySerializedEffects('%fooValue%'); \/\/ WHERE serialized<\/em>effects LIKE '%fooValue%' <\/code><\/p> <\/div> <div class=\"tags\"> <h4>Parameters<\/h4> <table class=\"table table-condensed\"> <tr> <td> string<\/td> <td>$serializedEffects<\/td> <td>The value to use as filter. Accepts wildcards (* and % trigger a LIKE)<\/td> <\/tr> <tr> <td> string<\/td> <td>$comparison<\/td> <td>Operator to use for the column comparison, defaults to Criteria::EQUAL<\/td> <\/tr> <\/table> <h4>Return Value<\/h4> <table class=\"table table-condensed\"> <tr> <td> <a href=\"..\/..\/..\/Thelia\/Model\/CouponVersionQuery.html\"><abbr title=\"Thelia\\Model\\CouponVersionQuery\">CouponVersionQuery<\/abbr><\/a><\/td> <td>The current query, for fluid interface<\/td> <\/tr> <\/table> <\/div> <\/div> <\/div> <div class=\"method-item\"> <h3 id=\"method_filterByIsEnabled\"> <div class=\"location\">at line 451<\/div> <code> <a href=\"..\/..\/..\/Thelia\/Model\/CouponVersionQuery.html\"><abbr title=\"Thelia\\Model\\CouponVersionQuery\">CouponVersionQuery<\/abbr><\/a> <strong>filterByIsEnabled<\/strong>( boolean|string $isEnabled = null, string $comparison = null)<\/code> <\/h3> <div class=\"details\"> <div class=\"method-description\"> <p>Filter the query on the is_enabled column<\/p> <p>Example usage: <code> $query->filterByIsEnabled(true); \/\/ WHERE is<em>enabled = true $query->filterByIsEnabled('yes'); \/\/ WHERE is<\/em>enabled = true <\/code><\/p> <\/div> <div class=\"tags\"> <h4>Parameters<\/h4> <table class=\"table table-condensed\"> <tr> <td> boolean|string<\/td> <td>$isEnabled<\/td> <td>The value to use as filter. Non-boolean arguments are converted using the following rules: * 1, '1', 'true', 'on', and 'yes' are converted to boolean true * 0, '0', 'false', 'off', and 'no' are converted to boolean false Check on string values is case insensitive (so 'FaLsE' is seen as 'false').<\/td> <\/tr> <tr> <td> string<\/td> <td>$comparison<\/td> <td>Operator to use for the column comparison, defaults to Criteria::EQUAL<\/td> <\/tr> <\/table> <h4>Return Value<\/h4> <table class=\"table table-condensed\"> <tr> <td> <a href=\"..\/..\/..\/Thelia\/Model\/CouponVersionQuery.html\"><abbr title=\"Thelia\\Model\\CouponVersionQuery\">CouponVersionQuery<\/abbr><\/a><\/td> <td>The current query, for fluid interface<\/td> <\/tr> <\/table> <\/div> <\/div> <\/div> <div class=\"method-item\"> <h3 id=\"method_filterByStartDate\"> <div class=\"location\">at line 480<\/div> <code> <a href=\"..\/..\/..\/Thelia\/Model\/CouponVersionQuery.html\"><abbr title=\"Thelia\\Model\\CouponVersionQuery\">CouponVersionQuery<\/abbr><\/a> <strong>filterByStartDate<\/strong>( mixed $startDate = null, string $comparison = null)<\/code> <\/h3> <div class=\"details\"> <div class=\"method-description\"> <p>Filter the query on the start_date column<\/p> <p>Example usage: <code> $query->filterByStartDate('2011-03-14'); \/\/ WHERE start<em>date = '2011-03-14' $query->filterByStartDate('now'); \/\/ WHERE start<\/em>date = '2011-03-14' $query->filterByStartDate(array('max' => 'yesterday')); \/\/ WHERE start_date > '2011-03-13' <\/code><\/p> <\/div> <div class=\"tags\"> <h4>Parameters<\/h4> <table class=\"table table-condensed\"> <tr> <td> mixed<\/td> <td>$startDate<\/td> <td>The value to use as filter. Values can be integers (unix timestamps), DateTime objects, or strings. Empty strings are treated as NULL. Use scalar values for equality. Use array values for in_array() equivalent. Use associative array('min' => $minValue, 'max' => $maxValue) for intervals.<\/td> <\/tr> <tr> <td> string<\/td> <td>$comparison<\/td> <td>Operator to use for the column comparison, defaults to Criteria::EQUAL<\/td> <\/tr> <\/table> <h4>Return Value<\/h4> <table class=\"table table-condensed\"> <tr> <td> <a href=\"..\/..\/..\/Thelia\/Model\/CouponVersionQuery.html\"><abbr title=\"Thelia\\Model\\CouponVersionQuery\">CouponVersionQuery<\/abbr><\/a><\/td> <td>The current query, for fluid interface<\/td> <\/tr> <\/table> <\/div> <\/div> <\/div> <div class=\"method-item\"> <h3 id=\"method_filterByExpirationDate\"> <div class=\"location\">at line 523<\/div> <code> <a href=\"..\/..\/..\/Thelia\/Model\/CouponVersionQuery.html\"><abbr title=\"Thelia\\Model\\CouponVersionQuery\">CouponVersionQuery<\/abbr><\/a> <strong>filterByExpirationDate<\/strong>( mixed $expirationDate = null, string $comparison = null)<\/code> <\/h3> <div class=\"details\"> <div class=\"method-description\"> <p>Filter the query on the expiration_date column<\/p> <p>Example usage: <code> $query->filterByExpirationDate('2011-03-14'); \/\/ WHERE expiration<em>date = '2011-03-14' $query->filterByExpirationDate('now'); \/\/ WHERE expiration<\/em>date = '2011-03-14' $query->filterByExpirationDate(array('max' => 'yesterday')); \/\/ WHERE expiration_date > '2011-03-13' <\/code><\/p> <\/div> <div class=\"tags\"> <h4>Parameters<\/h4> <table class=\"table table-condensed\"> <tr> <td> mixed<\/td> <td>$expirationDate<\/td> <td>The value to use as filter. Values can be integers (unix timestamps), DateTime objects, or strings. Empty strings are treated as NULL. Use scalar values for equality. Use array values for in_array() equivalent. Use associative array('min' => $minValue, 'max' => $maxValue) for intervals.<\/td> <\/tr> <tr> <td> string<\/td> <td>$comparison<\/td> <td>Operator to use for the column comparison, defaults to Criteria::EQUAL<\/td> <\/tr> <\/table> <h4>Return Value<\/h4> <table class=\"table table-condensed\"> <tr> <td> <a href=\"..\/..\/..\/Thelia\/Model\/CouponVersionQuery.html\"><abbr title=\"Thelia\\Model\\CouponVersionQuery\">CouponVersionQuery<\/abbr><\/a><\/td> <td>The current query, for fluid interface<\/td> <\/tr> <\/table> <\/div> <\/div> <\/div> <div class=\"method-item\"> <h3 id=\"method_filterByMaxUsage\"> <div class=\"location\">at line 564<\/div> <code> <a href=\"..\/..\/..\/Thelia\/Model\/CouponVersionQuery.html\"><abbr title=\"Thelia\\Model\\CouponVersionQuery\">CouponVersionQuery<\/abbr><\/a> <strong>filterByMaxUsage<\/strong>( mixed $maxUsage = null, string $comparison = null)<\/code> <\/h3> <div class=\"details\"> <div class=\"method-description\"> <p>Filter the query on the max_usage column<\/p> <p>Example usage: <code> $query->filterByMaxUsage(1234); \/\/ WHERE max<em>usage = 1234 $query->filterByMaxUsage(array(12, 34)); \/\/ WHERE max<\/em>usage IN (12, 34) $query->filterByMaxUsage(array('min' => 12)); \/\/ WHERE max_usage > 12 <\/code><\/p> <\/div> <div class=\"tags\"> <h4>Parameters<\/h4> <table class=\"table table-condensed\"> <tr> <td> mixed<\/td> <td>$maxUsage<\/td> <td>The value to use as filter. Use scalar values for equality. Use array values for in_array() equivalent. Use associative array('min' => $minValue, 'max' => $maxValue) for intervals.<\/td> <\/tr> <tr> <td> string<\/td> <td>$comparison<\/td> <td>Operator to use for the column comparison, defaults to Criteria::EQUAL<\/td> <\/tr> <\/table> <h4>Return Value<\/h4> <table class=\"table table-condensed\"> <tr> <td> <a href=\"..\/..\/..\/Thelia\/Model\/CouponVersionQuery.html\"><abbr title=\"Thelia\\Model\\CouponVersionQuery\">CouponVersionQuery<\/abbr><\/a><\/td> <td>The current query, for fluid interface<\/td> <\/tr> <\/table> <\/div> <\/div> <\/div> <div class=\"method-item\"> <h3 id=\"method_filterByIsCumulative\"> <div class=\"location\">at line 605<\/div> <code> <a href=\"..\/..\/..\/Thelia\/Model\/CouponVersionQuery.html\"><abbr title=\"Thelia\\Model\\CouponVersionQuery\">CouponVersionQuery<\/abbr><\/a> <strong>filterByIsCumulative<\/strong>( boolean|string $isCumulative = null, string $comparison = null)<\/code> <\/h3> <div class=\"details\"> <div class=\"method-description\"> <p>Filter the query on the is_cumulative column<\/p> <p>Example usage: <code> $query->filterByIsCumulative(true); \/\/ WHERE is<em>cumulative = true $query->filterByIsCumulative('yes'); \/\/ WHERE is<\/em>cumulative = true <\/code><\/p> <\/div> <div class=\"tags\"> <h4>Parameters<\/h4> <table class=\"table table-condensed\"> <tr> <td> boolean|string<\/td> <td>$isCumulative<\/td> <td>The value to use as filter. Non-boolean arguments are converted using the following rules: * 1, '1', 'true', 'on', and 'yes' are converted to boolean true * 0, '0', 'false', 'off', and 'no' are converted to boolean false Check on string values is case insensitive (so 'FaLsE' is seen as 'false').<\/td> <\/tr> <tr> <td> string<\/td> <td>$comparison<\/td> <td>Operator to use for the column comparison, defaults to Criteria::EQUAL<\/td> <\/tr> <\/table> <h4>Return Value<\/h4> <table class=\"table table-condensed\"> <tr> <td> <a href=\"..\/..\/..\/Thelia\/Model\/CouponVersionQuery.html\"><abbr title=\"Thelia\\Model\\CouponVersionQuery\">CouponVersionQuery<\/abbr><\/a><\/td> <td>The current query, for fluid interface<\/td> <\/tr> <\/table> <\/div> <\/div> <\/div> <div class=\"method-item\"> <h3 id=\"method_filterByIsRemovingPostage\"> <div class=\"location\">at line 632<\/div> <code> <a href=\"..\/..\/..\/Thelia\/Model\/CouponVersionQuery.html\"><abbr title=\"Thelia\\Model\\CouponVersionQuery\">CouponVersionQuery<\/abbr><\/a> <strong>filterByIsRemovingPostage<\/strong>( boolean|string $isRemovingPostage = null, string $comparison = null)<\/code> <\/h3> <div class=\"details\"> <div class=\"method-description\"> <p>Filter the query on the is<em>removing<\/em>postage column<\/p> <p>Example usage: <code> $query->filterByIsRemovingPostage(true); \/\/ WHERE is<em>removing<\/em>postage = true $query->filterByIsRemovingPostage('yes'); \/\/ WHERE is<em>removing<\/em>postage = true <\/code><\/p> <\/div> <div class=\"tags\"> <h4>Parameters<\/h4> <table class=\"table table-condensed\"> <tr> <td> boolean|string<\/td> <td>$isRemovingPostage<\/td> <td>The value to use as filter. Non-boolean arguments are converted using the following rules: * 1, '1', 'true', 'on', and 'yes' are converted to boolean true * 0, '0', 'false', 'off', and 'no' are converted to boolean false Check on string values is case insensitive (so 'FaLsE' is seen as 'false').<\/td> <\/tr> <tr> <td> string<\/td> <td>$comparison<\/td> <td>Operator to use for the column comparison, defaults to Criteria::EQUAL<\/td> <\/tr> <\/table> <h4>Return Value<\/h4> <table class=\"table table-condensed\"> <tr> <td> <a href=\"..\/..\/..\/Thelia\/Model\/CouponVersionQuery.html\"><abbr title=\"Thelia\\Model\\CouponVersionQuery\">CouponVersionQuery<\/abbr><\/a><\/td> <td>The current query, for fluid interface<\/td> <\/tr> <\/table> <\/div> <\/div> <\/div> <div class=\"method-item\"> <h3 id=\"method_filterByIsAvailableOnSpecialOffers\"> <div class=\"location\">at line 659<\/div> <code> <a href=\"..\/..\/..\/Thelia\/Model\/CouponVersionQuery.html\"><abbr title=\"Thelia\\Model\\CouponVersionQuery\">CouponVersionQuery<\/abbr><\/a> <strong>filterByIsAvailableOnSpecialOffers<\/strong>( boolean|string $isAvailableOnSpecialOffers = null, string $comparison = null)<\/code> <\/h3> <div class=\"details\"> <div class=\"method-description\"> <p>Filter the query on the is<em>available<\/em>on<em>special<\/em>offers column<\/p> <p>Example usage: <code> $query->filterByIsAvailableOnSpecialOffers(true); \/\/ WHERE is<em>available<\/em>on<em>special<\/em>offers = true $query->filterByIsAvailableOnSpecialOffers('yes'); \/\/ WHERE is<em>available<\/em>on<em>special<\/em>offers = true <\/code><\/p> <\/div> <div class=\"tags\"> <h4>Parameters<\/h4> <table class=\"table table-condensed\"> <tr> <td> boolean|string<\/td> <td>$isAvailableOnSpecialOffers<\/td> <td>The value to use as filter. Non-boolean arguments are converted using the following rules: * 1, '1', 'true', 'on', and 'yes' are converted to boolean true * 0, '0', 'false', 'off', and 'no' are converted to boolean false Check on string values is case insensitive (so 'FaLsE' is seen as 'false').<\/td> <\/tr> <tr> <td> string<\/td> <td>$comparison<\/td> <td>Operator to use for the column comparison, defaults to Criteria::EQUAL<\/td> <\/tr> <\/table> <h4>Return Value<\/h4> <table class=\"table table-condensed\"> <tr> <td> <a href=\"..\/..\/..\/Thelia\/Model\/CouponVersionQuery.html\"><abbr title=\"Thelia\\Model\\CouponVersionQuery\">CouponVersionQuery<\/abbr><\/a><\/td> <td>The current query, for fluid interface<\/td> <\/tr> <\/table> <\/div> <\/div> <\/div> <div class=\"method-item\"> <h3 id=\"method_filterByIsUsed\"> <div class=\"location\">at line 686<\/div> <code> <a href=\"..\/..\/..\/Thelia\/Model\/CouponVersionQuery.html\"><abbr title=\"Thelia\\Model\\CouponVersionQuery\">CouponVersionQuery<\/abbr><\/a> <strong>filterByIsUsed<\/strong>( boolean|string $isUsed = null, string $comparison = null)<\/code> <\/h3> <div class=\"details\"> <div class=\"method-description\"> <p>Filter the query on the is_used column<\/p> <p>Example usage: <code> $query->filterByIsUsed(true); \/\/ WHERE is<em>used = true $query->filterByIsUsed('yes'); \/\/ WHERE is<\/em>used = true <\/code><\/p> <\/div> <div class=\"tags\"> <h4>Parameters<\/h4> <table class=\"table table-condensed\"> <tr> <td> boolean|string<\/td> <td>$isUsed<\/td> <td>The value to use as filter. Non-boolean arguments are converted using the following rules: * 1, '1', 'true', 'on', and 'yes' are converted to boolean true * 0, '0', 'false', 'off', and 'no' are converted to boolean false Check on string values is case insensitive (so 'FaLsE' is seen as 'false').<\/td> <\/tr> <tr> <td> string<\/td> <td>$comparison<\/td> <td>Operator to use for the column comparison, defaults to Criteria::EQUAL<\/td> <\/tr> <\/table> <h4>Return Value<\/h4> <table class=\"table table-condensed\"> <tr> <td> <a href=\"..\/..\/..\/Thelia\/Model\/CouponVersionQuery.html\"><abbr title=\"Thelia\\Model\\CouponVersionQuery\">CouponVersionQuery<\/abbr><\/a><\/td> <td>The current query, for fluid interface<\/td> <\/tr> <\/table> <\/div> <\/div> <\/div> <div class=\"method-item\"> <h3 id=\"method_filterBySerializedConditions\"> <div class=\"location\">at line 710<\/div> <code> <a href=\"..\/..\/..\/Thelia\/Model\/CouponVersionQuery.html\"><abbr title=\"Thelia\\Model\\CouponVersionQuery\">CouponVersionQuery<\/abbr><\/a> <strong>filterBySerializedConditions<\/strong>( string $serializedConditions = null, string $comparison = null)<\/code> <\/h3> <div class=\"details\"> <div class=\"method-description\"> <p>Filter the query on the serialized_conditions column<\/p> <p>Example usage: <code> $query->filterBySerializedConditions('fooValue'); \/\/ WHERE serialized<em>conditions = 'fooValue' $query->filterBySerializedConditions('%fooValue%'); \/\/ WHERE serialized<\/em>conditions LIKE '%fooValue%' <\/code><\/p> <\/div> <div class=\"tags\"> <h4>Parameters<\/h4> <table class=\"table table-condensed\"> <tr> <td> string<\/td> <td>$serializedConditions<\/td> <td>The value to use as filter. Accepts wildcards (* and % trigger a LIKE)<\/td> <\/tr> <tr> <td> string<\/td> <td>$comparison<\/td> <td>Operator to use for the column comparison, defaults to Criteria::EQUAL<\/td> <\/tr> <\/table> <h4>Return Value<\/h4> <table class=\"table table-condensed\"> <tr> <td> <a href=\"..\/..\/..\/Thelia\/Model\/CouponVersionQuery.html\"><abbr title=\"Thelia\\Model\\CouponVersionQuery\">CouponVersionQuery<\/abbr><\/a><\/td> <td>The current query, for fluid interface<\/td> <\/tr> <\/table> <\/div> <\/div> <\/div> <div class=\"method-item\"> <h3 id=\"method_filterByPerCustomerUsageCount\"> <div class=\"location\">at line 742<\/div> <code> <a href=\"..\/..\/..\/Thelia\/Model\/CouponVersionQuery.html\"><abbr title=\"Thelia\\Model\\CouponVersionQuery\">CouponVersionQuery<\/abbr><\/a> <strong>filterByPerCustomerUsageCount<\/strong>( boolean|string $perCustomerUsageCount = null, string $comparison = null)<\/code> <\/h3> <div class=\"details\"> <div class=\"method-description\"> <p>Filter the query on the per<em>customer<\/em>usage_count column<\/p> <p>Example usage: <code> $query->filterByPerCustomerUsageCount(true); \/\/ WHERE per<em>customer<\/em>usage<em>count = true $query->filterByPerCustomerUsageCount('yes'); \/\/ WHERE per<\/em>customer<em>usage<\/em>count = true <\/code><\/p> <\/div> <div class=\"tags\"> <h4>Parameters<\/h4> <table class=\"table table-condensed\"> <tr> <td> boolean|string<\/td> <td>$perCustomerUsageCount<\/td> <td>The value to use as filter. Non-boolean arguments are converted using the following rules: * 1, '1', 'true', 'on', and 'yes' are converted to boolean true * 0, '0', 'false', 'off', and 'no' are converted to boolean false Check on string values is case insensitive (so 'FaLsE' is seen as 'false').<\/td> <\/tr> <tr> <td> string<\/td> <td>$comparison<\/td> <td>Operator to use for the column comparison, defaults to Criteria::EQUAL<\/td> <\/tr> <\/table> <h4>Return Value<\/h4> <table class=\"table table-condensed\"> <tr> <td> <a href=\"..\/..\/..\/Thelia\/Model\/CouponVersionQuery.html\"><abbr title=\"Thelia\\Model\\CouponVersionQuery\">CouponVersionQuery<\/abbr><\/a><\/td> <td>The current query, for fluid interface<\/td> <\/tr> <\/table> <\/div> <\/div> <\/div> <div class=\"method-item\"> <h3 id=\"method_filterByCreatedAt\"> <div class=\"location\">at line 771<\/div> <code> <a href=\"..\/..\/..\/Thelia\/Model\/CouponVersionQuery.html\"><abbr title=\"Thelia\\Model\\CouponVersionQuery\">CouponVersionQuery<\/abbr><\/a> <strong>filterByCreatedAt<\/strong>( mixed $createdAt = null, string $comparison = null)<\/code> <\/h3> <div class=\"details\"> <div class=\"method-description\"> <p>Filter the query on the created_at column<\/p> <p>Example usage: <code> $query->filterByCreatedAt('2011-03-14'); \/\/ WHERE created<em>at = '2011-03-14' $query->filterByCreatedAt('now'); \/\/ WHERE created<\/em>at = '2011-03-14' $query->filterByCreatedAt(array('max' => 'yesterday')); \/\/ WHERE created_at > '2011-03-13' <\/code><\/p> <\/div> <div class=\"tags\"> <h4>Parameters<\/h4> <table class=\"table table-condensed\"> <tr> <td> mixed<\/td> <td>$createdAt<\/td> <td>The value to use as filter. Values can be integers (unix timestamps), DateTime objects, or strings. Empty strings are treated as NULL. Use scalar values for equality. Use array values for in_array() equivalent. Use associative array('min' => $minValue, 'max' => $maxValue) for intervals.<\/td> <\/tr> <tr> <td> string<\/td> <td>$comparison<\/td> <td>Operator to use for the column comparison, defaults to Criteria::EQUAL<\/td> <\/tr> <\/table> <h4>Return Value<\/h4> <table class=\"table table-condensed\"> <tr> <td> <a href=\"..\/..\/..\/Thelia\/Model\/CouponVersionQuery.html\"><abbr title=\"Thelia\\Model\\CouponVersionQuery\">CouponVersionQuery<\/abbr><\/a><\/td> <td>The current query, for fluid interface<\/td> <\/tr> <\/table> <\/div> <\/div> <\/div> <div class=\"method-item\"> <h3 id=\"method_filterByUpdatedAt\"> <div class=\"location\">at line 814<\/div> <code> <a href=\"..\/..\/..\/Thelia\/Model\/CouponVersionQuery.html\"><abbr title=\"Thelia\\Model\\CouponVersionQuery\">CouponVersionQuery<\/abbr><\/a> <strong>filterByUpdatedAt<\/strong>( mixed $updatedAt = null, string $comparison = null)<\/code> <\/h3> <div class=\"details\"> <div class=\"method-description\"> <p>Filter the query on the updated_at column<\/p> <p>Example usage: <code> $query->filterByUpdatedAt('2011-03-14'); \/\/ WHERE updated<em>at = '2011-03-14' $query->filterByUpdatedAt('now'); \/\/ WHERE updated<\/em>at = '2011-03-14' $query->filterByUpdatedAt(array('max' => 'yesterday')); \/\/ WHERE updated_at > '2011-03-13' <\/code><\/p> <\/div> <div class=\"tags\"> <h4>Parameters<\/h4> <table class=\"table table-condensed\"> <tr> <td> mixed<\/td> <td>$updatedAt<\/td> <td>The value to use as filter. Values can be integers (unix timestamps), DateTime objects, or strings. Empty strings are treated as NULL. Use scalar values for equality. Use array values for in_array() equivalent. Use associative array('min' => $minValue, 'max' => $maxValue) for intervals.<\/td> <\/tr> <tr> <td> string<\/td> <td>$comparison<\/td> <td>Operator to use for the column comparison, defaults to Criteria::EQUAL<\/td> <\/tr> <\/table> <h4>Return Value<\/h4> <table class=\"table table-condensed\"> <tr> <td> <a href=\"..\/..\/..\/Thelia\/Model\/CouponVersionQuery.html\"><abbr title=\"Thelia\\Model\\CouponVersionQuery\">CouponVersionQuery<\/abbr><\/a><\/td> <td>The current query, for fluid interface<\/td> <\/tr> <\/table> <\/div> <\/div> <\/div> <div class=\"method-item\"> <h3 id=\"method_filterByVersion\"> <div class=\"location\">at line 855<\/div> <code> <a href=\"..\/..\/..\/Thelia\/Model\/CouponVersionQuery.html\"><abbr title=\"Thelia\\Model\\CouponVersionQuery\">CouponVersionQuery<\/abbr><\/a> <strong>filterByVersion<\/strong>( mixed $version = null, string $comparison = null)<\/code> <\/h3> <div class=\"details\"> <div class=\"method-description\"> <p>Filter the query on the version column<\/p> <p>Example usage: <code> $query->filterByVersion(1234); \/\/ WHERE version = 1234 $query->filterByVersion(array(12, 34)); \/\/ WHERE version IN (12, 34) $query->filterByVersion(array('min' => 12)); \/\/ WHERE version > 12 <\/code><\/p> <\/div> <div class=\"tags\"> <h4>Parameters<\/h4> <table class=\"table table-condensed\"> <tr> <td> mixed<\/td> <td>$version<\/td> <td>The value to use as filter. Use scalar values for equality. Use array values for in_array() equivalent. Use associative array('min' => $minValue, 'max' => $maxValue) for intervals.<\/td> <\/tr> <tr> <td> string<\/td> <td>$comparison<\/td> <td>Operator to use for the column comparison, defaults to Criteria::EQUAL<\/td> <\/tr> <\/table> <h4>Return Value<\/h4> <table class=\"table table-condensed\"> <tr> <td> <a href=\"..\/..\/..\/Thelia\/Model\/CouponVersionQuery.html\"><abbr title=\"Thelia\\Model\\CouponVersionQuery\">CouponVersionQuery<\/abbr><\/a><\/td> <td>The current query, for fluid interface<\/td> <\/tr> <\/table> <\/div> <\/div> <\/div> <div class=\"method-item\"> <h3 id=\"method_filterByVersionCreatedAt\"> <div class=\"location\">at line 898<\/div> <code> <a href=\"..\/..\/..\/Thelia\/Model\/CouponVersionQuery.html\"><abbr title=\"Thelia\\Model\\CouponVersionQuery\">CouponVersionQuery<\/abbr><\/a> <strong>filterByVersionCreatedAt<\/strong>( mixed $versionCreatedAt = null, string $comparison = null)<\/code> <\/h3> <div class=\"details\"> <div class=\"method-description\"> <p>Filter the query on the version<em>created<\/em>at column<\/p> <p>Example usage: <code> $query->filterByVersionCreatedAt('2011-03-14'); \/\/ WHERE version<em>created<\/em>at = '2011-03-14' $query->filterByVersionCreatedAt('now'); \/\/ WHERE version<em>created<\/em>at = '2011-03-14' $query->filterByVersionCreatedAt(array('max' => 'yesterday')); \/\/ WHERE version<em>created<\/em>at > '2011-03-13' <\/code><\/p> <\/div> <div class=\"tags\"> <h4>Parameters<\/h4> <table class=\"table table-condensed\"> <tr> <td> mixed<\/td> <td>$versionCreatedAt<\/td> <td>The value to use as filter. Values can be integers (unix timestamps), DateTime objects, or strings. Empty strings are treated as NULL. Use scalar values for equality. Use array values for in_array() equivalent. Use associative array('min' => $minValue, 'max' => $maxValue) for intervals.<\/td> <\/tr> <tr> <td> string<\/td> <td>$comparison<\/td> <td>Operator to use for the column comparison, defaults to Criteria::EQUAL<\/td> <\/tr> <\/table> <h4>Return Value<\/h4> <table class=\"table table-condensed\"> <tr> <td> <a href=\"..\/..\/..\/Thelia\/Model\/CouponVersionQuery.html\"><abbr title=\"Thelia\\Model\\CouponVersionQuery\">CouponVersionQuery<\/abbr><\/a><\/td> <td>The current query, for fluid interface<\/td> <\/tr> <\/table> <\/div> <\/div> <\/div> <div class=\"method-item\"> <h3 id=\"method_filterByVersionCreatedBy\"> <div class=\"location\">at line 936<\/div> <code> <a href=\"..\/..\/..\/Thelia\/Model\/CouponVersionQuery.html\"><abbr title=\"Thelia\\Model\\CouponVersionQuery\">CouponVersionQuery<\/abbr><\/a> <strong>filterByVersionCreatedBy<\/strong>( string $versionCreatedBy = null, string $comparison = null)<\/code> <\/h3> <div class=\"details\"> <div class=\"method-description\"> <p>Filter the query on the version<em>created<\/em>by column<\/p> <p>Example usage: <code> $query->filterByVersionCreatedBy('fooValue'); \/\/ WHERE version<em>created<\/em>by = 'fooValue' $query->filterByVersionCreatedBy('%fooValue%'); \/\/ WHERE version<em>created<\/em>by LIKE '%fooValue%' <\/code><\/p> <\/div> <div class=\"tags\"> <h4>Parameters<\/h4> <table class=\"table table-condensed\"> <tr> <td> string<\/td> <td>$versionCreatedBy<\/td> <td>The value to use as filter. Accepts wildcards (* and % trigger a LIKE)<\/td> <\/tr> <tr> <td> string<\/td> <td>$comparison<\/td> <td>Operator to use for the column comparison, defaults to Criteria::EQUAL<\/td> <\/tr> <\/table> <h4>Return Value<\/h4> <table class=\"table table-condensed\"> <tr> <td> <a href=\"..\/..\/..\/Thelia\/Model\/CouponVersionQuery.html\"><abbr title=\"Thelia\\Model\\CouponVersionQuery\">CouponVersionQuery<\/abbr><\/a><\/td> <td>The current query, for fluid interface<\/td> <\/tr> <\/table> <\/div> <\/div> <\/div> <div class=\"method-item\"> <h3 id=\"method_filterByCoupon\"> <div class=\"location\">at line 958<\/div> <code> <a href=\"..\/..\/..\/Thelia\/Model\/CouponVersionQuery.html\"><abbr title=\"Thelia\\Model\\CouponVersionQuery\">CouponVersionQuery<\/abbr><\/a> <strong>filterByCoupon<\/strong>( <a href=\"..\/..\/..\/Thelia\/Model\/Coupon.html\"><abbr title=\"Thelia\\Model\\Coupon\">Coupon<\/abbr><\/a>|<abbr title=\"Propel\\Runtime\\Collection\\ObjectCollection\">ObjectCollection<\/abbr> $coupon, string $comparison = null)<\/code> <\/h3> <div class=\"details\"> <div class=\"method-description\"> <p>Filter the query by a related \\Thelia\\Model\\Coupon object<\/p> <\/div> <div class=\"tags\"> <h4>Parameters<\/h4> <table class=\"table table-condensed\"> <tr> <td> <a href=\"..\/..\/..\/Thelia\/Model\/Coupon.html\"><abbr title=\"Thelia\\Model\\Coupon\">Coupon<\/abbr><\/a>|<abbr title=\"Propel\\Runtime\\Collection\\ObjectCollection\">ObjectCollection<\/abbr><\/td> <td>$coupon<\/td> <td>The related object(s) to use as filter<\/td> <\/tr> <tr> <td> string<\/td> <td>$comparison<\/td> <td>Operator to use for the column comparison, defaults to Criteria::EQUAL<\/td> <\/tr> <\/table> <h4>Return Value<\/h4> <table class=\"table table-condensed\"> <tr> <td> <a href=\"..\/..\/..\/Thelia\/Model\/CouponVersionQuery.html\"><abbr title=\"Thelia\\Model\\CouponVersionQuery\">CouponVersionQuery<\/abbr><\/a><\/td> <td>The current query, for fluid interface<\/td> <\/tr> <\/table> <\/div> <\/div> <\/div> <div class=\"method-item\"> <h3 id=\"method_joinCoupon\"> <div class=\"location\">at line 983<\/div> <code> <a href=\"..\/..\/..\/Thelia\/Model\/CouponVersionQuery.html\"><abbr title=\"Thelia\\Model\\CouponVersionQuery\">CouponVersionQuery<\/abbr><\/a> <strong>joinCoupon<\/strong>( string $relationAlias = null, string $joinType = Criteria::INNER_JOIN)<\/code> <\/h3> <div class=\"details\"> <div class=\"method-description\"> <p>Adds a JOIN clause to the query using the Coupon relation<\/p> <\/div> <div class=\"tags\"> <h4>Parameters<\/h4> <table class=\"table table-condensed\"> <tr> <td> string<\/td> <td>$relationAlias<\/td> <td>optional alias for the relation<\/td> <\/tr> <tr> <td> string<\/td> <td>$joinType<\/td> <td>Accepted values are null, 'left join', 'right join', 'inner join'<\/td> <\/tr> <\/table> <h4>Return Value<\/h4> <table class=\"table table-condensed\"> <tr> <td> <a href=\"..\/..\/..\/Thelia\/Model\/CouponVersionQuery.html\"><abbr title=\"Thelia\\Model\\CouponVersionQuery\">CouponVersionQuery<\/abbr><\/a><\/td> <td>The current query, for fluid interface<\/td> <\/tr> <\/table> <\/div> <\/div> <\/div> <div class=\"method-item\"> <h3 id=\"method_useCouponQuery\"> <div class=\"location\">at line 1018<\/div> <code> <a href=\"..\/..\/..\/Thelia\/Model\/CouponQuery.html\"><abbr title=\"Thelia\\Model\\CouponQuery\">CouponQuery<\/abbr><\/a> <strong>useCouponQuery<\/strong>( string $relationAlias = null, string $joinType = Criteria::INNER_JOIN)<\/code> <\/h3> <div class=\"details\"> <div class=\"method-description\"> <p>Use the Coupon relation Coupon object<\/p> <\/div> <div class=\"tags\"> <h4>Parameters<\/h4> <table class=\"table table-condensed\"> <tr> <td> string<\/td> <td>$relationAlias<\/td> <td>optional alias for the relation, to be used as main alias in the secondary query<\/td> <\/tr> <tr> <td> string<\/td> <td>$joinType<\/td> <td>Accepted values are null, 'left join', 'right join', 'inner join'<\/td> <\/tr> <\/table> <h4>Return Value<\/h4> <table class=\"table table-condensed\"> <tr> <td> <a href=\"..\/..\/..\/Thelia\/Model\/CouponQuery.html\"><abbr title=\"Thelia\\Model\\CouponQuery\">CouponQuery<\/abbr><\/a><\/td> <td>A secondary query class using the current class as primary query<\/td> <\/tr> <\/table> <h4>See also<\/h4> <table class=\"table table-condensed\"> <tr> <td>useQuery()<\/td> <td><\/td> <\/tr> <\/table> <\/div> <\/div> <\/div> <div class=\"method-item\"> <h3 id=\"method_prune\"> <div class=\"location\">at line 1032<\/div> <code> <a href=\"..\/..\/..\/Thelia\/Model\/CouponVersionQuery.html\"><abbr title=\"Thelia\\Model\\CouponVersionQuery\">CouponVersionQuery<\/abbr><\/a> <strong>prune<\/strong>( <a href=\"..\/..\/..\/Thelia\/Model\/CouponVersion.html\"><abbr title=\"Thelia\\Model\\CouponVersion\">CouponVersion<\/abbr><\/a> $couponVersion = null)<\/code> <\/h3> <div class=\"details\"> <div class=\"method-description\"> <p>Exclude object from result<\/p> <\/div> <div class=\"tags\"> <h4>Parameters<\/h4> <table class=\"table table-condensed\"> <tr> <td> <a href=\"..\/..\/..\/Thelia\/Model\/CouponVersion.html\"><abbr title=\"Thelia\\Model\\CouponVersion\">CouponVersion<\/abbr><\/a><\/td> <td>$couponVersion<\/td> <td>Object to remove from the list of results<\/td> <\/tr> <\/table> <h4>Return Value<\/h4> <table class=\"table table-condensed\"> <tr> <td> <a href=\"..\/..\/..\/Thelia\/Model\/CouponVersionQuery.html\"><abbr title=\"Thelia\\Model\\CouponVersionQuery\">CouponVersionQuery<\/abbr><\/a><\/td> <td>The current query, for fluid interface<\/td> <\/tr> <\/table> <\/div> <\/div> <\/div> <div class=\"method-item\"> <h3 id=\"method_doDeleteAll\"> <div class=\"location\">at line 1049<\/div> <code> int <strong>doDeleteAll<\/strong>( <abbr title=\"Thelia\\Model\\Base\\Propel\\Runtime\\Connection\\ConnectionInterface\">ConnectionInterface<\/abbr> $con = null)<\/code> <\/h3> <div class=\"details\"> <div class=\"method-description\"> <p>Deletes all rows from the coupon_version table.<\/p> <\/div> <div class=\"tags\"> <h4>Parameters<\/h4> <table class=\"table table-condensed\"> <tr> <td> <abbr title=\"Thelia\\Model\\Base\\Propel\\Runtime\\Connection\\ConnectionInterface\">ConnectionInterface<\/abbr><\/td> <td>$con<\/td> <td>the connection to use<\/td> <\/tr> <\/table> <h4>Return Value<\/h4> <table class=\"table table-condensed\"> <tr> <td> int<\/td> <td>The number of affected rows (if supported by underlying database driver).<\/td> <\/tr> <\/table> <\/div> <\/div> <\/div> <div class=\"method-item\"> <h3 id=\"method_delete\"> <div class=\"location\">at line 1086<\/div> <code> int <strong>delete<\/strong>( <abbr title=\"Thelia\\Model\\Base\\Propel\\Runtime\\Connection\\ConnectionInterface\">ConnectionInterface<\/abbr> $con = null)<\/code> <\/h3> <div class=\"details\"> <div class=\"method-description\"> <p>Performs a DELETE on the database, given a ChildCouponVersion or Criteria object OR a primary key value.<\/p> <\/div> <div class=\"tags\"> <h4>Parameters<\/h4> <table class=\"table table-condensed\"> <tr> <td> <abbr title=\"Thelia\\Model\\Base\\Propel\\Runtime\\Connection\\ConnectionInterface\">ConnectionInterface<\/abbr><\/td> <td>$con<\/td> <td><\/td> <\/tr> <\/table> <h4>Return Value<\/h4> <table class=\"table table-condensed\"> <tr> <td> int<\/td> <td>The number of affected rows (if supported by underlying database driver). This includes CASCADE-related rows if supported by native driver or if emulated using Propel.<\/td> <\/tr> <\/table> <h4>Exceptions<\/h4> <table class=\"table table-condensed\"> <tr> <td><abbr title=\"Propel\\Runtime\\Exception\\PropelException\">PropelException<\/abbr><\/td> <td>Any exceptions caught during processing will be rethrown wrapped into a PropelException.<\/td> <\/tr> <\/table> <\/div> <\/div> <\/div> <div class=\"method-item\"> <h3 id=\"method_orderById\"> <div class=\"location\">at line 116<\/div> <code> <abbr title=\"ChildCouponVersionQuery\">ChildCouponVersionQuery<\/abbr> <strong>orderById<\/strong>($order = Criteria::ASC)<\/code> <\/h3> <div class=\"details\"> <div class=\"method-description\"> <p>Order by the id column<\/p> <\/div> <div class=\"tags\"> <h4>Parameters<\/h4> <table class=\"table table-condensed\"> <tr> <td><\/td> <td>$order<\/td> <td><\/td> <\/tr> <\/table> <h4>Return Value<\/h4> <table class=\"table table-condensed\"> <tr> <td> <abbr title=\"ChildCouponVersionQuery\">ChildCouponVersionQuery<\/abbr><\/td> <td><\/td> <\/tr> <\/table> <\/div> <\/div> <\/div> <div class=\"method-item\"> <h3 id=\"method_orderByCode\"> <div class=\"location\">at line 116<\/div> <code> <abbr title=\"ChildCouponVersionQuery\">ChildCouponVersionQuery<\/abbr> <strong>orderByCode<\/strong>($order = Criteria::ASC)<\/code> <\/h3> <div class=\"details\"> <div class=\"method-description\"> <p>Order by the code column<\/p> <\/div> <div class=\"tags\"> <h4>Parameters<\/h4> <table class=\"table table-condensed\"> <tr> <td><\/td> <td>$order<\/td> <td><\/td> <\/tr> <\/table> <h4>Return Value<\/h4> <table class=\"table table-condensed\"> <tr> <td> <abbr title=\"ChildCouponVersionQuery\">ChildCouponVersionQuery<\/abbr><\/td> <td><\/td> <\/tr> <\/table> <\/div> <\/div> <\/div> <div class=\"method-item\"> <h3 id=\"method_orderByType\"> <div class=\"location\">at line 116<\/div> <code> <abbr title=\"ChildCouponVersionQuery\">ChildCouponVersionQuery<\/abbr> <strong>orderByType<\/strong>($order = Criteria::ASC)<\/code> <\/h3> <div class=\"details\"> <div class=\"method-description\"> <p>Order by the type column<\/p> <\/div> <div class=\"tags\"> <h4>Parameters<\/h4> <table class=\"table table-condensed\"> <tr> <td><\/td> <td>$order<\/td> <td><\/td> <\/tr> <\/table> <h4>Return Value<\/h4> <table class=\"table table-condensed\"> <tr> <td> <abbr title=\"ChildCouponVersionQuery\">ChildCouponVersionQuery<\/abbr><\/td> <td><\/td> <\/tr> <\/table> <\/div> <\/div> <\/div> <div class=\"method-item\"> <h3 id=\"method_orderBySerializedEffects\"> <div class=\"location\">at line 116<\/div> <code> <abbr title=\"ChildCouponVersionQuery\">ChildCouponVersionQuery<\/abbr> <strong>orderBySerializedEffects<\/strong>($order = Criteria::ASC)<\/code> <\/h3> <div class=\"details\"> <div class=\"method-description\"> <p>Order by the serialized_effects column<\/p> <\/div> <div class=\"tags\"> <h4>Parameters<\/h4> <table class=\"table table-condensed\"> <tr> <td><\/td> <td>$order<\/td> <td><\/td> <\/tr> <\/table> <h4>Return Value<\/h4> <table class=\"table table-condensed\"> <tr> <td> <abbr title=\"ChildCouponVersionQuery\">ChildCouponVersionQuery<\/abbr><\/td> <td><\/td> <\/tr> <\/table> <\/div> <\/div> <\/div> <div class=\"method-item\"> <h3 id=\"method_orderByIsEnabled\"> <div class=\"location\">at line 116<\/div> <code> <abbr title=\"ChildCouponVersionQuery\">ChildCouponVersionQuery<\/abbr> <strong>orderByIsEnabled<\/strong>($order = Criteria::ASC)<\/code> <\/h3> <div class=\"details\"> <div class=\"method-description\"> <p>Order by the is_enabled column<\/p> <\/div> <div class=\"tags\"> <h4>Parameters<\/h4> <table class=\"table table-condensed\"> <tr> <td><\/td> <td>$order<\/td> <td><\/td> <\/tr> <\/table> <h4>Return Value<\/h4> <table class=\"table table-condensed\"> <tr> <td> <abbr title=\"ChildCouponVersionQuery\">ChildCouponVersionQuery<\/abbr><\/td> <td><\/td> <\/tr> <\/table> <\/div> <\/div> <\/div> <div class=\"method-item\"> <h3 id=\"method_orderByStartDate\"> <div class=\"location\">at line 116<\/div> <code> <abbr title=\"ChildCouponVersionQuery\">ChildCouponVersionQuery<\/abbr> <strong>orderByStartDate<\/strong>($order = Criteria::ASC)<\/code> <\/h3> <div class=\"details\"> <div class=\"method-description\"> <p>Order by the start_date column<\/p> <\/div> <div class=\"tags\"> <h4>Parameters<\/h4> <table class=\"table table-condensed\"> <tr> <td><\/td> <td>$order<\/td> <td><\/td> <\/tr> <\/table> <h4>Return Value<\/h4> <table class=\"table table-condensed\"> <tr> <td> <abbr title=\"ChildCouponVersionQuery\">ChildCouponVersionQuery<\/abbr><\/td> <td><\/td> <\/tr> <\/table> <\/div> <\/div> <\/div> <div class=\"method-item\"> <h3 id=\"method_orderByExpirationDate\"> <div class=\"location\">at line 116<\/div> <code> <abbr title=\"ChildCouponVersionQuery\">ChildCouponVersionQuery<\/abbr> <strong>orderByExpirationDate<\/strong>($order = Criteria::ASC)<\/code> <\/h3> <div class=\"details\"> <div class=\"method-description\"> <p>Order by the expiration_date column<\/p> <\/div> <div class=\"tags\"> <h4>Parameters<\/h4> <table class=\"table table-condensed\"> <tr> <td><\/td> <td>$order<\/td> <td><\/td> <\/tr> <\/table> <h4>Return Value<\/h4> <table class=\"table table-condensed\"> <tr> <td> <abbr title=\"ChildCouponVersionQuery\">ChildCouponVersionQuery<\/abbr><\/td> <td><\/td> <\/tr> <\/table> <\/div> <\/div> <\/div> <div class=\"method-item\"> <h3 id=\"method_orderByMaxUsage\"> <div class=\"location\">at line 116<\/div> <code> <abbr title=\"ChildCouponVersionQuery\">ChildCouponVersionQuery<\/abbr> <strong>orderByMaxUsage<\/strong>($order = Criteria::ASC)<\/code> <\/h3> <div class=\"details\"> <div class=\"method-description\"> <p>Order by the max_usage column<\/p> <\/div> <div class=\"tags\"> <h4>Parameters<\/h4> <table class=\"table table-condensed\"> <tr> <td><\/td> <td>$order<\/td> <td><\/td> <\/tr> <\/table> <h4>Return Value<\/h4> <table class=\"table table-condensed\"> <tr> <td> <abbr title=\"ChildCouponVersionQuery\">ChildCouponVersionQuery<\/abbr><\/td> <td><\/td> <\/tr> <\/table> <\/div> <\/div> <\/div> <div class=\"method-item\"> <h3 id=\"method_orderByIsCumulative\"> <div class=\"location\">at line 116<\/div> <code> <abbr title=\"ChildCouponVersionQuery\">ChildCouponVersionQuery<\/abbr> <strong>orderByIsCumulative<\/strong>($order = Criteria::ASC)<\/code> <\/h3> <div class=\"details\"> <div class=\"method-description\"> <p>Order by the is_cumulative column<\/p> <\/div> <div class=\"tags\"> <h4>Parameters<\/h4> <table class=\"table table-condensed\"> <tr> <td><\/td> <td>$order<\/td> <td><\/td> <\/tr> <\/table> <h4>Return Value<\/h4> <table class=\"table table-condensed\"> <tr> <td> <abbr title=\"ChildCouponVersionQuery\">ChildCouponVersionQuery<\/abbr><\/td> <td><\/td> <\/tr> <\/table> <\/div> <\/div> <\/div> <div class=\"method-item\"> <h3 id=\"method_orderByIsRemovingPostage\"> <div class=\"location\">at line 116<\/div> <code> <abbr title=\"ChildCouponVersionQuery\">ChildCouponVersionQuery<\/abbr> <strong>orderByIsRemovingPostage<\/strong>($order = Criteria::ASC)<\/code> <\/h3> <div class=\"details\"> <div class=\"method-description\"> <p>Order by the is<em>removing<\/em>postage column<\/p> <\/div> <div class=\"tags\"> <h4>Parameters<\/h4> <table class=\"table table-condensed\"> <tr> <td><\/td> <td>$order<\/td> <td><\/td> <\/tr> <\/table> <h4>Return Value<\/h4> <table class=\"table table-condensed\"> <tr> <td> <abbr title=\"ChildCouponVersionQuery\">ChildCouponVersionQuery<\/abbr><\/td> <td><\/td> <\/tr> <\/table> <\/div> <\/div> <\/div> <div class=\"method-item\"> <h3 id=\"method_orderByIsAvailableOnSpecialOffers\"> <div class=\"location\">at line 116<\/div> <code> <abbr title=\"ChildCouponVersionQuery\">ChildCouponVersionQuery<\/abbr> <strong>orderByIsAvailableOnSpecialOffers<\/strong>($order = Criteria::ASC)<\/code> <\/h3> <div class=\"details\"> <div class=\"method-description\"> <p>Order by the is<em>available<\/em>on<em>special<\/em>offers column<\/p> <\/div> <div class=\"tags\"> <h4>Parameters<\/h4> <table class=\"table table-condensed\"> <tr> <td><\/td> <td>$order<\/td> <td><\/td> <\/tr> <\/table> <h4>Return Value<\/h4> <table class=\"table table-condensed\"> <tr> <td> <abbr title=\"ChildCouponVersionQuery\">ChildCouponVersionQuery<\/abbr><\/td> <td><\/td> <\/tr> <\/table> <\/div> <\/div> <\/div> <div class=\"method-item\"> <h3 id=\"method_orderByIsUsed\"> <div class=\"location\">at line 116<\/div> <code> <abbr title=\"ChildCouponVersionQuery\">ChildCouponVersionQuery<\/abbr> <strong>orderByIsUsed<\/strong>($order = Criteria::ASC)<\/code> <\/h3> <div class=\"details\"> <div class=\"method-description\"> <p>Order by the is_used column<\/p> <\/div> <div class=\"tags\"> <h4>Parameters<\/h4> <table class=\"table table-condensed\"> <tr> <td><\/td> <td>$order<\/td> <td><\/td> <\/tr> <\/table> <h4>Return Value<\/h4> <table class=\"table table-condensed\"> <tr> <td> <abbr title=\"ChildCouponVersionQuery\">ChildCouponVersionQuery<\/abbr><\/td> <td><\/td> <\/tr> <\/table> <\/div> <\/div> <\/div> <div class=\"method-item\"> <h3 id=\"method_orderBySerializedConditions\"> <div class=\"location\">at line 116<\/div> <code> <abbr title=\"ChildCouponVersionQuery\">ChildCouponVersionQuery<\/abbr> <strong>orderBySerializedConditions<\/strong>($order = Criteria::ASC)<\/code> <\/h3> <div class=\"details\"> <div class=\"method-description\"> <p>Order by the serialized_conditions column<\/p> <\/div> <div class=\"tags\"> <h4>Parameters<\/h4> <table class=\"table table-condensed\"> <tr> <td><\/td> <td>$order<\/td> <td><\/td> <\/tr> <\/table> <h4>Return Value<\/h4> <table class=\"table table-condensed\"> <tr> <td> <abbr title=\"ChildCouponVersionQuery\">ChildCouponVersionQuery<\/abbr><\/td> <td><\/td> <\/tr> <\/table> <\/div> <\/div> <\/div> <div class=\"method-item\"> <h3 id=\"method_orderByPerCustomerUsageCount\"> <div class=\"location\">at line 116<\/div> <code> <abbr title=\"ChildCouponVersionQuery\">ChildCouponVersionQuery<\/abbr> <strong>orderByPerCustomerUsageCount<\/strong>($order = Criteria::ASC)<\/code> <\/h3> <div class=\"details\"> <div class=\"method-description\"> <p>Order by the per<em>customer<\/em>usage_count column<\/p> <\/div> <div class=\"tags\"> <h4>Parameters<\/h4> <table class=\"table table-condensed\"> <tr> <td><\/td> <td>$order<\/td> <td><\/td> <\/tr> <\/table> <h4>Return Value<\/h4> <table class=\"table table-condensed\"> <tr> <td> <abbr title=\"ChildCouponVersionQuery\">ChildCouponVersionQuery<\/abbr><\/td> <td><\/td> <\/tr> <\/table> <\/div> <\/div> <\/div> <div class=\"method-item\"> <h3 id=\"method_orderByCreatedAt\"> <div class=\"location\">at line 116<\/div> <code> <abbr title=\"ChildCouponVersionQuery\">ChildCouponVersionQuery<\/abbr> <strong>orderByCreatedAt<\/strong>($order = Criteria::ASC)<\/code> <\/h3> <div class=\"details\"> <div class=\"method-description\"> <p>Order by the created_at column<\/p> <\/div> <div class=\"tags\"> <h4>Parameters<\/h4> <table class=\"table table-condensed\"> <tr> <td><\/td> <td>$order<\/td> <td><\/td> <\/tr> <\/table> <h4>Return Value<\/h4> <table class=\"table table-condensed\"> <tr> <td> <abbr title=\"ChildCouponVersionQuery\">ChildCouponVersionQuery<\/abbr><\/td> <td><\/td> <\/tr> <\/table> <\/div> <\/div> <\/div> <div class=\"method-item\"> <h3 id=\"method_orderByUpdatedAt\"> <div class=\"location\">at line 116<\/div> <code> <abbr title=\"ChildCouponVersionQuery\">ChildCouponVersionQuery<\/abbr> <strong>orderByUpdatedAt<\/strong>($order = Criteria::ASC)<\/code> <\/h3> <div class=\"details\"> <div class=\"method-description\"> <p>Order by the updated_at column<\/p> <\/div> <div class=\"tags\"> <h4>Parameters<\/h4> <table class=\"table table-condensed\"> <tr> <td><\/td> <td>$order<\/td> <td><\/td> <\/tr> <\/table> <h4>Return Value<\/h4> <table class=\"table table-condensed\"> <tr> <td> <abbr title=\"ChildCouponVersionQuery\">ChildCouponVersionQuery<\/abbr><\/td> <td><\/td> <\/tr> <\/table> <\/div> <\/div> <\/div> <div class=\"method-item\"> <h3 id=\"method_orderByVersion\"> <div class=\"location\">at line 116<\/div> <code> <abbr title=\"ChildCouponVersionQuery\">ChildCouponVersionQuery<\/abbr> <strong>orderByVersion<\/strong>($order = Criteria::ASC)<\/code> <\/h3> <div class=\"details\"> <div class=\"method-description\"> <p>Order by the version column<\/p> <\/div> <div class=\"tags\"> <h4>Parameters<\/h4> <table class=\"table table-condensed\"> <tr> <td><\/td> <td>$order<\/td> <td><\/td> <\/tr> <\/table> <h4>Return Value<\/h4> <table class=\"table table-condensed\"> <tr> <td> <abbr title=\"ChildCouponVersionQuery\">ChildCouponVersionQuery<\/abbr><\/td> <td><\/td> <\/tr> <\/table> <\/div> <\/div> <\/div> <div class=\"method-item\"> <h3 id=\"method_orderByVersionCreatedAt\"> <div class=\"location\">at line 116<\/div> <code> <abbr title=\"ChildCouponVersionQuery\">ChildCouponVersionQuery<\/abbr> <strong>orderByVersionCreatedAt<\/strong>($order = Criteria::ASC)<\/code> <\/h3> <div class=\"details\"> <div class=\"method-description\"> <p>Order by the version<em>created<\/em>at column<\/p> <\/div> <div class=\"tags\"> <h4>Parameters<\/h4> <table class=\"table table-condensed\"> <tr> <td><\/td> <td>$order<\/td> <td><\/td> <\/tr> <\/table> <h4>Return Value<\/h4> <table class=\"table table-condensed\"> <tr> <td> <abbr title=\"ChildCouponVersionQuery\">ChildCouponVersionQuery<\/abbr><\/td> <td><\/td> <\/tr> <\/table> <\/div> <\/div> <\/div> <div class=\"method-item\"> <h3 id=\"method_orderByVersionCreatedBy\"> <div class=\"location\">at line 116<\/div> <code> <abbr title=\"ChildCouponVersionQuery\">ChildCouponVersionQuery<\/abbr> <strong>orderByVersionCreatedBy<\/strong>($order = Criteria::ASC)<\/code> <\/h3> <div class=\"details\"> <div class=\"method-description\"> <p>Order by the version<em>created<\/em>by column<\/p> <\/div> <div class=\"tags\"> <h4>Parameters<\/h4> <table class=\"table table-condensed\"> <tr> <td><\/td> <td>$order<\/td> <td><\/td> <\/tr> <\/table> <h4>Return Value<\/h4> <table class=\"table table-condensed\"> <tr> <td> <abbr title=\"ChildCouponVersionQuery\">ChildCouponVersionQuery<\/abbr><\/td> <td><\/td> <\/tr> <\/table> <\/div> <\/div> <\/div> <div class=\"method-item\"> <h3 id=\"method_groupById\"> <div class=\"location\">at line 116<\/div> <code> <abbr title=\"ChildCouponVersionQuery\">ChildCouponVersionQuery<\/abbr> <strong>groupById<\/strong>()<\/code> <\/h3> <div class=\"details\"> <div class=\"method-description\"> <p>Group by the id column<\/p> <\/div> <div class=\"tags\"> <h4>Return Value<\/h4> <table class=\"table table-condensed\"> <tr> <td> <abbr title=\"ChildCouponVersionQuery\">ChildCouponVersionQuery<\/abbr><\/td> <td><\/td> <\/tr> <\/table> <\/div> <\/div> <\/div> <div class=\"method-item\"> <h3 id=\"method_groupByCode\"> <div class=\"location\">at line 116<\/div> <code> <abbr title=\"ChildCouponVersionQuery\">ChildCouponVersionQuery<\/abbr> <strong>groupByCode<\/strong>()<\/code> <\/h3> <div class=\"details\"> <div class=\"method-description\"> <p>Group by the code column<\/p> <\/div> <div class=\"tags\"> <h4>Return Value<\/h4> <table class=\"table table-condensed\"> <tr> <td> <abbr title=\"ChildCouponVersionQuery\">ChildCouponVersionQuery<\/abbr><\/td> <td><\/td> <\/tr> <\/table> <\/div> <\/div> <\/div> <div class=\"method-item\"> <h3 id=\"method_groupByType\"> <div class=\"location\">at line 116<\/div> <code> <abbr title=\"ChildCouponVersionQuery\">ChildCouponVersionQuery<\/abbr> <strong>groupByType<\/strong>()<\/code> <\/h3> <div class=\"details\"> <div class=\"method-description\"> <p>Group by"} +{"id":"RedPajamaGithub.0004","text":"\/\/ Copyright (c) Microsoft Corporation. All rights reserved. \/\/ Licensed under the MIT License. using System; using System.ComponentModel; using System.IO; using System.Threading; using System.Threading.Tasks; using Azure.Core; using Azure.Core.Pipeline; using Azure.Storage.Blobs.Models; using Azure.Storage.Shared; using Metadata = System.Collections.Generic.IDictionary<string, string>; using Tags = System.Collections.Generic.IDictionary<string, string>; #pragma warning disable SA1402 \/\/ File may only contain a single type namespace Azure.Storage.Blobs.Specialized { \/\/\/ <summary> \/\/\/ The <see cref=\"PageBlobClient\"\/> allows you to manipulate Azure \/\/\/ Storage page blobs. \/\/\/ \/\/\/ Page blobs are a collection of 512-byte pages optimized for random \/\/\/ read and write operations. To create a page blob, you initialize the \/\/\/ page blob and specify the maximum size the page blob will grow. To add \/\/\/ or update the contents of a page blob, you write a page or pages by \/\/\/ specifying an offset and a range that align to 512-byte page \/\/\/ boundaries. A write to a page blob can overwrite just one page, some \/\/\/ pages, or up to 4 MB of the page blob. Writes to page blobs happen \/\/\/ in-place and are immediately committed to the blob. The maximum size \/\/\/ for a page blob is 8 TB. \/\/\/ <\/summary> public class PageBlobClient : BlobBaseClient { \/\/\/ <summary> \/\/\/ Gets the number of bytes in a page (512). \/\/\/ <\/summary> public virtual int PageBlobPageBytes => 512; \/\/\/ <summary> \/\/\/ Gets the maximum number of bytes that can be sent in a call \/\/\/ to the <see cref=\"UploadPagesAsync(Stream, long, byte[], PageBlobRequestConditions, IProgress{long}, CancellationToken)\"\/> operation. \/\/\/ <\/summary> public virtual int PageBlobMaxUploadPagesBytes => 4 * Constants.MB; \/\/ 4MB \/\/\/ <summary> \/\/\/ PageBlobRestClient. \/\/\/ <\/summary> private readonly PageBlobRestClient _pageBlobRestClient; \/\/\/ <summary> \/\/\/ PageBlobRestClient. \/\/\/ <\/summary> internal virtual PageBlobRestClient PageBlobRestClient => _pageBlobRestClient; #region ctors \/\/\/ <summary> \/\/\/ Initializes a new instance of the <see cref=\"PageBlobClient\"\/> \/\/\/ class for mocking. \/\/\/ <\/summary> protected PageBlobClient() { } \/\/\/ <summary> \/\/\/ Initializes a new instance of the <see cref=\"PageBlobClient\"\/> \/\/\/ class. \/\/\/ <\/summary> \/\/\/ <param name=\"connectionString\"> \/\/\/ A connection string includes the authentication information \/\/\/ required for your application to access data in an Azure Storage \/\/\/ account at runtime. \/\/\/ \/\/\/ For more information \/\/\/ <see href=\"https:\/\/docs.microsoft.com\/azure\/storage\/common\/storage-configure-connection-string\"> \/\/\/ Configure Azure Storage connection strings<\/see> \/\/\/ <\/param> \/\/\/ <param name=\"blobContainerName\"> \/\/\/ The name of the container containing this page blob. \/\/\/ <\/param> \/\/\/ <param name=\"blobName\"> \/\/\/ The name of this page blob. \/\/\/ <\/param> public PageBlobClient(string connectionString, string blobContainerName, string blobName) : base(connectionString, blobContainerName, blobName) { _pageBlobRestClient = BuildPageBlobRestClient(_uri); } \/\/\/ <summary> \/\/\/ Initializes a new instance of the <see cref=\"PageBlobClient\"\/> \/\/\/ class. \/\/\/ <\/summary> \/\/\/ <param name=\"connectionString\"> \/\/\/ A connection string includes the authentication information \/\/\/ required for your application to access data in an Azure Storage \/\/\/ account at runtime. \/\/\/ \/\/\/ For more information, \/\/\/ <see href=\"https:\/\/docs.microsoft.com\/azure\/storage\/common\/storage-configure-connection-string\"> \/\/\/ Configure Azure Storage connection strings<\/see> \/\/\/ <\/param> \/\/\/ <param name=\"blobContainerName\"> \/\/\/ The name of the container containing this page blob. \/\/\/ <\/param> \/\/\/ <param name=\"blobName\"> \/\/\/ The name of this page blob. \/\/\/ <\/param> \/\/\/ <param name=\"options\"> \/\/\/ Optional client options that define the transport pipeline \/\/\/ policies for authentication, retries, etc., that are applied to \/\/\/ every request. \/\/\/ <\/param> public PageBlobClient(string connectionString, string blobContainerName, string blobName, BlobClientOptions options) : base(connectionString, blobContainerName, blobName, options) { _pageBlobRestClient = BuildPageBlobRestClient(_uri); AssertNoClientSideEncryption(options); } \/\/\/ <summary> \/\/\/ Initializes a new instance of the <see cref=\"PageBlobClient\"\/> \/\/\/ class. \/\/\/ <\/summary> \/\/\/ <param name=\"blobUri\"> \/\/\/ A <see cref=\"Uri\"\/> referencing the page blob that includes the \/\/\/ name of the account, the name of the blob container, and the name of \/\/\/ the blob. \/\/\/ <\/param> \/\/\/ <param name=\"options\"> \/\/\/ Optional client options that define the transport pipeline \/\/\/ policies for authentication, retries, etc., that are applied to \/\/\/ every request. \/\/\/ <\/param> public PageBlobClient(Uri blobUri, BlobClientOptions options = default) : base(blobUri, options) { _pageBlobRestClient = BuildPageBlobRestClient(blobUri); AssertNoClientSideEncryption(options); } \/\/\/ <summary> \/\/\/ Initializes a new instance of the <see cref=\"PageBlobClient\"\/> \/\/\/ class. \/\/\/ <\/summary> \/\/\/ <param name=\"blobUri\"> \/\/\/ A <see cref=\"Uri\"\/> referencing the page blob that includes the \/\/\/ name of the account, the name of the blob container, and the name of \/\/\/ the blob. \/\/\/ <\/param> \/\/\/ <param name=\"credential\"> \/\/\/ The shared key credential used to sign requests. \/\/\/ <\/param> \/\/\/ <param name=\"options\"> \/\/\/ Optional client options that define the transport pipeline \/\/\/ policies for authentication, retries, etc., that are applied to \/\/\/ every request. \/\/\/ <\/param> public PageBlobClient(Uri blobUri, StorageSharedKeyCredential credential, BlobClientOptions options = default) : base(blobUri, credential, options) { _pageBlobRestClient = BuildPageBlobRestClient(blobUri); AssertNoClientSideEncryption(options); } \/\/\/ <summary> \/\/\/ Initializes a new instance of the <see cref=\"PageBlobClient\"\/> \/\/\/ class. \/\/\/ <\/summary> \/\/\/ <param name=\"blobUri\"> \/\/\/ A <see cref=\"Uri\"\/> referencing the page blob that includes the \/\/\/ name of the account, the name of the blob container, and the name of \/\/\/ the blob. \/\/\/ Must not contain shared access signature, which should be passed in the second parameter. \/\/\/ <\/param> \/\/\/ <param name=\"credential\"> \/\/\/ The shared access signature credential used to sign requests. \/\/\/ <\/param> \/\/\/ <param name=\"options\"> \/\/\/ Optional client options that define the transport pipeline \/\/\/ policies for authentication, retries, etc., that are applied to \/\/\/ every request. \/\/\/ <\/param> \/\/\/ <remarks> \/\/\/ This constructor should only be used when shared access signature needs to be updated during lifespan of this client. \/\/\/ <\/remarks> public PageBlobClient(Uri blobUri, AzureSasCredential credential, BlobClientOptions options = default) : base(blobUri, credential, options) { _pageBlobRestClient = BuildPageBlobRestClient(blobUri); AssertNoClientSideEncryption(options); } \/\/\/ <summary> \/\/\/ Initializes a new instance of the <see cref=\"PageBlobClient\"\/> \/\/\/ class. \/\/\/ <\/summary> \/\/\/ <param name=\"blobUri\"> \/\/\/ A <see cref=\"Uri\"\/> referencing the page blob that includes the \/\/\/ name of the account, the name of the blob container, and the name of \/\/\/ the blob. \/\/\/ <\/param> \/\/\/ <param name=\"credential\"> \/\/\/ The token credential used to sign requests. \/\/\/ <\/param> \/\/\/ <param name=\"options\"> \/\/\/ Optional client options that define the transport pipeline \/\/\/ policies for authentication, retries, etc., that are applied to \/\/\/ every request. \/\/\/ <\/param> public PageBlobClient(Uri blobUri, TokenCredential credential, BlobClientOptions options = default) : base(blobUri, credential, options) { _pageBlobRestClient = BuildPageBlobRestClient(blobUri); AssertNoClientSideEncryption(options); } \/\/\/ <summary> \/\/\/ Initializes a new instance of the <see cref=\"PageBlobClient\"\/> \/\/\/ class. \/\/\/ <\/summary> \/\/\/ <param name=\"blobUri\"> \/\/\/ A <see cref=\"Uri\"\/> referencing the page blob that includes the \/\/\/ name of the account, the name of the blob container, and the name of \/\/\/ the blob. \/\/\/ <\/param> \/\/\/ <param name=\"clientConfiguration\"> \/\/\/ <see cref=\"BlobClientConfiguration\"\/>. \/\/\/ <\/param> internal PageBlobClient( Uri blobUri, BlobClientConfiguration clientConfiguration) : base( blobUri, clientConfiguration, clientSideEncryption: default) { _pageBlobRestClient = BuildPageBlobRestClient(blobUri); } private static void AssertNoClientSideEncryption(BlobClientOptions options) { if (options?._clientSideEncryptionOptions != default) { throw Errors.ClientSideEncryption.TypeNotSupported(typeof(PageBlobClient)); } } private PageBlobRestClient BuildPageBlobRestClient(Uri blobUri) { return new PageBlobRestClient( clientDiagnostics: _clientConfiguration.ClientDiagnostics, pipeline: _clientConfiguration.Pipeline, url: blobUri.AbsoluteUri, version: _clientConfiguration.Version.ToVersionString()); } #endregion ctors \/\/\/ <summary> \/\/\/ Initializes a new instance of the <see cref=\"PageBlobClient\"\/> \/\/\/ class with an identical <see cref=\"Uri\"\/> source but the specified \/\/\/ snapshot timestamp. \/\/\/ \/\/\/ For more information, see \/\/\/ <see href=\"https:\/\/docs.microsoft.com\/en-us\/rest\/api\/storageservices\/creating-a-snapshot-of-a-blob\"> \/\/\/ Create a snapshot of a blob<\/see>. \/\/\/ <\/summary> \/\/\/ <param name=\"snapshot\">The snapshot identifier.<\/param> \/\/\/ <returns>A new <see cref=\"PageBlobClient\"\/> instance.<\/returns> \/\/\/ <remarks> \/\/\/ Pass null or empty string to remove the snapshot returning a URL \/\/\/ to the base blob. \/\/\/ <\/remarks> public new PageBlobClient WithSnapshot(string snapshot) => (PageBlobClient)WithSnapshotCore(snapshot); \/\/\/ <summary> \/\/\/ Creates a new instance of the <see cref=\"PageBlobClient\"\/> class \/\/\/ with an identical <see cref=\"Uri\"\/> source but the specified \/\/\/ snapshot timestamp. \/\/\/ <\/summary> \/\/\/ <param name=\"snapshot\">The snapshot identifier.<\/param> \/\/\/ <returns>A new <see cref=\"PageBlobClient\"\/> instance.<\/returns> protected sealed override BlobBaseClient WithSnapshotCore(string snapshot) { var builder = new BlobUriBuilder(Uri) { Snapshot = snapshot }; return new PageBlobClient( builder.ToUri(), ClientConfiguration); } \/\/\/ <summary> \/\/\/ Creates a new PageBlobClient object identical to the source but with the specified version ID. \/\/\/ Pass \"\" to remove the version ID returning a URL to the base blob. \/\/\/ <\/summary> \/\/\/ <param name=\"versionId\">version ID<\/param> \/\/\/ <returns><\/returns> public new PageBlobClient WithVersion(string versionId) { var builder = new BlobUriBuilder(Uri) { VersionId = versionId }; return new PageBlobClient( builder.ToUri(), ClientConfiguration); } \/\/\/ <summary> \/\/\/ Initializes a new instance of the <see cref=\"PageBlobClient\"\/> \/\/\/ class with an identical <see cref=\"Uri\"\/> source but the specified \/\/\/ <paramref name=\"customerProvidedKey\"\/>. \/\/\/ \/\/\/ <\/summary> \/\/\/ <param name=\"customerProvidedKey\">The customer provided key.<\/param> \/\/\/ <returns>A new <see cref=\"PageBlobClient\"\/> instance.<\/returns> \/\/\/ <remarks> \/\/\/ Pass null to remove the customer provide key in the returned <see cref=\"PageBlobClient\"\/>. \/\/\/ <\/remarks> public new PageBlobClient WithCustomerProvidedKey(CustomerProvidedKey? customerProvidedKey) { BlobClientConfiguration newClientConfiguration = BlobClientConfiguration.DeepCopy(ClientConfiguration); newClientConfiguration.CustomerProvidedKey = customerProvidedKey; return new PageBlobClient( blobUri: Uri, clientConfiguration: newClientConfiguration); } \/\/\/ <summary> \/\/\/ Initializes a new instance of the <see cref=\"PageBlobClient\"\/> \/\/\/ class with an identical <see cref=\"Uri\"\/> source but the specified \/\/\/ <paramref name=\"encryptionScope\"\/>. \/\/\/ \/\/\/ <\/summary> \/\/\/ <param name=\"encryptionScope\">The encryption scope.<\/param> \/\/\/ <returns>A new <see cref=\"PageBlobClient\"\/> instance.<\/returns> \/\/\/ <remarks> \/\/\/ Pass null to remove the encryption scope in the returned <see cref=\"PageBlobClient\"\/>. \/\/\/ <\/remarks> public new PageBlobClient WithEncryptionScope(string encryptionScope) { BlobClientConfiguration newClientConfiguration = BlobClientConfiguration.DeepCopy(ClientConfiguration); newClientConfiguration.EncryptionScope = encryptionScope; return new PageBlobClient( blobUri: Uri, clientConfiguration: newClientConfiguration); } #region Create \/\/\/ <summary> \/\/\/ The <see cref=\"Create(long, PageBlobCreateOptions, CancellationToken)\"\/> \/\/\/ operation creates a new page blob of the specified <paramref name=\"size\"\/>. \/\/\/ The content of any existing blob is overwritten with the newly initialized page blob \/\/\/ To add content to the page blob, call the \/\/\/ <see cref=\"UploadPages(Stream, long, byte[], PageBlobRequestConditions, IProgress{long}, CancellationToken)\"\/> operation. \/\/\/ \/\/\/ For more information, see https:\/\/docs.microsoft.com\/rest\/api\/storageservices\/put-blob. \/\/\/ <\/summary> \/\/\/ <param name=\"size\"> \/\/\/ Specifies the maximum size for the page blob, up to 8 TB. The \/\/\/ size must be aligned to a 512-byte boundary. \/\/\/ <\/param> \/\/\/ <param name=\"options\"> \/\/\/ Optional parameters. \/\/\/ <\/param> \/\/\/ <param name=\"cancellationToken\"> \/\/\/ Optional <see cref=\"CancellationToken\"\/> to propagate \/\/\/ notifications that the operation should be cancelled. \/\/\/ <\/param> \/\/\/ <returns> \/\/\/ A <see cref=\"Response{BlobContentInfo}\"\/> describing the \/\/\/ newly created page blob. \/\/\/ <\/returns> \/\/\/ <remarks> \/\/\/ A <see cref=\"RequestFailedException\"\/> will be thrown if \/\/\/ a failure occurs. \/\/\/ <\/remarks> public virtual Response<BlobContentInfo> Create( long size, PageBlobCreateOptions options, CancellationToken cancellationToken = default) => CreateInternal( size, options?.SequenceNumber, options?.HttpHeaders, options?.Metadata, options?.Tags, options?.Conditions, options?.ImmutabilityPolicy, options?.LegalHold, async: false, cancellationToken) .EnsureCompleted(); \/\/\/ <summary> \/\/\/ The <see cref=\"CreateAsync(long, PageBlobCreateOptions, CancellationToken)\"\/> \/\/\/ operation creates a new page blob of the specified <paramref name=\"size\"\/>. \/\/\/ The content of any existing blob is overwritten with the newly initialized page blob \/\/\/ To add content to the page blob, call the \/\/\/ <see cref=\"UploadPages(Stream, long, byte[], PageBlobRequestConditions, IProgress{long}, CancellationToken)\"\/> operation. \/\/\/ \/\/\/ For more information, see https:\/\/docs.microsoft.com\/rest\/api\/storageservices\/put-blob. \/\/\/ <\/summary> \/\/\/ <param name=\"size\"> \/\/\/ Specifies the maximum size for the page blob, up to 8 TB. The \/\/\/ size must be aligned to a 512-byte boundary. \/\/\/ <\/param> \/\/\/ <param name=\"options\"> \/\/\/ Optional parameters. \/\/\/ <\/param> \/\/\/ <param name=\"cancellationToken\"> \/\/\/ Optional <see cref=\"CancellationToken\"\/> to propagate \/\/\/ notifications that the operation should be cancelled. \/\/\/ <\/param> \/\/\/ <returns> \/\/\/ A <see cref=\"Response{BlobContentInfo}\"\/> describing the \/\/\/ newly created page blob. \/\/\/ <\/returns> \/\/\/ <remarks> \/\/\/ A <see cref=\"RequestFailedException\"\/> will be thrown if \/\/\/ a failure occurs. \/\/\/ <\/remarks> public virtual async Task<Response<BlobContentInfo>> CreateAsync( long size, PageBlobCreateOptions options, CancellationToken cancellationToken = default) => await CreateInternal( size, options?.SequenceNumber, options?.HttpHeaders, options?.Metadata, options?.Tags, options?.Conditions, options?.ImmutabilityPolicy, options?.LegalHold, async: true, cancellationToken) .ConfigureAwait(false); \/\/\/ <summary> \/\/\/ The <see cref=\"Create(long, long?, BlobHttpHeaders, Metadata, PageBlobRequestConditions, CancellationToken)\"\/> \/\/\/ operation creates a new page blob of the specified <paramref name=\"size\"\/>. The content of any \/\/\/ existing blob is overwritten with the newly initialized page blob \/\/\/ To add content to the page blob, call the \/\/\/ <see cref=\"UploadPages(Stream, long, byte[], PageBlobRequestConditions, IProgress{long}, CancellationToken)\"\/> operation. \/\/\/ \/\/\/ For more information, see https:\/\/docs.microsoft.com\/rest\/api\/storageservices\/put-blob. \/\/\/ <\/summary> \/\/\/ <param name=\"size\"> \/\/\/ Specifies the maximum size for the page blob, up to 8 TB. The \/\/\/ size must be aligned to a 512-byte boundary. \/\/\/ <\/param> \/\/\/ <param name=\"sequenceNumber\"> \/\/\/ Optional user-controlled value that you can use to track requests. \/\/\/ The value of the <paramref name=\"sequenceNumber\"\/> must be between \/\/\/ 0 and 2^63 - 1. The default value is 0. \/\/\/ <\/param> \/\/\/ <param name=\"httpHeaders\"> \/\/\/ Optional standard HTTP header properties that can be set for the \/\/\/ new page blob. \/\/\/ <\/param> \/\/\/ <param name=\"metadata\"> \/\/\/ Optional custom metadata to set for this page blob. \/\/\/ <\/param> \/\/\/ <param name=\"conditions\"> \/\/\/ Optional <see cref=\"PageBlobRequestConditions\"\/> to add \/\/\/ conditions on the creation of this new page blob. \/\/\/ <\/param> \/\/\/ <param name=\"cancellationToken\"> \/\/\/ Optional <see cref=\"CancellationToken\"\/> to propagate \/\/\/ notifications that the operation should be cancelled. \/\/\/ <\/param> \/\/\/ <returns> \/\/\/ A <see cref=\"Response{BlobContentInfo}\"\/> describing the \/\/\/ newly created page blob. \/\/\/ <\/returns> \/\/\/ <remarks> \/\/\/ A <see cref=\"RequestFailedException\"\/> will be thrown if \/\/\/ a failure occurs. \/\/\/ <\/remarks> [EditorBrowsable(EditorBrowsableState.Never)] public virtual Response<BlobContentInfo> Create( long size, long? sequenceNumber = default, BlobHttpHeaders httpHeaders = default, Metadata metadata = default, PageBlobRequestConditions conditions = default, CancellationToken cancellationToken = default) => CreateInternal( size: size, sequenceNumber: sequenceNumber, httpHeaders: httpHeaders, metadata: metadata, tags: default, conditions: conditions, immutabilityPolicy: default, legalHold: default, async: false, cancellationToken: cancellationToken) .EnsureCompleted(); \/\/\/ <summary> \/\/\/ The <see cref=\"CreateAsync(long, long?, BlobHttpHeaders, Metadata, PageBlobRequestConditions, CancellationToken)\"\/> \/\/\/ operation creates a new page blob of the specified <paramref name=\"size\"\/>. The content of any \/\/\/ existing blob is overwritten with the newly initialized page blob \/\/\/ To add content to the page blob, call the \/\/\/ <see cref=\"UploadPagesAsync(Stream, long, byte[], PageBlobRequestConditions, IProgress{long}, CancellationToken)\"\/> operation. \/\/\/ \/\/\/ For more information, see https:\/\/docs.microsoft.com\/rest\/api\/storageservices\/put-blob. \/\/\/ <\/summary> \/\/\/ <param name=\"size\"> \/\/\/ Specifies the maximum size for the page blob, up to 8 TB. The \/\/\/ size must be aligned to a 512-byte boundary. \/\/\/ <\/param> \/\/\/ <param name=\"sequenceNumber\"> \/\/\/ Optional user-controlled value that you can use to track requests. \/\/\/ The value of the <paramref name=\"sequenceNumber\"\/> must be between \/\/\/ 0 and 2^63 - 1. The default value is 0. \/\/\/ <\/param> \/\/\/ <param name=\"httpHeaders\"> \/\/\/ Optional standard HTTP header properties that can be set for the \/\/\/ new page blob. \/\/\/ <\/param> \/\/\/ <param name=\"metadata\"> \/\/\/ Optional custom metadata to set for this page blob. \/\/\/ <\/param> \/\/\/ <param name=\"conditions\"> \/\/\/ Optional <see cref=\"PageBlobRequestConditions\"\/> to add \/\/\/ conditions on the creation of this new page blob. \/\/\/ <\/param> \/\/\/ <param name=\"cancellationToken\"> \/\/\/ Optional <see cref=\"CancellationToken\"\/> to propagate \/\/\/ notifications that the operation should be cancelled. \/\/\/ <\/param> \/\/\/ <returns> \/\/\/ A <see cref=\"Response{BlobContentInfo}\"\/> describing the \/\/\/ newly created page blob. \/\/\/ <\/returns> \/\/\/ <remarks> \/\/\/ A <see cref=\"RequestFailedException\"\/> will be thrown if \/\/\/ a failure occurs. \/\/\/ <\/remarks> [EditorBrowsable(EditorBrowsableState.Never)] public virtual async Task<Response<BlobContentInfo>> CreateAsync( long size, long? sequenceNumber = default, BlobHttpHeaders httpHeaders = default, Metadata metadata = default, PageBlobRequestConditions conditions = default, CancellationToken cancellationToken = default) => await CreateInternal( size: size, sequenceNumber: sequenceNumber, httpHeaders: httpHeaders, metadata: metadata, tags: default, conditions: conditions, immutabilityPolicy: default, legalHold: default, async: true, cancellationToken: cancellationToken) .ConfigureAwait(false); \/\/\/ <summary> \/\/\/ The <see cref=\"CreateIfNotExists(long, PageBlobCreateOptions, CancellationToken)\"\/> \/\/\/ operation creates a new page blob of the specified <paramref name=\"size\"\/>. If the blob already \/\/\/ exists, the content of the existing blob will remain unchanged. If the blob does not already exists, \/\/\/ a new page blob with the specified <paramref name=\"size\"\/> will be created. \/\/\/ <see cref=\"UploadPages(Stream, long, byte[], PageBlobRequestConditions, IProgress{long}, CancellationToken)\"\/> operation. \/\/\/ \/\/\/ For more information, see https:\/\/docs.microsoft.com\/rest\/api\/storageservices\/put-blob. \/\/\/ <\/summary> \/\/\/ <param name=\"size\"> \/\/\/ Specifies the maximum size for the page blob, up to 8 TB. The \/\/\/ size must be aligned to a 512-byte boundary. \/\/\/ <\/param> \/\/\/ <param name=\"options\"> \/\/\/ Optional parameters. \/\/\/ <\/param> \/\/\/ \/\/\/ <param name=\"cancellationToken\"> \/\/\/ Optional <see cref=\"CancellationToken\"\/> to propagate \/\/\/ notifications that the operation should be cancelled. \/\/\/ <\/param> \/\/\/ <returns> \/\/\/ If the page blob does not already exist, A <see cref=\"Response{BlobContentInfo}\"\/> \/\/\/ describing the newly created page blob. Otherwise, <c>null<\/c>. \/\/\/ <\/returns> \/\/\/ <remarks> \/\/\/ A <see cref=\"RequestFailedException\"\/> will be thrown if \/\/\/ a failure occurs. \/\/\/ <\/remarks> public virtual Response<BlobContentInfo> CreateIfNotExists( long size, PageBlobCreateOptions options, CancellationToken cancellationToken = default) => CreateIfNotExistsInternal( size, options?.SequenceNumber, options?.HttpHeaders, options?.Metadata, options?.Tags, options?.ImmutabilityPolicy, options?.LegalHold, async: false, cancellationToken) .EnsureCompleted(); \/\/\/ <summary> \/\/\/ The <see cref=\"CreateIfNotExistsAsync(long, PageBlobCreateOptions, CancellationToken)\"\/> \/\/\/ operation creates a new page blob of the specified <paramref name=\"size\"\/>. If the blob already \/\/\/ exists, the content of the existing blob will remain unchanged. If the blob does not already exists, \/\/\/ a new page blob with the specified <paramref name=\"size\"\/> will be created. \/\/\/ <see cref=\"UploadPages(Stream, long, byte[], PageBlobRequestConditions, IProgress{long}, CancellationToken)\"\/> operation. \/\/\/ \/\/\/ For more information, see https:\/\/docs.microsoft.com\/rest\/api\/storageservices\/put-blob. \/\/\/ <\/summary> \/\/\/ <param name=\"size\"> \/\/\/ Specifies the maximum size for the page blob, up to 8 TB. The \/\/\/ size must be aligned to a 512-byte boundary. \/\/\/ <\/param> \/\/\/ <param name=\"options\"> \/\/\/ Optional parameters. \/\/\/ <\/param> \/\/\/ \/\/\/ <param name=\"cancellationToken\"> \/\/\/ Optional <see cref=\"CancellationToken\"\/> to propagate \/\/\/ notifications that the operation should be cancelled. \/\/\/ <\/param> \/\/\/ <returns> \/\/\/ If the page blob does not already exist, A <see cref=\"Response{BlobContentInfo}\"\/> \/\/\/ describing the newly created page blob. Otherwise, <c>null<\/c>. \/\/\/ <\/returns> \/\/\/ <remarks> \/\/\/ A <see cref=\"RequestFailedException\"\/> will be thrown if \/\/\/ a failure occurs. \/\/\/ <\/remarks> public virtual async Task<Response<BlobContentInfo>> CreateIfNotExistsAsync( long size, PageBlobCreateOptions options, CancellationToken cancellationToken = default) => await CreateIfNotExistsInternal( size, options?.SequenceNumber, options?.HttpHeaders, options?.Metadata, options?.Tags, options?.ImmutabilityPolicy, options?.LegalHold, async: true, cancellationToken) .ConfigureAwait(false); \/\/\/ <summary> \/\/\/ The <see cref=\"CreateIfNotExists(long, long?, BlobHttpHeaders, Metadata, CancellationToken)\"\/> \/\/\/ operation creates a new page blob of the specified <paramref name=\"size\"\/>. If the blob already \/\/\/ exists, the content of the existing blob will remain unchanged. If the blob does not already exists, \/\/\/ a new page blob with the specified <paramref name=\"size\"\/> will be created. \/\/\/ <see cref=\"UploadPages(Stream, long, byte[], PageBlobRequestConditions, IProgress{long}, CancellationToken)\"\/> operation. \/\/\/ \/\/\/ For more information, see https:\/\/docs.microsoft.com\/rest\/api\/storageservices\/put-blob. \/\/\/ <\/summary> \/\/\/ <param name=\"size\"> \/\/\/ Specifies the maximum size for the page blob, up to 8 TB. The \/\/\/ size must be aligned to a 512-byte boundary. \/\/\/ <\/param> \/\/\/ <param name=\"sequenceNumber\"> \/\/\/ Optional user-controlled value that you can use to track requests. \/\/\/ The value of the <paramref name=\"sequenceNumber\"\/> must be between \/\/\/ 0 and 2^63 - 1. The default value is 0. \/\/\/ <\/param> \/\/\/ <param name=\"httpHeaders\"> \/\/\/ Optional standard HTTP header properties that can be set for the \/\/\/ new page blob. \/\/\/ <\/param> \/\/\/ <param name=\"metadata\"> \/\/\/ Optional custom metadata to set for this page blob. \/\/\/ <\/param> \/\/\/ \/\/\/ <param name=\"cancellationToken\"> \/\/\/ Optional <see cref=\"CancellationToken\"\/> to propagate \/\/\/ notifications that the operation should be cancelled. \/\/\/ <\/param> \/\/\/ <returns> \/\/\/ If the page blob does not already exist, A <see cref=\"Response{BlobContentInfo}\"\/> \/\/\/ describing the newly created page blob. Otherwise, <c>null<\/c>. \/\/\/ <\/returns> \/\/\/ <remarks> \/\/\/ A <see cref=\"RequestFailedException\"\/> will be thrown if \/\/\/ a failure occurs. \/\/\/ <\/remarks> [EditorBrowsable(EditorBrowsableState.Never)] public virtual Response<BlobContentInfo> CreateIfNotExists( long size, long? sequenceNumber = default, BlobHttpHeaders httpHeaders = default, Metadata metadata = default, CancellationToken cancellationToken = default) => CreateIfNotExistsInternal( size: size, sequenceNumber: sequenceNumber, httpHeaders: httpHeaders, metadata: metadata, tags: default, immutabilityPolicy: default, legalHold: default, async: false, cancellationToken: cancellationToken) .EnsureCompleted(); \/\/\/ <summary> \/\/\/ The <see cref=\"CreateIfNotExistsAsync(long, long?, BlobHttpHeaders, Metadata, CancellationToken)\"\/> \/\/\/ operation creates a new page blob of the specified <paramref name=\"size\"\/>. If the blob already exists, \/\/\/ the content of the existing blob will remain unchanged. If the blob does not already exists, \/\/\/ a new page blob with the specified <paramref name=\"size\"\/> will be created. \/\/\/ <see cref=\"UploadPagesAsync(Stream, long, byte[], PageBlobRequestConditions, IProgress{long}, CancellationToken)\"\/> operation. \/\/\/ \/\/\/ For more information, see https:\/\/docs.microsoft.com\/rest\/api\/storageservices\/put-blob. \/\/\/ <\/summary> \/\/\/ <param name=\"size\"> \/\/\/ Specifies the maximum size for the page blob, up to 8 TB. The \/\/\/ size must be aligned to a 512-byte boundary. \/\/\/ <\/param> \/\/\/ <param name=\"sequenceNumber\"> \/\/\/ Optional user-controlled value that you can use to track requests. \/\/\/ The value of the <paramref name=\"sequenceNumber\"\/> must be between \/\/\/ 0 and 2^63 - 1. The default value is 0. \/\/\/ <\/param> \/\/\/ <param name=\"httpHeaders\"> \/\/\/ Optional standard HTTP header properties that can be set for the \/\/\/ new page blob. \/\/\/ <\/param> \/\/\/ <param name=\"metadata\"> \/\/\/ Optional custom metadata to set for this page blob. \/\/\/ <\/param> \/\/\/ <param name=\"cancellationToken\"> \/\/\/ Optional <see cref=\"CancellationToken\"\/> to propagate \/\/\/ notifications that the operation should be cancelled. \/\/\/ <\/param> \/\/\/ <returns> \/\/\/ If the page blob does not already exist, A <see cref=\"Response{BlobContentInfo}\"\/> \/\/\/ describing the newly created page blob. Otherwise, <c>null<\/c>. \/\/\/ <\/returns> \/\/\/ <remarks> \/\/\/ A <see cref=\"RequestFailedException\"\/> will be thrown if \/\/\/ a failure occurs. \/\/\/ <\/remarks> [EditorBrowsable(EditorBrowsableState.Never)] public virtual async Task<Response<BlobContentInfo>> CreateIfNotExistsAsync( long size, long? sequenceNumber = default, BlobHttpHeaders httpHeaders = default, Metadata metadata = default, CancellationToken cancellationToken = default) => await CreateIfNotExistsInternal( size: size, sequenceNumber: sequenceNumber, httpHeaders: httpHeaders, metadata: metadata, tags: default, immutabilityPolicy: default, legalHold: default, async: true, cancellationToken: cancellationToken) .ConfigureAwait(false); \/\/\/ <summary> \/\/\/ The <see cref=\"CreateIfNotExistsInternal\"\/> operation creates a new page blob \/\/\/ of the specified <paramref name=\"size\"\/>. If the blob already exists, the content of \/\/\/ the existing blob will remain unchanged. If the blob does not already exists, \/\/\/ a new page blob with the specified <paramref name=\"size\"\/> will be created. \/\/\/ To add content to the page blob, call the \/\/\/ <see cref=\"UploadPagesAsync(Stream, long, byte[], PageBlobRequestConditions, IProgress{long}, CancellationToken)\"\/> operation. \/\/\/ \/\/\/ For more information, see https:\/\/docs.microsoft.com\/rest\/api\/storageservices\/put-blob. \/\/\/ <\/summary> \/\/\/ <param name=\"size\"> \/\/\/ Specifies the maximum size for the page blob, up to 8 TB. The \/\/\/ size must be aligned to a 512-byte boundary. \/\/\/ <\/param> \/\/\/ <param name=\"sequenceNumber\"> \/\/\/ Optional user-controlled value that you can use to track requests. \/\/\/ The value of the <paramref name=\"sequenceNumber\"\/> must be between \/\/\/ 0 and 2^63 - 1. The default value is 0. \/\/\/ <\/param> \/\/\/ <param name=\"httpHeaders\"> \/\/\/ Optional standard HTTP header properties that can be set for the \/\/\/ new page blob. \/\/\/ <\/param> \/\/\/ <param name=\"metadata\"> \/\/\/ Optional custom metadata to set for this page blob. \/\/\/ <\/param> \/\/\/ <param name=\"tags\"> \/\/\/ Optional tags to set for this page blob. \/\/\/ <\/param> \/\/\/ <param name=\"immutabilityPolicy\"> \/\/\/ Optional <see cref=\"BlobImmutabilityPolicy\"\/> to set on the blob. \/\/\/ Note that is parameter is only applicable to a blob within a container that \/\/\/ has immutable storage with versioning enabled. \/\/\/ <\/param> \/\/\/ <param name=\"legalHold\"> \/\/\/ Optional. Indicates if a legal hold should be placed on the blob. \/\/\/ Note that is parameter is only applicable to a blob within a container that \/\/\/ has immutable storage with versioning enabled. \/\/\/ <\/param> \/\/\/ <param name=\"async\"> \/\/\/ Whether to invoke the operation asynchronously. \/\/\/ <\/param> \/\/\/ <param name=\"cancellationToken\"> \/\/\/ Optional <see cref=\"CancellationToken\"\/> to propagate \/\/\/ notifications that the operation should be cancelled. \/\/\/ <\/param> \/\/\/ <returns> \/\/\/ If the page blob does not already exist, A <see cref=\"Response{BlobContentInfo}\"\/> \/\/\/ describing the newly created page blob. Otherwise, <c>null<\/c>. \/\/\/ <\/returns> \/\/\/ <remarks> \/\/\/ A <see cref=\"RequestFailedException\"\/> will be thrown if \/\/\/ a failure occurs. \/\/\/ <\/remarks> private async Task<Response<BlobContentInfo>> CreateIfNotExistsInternal( long size, long? sequenceNumber, BlobHttpHeaders httpHeaders, Metadata metadata, Tags tags, BlobImmutabilityPolicy immutabilityPolicy, bool? legalHold, bool async, CancellationToken cancellationToken) { using (ClientConfiguration.Pipeline.BeginLoggingScope(nameof(PageBlobClient))) { ClientConfiguration.Pipeline.LogMethodEnter( nameof(PageBlobClient), message: $\"{nameof(Uri)}: {Uri}\\n\" + $\"{nameof(size)}: {size}\\n\" + $\"{nameof(sequenceNumber)}: {sequenceNumber}\\n\" + $\"{nameof(httpHeaders)}: {httpHeaders}\"); PageBlobRequestConditions conditions = new PageBlobRequestConditions { IfNoneMatch = new ETag(Constants.Wildcard) }; try { return await CreateInternal( size, sequenceNumber, httpHeaders, metadata, tags, conditions, immutabilityPolicy, legalHold, async, cancellationToken, $\"{nameof(PageBlobClient)}.{nameof(CreateIfNotExists)}\") .ConfigureAwait(false); } catch (RequestFailedException storageRequestFailedException) when (storageRequestFailedException.ErrorCode == BlobErrorCode.BlobAlreadyExists) { return default; } catch (Exception ex) { ClientConfiguration.Pipeline.LogException(ex); throw; } finally { ClientConfiguration.Pipeline.LogMethodExit(nameof(PageBlobClient)); } } } \/\/\/ <summary> \/\/\/ The <see cref=\"CreateInternal\"\/> operation creates a new page blob \/\/\/ of the specified <paramref name=\"size\"\/>. The content of any \/\/\/ existing blob is overwritten with the newly initialized page blob \/\/\/ To add content to the page blob, call the \/\/\/ <see cref=\"UploadPagesAsync(Stream, long, byte[], PageBlobRequestConditions, IProgress{long}, CancellationToken)\"\/> operation. \/\/\/ \/\/\/ For more information, see https:\/\/docs.microsoft.com\/rest\/api\/storageservices\/put-blob. \/\/\/ <\/summary> \/\/\/ <param name=\"size\"> \/\/\/ Specifies the maximum size for the page blob, up to 8 TB. The \/\/\/ size must be aligned to a 512-byte boundary. \/\/\/ <\/param> \/\/\/ <param name=\"sequenceNumber\"> \/\/\/ Optional user-controlled value that you can use to track requests. \/\/\/ The value of the <paramref name=\"sequenceNumber\"\/> must be between \/\/\/ 0 and 2^63 - 1. The default value is 0. \/\/\/ <\/param> \/\/\/ <param name=\"httpHeaders\"> \/\/\/ Optional standard HTTP header properties that can be set for the \/\/\/ new page blob. \/\/\/ <\/param> \/\/\/ <param name=\"metadata\"> \/\/\/ Optional custom metadata to set for this page blob. \/\/\/ <\/param> \/\/\/ <param name=\"tags\"> \/\/\/ Optional tags to set for this page blob. \/\/\/ <\/param> \/\/\/ <param name=\"conditions\"> \/\/\/ Optional <see cref=\"PageBlobRequestConditions\"\/> to add \/\/\/ conditions on the creation of this new page blob. \/\/\/ <\/param> \/\/\/ <param name=\"immutabilityPolicy\"> \/\/\/ Optional <see cref=\"BlobImmutabilityPolicy\"\/> to set on the blob. \/\/\/ Note that is parameter is only applicable to a blob within a container that \/\/\/ has immutable storage with versioning enabled. \/\/\/ <\/param> \/\/\/ <param name=\"legalHold\"> \/\/\/ Optional. Indicates if a legal hold should be placed on the blob. \/\/\/ Note that is parameter is only applicable to a blob within a container that \/\/\/ has immutable storage with versioning enabled. \/\/\/ <\/param> \/\/\/ <param name=\"async\"> \/\/\/ Whether to invoke the operation asynchronously. \/\/\/ <\/param> \/\/\/ <param name=\"cancellationToken\"> \/\/\/ Optional <see cref=\"CancellationToken\"\/> to propagate \/\/\/ notifications that the operation should be cancelled. \/\/\/ <\/param> \/\/\/ <param name=\"operationName\"> \/\/\/ Optional. To indicate if the name of the operation. \/\/\/ <\/param> \/\/\/ <returns> \/\/\/ A <see cref=\"Response{BlobContentInfo}\"\/> describing the \/\/\/ newly created page blob. \/\/\/ <\/returns> \/\/\/ <remarks> \/\/\/ A <see cref=\"RequestFailedException\"\/> will be thrown if \/\/\/ a failure occurs. \/\/\/ <\/remarks> private async Task<Response<BlobContentInfo>> CreateInternal( long size, long? sequenceNumber, BlobHttpHeaders httpHeaders, Metadata metadata, Tags tags, PageBlobRequestConditions conditions, BlobImmutabilityPolicy immutabilityPolicy, bool? legalHold, bool async, CancellationToken cancellationToken, string operationName = null) { using (ClientConfiguration.Pipeline.BeginLoggingScope(nameof(PageBlobClient))) { ClientConfiguration.Pipeline.LogMethodEnter( nameof(PageBlobClient), message: $\"{nameof(Uri)}: {Uri}\\n\" + $\"{nameof(size)}: {size}\\n\" + $\"{nameof(sequenceNumber)}: {sequenceNumber}\\n\" + $\"{nameof(httpHeaders)}: {httpHeaders}\"); operationName ??= $\"{nameof(PageBlobClient)}.{nameof(Create)}\"; DiagnosticScope scope = ClientConfiguration.ClientDiagnostics.CreateScope(operationName); conditions.ValidateConditionsNotPresent( invalidConditions: BlobRequestConditionProperty.IfSequenceNumberLessThanOrEqual | BlobRequestConditionProperty.IfSequenceNumberLessThan | BlobRequestConditionProperty.IfSequenceNumberEqual, operationName: nameof(PageBlobClient.Create), parameterName: nameof(conditions)); try { scope.Start(); ResponseWithHeaders<PageBlobCreateHeaders> response; if (async) { response = await PageBlobRestClient.CreateAsync( contentLength: 0, blobContentLength: size, tier: null, blobContentType: httpHeaders?.ContentType, blobContentEncoding: httpHeaders?.ContentEncoding, blobContentLanguage: httpHeaders?.ContentLanguage, blobContentMD5: httpHeaders?.ContentHash, blobCacheControl: httpHeaders?.CacheControl, metadata: metadata, leaseId: conditions?.LeaseId, blobContentDisposition: httpHeaders?.ContentDisposition, encryptionKey: ClientConfiguration.CustomerProvidedKey?.EncryptionKey, encryptionKeySha256: ClientConfiguration.CustomerProvidedKey?.EncryptionKeyHash, encryptionAlgorithm: ClientConfiguration.CustomerProvidedKey?.EncryptionAlgorithm == null ? null : EncryptionAlgorithmTypeInternal.AES256, encryptionScope: ClientConfiguration.EncryptionScope, ifModifiedSince: conditions?.IfModifiedSince, ifUnmodifiedSince: conditions?.IfUnmodifiedSince, ifMatch: conditions?.IfMatch?.ToString(), ifNoneMatch: conditions?.IfNoneMatch?.ToString(), ifTags: conditions?.TagConditions, blobSequenceNumber: sequenceNumber, blobTagsString: tags?.ToTagsString(), immutabilityPolicyExpiry: immutabilityPolicy?.ExpiresOn, immutabilityPolicyMode: immutabilityPolicy?.PolicyMode, legalHold: legalHold, cancellationToken: cancellationToken) .ConfigureAwait(false); } else { response = PageBlobRestClient.Create( contentLength: 0, blobContentLength: size, tier: null, blobContentType: httpHeaders?.ContentType, blobContentEncoding: httpHeaders?.ContentEncoding, blobContentLanguage: httpHeaders?.ContentLanguage, blobContentMD5: httpHeaders?.ContentHash, blobCacheControl: httpHeaders?.CacheControl, metadata: metadata, leaseId: conditions?.LeaseId, blobContentDisposition: httpHeaders?.ContentDisposition, encryptionKey: ClientConfiguration.CustomerProvidedKey?.EncryptionKey, encryptionKeySha256: ClientConfiguration.CustomerProvidedKey?.EncryptionKeyHash, encryptionAlgorithm: ClientConfiguration.CustomerProvidedKey?.EncryptionAlgorithm == null ? null : EncryptionAlgorithmTypeInternal.AES256, encryptionScope: ClientConfiguration.EncryptionScope, ifModifiedSince: conditions?.IfModifiedSince, ifUnmodifiedSince: conditions?.IfUnmodifiedSince, ifMatch: conditions?.IfMatch?.ToString(), ifNoneMatch: conditions?.IfNoneMatch?.ToString(), ifTags: conditions?.TagConditions, blobSequenceNumber: sequenceNumber, blobTagsString: tags?.ToTagsString(), immutabilityPolicyExpiry: immutabilityPolicy?.ExpiresOn, immutabilityPolicyMode: immutabilityPolicy?.PolicyMode, legalHold: legalHold, cancellationToken: cancellationToken); } return Response.FromValue( response.ToBlobContentInfo(), response.GetRawResponse()); } catch (Exception ex) { ClientConfiguration.Pipeline.LogException(ex); scope.Failed(ex); throw; } finally { ClientConfiguration.Pipeline.LogMethodExit(nameof(PageBlobClient)); scope.Dispose(); } } } #endregion Create #region UploadPages \/\/\/ <summary> \/\/\/ The <see cref=\"UploadPages(Stream, long, byte[], PageBlobRequestConditions, IProgress{long}, CancellationToken)\"\/> operation writes \/\/\/ <paramref name=\"content\"\/> to a range of pages in a page blob, \/\/\/ starting at <paramref name=\"offset\"\/>. \/\/\/ \/\/\/ For more information, see \/\/\/ <see href=\"https:\/\/docs.microsoft.com\/rest\/api\/storageservices\/put-page\"> \/\/\/ Put Page<\/see>. \/\/\/ <\/summary> \/\/\/ <param name=\"content\"> \/\/\/ A <see cref=\"Stream\"\/> containing the content of the pages to \/\/\/ upload. The content can be up to 4 MB in size. \/\/\/ <\/param> \/\/\/ <param name=\"offset\"> \/\/\/ Specifies the starting offset for the <paramref name=\"content\"\/> \/\/\/ to be written as a page. Given that pages must be aligned with \/\/\/ 512-byte boundaries, the start offset must be a modulus of 512. \/\/\/ <\/param> \/\/\/ <param name=\"transactionalContentHash\"> \/\/\/ Optional MD5 hash of the block content. This hash is used to \/\/\/ verify the integrity of the block during transport. When this hash \/\/\/ is specified, the storage service compares the hash of the content \/\/\/ that has arrived with this value. Note that this MD5 hash is not \/\/\/ stored with the blob. If the two hashes do not match, the \/\/\/ operation will fail with a <see cref=\"RequestFailedException\"\/>. \/\/\/ <\/param> \/\/\/ <param name=\"conditions\"> \/\/\/ Optional <see cref=\"PageBlobRequestConditions\"\/> to add \/\/\/ conditions on uploading pages to this page blob. \/\/\/ <\/param> \/\/\/ <param name=\"progressHandler\"> \/\/\/ Optional <see cref=\"IProgress{Long}\"\/> to provide \/\/\/ progress updates about data transfers. \/\/\/ <\/param> \/\/\/ <param name=\"cancellationToken\"> \/\/\/ Optional <see cref=\"CancellationToken\"\/> to propagate \/\/\/ notifications that the operation should be cancelled. \/\/\/ <\/param> \/\/\/ <returns> \/\/\/ A <see cref=\"Response{PageInfo}\"\/> describing the \/\/\/ state of the updated pages. \/\/\/ <\/returns> \/\/\/ <remarks> \/\/\/ A <see cref=\"RequestFailedException\"\/> will be thrown if \/\/\/ a failure occurs. \/\/\/ <\/remarks> [EditorBrowsable(EditorBrowsableState.Never)] #pragma warning disable AZC0002 \/\/ DO ensure all service methods, both asynchronous and synchronous, take an optional CancellationToken parameter called cancellationToken. public virtual Response<PageInfo> UploadPages( #pragma warning restore AZC0002 \/\/ DO ensure all service methods, both asynchronous and synchronous, take an optional CancellationToken parameter called cancellationToken. Stream content, long offset, byte[] transactionalContentHash, PageBlobRequestConditions conditions, IProgress<long> progressHandler, CancellationToken cancellationToken) { return UploadPagesInternal( content, offset, transactionalContentHash.ToValidationOptions(), conditions, progressHandler, false, \/\/ async cancellationToken) .EnsureCompleted(); } \/\/\/ <summary> \/\/\/ The <see cref=\"UploadPagesAsync(Stream, long, byte[], PageBlobRequestConditions, IProgress{long}, CancellationToken)\"\/> operation writes \/\/\/ <paramref name=\"content\"\/> to a range of pages in a page blob, \/\/\/ starting at <paramref name=\"offset\"\/>. \/\/\/ \/\/\/ For more information, see \/\/\/ <see href=\"https:\/\/docs.microsoft.com\/rest\/api\/storageservices\/put-page\"> \/\/\/ Put Page<\/see>. \/\/\/ <\/summary> \/\/\/ <param name=\"content\"> \/\/\/ A <see cref=\"Stream\"\/> containing the content of the pages to \/\/\/ upload. The content can be up to 4 MB in size. \/\/\/ <\/param> \/\/\/ <param name=\"offset\"> \/\/\/ Specifies the starting offset for the <paramref name=\"content\"\/> \/\/\/ to be written as a page. Given that pages must be aligned with \/\/\/ 512-byte boundaries, the start offset must be a modulus of 512. \/\/\/ <\/param> \/\/\/ <param name=\"transactionalContentHash\"> \/\/\/ Optional MD5 hash of the block content. This hash is used to \/\/\/ verify the integrity of the block during transport. When this hash \/\/\/ is specified, the storage service compares the hash of the content \/\/\/ that has arrived with this value. Note that this MD5 hash is not \/\/\/ stored with the blob. If the two hashes do not match, the \/\/\/ operation will fail with a <see cref=\"RequestFailedException\"\/>. \/\/\/ <\/param> \/\/\/ <param name=\"conditions\"> \/\/\/ Optional <see cref=\"PageBlobRequestConditions\"\/> to add \/\/\/ conditions on uploading pages to this page blob. \/\/\/ <\/param> \/\/\/ <param name=\"progressHandler\"> \/\/\/ Optional <see cref=\"IProgress{Long}\"\/> to provide \/\/\/ progress updates about data transfers. \/\/\/ <\/param> \/\/\/ <param name=\"cancellationToken\"> \/\/\/ Optional <see cref=\"CancellationToken\"\/> to propagate \/\/\/ notifications that the operation should be cancelled. \/\/\/ <\/param> \/\/\/ <returns> \/\/\/ A <see cref=\"Response{PageInfo}\"\/> describing the \/\/\/ state of the updated pages. \/\/\/ <\/returns> \/\/\/ <remarks> \/\/\/ A <see cref=\"RequestFailedException\"\/> will be thrown if \/\/\/ a failure occurs. \/\/\/ <\/remarks> [EditorBrowsable(EditorBrowsableState.Never)] #pragma warning disable AZC0002 \/\/ DO ensure all service methods, both asynchronous and synchronous, take an optional CancellationToken parameter called cancellationToken. public virtual async Task<Response<PageInfo>> UploadPagesAsync( #pragma warning restore AZC0002 \/\/ DO ensure all service methods, both asynchronous and synchronous, take an optional CancellationToken parameter called cancellationToken. Stream content, long offset, byte[] transactionalContentHash, PageBlobRequestConditions conditions, IProgress<long> progressHandler, CancellationToken cancellationToken) { return await UploadPagesInternal( content, offset, transactionalContentHash.ToValidationOptions(), conditions, progressHandler, true, \/\/ async cancellationToken) .ConfigureAwait(false); } \/\/\/ <summary> \/\/\/ The <see cref=\"UploadPages(Stream, long, PageBlobUploadPagesOptions, CancellationToken)\"\/> operation writes \/\/\/ <paramref name=\"content\"\/> to a range of pages in a page blob, \/\/\/ starting at <paramref name=\"offset\"\/>. \/\/\/ \/\/\/ For more information, see \/\/\/ <see href=\"https:\/\/docs.microsoft.com\/rest\/api\/storageservices\/put-page\"> \/\/\/ Put Page<\/see>. \/\/\/ <\/summary> \/\/\/ <param name=\"content\"> \/\/\/ A <see cref=\"Stream\"\/> containing the content of the pages to \/\/\/ upload. The content can be up to 4 MB in size. \/\/\/ <\/param> \/\/\/ <param name=\"offset\"> \/\/\/ Specifies the starting offset for the <paramref name=\"content\"\/> \/\/\/ to be written as a page. Given that pages must be aligned with \/\/\/ 512-byte boundaries, the start offset must be a modulus of 512. \/\/\/ <\/param> \/\/\/ <param name=\"options\"> \/\/\/ Optional parameters. \/\/\/ <\/param> \/\/\/ <param name=\"cancellationToken\"> \/\/\/ Optional <see cref=\"CancellationToken\"\/> to propagate \/\/\/ notifications that the operation should be cancelled. \/\/\/ <\/param> \/\/\/ <returns> \/\/\/ A <see cref=\"Response{PageInfo}\"\/> describing the \/\/\/ state of the updated pages. \/\/\/ <\/returns> \/\/\/ <remarks> \/\/\/ A <see cref=\"RequestFailedException\"\/> will be thrown if \/\/\/ a failure occurs. \/\/\/ <\/remarks> public virtual Response<PageInfo> UploadPages( Stream content, long offset, PageBlobUploadPagesOptions options = default, CancellationToken cancellationToken = default) => UploadPagesInternal( content, offset, options?.TransferValidation, options?.Conditions, options?.ProgressHandler, false, \/\/ async cancellationToken) .EnsureCompleted(); \/\/\/ <summary> \/\/\/ The <see cref=\"UploadPagesAsync(Stream, long, PageBlobUploadPagesOptions, CancellationToken)\"\/> operation writes \/\/\/ <paramref name=\"content\"\/> to a range of pages in a page blob, \/\/\/ starting at <paramref name=\"offset\"\/>. \/\/\/ \/\/\/ For more information, see \/\/\/ <see href=\"https:\/\/docs.microsoft.com\/rest\/api\/storageservices\/put-page\"> \/\/\/ Put Page<\/see>. \/\/\/ <\/summary> \/\/\/ <param name=\"content\"> \/\/\/ A <see cref=\"Stream\"\/> containing the content of the pages to \/\/\/ upload. The content can be up to 4 MB in size. \/\/\/ <\/param> \/\/\/ <param name=\"offset\"> \/\/\/ Specifies the starting offset for the <paramref name=\"content\"\/> \/\/\/ to be written as a page. Given that pages must be aligned with \/\/\/ 512-byte boundaries, the start offset must be a modulus of 512. \/\/\/ <\/param> \/\/\/ <param name=\"options\"> \/\/\/ Optional parameters. \/\/\/ <\/param> \/\/\/ <param name=\"cancellationToken\"> \/\/\/ Optional <see cref=\"CancellationToken\"\/> to propagate \/\/\/ notifications that the operation should be cancelled. \/\/\/ <\/param> \/\/\/ <returns> \/\/\/ A <see cref=\"Response{PageInfo}\"\/> describing the \/\/\/ state of the updated pages. \/\/\/ <\/returns> \/\/\/ <remarks> \/\/\/ A <see cref=\"RequestFailedException\"\/> will be thrown if \/\/\/ a failure occurs. \/\/\/ <\/remarks> public virtual async Task<Response<PageInfo>> UploadPagesAsync( Stream content, long offset, PageBlobUploadPagesOptions options = default, CancellationToken cancellationToken = default) => await UploadPagesInternal( content, offset, options?.TransferValidation, options?.Conditions, options?.ProgressHandler, true, \/\/ async cancellationToken) .ConfigureAwait(false); \/\/\/ <summary> \/\/\/ The <see cref=\"UploadPagesInternal\"\/> operation writes \/\/\/ <paramref name=\"content\"\/> to a range of pages in a page blob, \/\/\/ starting at <paramref name=\"offset\"\/>. \/\/\/ \/\/\/ For more information, see \/\/\/ <see href=\"https:\/\/docs.microsoft.com\/rest\/api\/storageservices\/put-page\"> \/\/\/ Put Page<\/see>. \/\/\/ <\/summary> \/\/\/ <param name=\"content\"> \/\/\/ A <see cref=\"Stream\"\/> containing the content of the pages to \/\/\/ upload. The content can be up to 4 MB in size. \/\/\/ <\/param> \/\/\/ <param name=\"offset\"> \/\/\/ Specifies the starting offset for the <paramref name=\"content\"\/> \/\/\/ to be written as a page. Given that pages must be aligned with \/\/\/ 512-byte boundaries, the start offset must be a modulus of 512. \/\/\/ <\/param> \/\/\/ <param name=\"transferValidationOverride\"> \/\/\/ Optional transfer validation options for uploading the page range. \/\/\/ <\/param> \/\/\/ <param name=\"conditions\"> \/\/\/ Request conditions for page upload. \/\/\/ <\/param> \/\/\/ <param name=\"progressHandler\"> \/\/\/ Progress handler for upload operation. \/\/\/ <\/param> \/\/\/ <param name=\"async\"> \/\/\/ Whether to invoke the operation asynchronously. \/\/\/ <\/param> \/\/\/ <param name=\"cancellationToken\"> \/\/\/ Optional <see cref=\"CancellationToken\"\/> to propagate \/\/\/ notifications that the operation should be cancelled. \/\/\/ <\/param> \/\/\/ <returns> \/\/\/ A <see cref=\"Response{PageInfo}\"\/> describing the \/\/\/ state of the updated pages. \/\/\/ <\/returns> \/\/\/ <remarks> \/\/\/ A <see cref=\"RequestFailedException\"\/> will be thrown if \/\/\/ a failure occurs. \/\/\/ <\/remarks> internal async Task<Response<PageInfo>> UploadPagesInternal( Stream content, long offset, UploadTransferValidationOptions transferValidationOverride, PageBlobRequestConditions conditions, IProgress<long> progressHandler, bool async, CancellationToken cancellationToken) { UploadTransferValidationOptions validationOptions = transferValidationOverride ?? ClientConfiguration.TransferValidation.Upload; using (ClientConfiguration.Pipeline.BeginLoggingScope(nameof(PageBlobClient))) { ClientConfiguration.Pipeline.LogMethodEnter( nameof(PageBlobClient), message: $\"{nameof(Uri)}: {Uri}\\n\" + $\"{nameof(offset)}: {offset}\\n\" + $\"{nameof(conditions)}: {conditions}\"); DiagnosticScope scope = ClientConfiguration.ClientDiagnostics.CreateScope($\"{nameof(PageBlobClient)}.{nameof(UploadPages)}\"); \/\/ All PageBlobRequestConditions are valid. conditions.ValidateConditionsNotPresent( invalidConditions: BlobRequestConditionProperty.None, operationName: nameof(PageBlobClient.UploadPages), parameterName: nameof(conditions)); try { scope.Start(); Errors.VerifyStreamPosition(content, nameof(content)); \/\/ compute hash BEFORE attaching progress handler ContentHasher.GetHashResult hashResult = ContentHasher.GetHashOrDefault(content, validationOptions); content = content?.WithNoDispose().WithProgress(progressHandler); HttpRange range = new HttpRange(offset, (content?.Length - content?.Position) ?? null); ResponseWithHeaders<PageBlobUploadPagesHeaders> response; if (async) { response = await PageBlobRestClient.UploadPagesAsync( contentLength: (content?.Length - content?.Position) ?? 0, body: content, transactionalContentCrc64: hashResult?.StorageCrc64AsArray, transactionalContentMD5: hashResult?.MD5AsArray, range: range.ToString(), leaseId: conditions?.LeaseId, encryptionKey: ClientConfiguration.CustomerProvidedKey?.EncryptionKey, encryptionKeySha256: ClientConfiguration.CustomerProvidedKey?.EncryptionKeyHash, encryptionAlgorithm: ClientConfiguration.CustomerProvidedKey?.EncryptionAlgorithm == null ? null : EncryptionAlgorithmTypeInternal.AES256, encryptionScope: ClientConfiguration.EncryptionScope, ifSequenceNumberLessThanOrEqualTo: conditions?.IfSequenceNumberLessThanOrEqual, ifSequenceNumberLessThan: conditions?.IfSequenceNumberLessThan, ifSequenceNumberEqualTo: conditions?.IfSequenceNumberEqual, ifModifiedSince: conditions?.IfModifiedSince, ifUnmodifiedSince: conditions?.IfUnmodifiedSince, ifMatch: conditions?.IfMatch?.ToString(), ifNoneMatch: conditions?.IfNoneMatch?.ToString(), ifTags: conditions?.TagConditions, cancellationToken: cancellationToken) .ConfigureAwait(false); } else { response = PageBlobRestClient.UploadPages( contentLength: (content?.Length - content?.Position) ?? 0, body: content, transactionalContentCrc64: hashResult?.StorageCrc64AsArray, transactionalContentMD5: hashResult?.MD5AsArray, range: range.ToString(), leaseId: conditions?.LeaseId, encryptionKey: ClientConfiguration.CustomerProvidedKey?.EncryptionKey, encryptionKeySha256: ClientConfiguration.CustomerProvidedKey?.EncryptionKeyHash, encryptionAlgorithm: ClientConfiguration.CustomerProvidedKey?.EncryptionAlgorithm == null ? null : EncryptionAlgorithmTypeInternal.AES256, encryptionScope: ClientConfiguration.EncryptionScope, ifSequenceNumberLessThanOrEqualTo: conditions?.IfSequenceNumberLessThanOrEqual, ifSequenceNumberLessThan: conditions?.IfSequenceNumberLessThan, ifSequenceNumberEqualTo: conditions?.IfSequenceNumberEqual, ifModifiedSince: conditions?.IfModifiedSince, ifUnmodifiedSince: conditions?.IfUnmodifiedSince, ifMatch: conditions?.IfMatch?.ToString(), ifNoneMatch: conditions?.IfNoneMatch?.ToString(), ifTags: conditions?.TagConditions, cancellationToken: cancellationToken); } return Response.FromValue( response.ToPageInfo(), response.GetRawResponse()); } catch (Exception ex) { ClientConfiguration.Pipeline.LogException(ex); scope.Failed(ex); throw; } finally { ClientConfiguration.Pipeline.LogMethodExit(nameof(PageBlobClient)); scope.Dispose(); } } } #endregion UploadPages #region ClearPages \/\/\/ <summary> \/\/\/ The <see cref=\"ClearPages\"\/> operation clears one or more \/\/\/ pages from the page blob, as specificed by the <paramref name=\"range\"\/>. \/\/\/ \/\/\/ For more information, see \/\/\/ <see href=\"https:\/\/docs.microsoft.com\/rest\/api\/storageservices\/put-page\"> \/\/\/ Put Page<\/see>. \/\/\/ <\/summary> \/\/\/ <param name=\"range\"> \/\/\/ Specifies the range of bytes to be cleared. Both the start and \/\/\/ end of the range must be specified. For a page clear operation, \/\/\/ the page range can be up to the value of the blob's full size. \/\/\/ Given that pages must be aligned with 512-byte boundaries, the \/\/\/ start of the range must be a modulus of 512 and the end of the \/\/\/ range must be a modulus of 512 \u2013 1. Examples of valid byte ranges \/\/\/ are 0-511, 512-1023, etc. \/\/\/ <\/param> \/\/\/ <param name=\"conditions\"> \/\/\/ Optional <see cref=\"PageBlobRequestConditions\"\/> to add \/\/\/ conditions on clearing pages from this page blob. \/\/\/ <\/param> \/\/\/ <param name=\"cancellationToken\"> \/\/\/ Optional <see cref=\"CancellationToken\"\/> to propagate \/\/\/ notifications that the operation should be cancelled. \/\/\/ <\/param> \/\/\/ <returns> \/\/\/ A <see cref=\"Response{PageInfo}\"\/> describing the \/\/\/ state of the updated pages. \/\/\/ <\/returns> \/\/\/ <remarks> \/\/\/ A <see cref=\"RequestFailedException\"\/> will be thrown if \/\/\/ a failure occurs. \/\/\/ <\/remarks> public virtual Response<PageInfo> ClearPages( HttpRange range, PageBlobRequestConditions conditions = default, CancellationToken cancellationToken = default) => ClearPagesInternal( range, conditions, false, \/\/ async cancellationToken) .EnsureCompleted(); \/\/\/ <summary> \/\/\/ The <see cref=\"ClearPagesAsync\"\/> operation clears one or more \/\/\/ pages from the page blob, as specificed by the <paramref name=\"range\"\/>. \/\/\/ \/\/\/ For more information, see \/\/\/ <see href=\"https:\/\/docs.microsoft.com\/rest\/api\/storageservices\/put-page\"> \/\/\/ Put Page<\/see>. \/\/\/ <\/summary> \/\/\/ <param name=\"range\"> \/\/\/ Specifies the range of bytes to be cleared. Both the start and \/\/\/ end of the range must be specified. For a page clear operation, \/\/\/ the page range can be up to the value of the blob's full size. \/\/\/ Given that pages must be aligned with 512-byte boundaries, the \/\/\/ start of the range must be a modulus of 512 and the end of the \/\/\/ range must be a modulus of 512 \u2013 1. Examples of valid byte ranges \/\/\/ are 0-511, 512-1023, etc. \/\/\/ <\/param> \/\/\/ <param name=\"conditions\"> \/\/\/ Optional <see cref=\"PageBlobRequestConditions\"\/> to add \/\/\/ conditions on clearing pages from this page blob. \/\/\/ <\/param> \/\/\/ <param name=\"cancellationToken\"> \/\/\/ Optional <see cref=\"CancellationToken\"\/> to propagate \/\/\/ notifications that the operation should be cancelled. \/\/\/ <\/param> \/\/\/ <returns> \/\/\/ A <see cref=\"Response{PageInfo}\"\/> describing the \/\/\/ state of the updated pages. \/\/\/ <\/returns> \/\/\/ <remarks> \/\/\/ A <see cref=\"RequestFailedException\"\/> will be thrown if \/\/\/ a failure occurs. \/\/\/ <\/remarks> public virtual async Task<Response<PageInfo>> ClearPagesAsync( HttpRange range, PageBlobRequestConditions conditions = default, CancellationToken cancellationToken = default) => await ClearPagesInternal( range, conditions, true, \/\/ async cancellationToken) .ConfigureAwait(false); \/\/\/ <summary> \/\/\/ The <see cref=\"ClearPagesInternal\"\/> operation clears one or more \/\/\/ pages from the page blob, as specificed by the <paramref name=\"range\"\/>. \/\/\/ \/\/\/ For more information, see \/\/\/ <see href=\"https:\/\/docs.microsoft.com\/rest\/api\/storageservices\/put-page\"> \/\/\/ Put Page<\/see>. \/\/\/ <\/summary> \/\/\/ <param name=\"range\"> \/\/\/ Specifies the range of bytes to be cleared. Both the start and \/\/\/ end of the range must be specified. For a page clear operation, \/\/\/ the page range can be up to the value of the blob's full size. \/\/\/ Given that pages must be aligned with 512-byte boundaries, the \/\/\/ start of the range must be a modulus of 512 and the end of the \/\/\/ range must be a modulus of 512 \u2013 1. Examples of valid byte ranges \/\/\/ are 0-511, 512-1023, etc. \/\/\/ <\/param> \/\/\/ <param name=\"conditions\"> \/\/\/ Optional <see cref=\"PageBlobRequestConditions\"\/> to add \/\/\/ conditions on clearing pages from this page blob. \/\/\/ <\/param> \/\/\/ <param name=\"async\"> \/\/\/ Whether to invoke the operation asynchronously. \/\/\/ <\/param> \/\/\/ <param name=\"cancellationToken\"> \/\/\/ Optional <see cref=\"CancellationToken\"\/> to propagate \/\/\/ notifications that the operation should be cancelled. \/\/\/ <\/param> \/\/\/ <returns> \/\/\/ A <see cref=\"Response{PageInfo}\"\/> describing the \/\/\/ state of the updated pages. \/\/\/ <\/returns> \/\/\/ <remarks> \/\/\/ A <see cref=\"RequestFailedException\"\/> will be thrown if \/\/\/ a failure occurs. \/\/\/ <\/remarks> private async Task<Response<PageInfo>> ClearPagesInternal( HttpRange range, PageBlobRequestConditions conditions, bool async, CancellationToken cancellationToken) { using (ClientConfiguration.Pipeline.BeginLoggingScope(nameof(PageBlobClient))) { ClientConfiguration.Pipeline.LogMethodEnter( nameof(PageBlobClient), message: $\"{nameof(Uri)}: {Uri}\\n\" + $\"{nameof(conditions)}: {conditions}\"); DiagnosticScope scope = ClientConfiguration.ClientDiagnostics.CreateScope($\"{nameof(PageBlobClient)}.{nameof(ClearPages)}\"); \/\/ All PageBlobRequestConditions are valid. conditions.ValidateConditionsNotPresent( invalidConditions: BlobRequestConditionProperty.None, operationName: nameof(PageBlobClient.ClearPages), parameterName: nameof(conditions)); try { scope.Start(); ResponseWithHeaders<PageBlobClearPagesHeaders> response; if (async) { response = await PageBlobRestClient.ClearPagesAsync( contentLength: 0, range: range.ToString(), leaseId: conditions?.LeaseId, encryptionKey: ClientConfiguration.CustomerProvidedKey?.EncryptionKey, encryptionKeySha256: ClientConfiguration.CustomerProvidedKey?.EncryptionKeyHash, encryptionScope: ClientConfiguration.EncryptionScope, ifSequenceNumberLessThanOrEqualTo: conditions?.IfSequenceNumberLessThanOrEqual, ifSequenceNumberLessThan: conditions?.IfSequenceNumberLessThan, ifSequenceNumberEqualTo: conditions?.IfSequenceNumberEqual, ifModifiedSince: conditions?.IfModifiedSince, ifUnmodifiedSince: conditions?.IfUnmodifiedSince, ifMatch: conditions?.IfMatch?.ToString(), ifNoneMatch: conditions?.IfNoneMatch?.ToString(), ifTags: conditions?.TagConditions, cancellationToken: cancellationToken) .ConfigureAwait(false); } else { response = PageBlobRestClient.ClearPages( contentLength: 0, range: range.ToString(), leaseId: conditions?.LeaseId, encryptionKey: ClientConfiguration.CustomerProvidedKey?.EncryptionKey, encryptionKeySha256: ClientConfiguration.CustomerProvidedKey?.EncryptionKeyHash, encryptionScope: ClientConfiguration.EncryptionScope, ifSequenceNumberLessThanOrEqualTo: conditions?.IfSequenceNumberLessThanOrEqual, ifSequenceNumberLessThan: conditions?.IfSequenceNumberLessThan, ifSequenceNumberEqualTo: conditions?.IfSequenceNumberEqual, ifModifiedSince: conditions?.IfModifiedSince, ifUnmodifiedSince: conditions?.IfUnmodifiedSince, ifMatch: conditions?.IfMatch?.ToString(), ifNoneMatch: conditions?.IfNoneMatch?.ToString(), ifTags: conditions?.TagConditions, cancellationToken: cancellationToken); } return Response.FromValue( response.ToPageInfo(), response.GetRawResponse()); } catch (Exception ex) { ClientConfiguration.Pipeline.LogException(ex); scope.Failed(ex); throw; } finally { ClientConfiguration.Pipeline.LogMethodExit(nameof(PageBlobClient)); scope.Dispose(); } } } #endregion ClearPages #region GetPageRanges \/\/\/ <summary> \/\/\/ The <see cref=\"GetAllPageRanges(GetPageRangesOptions, CancellationToken)\"\/> operation returns the list of \/\/\/ valid page ranges for a page blob or snapshot of a page blob. \/\/\/ \/\/\/ For more information, see \/\/\/ <see href=\"https:\/\/docs.microsoft.com\/en-us\/rest\/api\/storageservices\/get-page-ranges\"> \/\/\/ Get Page Ranges<\/see>. \/\/\/ <\/summary> \/\/\/ <param name=\"options\"> \/\/\/ Optional parameters. \/\/\/ <\/param> \/\/\/ <param name=\"cancellationToken\"> \/\/\/ Optional <see cref=\"CancellationToken\"\/> to propagate \/\/\/ notifications that the operation should be cancelled. \/\/\/ <\/param> \/\/\/ <returns> \/\/\/ A <see cref=\"Page{PageBlobRange}\"\/> describing the \/\/\/ valid page ranges for this blob. \/\/\/ <\/returns> \/\/\/ <remarks> \/\/\/ A <see cref=\"RequestFailedException\"\/> will be thrown if \/\/\/ a failure occurs. \/\/\/ <\/remarks> public virtual Pageable<PageRangeItem> GetAllPageRanges( GetPageRangesOptions options = default, CancellationToken cancellationToken = default) => new GetPageRangesAsyncCollection( diff: false, client: this, range: options?.Range, snapshot: options?.Snapshot, previousSnapshot: null, previousSnapshotUri: null, requestConditions: options?.Conditions, operationName: $\"{nameof(PageBlobClient)}.{nameof(GetAllPageRanges)}\") .ToSyncCollection(cancellationToken); \/\/\/ <summary> \/\/\/ The <see cref=\"GetAllPageRangesAsync(GetPageRangesOptions, CancellationToken)\"\/> operation returns the list of \/\/\/ valid page ranges for a page blob or snapshot of a page blob. \/\/\/ \/\/\/ For more information, see \/\/\/ <see href=\"https:\/\/docs.microsoft.com\/en-us\/rest\/api\/storageservices\/get-page-ranges\"> \/\/\/ Get Page Ranges<\/see>. \/\/\/ <\/summary> \/\/\/ <param name=\"options\"> \/\/\/ Optional parameters. \/\/\/ <\/param> \/\/\/ <param name=\"cancellationToken\"> \/\/\/ Optional <see cref=\"CancellationToken\"\/> to propagate \/\/\/ notifications that the operation should be cancelled. \/\/\/ <\/param> \/\/\/ <returns> \/\/\/ A <see cref=\"AsyncPageable{PageBlobRange}\"\/> describing the \/\/\/ valid page ranges for this blob. \/\/\/ <\/returns> \/\/\/ <remarks> \/\/\/ A <see cref=\"RequestFailedException\"\/> will be thrown if \/\/\/ a failure occurs. \/\/\/ <\/remarks> public virtual AsyncPageable<PageRangeItem> GetAllPageRangesAsync( GetPageRangesOptions options = default, CancellationToken cancellationToken = default) => new GetPageRangesAsyncCollection( diff: false, client: this, range: options?.Range, snapshot: options?.Snapshot, previousSnapshot: null, previousSnapshotUri: null, requestConditions: options?.Conditions, operationName: $\"{nameof(PageBlobClient)}.{nameof(GetAllPageRanges)}\") .ToAsyncCollection(cancellationToken); \/\/\/ <summary> \/\/\/ The <see cref=\"GetAllPageRangesInteral\"\/> operation returns the list \/\/\/ of valid page ranges for a page blob or snapshot of a page blob. \/\/\/ \/\/\/ For more information, see For more information, see \/\/\/ <see href=\"https:\/\/docs.microsoft.com\/en-us\/rest\/api\/storageservices\/get-page-ranges\"> \/\/\/ Get Page Ranges<\/see>. \/\/\/ <\/summary> \/\/\/ <param name=\"marker\"> \/\/\/ An optional string value that identifies the segment of the list \/\/\/ of blobs to be returned with the next listing operation. The \/\/\/ operation returns a non-empty <see cref=\"ListBlobsFlatSegmentResponse.NextMarker\"\/> \/\/\/ if the listing operation did not return all blobs remaining to be \/\/\/ listed with the current segment. The NextMarker value can \/\/\/ be used as the value for the <paramref name=\"marker\"\/> parameter \/\/\/ in a subsequent call to request the next segment of list items. \/\/\/ <\/param> \/\/\/ <param name=\"pageSizeHint\"> \/\/\/ Gets or sets a value indicating the size of the page that should be \/\/\/ requested. \/\/\/ <\/param> \/\/\/ <param name=\"range\"> \/\/\/ Optionally specifies the range of bytes over which to list ranges, \/\/\/ inclusively. If omitted, then all ranges for the blob are returned. \/\/\/ <\/param> \/\/\/ <param name=\"snapshot\"> \/\/\/ Optionally specifies the blob snapshot to retrieve page ranges \/\/\/ information from. For more information on working with blob snapshots, \/\/\/ <see href=\"https:\/\/docs.microsoft.com\/rest\/api\/storageservices\/creating-a-snapshot-of-a-blob\"> \/\/\/ Create a snapshot of a blob<\/see>. \/\/\/ <\/param> \/\/\/ <param name=\"conditions\"> \/\/\/ Optional <see cref=\"PageBlobRequestConditions\"\/> to add \/\/\/ conditions on getting page ranges for the this blob. \/\/\/ <\/param> \/\/\/ <param name=\"async\"> \/\/\/ Whether to invoke the operation asynchronously. \/\/\/ <\/param> \/\/\/ <param name=\"cancellationToken\"> \/\/\/ Optional <see cref=\"CancellationToken\"\/> to propagate \/\/\/ notifications that the operation should be cancelled. \/\/\/ <\/param> \/\/\/ <returns> \/\/\/ A <see cref=\"Response{PageRangesInfo}\"\/> describing the \/\/\/ valid page ranges for this blob. \/\/\/ <\/returns> \/\/\/ <remarks> \/\/\/ A <see cref=\"RequestFailedException\"\/> will be thrown if \/\/\/ a failure occurs. \/\/\/ <\/remarks> internal async Task<ResponseWithHeaders<PageList, PageBlobGetPageRangesHeaders>> GetAllPageRangesInteral( string marker, int? pageSizeHint, HttpRange? range, string snapshot, PageBlobRequestConditions conditions, bool async, CancellationToken cancellationToken) { using (ClientConfiguration.Pipeline.BeginLoggingScope(nameof(PageBlobClient))) { ClientConfiguration.Pipeline.LogMethodEnter( nameof(PageBlobClient), message: $\"{nameof(Uri)}: {Uri}\\n\" + $\"{nameof(marker)}: {marker}\\n\" + $\"{nameof(pageSizeHint)}: {pageSizeHint}\\n\" + $\"{nameof(range)}: {range}\\n\" + $\"{nameof(snapshot)}: {snapshot}\\n\" + $\"{nameof(conditions)}: {conditions}\"); DiagnosticScope scope = ClientConfiguration.ClientDiagnostics.CreateScope($\"{nameof(PageBlobClient)}.{nameof(GetAllPageRanges)}\"); conditions.ValidateConditionsNotPresent( invalidConditions: BlobRequestConditionProperty.IfSequenceNumberLessThanOrEqual | BlobRequestConditionProperty.IfSequenceNumberLessThan | BlobRequestConditionProperty.IfSequenceNumberEqual, operationName: nameof(PageBlobClient.GetPageRanges), parameterName: nameof(conditions)); try { scope.Start(); ResponseWithHeaders<PageList, PageBlobGetPageRangesHeaders> response; if (async) { response = await PageBlobRestClient.GetPageRangesAsync( snapshot: snapshot, range: range?.ToString(), leaseId: conditions?.LeaseId, ifModifiedSince: conditions?.IfModifiedSince, ifUnmodifiedSince: conditions?.IfUnmodifiedSince, ifMatch: conditions?.IfMatch?.ToString(), ifNoneMatch: conditions?.IfNoneMatch?.ToString(), ifTags: conditions?.TagConditions, marker: marker, maxresults: pageSizeHint, cancellationToken: cancellationToken) .ConfigureAwait(false); } else { response = PageBlobRestClient.GetPageRanges( snapshot: snapshot, range: range?.ToString(), leaseId: conditions?.LeaseId, ifModifiedSince: conditions?.IfModifiedSince, ifUnmodifiedSince: conditions?.IfUnmodifiedSince, ifMatch: conditions?.IfMatch?.ToString(), ifNoneMatch: conditions?.IfNoneMatch?.ToString(), ifTags: conditions?.TagConditions, marker: marker, maxresults: pageSizeHint, cancellationToken: cancellationToken); } \/\/ Return an exploding Response on 304 if (response.IsUnavailable()) { return response.GetRawResponse().AsNoBodyResponse<ResponseWithHeaders<PageList, PageBlobGetPageRangesHeaders>>(); } return response; } catch (Exception ex) { ClientConfiguration.Pipeline.LogException(ex); scope.Failed(ex); throw; } finally { ClientConfiguration.Pipeline.LogMethodExit(nameof(PageBlobClient)); scope.Dispose(); } } } \/\/\/ <summary> \/\/\/ The <see cref=\"GetPageRanges(HttpRange?, string, PageBlobRequestConditions, CancellationToken)\"\/> \/\/\/ operation returns the list of valid page ranges for a page blob or snapshot of a page blob. \/\/\/ \/\/\/ For more information, see \/\/\/ <see href=\"https:\/\/docs.microsoft.com\/en-us\/rest\/api\/storageservices\/get-page-ranges\"> \/\/\/ Get Page Ranges<\/see>. \/\/\/ <\/summary> \/\/\/ <param name=\"range\"> \/\/\/ Optionally specifies the range of bytes over which to list ranges, \/\/\/ inclusively. If omitted, then all ranges for the blob are returned. \/\/\/ <\/param> \/\/\/ <param name=\"snapshot\"> \/\/\/ Optionally specifies the blob snapshot to retrieve page ranges \/\/\/ information from. For more information on working with blob snapshots, \/\/\/ <see href=\"https:\/\/docs.microsoft.com\/rest\/api\/storageservices\/creating-a-snapshot-of-a-blob\"> \/\/\/ Create a snapshot of a blob<\/see>. \/\/\/ <\/param> \/\/\/ <param name=\"conditions\"> \/\/\/ Optional <see cref=\"PageBlobRequestConditions\"\/> to add \/\/\/ conditions on getting page ranges for the this blob. \/\/\/ <\/param> \/\/\/ <param name=\"cancellationToken\"> \/\/\/ Optional <see cref=\"CancellationToken\"\/> to propagate \/\/\/ notifications that the operation should be cancelled. \/\/\/ <\/param> \/\/\/ <returns> \/\/\/ A <see cref=\"Response{PageRangesInfo}\"\/> describing the \/\/\/ valid page ranges for this blob. \/\/\/ <\/returns> \/\/\/ <remarks> \/\/\/ A <see cref=\"RequestFailedException\"\/> will be thrown if \/\/\/ a failure occurs. \/\/\/ <\/remarks> [EditorBrowsable(EditorBrowsableState.Never)] public virtual Response<PageRangesInfo> GetPageRanges( HttpRange? range = null, string snapshot = null, PageBlobRequestConditions conditions = null, CancellationToken cancellationToken = default) => GetPageRangesInternal( range, snapshot, conditions, false, \/\/ async cancellationToken) .EnsureCompleted(); \/\/\/ <summary> \/\/\/ The <see cref=\"GetPageRangesAsync(HttpRange?, string, PageBlobRequestConditions, CancellationToken)\"\/> \/\/\/ operation returns the list of valid page ranges for a page blob or snapshot of a page blob. \/\/\/ \/\/\/ For more information, see \/\/\/ <see href=\"https:\/\/docs.microsoft.com\/en-us\/rest\/api\/storageservices\/get-page-ranges\"> \/\/\/ Get Page Ranges<\/see>. \/\/\/ <\/summary> \/\/\/ <param name=\"range\"> \/\/\/ Optionally specifies the range of bytes over which to list ranges, \/\/\/ inclusively. If omitted, then all ranges for the blob are returned. \/\/\/ <\/param> \/\/\/ <param name=\"snapshot\"> \/\/\/ Optionally specifies the blob snapshot to retrieve page ranges \/\/\/ information from. For more information on working with blob snapshots, \/\/\/ <see href=\"https:\/\/docs.microsoft.com\/rest\/api\/storageservices\/creating-a-snapshot-of-a-blob\"> \/\/\/ Create a snapshot of a blob<\/see>. \/\/\/ <\/param> \/\/\/ <param name=\"conditions\"> \/\/\/ Optional <see cref=\"PageBlobRequestConditions\"\/> to add \/\/\/ conditions on getting page ranges for the this blob. \/\/\/ <\/param> \/\/\/ <param name=\"cancellationToken\"> \/\/\/ Optional <see cref=\"CancellationToken\"\/> to propagate \/\/\/ notifications that the operation should be cancelled. \/\/\/ <\/param> \/\/\/ <returns> \/\/\/ A <see cref=\"Response{PageRangesInfo}\"\/> describing the \/\/\/ valid page ranges for this blob. \/\/\/ <\/returns> \/\/\/ <remarks> \/\/\/ A <see cref=\"RequestFailedException\"\/> will be thrown if \/\/\/ a failure occurs. \/\/\/ <\/remarks> [EditorBrowsable(EditorBrowsableState.Never)] public virtual async Task<Response<PageRangesInfo>> GetPageRangesAsync( HttpRange? range = null, string snapshot = null, PageBlobRequestConditions conditions = null, CancellationToken cancellationToken = default) => await GetPageRangesInternal( range, snapshot, conditions, true, \/\/ async cancellationToken) .ConfigureAwait(false); \/\/\/ <summary> \/\/\/ The <see cref=\"GetPageRangesInternal\"\/> operation returns the list \/\/\/ of valid page ranges for a page blob or snapshot of a page blob. \/\/\/ \/\/\/ For more information, see For more information, see \/\/\/ <see href=\"https:\/\/docs.microsoft.com\/en-us\/rest\/api\/storageservices\/get-page-ranges\"> \/\/\/ Get Page Ranges<\/see>. \/\/\/ <\/summary> \/\/\/ <param name=\"range\"> \/\/\/ Optionally specifies the range of bytes over which to list ranges, \/\/\/ inclusively. If omitted, then all ranges for the blob are returned. \/\/\/ <\/param> \/\/\/ <param name=\"snapshot\"> \/\/\/ Optionally specifies the blob snapshot to retrieve page ranges \/\/\/ information from. For more information on working with blob snapshots, \/\/\/ <see href=\"https:\/\/docs.microsoft.com\/rest\/api\/storageservices\/creating-a-snapshot-of-a-blob\"> \/\/\/ Create a snapshot of a blob<\/see>. \/\/\/ <\/param> \/\/\/ <param name=\"conditions\"> \/\/\/ Optional <see cref=\"PageBlobRequestConditions\"\/> to add \/\/\/ conditions on getting page ranges for the this blob. \/\/\/ <\/param> \/\/\/ <param name=\"async\"> \/\/\/ Whether to invoke the operation asynchronously. \/\/\/ <\/param> \/\/\/ <param name=\"cancellationToken\"> \/\/\/ Optional <see cref=\"CancellationToken\"\/> to propagate \/\/\/ notifications that the operation should be cancelled. \/\/\/ <\/param> \/\/\/ <returns> \/\/\/ A <see cref=\"Response{PageRangesInfo}\"\/> describing the \/\/\/ valid page ranges for this blob. \/\/\/ <\/returns> \/\/\/ <remarks> \/\/\/ A <see cref=\"RequestFailedException\"\/> will be thrown if \/\/\/ a failure occurs. \/\/\/ <\/remarks> private async Task<Response<PageRangesInfo>> GetPageRangesInternal( HttpRange? range, string snapshot, PageBlobRequestConditions conditions, bool async, CancellationToken cancellationToken) { using (ClientConfiguration.Pipeline.BeginLoggingScope(nameof(PageBlobClient))) { ClientConfiguration.Pipeline.LogMethodEnter( nameof(PageBlobClient), message: $\"{nameof(Uri)}: {Uri}\\n\" + $\"{nameof(snapshot)}: {snapshot}\\n\" + $\"{nameof(conditions)}: {conditions}\"); DiagnosticScope scope = ClientConfiguration.ClientDiagnostics.CreateScope($\"{nameof(PageBlobClient)}.{nameof(GetPageRanges)}\"); conditions.ValidateConditionsNotPresent( invalidConditions: BlobRequestConditionProperty.IfSequenceNumberLessThanOrEqual | BlobRequestConditionProperty.IfSequenceNumberLessThan | BlobRequestConditionProperty.IfSequenceNumberEqual, operationName: nameof(PageBlobClient.GetPageRanges), parameterName: nameof(conditions)); try { scope.Start(); ResponseWithHeaders<PageList, PageBlobGetPageRangesHeaders> response; if (async) { response = await PageBlobRestClient.GetPageRangesAsync( snapshot: snapshot, range: range?.ToString(), leaseId: conditions?.LeaseId, ifModifiedSince: conditions?.IfModifiedSince, ifUnmodifiedSince: conditions?.IfUnmodifiedSince, ifMatch: conditions?.IfMatch?.ToString(), ifNoneMatch: conditions?.IfNoneMatch?.ToString(), ifTags: conditions?.TagConditions, cancellationToken: cancellationToken) .ConfigureAwait(false); } else { response = PageBlobRestClient.GetPageRanges( snapshot: snapshot, range: range?.ToString(), leaseId: conditions?.LeaseId, ifModifiedSince: conditions?.IfModifiedSince, ifUnmodifiedSince: conditions?.IfUnmodifiedSince, ifMatch: conditions?.IfMatch?.ToString(), ifNoneMatch: conditions?.IfNoneMatch?.ToString(), ifTags: conditions?.TagConditions, cancellationToken: cancellationToken); } \/\/ Return an exploding Response on 304 return response.IsUnavailable() ? response.GetRawResponse().AsNoBodyResponse<PageRangesInfo>() : Response.FromValue( response.ToPageRangesInfo(), response.GetRawResponse()); } catch (Exception ex) { ClientConfiguration.Pipeline.LogException(ex); scope.Failed(ex); throw; } finally { ClientConfiguration.Pipeline.LogMethodExit(nameof(PageBlobClient)); scope.Dispose(); } } } #endregion GetPageRanges #region GetPageRangesDiff \/\/\/ <summary> \/\/\/ The <see cref=\"GetAllPageRangesDiff(GetPageRangesDiffOptions, CancellationToken)\"\/> \/\/\/ operation returns the list of page ranges that differ between a"} +{"id":"RedPajamaBook.0000","text":"Appetite by Random House\u00ae edition published 2016 Copyright \u00a9 2015 by Octopus Publishing Group Ltd All rights reserved. The use of any part of this publication, reproduced, transmitted in any form or by any means electronic, mechanical, photocopying, recording or otherwise, or stored in a retrieval system without the prior written consent of the publisher\u2014or in the case of photocopying or other reprographic copying, license from the Canadian Copyright Licensing Agency\u2014is an infringement of the copyright law. Originally published in a slightly different form in the United Kingdom by Mitchell Beazley, a division of Octopus Publishing Group Ltd, London, in 2015. Appetite by Random House\u00ae and colophon are registered trademarks of Random House of Canada Limited. Library and Archives of Canada Cataloguing in Publication is available upon request. ISBN: 978-0-147-52997-8 eBook ISBN: 978-0-147-52998-5 Design and art direction by Smith & Gilmour Cover design by Martin Poole Cover photography by Martin Poole Published in Canada by Appetite by Random House\u00ae a division of Random House of Canada Limited, a Penguin Random House Company www.penguinrandomhouse.ca v4.1 a _To my mother, the best cook I will ever know._ # **Contents** _Introduction_ Light Bites Big Bites Feel-Good Factor Veggies Galore BBQ Indian Summer Those Little Extras Sugar & Spice Cocktail Time SECRET ESSENTIALS _Everyday spice box_ _Pantry must-haves_ _Magical chiles_ _Kitchen gadgets_ _Fridge favorites_ _Kitchen shortcuts_ _Wine & spice_ _Index_ _Acknowledgments_ # Introduction I've been fond of food from an early age, but mostly Indian food, and I've always loved cooking. My earliest memory of being in the kitchen was when my grandmother bought me a small rolling pin and board to help her make the rotis for the family dinner. She pronounced, \"If you can make them round, you will find a good husband,\" and as a little girl I thought this was rather strange. But day after day I would sit with my board and pin, concentrating on trying to get my rotis perfectly round. This was our time together, and I'll never forget how much care she took in helping me find my love of cooking. _\"I grew up in a spice-loving family where spice not only dominated our dishes but was usually the topic of conversation around the table.\"_ My parents were busy growing our family food business into the global household brand they always hoped for, and I spent every holiday at the office learning the tricks of the trade. My mum would bring home recipes she had been experimenting with and test them out on my brothers and me. If we liked them, they would find their way into a jar and onto the supermarket shelf. My parents made sure we were exposed to a wide variety of flavors from all corners of the world, and little did I know that I was training my taste buds for a life in food. Spices are magical ingredients that have the ability to transform a dish from ordinary to extraordinary. Spices are big, bold and vibrant, exploding in your mouth and making you feel alive. Although this experience isn't for everyone, when I first tasted Indian food I was hooked and instantly understood that adding a few spices to some simple ingredients can create delicious results. I was lucky enough to eat incredible food at home. Coming from a whole generation of accomplished cooks, we loved to stay in, cook and then eat as a family rather than going out. Traditional Indian food made by my grandmother or experimental Asian cooking by my mum was what I regarded as the norm. When I left home to study at uni, I realized it was rare to have grown-up cooking at home to that creative level. Those early cooking lessons are ones I will cherish forever. In putting this book together, I wanted to draw on the food I love and have loved growing up. The dishes I've included are all inspired by the special food encounters I've experienced and the wonderful flavors and ingredients I've discovered along the way. From our Sunday roast family favorite Slow-roast Spiced Lamb to my dad's Smokin' Ribs, which we have only once a year, all my recipes hold a special place in my heart. _\"The best recipes only taste the best because they are filled with emotion, filled with love. They come from precious memories, and all have a story to tell.\"_ Throughout my life, and as a result of my travels and my experiences, my confidence in using spices has grown. My professional culinary training at Leiths School of Food and Wine in London taught me techniques I'd never used before, and I've embraced many new ingredients, flavors and ideas from around the world to help bring out the enchanting qualities of spices. I wanted to offer a good balance of recipes, between light, uplifting dishes that you can ease into your busy life, and a few long, slow-cooked ones designed to intensify those luscious Indian flavors. Here are recipes for those rushed days when cooking needs to be especially quick, along with showstoppers for sun-filled barbecues and dinner parties. I've also included plenty of nutritious, feel-good dishes for the health conscious. The Sugar & Spice section has the most recipes, as I have a sweet tooth just like my father and go crazy for desserts. Scattered throughout the recipes are My Secret stamps giving you tips on how to make the most of your ingredients, ways to tweak the recipes for slightly different yet still scrumptious results, and some of my favorite serving suggestions. I also simply had to share some of my secret kitchen essentials with you, including a peek into my Everyday Spice Box and Pantry Must-Haves, which Kitchen Gadgets I rely, how to make the most of Magical Chiles and my Wine & Spice guide. _\"This book isn't for those wanting to learn traditional Indian cooking, but for those who love the spice flavors characteristic of Indian food and want to be shown how to use them in exciting and unexpected ways.\"_ Indian food is usually seen as complicated with seemingly endless ingredient lists, but I wanted to share recipes with you that won't take forever and don't need a truckload of ingredients. A well-stocked pantry is all you need, and if you don't have one of the items listed, don't worry about it\u2014simply leave it out, use your intuition and the end result will taste great. I'm particularly passionate about bringing out the cook and food lover within each and every one of us, and I have sought to feature recipes that will both inspire those who love to cook as well as entice and satisfy those who love to eat. I want my recipes to be used as a canvas for experimenting with flavors. That's the way I love to cook, with my pantry wide open so that I can see what I have to play with. But my desire to eat well will always lead my taste buds back to the spice flavors of home, and my family who helped me discover my great love of food. _\"I believe that cooking should be a pleasurable experience and approached with an adventurous mind.\"_ I have always believed that good cookbooks should be covered in splashes from the preparation of meals gone by, and full of the cook's own scribbled substitutions and suggestions. They should look dog-eared and crinkled from being well read and frequently cooked from. That's what I hope for my cookbook...a book that is loved and used for many years to come. ## Carrot, onion & spinach bhajias _Bhajias will always hold a special place in my heart. When my grandparents moved to the UK in the 1950s they were incredibly poor, so they had to do whatever they could to keep themselves afloat and provide for my dad and his siblings. My grandmother did what she loved, which was cooking. Her Indian samosas, bhajias and traditional desserts gained national fame, and from these humble beginnings the Patak's brand was born. My granny loved being in the kitchen and she taught me more about Gujarati cooking than I could ever thank her for. This is actually not one of her recipes but more of a modern spin on an old classic._ SERVES 4 (MAKES ABOUT 12) Prep time 10 minutes Cook time 5 minutes if cooking in a single batch vegetable oil, for frying\u2014you won't need more than 1 quart 2 carrots 1 large red onion 1\u00bc-inch piece fresh ginger, peeled good handful of spinach leaves, roughly chopped 1 red chile, finely chopped 2 tbsp roughly chopped fresh cilantro 1 tsp cumin seeds 1 tsp ground turmeric 1 tsp garam masala \u00bd tsp ground asafetida\/hing (optional) juice of 1 lemon good pinch of sea salt \u00be cup gram (chickpea) flour ( _see_ My Secret, below) Pour vegetable oil into a large, deep-lipped skillet so that it comes 2 inches up the sides. Gently heat it while you prepare the bhajia mixture. Alternatively, heat a deep-fat fryer to 350\u00b0F. Grate the carrots, onion and ginger using a cheese grater. Transfer them to a large bowl and add the rest of the ingredients. Scrunch all of the mixture together with your hands to release the moisture from the veggies and help it bind together. If you need to, add a few tablespoons of water\u2014you want it to be a dropping consistency. Shape the mixture into balls of around a tablespoonful each before flattening them a little, which allows them to cook all the way through so that they don't end up with a doughy center. Add a little of the mixture to the oil to test if it's hot enough: it should sink and then swim. Deep-fry the bhajias, in batches if you need to, for about 5 minutes until they are golden brown. You will need to flip them a few times to get an even color. Drain on paper towels. Serve hot with Mango Chutney or your favorite dip. \u00b7 MY SECRET \u00b7 Gram flour, made from ground chickpeas, is used widely in Indian cooking and is gluten free. It can be found in most supermarkets. If you don't have any at hand, use all-purpose flour instead and add a little more turmeric to give the bhajias a good color. ## Stuffed zucchini flowers with ricotta & honey _Zucchini flowers are seen as exotic and are only available when zucchini come into season. They have a light, subtle flavor and so I'm adding sweet spices to my ricotta with just a little chile heat to help the honey taste even sweeter. This is a great starter to any meal._ SERVES 4 Prep time 20 minutes Cook time 5 minutes _Stuffing_ 3 tbsp ricotta cheese 1 garlic clove, finely chopped \u00bd tbsp finely chopped chives \u00bd tbsp pine nuts, toasted and finely chopped, plus extra to garnish pinch of ground green cardamom (optional) 8 zucchini flowers with baby zucchini attached (preferably), flower stamens removed 2 tbsp vegetable oil good drizzle of honey 1 fresh red chile, seeded and finely chopped Mix all the stuffing ingredients together in a bowl. Slit the zucchini through the middle lengthwise but not all the way to the top so that the heat from the pan can cook them all the way through. Carefully stuff the flowers with the ricotta stuffing, trying not to overfill them. Twist the top to seal. Gently heat the oil in a large skillet and fry the flowers for a few minutes until they are light golden brown on all sides. Transfer the flowers to a plate, draining on paper towels if you need to, and drizzle with honey. Sprinkle over the chile and a few extra toasted pine nuts to garnish. \u00b7 MY SECRET \u00b7 Zucchini flowers are delicate. Be careful when stuffing them to avoid damaging the petals. If you can get hold of baby zucchini with the flowers still attached, then great, otherwise the flowers alone will do. ## Crispy sumac okra _Frying okra makes this otherwise slimy vegetable taste absolutely wonderful. The sticky texture disappears and it becomes one of the best snacks you'll ever try. In India they would make a spice mix to dust on the okra before frying, but instead of following tradition I have opted for sumac as my flavoring of choice. It's a Middle Eastern spice made from beautiful dried crimson berries that have a sweet, sour and almost lemony flavor. Sumac is now widely available, but you can always substitute your favorite garam masala if you can't find it, although it doesn't have the same flavor. Try and cut the okra all the same size to ensure that they crisp up together without some of them burning._ SERVES 4 AS A SNACK Prep time 5 minutes Cook time 3 minutes if cooking in a single batch 3 tbsp vegetable oil or light olive oil, plus extra if needed 8 oz okra, thinly sliced 2 tbsp gram (chickpea) flour or all-purpose flour 1 tsp ground turmeric \u00bd tsp chile powder 1 tbsp ground sumac pinch of sea salt, or to taste Heat the oil in a large, shallow skillet. Sprinkle the okra with the flour, turmeric and chile powder, and toss together well so that they are all evenly coated. Test the temperature of the oil by dropping in a little pinch of flour: it should sizzle. Add the okra to the pan and fry for a few minutes, moving them around frequently, until they are light golden brown and crispy. Be careful, as they burn easily, so turn down the heat if you need to. Depending on the size of your pan, you may need to do this in batches, so add a little more oil when frying each batch. Drain on paper towels and sprinkle over the sumac with a good pinch of sea salt. Taste and adjust the flavorings if you need to. Serve hot with a chilled drink for a wonderful party snack. \u00b7 MY SECRET \u00b7 I was always taught never to wash okra, as they absorb water, so instead I wipe them with a damp cloth to clean them. ## Charred baby eggplants _My grandmother used to make a dish just like this when I was young. She used large eggplant but I prefer baby ones as they are just the right size for snacking when they are halved lengthwise. If you do use large ones, make sure you roast them for longer._ SERVES 4 Prep time 5 minutes Cook time 15 minutes 10 baby eggplants, cut in half and flesh scored with a cross 2 tbsp vegetable oil _Stuffing_ 2 tsp black mustard seeds 2 tsp peeled and finely chopped fresh ginger 1\u20132 fresh red chiles, finely chopped 15 fresh curry leaves 4 heaped tbsp dried unsweetened coconut 3 tbsp chopped chives pinch of sea salt, or to taste _To finish_ 2 tbsp plain Greek yogurt honey, for drizzling Preheat an outdoor grill to medium or the oven to 425\u00b0F. Rub the eggplants with half the oil and grill with the lid down or roast, cut-side down. The skin should start to change color and turn crispy after 10\u201315 minutes. In the meantime, make the stuffing. Gently heat the remaining oil in a small skillet and add the mustard seeds. When the seeds start to jump out of the pan, add the ginger, chiles and curry leaves and allow to cook for 1 minute before stirring in the coconut. This should start to toast and turn golden brown after around 30 seconds. Turn off the heat and add half the chives and a pinch of salt. Stir well and taste and adjust the seasoning if you need to. Remove the eggplants from the grill or oven and flip them over so that you can see the flesh side. Fill the aubergines with the stuffing. Drizzle with the yogurt and some honey, and sprinkle over the remaining chives before serving. \u00b7 MY SECRET \u00b7 Fresh curry leaves must be thoroughly rinsed under cold running water before use. Available at Asian stores and large supermarkets, curry leaves freeze well. Buy a large bag to freeze for use whenever a recipe calls for them. ## Flash-fried calamari _Fried squid wins the hearts of most people and I'm one of them. As much as I like the usual sprinkling of salt and citrus, I'm going for something different here. I've fried up some scallions, garlic, chile and curry leaves to toss through, and it tastes awesome!_ _I'm using the tried-and-trusted tenderizing technique of soaking the squid in milk. It tastes best if you can leave it for a few hours, but in this recipe I only do it for 5 minutes while I get on with the chopping. Something is better than nothing._ SERVES 4 AS A SNACK Prep time 10 minutes Cook time 5 minutes 14 oz cleaned squid, cut into small bite-size pieces milk, for soaking vegetable oil, for frying 5 tbsp all-purpose flour 1 tsp ajwain seeds (optional) \u00bd tsp ground turmeric \u00bc tsp ground asafetida\/hing (optional) sea salt and pepper 2 scallions, finely chopped 2 garlic cloves, finely chopped 1 fresh red chile, seeded if you wish, finely chopped 20 fresh curry leaves ( _see_ My Secret) juice of 1 lime Soak the squid in milk, making sure it is completely covered, while you prepare the other ingredients. Pour vegetable oil into a large, deep-lipped skillet so that it comes \u00be inch up the sides and put on to heat. Alternatively, heat a deep-fat fryer to 400\u00b0F. Put the flour in a large bowl and stir in the ajwain seeds (if using), turmeric, asafetida\/hing (if using) and a really good pinch of salt and pepper. Drain the squid and toss in the flour mixture. Test the temperature of the oil by dropping in a little pinch of flour: it should sizzle. Once the oil is hot enough, dust off any excess flour and carefully deep-fry the squid, in batches, for 1 minute\u2014any longer and it will be rubbery. Drain on paper towels. In the meantime, prepare the flavorings to sprinkle over the calamari. Gently heat 1 tablespoon vegetable oil in a small skillet, stir in the scallions, garlic, chile and curry leaves and fry for 1 minute. Spoon the fried mixture all over the hot calamari, squeeze over the lime juice and sprinkle with a little more salt before serving. \u00b7 MY SECRET \u00b7 Ajwain seeds are small brown seeds that have a slightly peppery and anise flavor. Although they look like small cumin seeds, they cannot be substituted, so just leave them out if you can't find any. ## Mini tortillas _Now I know this is a Mexican classic, but who doesn't love tortillas? And I couldn't write a cookbook without including some of my favorite recipes. I've used store-bought tortilla wraps here, but you can make your own if you like, and they aren't that difficult to do. I actually prefer the ready-made ones._ _These are some of my favorite tortilla fillings. Make just one or cook them all up, pile separate bowls in the middle of the table and top your tortillas with whatever you like. Sprinkle with finely sliced red onions, jalape\u00f1os and some sour cream or yogurt for a true feast. Roll up and devour: no cutlery allowed!_ SERVES 4 (MAKES 8 MINI OR 4 LARGE SOFT, FLOUR TORTILLA WRAPS) Pulled chicken or pork Prep time 10 minutes Cook time 1\u00bd hours for chicken, or up to 3 hours for pork 1 onion, sliced 2 Indian bay leaves 6 bone-in chicken thighs, skin removed, or 1 lb boneless pork shoulder, skin and all the fat removed 2 tbsp tomato paste 1 tbsp ketchup or barbecue sauce 1 tbsp chipotle paste or canned chopped chipotle chiles (use less if you don't like it fiery) 2 garlic cloves, finely chopped 1 tbsp light brown sugar 2 tsp smoked paprika juice of 1 orange 1 cup chicken or vegetable stock Preheat the oven to 300\u00b0F. Lay the onion and bay leaves in the base of a small roasting tray, one that will fit the chicken or pork snugly. Place the meat on top. Make the marinade by mixing together all the remaining ingredients. Pour over the meat, cover tightly with foil and slow cook in the oven for about 90 minutes for chicken, or up to 3 hours for pork, basting the meat every now and again, until cooked through and falling off the bone. Shred the meat and mix into the sauce (discard the bay leaves). If the sauce isn't thick enough, you can put the meat aside to keep warm while you reduce it in a saucepan over medium-high heat. Roast corn salsa Prep time 10 minutes Cook time 10 minutes 1 tbsp vegetable oil 7 oz corn, drained if canned or defrosted if frozen 1 tsp cumin seeds 2 garlic cloves, finely chopped 1 fresh red chile, seeded if you wish, sliced 1 scallion, finely sliced good pinch of sea salt, or to taste grated zest and juice of 1 lime 3 cherry tomatoes, cut into quarters (optional) chopped mint, to garnish Gently heat a large skillet, add the oil and corn, and give it a good stir. Turn up the heat and allow the corn to cook until golden brown. Be careful, as the kernels will start to jump out of the pan. Stir in the cumin seeds, garlic, chile, scallion, salt and the lime juice. Allow to cook for a few minutes before stirring in the tomatoes (if using). Taste and adjust the seasoning if you need to, then garnish with the lime zest and mint. Avocado & cilantro salsa Prep time 5 minutes 2 ripe avocados, peeled, pitted and mashed lightly with a fork juice of \u00bd lime 1 scallion, roughly chopped 1 fresh red chile, seeded and finely chopped 1 tbsp roughly chopped cilantro good pinch of sea salt crumbled feta cheese, to garnish (optional) Mix all the ingredients together in a serving bowl and top with a little feta cheese (if using), in which case, remember to go easy on the salt, as the feta will be salty. Chickpea salsa Prep time 10 minutes \u00bd 15-oz can chickpeas, drained 2 tbsp light olive oil 1 fresh Indian finger chile or jalape\u00f1o, roughly chopped 1 roasted red pepper, seeded and roughly chopped 1 tbsp roughly chopped cilantro 1 tbsp roughly chopped mint 1 tsp coriander seeds, toasted (optional) \u00bd red onion, roughly chopped good pinch of sea salt, or to taste juice of \u00bd lime, or to taste Place all the ingredients in a food processor and pulse a few times until almost smooth\u2014add some water if you need to. Taste and adjust the seasoning. ## Spiced chicken wings _My love for wings comes from many school holidays spent in the US visiting family. We would eat them nearly every day\u2014which sounds excessive but we absolutely loved them. This isn't a shy dish, so roll up your sleeves and get stuck in. These two versions of spiced wings really are finger-licking good. Tone down the heat or dial it up, depending on what you feel like._ _I spent some time learning the regional cuisine in an area of South India called Chettinad. This Hot Pepper Marinade is inspired by my travels, and it's aromatic and punchy with a good hit of spice. I've added one of my favorite ingredients, tamarind, but you can leave it out if you haven't got any._ SERVES 4 Prep time 5 minutes, plus (preferably) marinating Cook time 35\u201340 minutes 12 chicken wings _Hot pepper marinade_ 2 dried red chiles or a good pinch of chile powder 1 tsp fennel seeds 1 tsp cumin seeds 1 tsp coriander seeds 1 tsp black peppercorns 1 tbsp peeled and roughly chopped fresh ginger 2 garlic cloves, peeled 1 scallion, roughly chopped 1 tbsp tamarind paste \u00bd tbsp honey good pinch of ground cinnamon good pinch of sea salt 1 tbsp vegetable oil _Tandoori marinade_ 4 tbsp plain Greek yogurt 1 tbsp garlic paste 2 tsp ginger paste 1 tsp ground turmeric \u00bd\u20131 tsp chile powder 2 tsp garam masala good pinch of sea salt Hot pepper wings For the hot pepper marinade, gently heat a heavy-bottomed skillet and toast the dry spices for a few minutes until fragrant and the seeds are golden brown. Transfer to a mortar and allow to cool for a few minutes, then roughly grind with a pestle. Add the ginger, garlic and scallion, and bash together to form a paste. Toss in the rest of the ingredients and taste\u2014the marinade should be slightly sweet, sour and full of flavor. Rub the marinade over the wings in a dish, cover and leave to marinate in the fridge for a few hours if you can. Preheat the oven to 400\u00b0F and heat up a griddle pan, if you have one, or a cast-iron skillet, over a medium heat. This will get a nice char on the wings before you pop them in the oven to fully cook through. Char-grill the wings in the griddle pan for a few minutes on each side before transferring to the oven and cooking for a further 30 minutes, or a few minutes longer if not char-grilled. Check they are cooked through before diving in and serving with a relish. Tandoori wings Mix all the ingredients for the tandoori marinade together and rub all over the wings in a dish. Marinate, cook and serve as above. * * * _My grandfather (right) Lakshmishankar, fondly known as LG, or Bapuji to me, with Dhiru Mama, Baa's brother (center), at 134 Drummond Street, London. Indians from all over would travel to the capital to stock up on Bapuji's imported spices, lentils, rices, pulses and homemade Bombay mix. Demand and community spirit were high._ _My grandmother (right) Shanta, respectfully known as Baa, cooking up yet another batch of her famous jalebis. Queues for Baa's authentic sweets were long. My dad and his brothers were soon kept busy delivering parcels all over London (making the most of the free Tube travel for Under 11's)._ _Baa at Allcroft Road, Kentish Town\u2014this was the first home Baa and Bapuji rented upon arriving in London from Kenya in 1956. Baa would cook up sweets in the tiny kitchen here, sales of which led to the opening of the Drummond Street grocery store. Thus, Patak's was born._ _Baa (pictured) and Bapuji invest in a van to keep up with delivery demands following the opening of the Drummond Street store!_ _Dad takes a break from making deliveries to pose with his beloved guitar._ * * * ## Papri chaat _Chaat is the name of a whole host of dishes that are eaten on the streets of India. They are utterly delicious and can vary from one street vendor to the next. This is my recipe for papri chaat, which is traditionally made with potatoes and chickpeas and smothered in yogurt, something sweet and salty (oftenSticky Sweet Date Chutney) and some crispy gram noodles called sev. All of this sits on cute little fried pastry disks that can be served warm or cold. To make it authentic is quite tricky, especially if you don't have all the ingredients, so I've made a few shortcuts. For instance, life is too short to make your own pastry and so I have used the store-bought variety, but by all means make your own._ SERVES 4 (MAKES ABOUT 16) Prep time 10 minutes Cook time 25 minutes \u00bc lb potatoes (any variety), roughly chopped into small pieces 1 tsp ground turmeric sea salt \u00bd lb puff pastry, \u00bc inch thick, cut into 16 disks about 2 inches in diameter 1 tbsp vegetable oil 1 tsp black mustard seeds \u00bc tsp ground asafetida\/hing (optional) 1 fresh red chile, seeded if you wish, finely chopped 1 tsp garam masala juice of \u00bd lemon _Topping_ 1 tsp cumin seeds 4 tbsp plain Greek yogurt 4 tbsp Sticky Sweet Date Chutney \u00bd small red onion, finely chopped 2 tbsp roughly chopped cilantro seeds of 1 pomegranate (optional) 2 tbsp sev (see headnote) (optional) Preheat the oven to 400\u00b0F. Fill a saucepan with cold water, add the potatoes with half the turmeric and some salt and bring to a boil. Cook until soft (around 10 minutes). Once cooked, drain well. In the meantime, lay the pastry disks on a baking sheet lined with parchment paper. Place another sheet of parchment paper and a baking sheet on top to stop them puffing up. Bake until golden brown on both sides (around 10 minutes). Keep an eye on them, as they color quickly. Heat the oil in a saucepan and add the mustard seeds, asafetida\/hing (if using) and the remaining turmeric. Once sizzling, stir in the chile, cooked potatoes, and garam masala. Using a fork, roughly mash the potatoes into the spices. Squeeze over the lemon juice and season with a pinch of salt. After a few minutes the spices will have cooked through, so give it a taste and adjust the seasoning. Put the potatoes to one side to cool a little, and also allow the puff pastry disks to cool down before putting it all together. Gently heat a heavy-bottomed skillet and toast the cumin seeds for a few minutes until golden brown and fragrant. Pour into a mortar, allow to cool for a few minutes, then roughly crush with a pestle. Start by laying out the puff pastry disks. Top with a heaped teaspoon of the spiced potato and then a good dollop of the yogurt and chutney. Scatter over the onion, cilantro, pomegranate seeds and sev (if using), and add a good sprinkling of the toasted cumin. ## Stuffed paneer bites _These are a wonderful snack to have when you fancy something a little naughty. I'm not a big fan of paneer, which is the cheese most commonly used in Indian dishes, but when it's fried, all that changes. It doesn't melt like other cheese but rather softens, and its neutral flavor makes it one of the most versatile ingredients around. Here I have made a stuffing quite similar to a pimped-up pesto and then rolled it in bread crumbs, which I make from slightly stale naan bread; but you can use ordinary white bread instead. It tastes best when served with a chutney, so try this simple fresh tomato one if you have time._ SERVES 4 AS A SNACK Prep time 10 minutes Cook time 10 minutes _Tomato chutney_ 3 large tomatoes or 20 cherry tomatoes, roughly chopped \u00bd red onion, finely chopped good pinch of kalonji (black onion or nigella) seeds (optional) 15 fresh curry leaves ( _see_ My Secret) (optional) good pinch of crushed red pepper flakes or chile powder 1 tbsp light brown sugar 1 tsp red wine vinegar good pinch of sea salt, or to taste 2 garlic cloves, peeled 2 tbsp pine nuts 1 tbsp basil leaves 1 tbsp freshly grated Parmesan cheese 1 tsp peeled and roughly chopped fresh ginger 1 fresh red chile, seeded if you wish \u00bd tsp cumin seeds, toasted (optional) juice of \u00bd lemon 1 pack paneer, around 8 oz 1 small naan bread\u2014any flavor, but I like garlic and coriander 1 egg, beaten 2 tbsp vegetable oil or light olive oil Gently heat all the tomato chutney ingredients together in a saucepan for 10 minutes. Add a splash of water if it starts to dry out, but allow it to thicken. In the meantime, prepare the paneer bites. Make the stuffing for the paneer by using a food processor to finely chop together the garlic, pine nuts, basil, Parmesan, ginger, chile and cumin with the lemon juice (or chop very fine with a knife and mix together). Give it a taste and adjust the seasoning if you think it needs it. Cut the paneer in half as if you are about to make a sandwich. Spread the stuffing on top of one layer and put the other paneer layer on top. Cut it into large bite-size pieces. Make the bread crumbs by pulsing the naan in the food processor, or grate on a cheese grater, and put into a bowl. Dip the paneer bites into the beaten egg in a bowl and then into the bread crumbs. Gently heat the oil in a large skillet and fry the paneer bites for a minute or so on each side until light golden brown and crispy. Drain on paper towels. Serve them piled high with the tomato chutney. \u00b7 MY SECRET \u00b7 To get these even crispier, try Japanese-style panko bread crumbs. They feel like toast and are amazing with this recipe. Find them in the Asian aisle at the supermarket or at an Asian shop. ## Bombay nuts _Nuts are the ultimate snack and even more so when dusted with spices, sugar and salt. Serve these at your next party and you'll be hearing praises all night! Sweet, salty, hot and smoky...the best combo._ SERVES 4 AS A SNACK Prep time 5 minutes Cook time 20 minutes 10\u00bd oz unsalted mixed nuts 1 egg white, beaten until frothy 4 tbsp light brown sugar 1 tsp smoked paprika 1 tsp ground cinnamon 1\u20132 tsp chile powder 2 tsp salt\u2014I love sea salt 20 fresh curry leaves ( _see_ My Secret) (optional) Preheat the oven to 325\u00b0F and cover a large rimmed baking sheet with parchment paper. Mix the nuts with the egg white in a bowl and make sure the nuts are all coated well. In a separate small bowl, stir together the sugar, spices and salt, then sprinkle over the nuts. Add the curry leaves (if using) and toss together before transferring the nuts to the lined baking sheet. Spread them out in a single layer. Bake in the oven for 20 minutes, stirring them halfway through. Leave to cool on the baking sheet before breaking them apart and serving. They taste best warm. ## Tiger shrimp with lime, ginger & mustard seeds _Shrimp are quick to cook and somehow feel rather exotic. This recipe borrows spices from the southern shores of India and I tasted a dish similar to this when I was learning about the local cuisine. My mouth was on fire with the chiles, but when I got past it I found the flavor to be delicate and delicious. I have toned down the chiles and added some background warmth by using fresh ginger instead._ _I've used tiger shrimp and removed most of the shell, apart from the tail. I prefer to leave the tail on, as it means that you have something to hold on to when biting into the shrimp, but you can take the entire shell off if you prefer. Just make sure the shrimp are raw and that they have been deveined._ SERVES 4 Prep time 10 minutes Cook time 10 minutes 2 tbsp vegetable oil 1 cinnamon stick 1 tsp black mustard seeds 1 tsp ground turmeric \u00bd tsp black peppercorns, crushed with a pestle and mortar 20 fresh curry leaves ( _see_ My Secret) (optional) 2 scallions, finely sliced 1 fresh red chile, finely sliced 1 tbsp peeled and julienned fresh ginger 20 raw jumbo shrimp, shells removed but tails left on, deveined good pinch of sea salt good drizzle of honey 2 tbsp roughly chopped cilantro juice of \u00bd lime, to taste Gently heat the oil in a large skillet and add the cinnamon stick, mustard seeds, turmeric, peppercorns and curry leaves (if using). Once they start to sizzle, stir through the scallions, chile and ginger and allow to soften for around a minute. Stir in the shrimp and watch how they turn to a golden pink color. Flip them over and sprinkle over a good pinch of salt. Once they are cooked through\u2014and it won't take long, only a few minutes on each side\u2014drizzle over the honey and sprinkle in half the cilantro and the lime juice. Mix well and serve sprinkled with the remaining cilantro. * * * Everyday spice box _Spices are the life and soul of all Indian dishes and are the ingredients that make your taste buds come to life. They brighten up even the simplest dishes by adding a little magic. As a little girl I would wander into the kitchen to see what wonderful dishes my family was creating as the scents wafted through the house. I came across my mum's spice box, which was the most amazing, colorful thing I'd ever seen. The smells were incredible but what surprised me most was the sheer amount she had crammed in there. As I grew up I learned how to use these little potent wonders and I've been hooked ever since._ Each Indian family will fill their spice box with their favorite spices; some will even have two or three boxes, depending how adventurously the family cooks. I like to keep one everyday box that contains most of the spices I need from all corners of India. I say \"most\" because I can't quite fit every single spice from my pantry in there and if I want my dish to taste typically southern, for example, then I need to add a few extras. I have two layers to it\u2014my base layer filled with canisters of spices, and then the top layer packed with a mix of aromatic spices. Buying super-fresh spices is a bit of an art, and something my father taught me. Spices have always been very special to him, not only as they were at the heart of our spice business, but he met my mum on one of his spice buying trips to India. Some spices are robust and don't lose much flavor as they age, while others need to be bought as fresh as can be so they deliver the best possible flavor punch. Have you ever wondered why recipes taste different every time you cook them, even though you've made them the exact same way? It's down to the quality of your ingredients. If you hold on to spices for years, you will never have a fresh-tasting dish as your core ingredients will have changed and lost their beautiful essence. I know buying fresh spices isn't always possible, not to mention affordable, so here are a few tips on how to buy and store my favorite spices that I keep in my everyday spice box. Base-layer spices CORIANDER SEEDS These seeds are one of the most important spices in my box. Coriander is one of the only spices that can be used throughout the recipe\u2014seeds at the beginning, powder a little later on, and finished with the fresh leaf (cilantro). I absolutely love the earthy lemony flavor it imparts in a dish and it is the perfect spice to create a good flavor base. The seeds can be toasted in a dry pan to help release their sweet flavor, and I like to sprinkle them on top of dishes to add a little mystery. Look for darkish beige-brown plump seeds. They turn light beige as they get older. Try with Tomato & Red Onion Salad with Toasted Coriander & Burrata. CUMIN SEEDS I love love love cumin seeds. They help create a good flavor base, add a warm earthy note to dishes, and taste incredible when toasted and ground. Not to be confused with black cumin or royal cumin, which adds a very different flavor. Buy cumin seeds when they are brown, plump and unbroken. Try with Lentil Salad with Toasted Cumin Dressing or Cumin Roast Potatoes. TURMERIC A very special spice that doesn't seem to age. I call it the \"wonder\" spice simply because it is truly wonderful. It has a unique healing ability, which acts as a natural cleanser, drawing impurities out of everything it comes into contact with, which is why it is used to heal the body externally as well as internally. It's a member of the ginger family and looks slightly similar in appearance. It has an orangey yellow skin and is much smaller than fresh ginger, with bright orange flesh inside. If you can get your hands on fresh turmeric then you can pop it in the freezer, otherwise the more common form is dried and ground. Its yellow color stains every single thing it touches and it can taste very bitter when raw, so I like to cook it well to bring out its slightly sweet flavor. Try with Scented Steamed Fish. BLACK PEPPER Once known as the King of the Spices, it used to be one of the most expensive spices in the world and has a rich history. Unlike in the West where it is only used as a seasoning, in India cooks use black pepper as a spice in its own right. Black pepper is surprisingly warm and brings a lot of heat to dishes. Buy dark black wrinkly peppercorns that are as whole as possible; they lose their flavor very quickly once ground. Try with Chile Beef with Black Pepper. BLACK MUSTARD SEEDS These tiny brown\/black seeds add warmth and a slightly nutty flavor to dishes. They can be ground, made into a paste, used to flavor oil (mustard oil is very pungent), or used whole. They come in different sizes, and hold their flavor well as they age, so look out for dark-colored seeds and whatever you do try not to drop the tub on the floor\u2014they spread everywhere! Try with Wilted Mustard Greens. CHILE POWDER Chiles gained fame in India only a few centuries ago. Before that it was black pepper that was known for being the heat-infusing ingredient. Chile powder can vary in heat level and it is only ever red as fresh green chiles can't be dried naturally. Bright deep-red chile powder carries less heat and is made from Kashmiri red chiles, but the only way to tell how hot your chile powder is, is to taste it! The dried seeds from dried red chiles can be used to add more heat, or leave them out if you want a milder chile powder. Try with Flaky Mint & Chile Paratha. GARAM MASALA The myth with garam masala is that it can only ever be one recipe. In truth, each cook will have his or her own recipe for garam masala, usually passed down from mother to daughter, and may even have several masalas as each one works best with different dishes. My garam masala recipe was given to me by my mum and it is very precious to me. You can buy good garam masalas off the shelf, but there is nothing like making it fresh as ground masalas lose their potency quickly. Lightly toast whole spices (never turmeric) until fragrant and warm before tipping into a spice grinder. It can be a blend of anything from two spices up to fifty spices, whatever the cook wants it to be. Try with Crunchy Roast Cauliflower & Broccoli. Top-layer spices INDIAN BAY LEAVES Indian bay leaves can't be substituted for European bay leaves as they have a different flavor, so leave them out if you don't have dried Indian bay leaves. If you're unsure what type yours are simply rub the leaves with your fingertips\u2014if you can smell a hint of cinnamon then they are fine to use. Avoid buying leaves that are discolored and holey. Try with One-Pot Chicken with Smoked Spices. CINNAMON STICKS I love cinnamon and prefer to buy the sticks as I can seek it out during cooking should I need to remove it. Its sweet, mesmerizing flavor is best when whole and is lost quickly once ground into a fine powder. Try with Tadka Dhal. GREEN CARDAMOM If black pepper is the King of the Spices then this is its queen. Buy bright dark-green pods that aren't too shriveled as the black seeds inside hold all the flavor. Green cardamom has a sweet camphor, almost aniseed, flavor and is by far my favorite spice. My first spice-buying trip to India led me to a cardamom auction and I fell in love with this beautiful spice. Try with Roast Hazelnut & Cardamom Ice Cream. BLACK CARDAMOM Although part of the same family as green cardamom, black cardamom is twice the size and more wrinkly, with a smoky aroma from being toasted on hot embers. Look out for large black dried pods that smell very smoky. Try with Black Dhal. MACE This is the outer red lacy casing wrapped around fresh nutmeg. Mace turns orangey once dried and tastes almost perfumey with a gentle floral backnote. Look for whole pieces of mace that smell floral. Try with Foolproof Pilau Rice. CLOVES Cloves have a medicinal flavor and cause a distinctive numbing sensation if chewed. You can tell they are fresh when they look plump and are a deep dark brown and almost black. The round heads should still be attached to their long stems and they should smell very strong. Try with Roast Stone Fruit & Honey with Pistachio Cream. STAR ANISE This spice originally came from China but is now used in so many other cuisines across the world. It is by far the prettiest spice but its strong anise flavor can overpower a recipe so don't go too crazy. Look for large stars that have their pods still nestled in between the points. Try with Pineapple Anise Colada. SAFFRON Although I don't keep saffron in my spice box, I do keep it in its very own special tub next to my box. Saffron strands are the stigmas of a variety of crocus flowers that only open for a few weeks of the year. Each flower produces only three stigmas and they have to be handpicked at dawn before the suns rays burn them. It is the world's most expensive spice and has a unique and enchanting floral flavor and color. It's hard to know the quality of saffron without touching it and smelling it. Usually the more expensive it is, the better quality it will be. Try with Saffron & Honey Naan Breads or Saffron, Cardamom & Thyme Celery Root. ASAFETIDA\/HING This is another spice I don't keep in my spice box, but it is an essential spice I keep in my pantry in an airtight container. It usually comes in a powder, but you can find it in its raw state as a dried resin that looks like a rock made from amber-colored glass. I secretly love its strong, pungent smell and use it as a flavor enhancer; when cooked in oil, it tastes like garlic and fried onions. Sprinkle it in Carrot, Onion & Spinach Bhajias. You can't really substitute the flavor of asafetida, but you could use extra garlic if you can't find it. Storing & using your spices Always keep your spices in an airtight container. A spice box is perfect. Oxygen and sunlight age your spices quickly so try to keep them somewhere dark. When you grind spices to create powders you start to release their essential oils, their essence, which will then float off into the air as time goes on. Grinding your spices only as you need them will give you the best flavor so try to buy your spices whole and use them up quickly. * * * ## Slow-roast spiced lamb _Another Sunday lunch favorite in my home when I was growing up, this recipe is one I cook regularly when I have friends coming around. Making a simple spice paste to rub over the lamb infuses the meat while it roasts, and just in case there isn't enough flavor going on, I stud the lamb with herbs and garlic. The juices that sit in the roasting tray are perfect for gravy, which I prefer thin and unadulterated, but you can add some flour to thicken it if you prefer._ _Low and slow is what makes the meat meltingly tender. It will taste even better if you can roast it at a lower temperature. For every 25\u00b0F lower, add on an extra hour of cooking time. By the time it's ready, you won't even need a knife._ SERVES 6 TO 8 Prep time 30 minutes Cook time 5 hours _Spice paste_ 1 tsp coriander seeds 2 tsp cumin seeds 2 tsp fennel seeds \u00bd tsp black peppercorns 1 tsp ground turmeric 2 tsp Creole mustard 4 tbsp vegetable oil 1 leg of lamb, about 4\u00bd lbs 5 garlic cloves, peeled, 2 for the Spice Paste 4 rosemary sprigs, cut into small pieces 2 tbsp mint leaves 1 fresh red chile, seeded if you wish, sliced 2 onions, finely sliced sea salt 2\u00bc cups hot lamb or vegetable stock or water pepper Make the spice paste by bashing up the coriander, cumin and fennel seeds with the peppercorns and 2 of the garlic cloves in a mortar with a pestle. Stir in the turmeric, mustard and oil, and mix well. Preheat the oven to 275\u00b0F. Make some deep cuts into the meat at evenly spaced intervals and poke a finger in the cuts to check that they are wide enough for the"} +{"id":"RedPajamaBook.0001","text":"Contents Title page Hostage Chapter 1 Chapter 2 Chapter 3 Chapter 4 Chapter 5 Chapter 6 Chapter 7 Chapter 8 Chapter 9 Chapter 10 Chapter 11 Chapter 12 Chapter 13 Chapter 14 Chapter 15 Chapter 16 Chapter 17 Chapter 18 About the Author Bantam Books by Louis L'Amour Copyright Page Excerpt from LAW OF THE DESERT BORN (Graphic Novel) HOSTAGE **A** NGER MADE BARDA bold, and the knowledge that this man, this bully, was trying to frighten her. \"If you lift a hand against me, I'll see you turned over to the troopers. They've known me since I was a child. I've been daughter and sister to them all! If you\u2014\" Pete Noble stepped back, staring at her. \"You think that scares me?\" His voice was harsh. \"I don't give a damn about them soldiers!\" Suddenly his eyes lighted, they looked odd, almost insane. \"How'd they know I done anything? I'll do what I want an' when they find you they'll think it was Injuns done it.\" He stepped toward her then, one hand reaching for her left wrist, the other for her waist. And she swung the rock. Barda McClean had been swimming and riding horses since she was a child, spirited horses that needed a strong hand. She swung the rock and she swung it hard. Too late he saw her arm come around; he threw up his arm as the rock hit just back of the temple. He staggered, and she swung it again, quickly, against the side of his head. . . . Chapter 1 **C** RISPIN MAYO HAD a wish to walk the high land with the company of eagles and the shadow of clouds, so he strode away to Bantry Bay and shipped aboard a windjammer as an able-bodied seaman. It was his first voyage on such a vessel, although he had fished upon deep water since childhood, and knew a marlinspike from a hickory fid before he was six. He jumped his ship in Boston Town and hied himself off along the dark streets, trusting no man and steering a course sheer of grog shops and the painted girls who lay traps for trusting sailormen. When the dawning came upon him he was beyond the city's streets and walking along country lanes with stone walls to left and right like there'd been at home in County Cork. He stayed shy of main-travelled roads for fear that if they found him they'd ship him home again, and he'd yet to see a mountain. So he begged a meal here, chopped wood for one there, and slept by the night in a haystack or a farmer's barn. And after sleeping in the barn, if he had an egg or two of the farmer's chickens, who is to blame him for that? After all, a large-shouldered Irish lad comes easy upon hunger. He had no blackthorn stick, so he cut one of oak from a fallen branch with a fine heft to it that lay handy to the road. If only one man came for him, or even two, he'd be after tearin' down their meathouse with his fists, but if they came against him in numbers the stick might be handy. Crossing a pasture once a bull came upon him, a bull with no taste for the singing of Ballinascarty songs, but he laid the bull flat with a blow between the horns and went his way a-singing. Somebody said while he listened that in a westward land they were building a railroad, and paying strong lads for the driving of steel, so he went that way and a hiring-man put him on a train. He sat royally upon the cushions then, and west he went with Paddy Gallagher, Tommy O'Brien and Mick Shannon riding beside him, bound for the end of track, wherever that might be, and nobody caring the least. The houses thinned out and the villages disappeared and when they had ridden the night through and day was come they were crossing a vast plain of grass, with the blue sky above and the train chugging down a fresh-laid track into a newborn land. All day they rode, and through the night and the day again, seeing only the grass, the sky, and far in the distance some woolly black cows, until a time came when the train clanked and squealed to a stop. The man in the blue suit and cap got down and walked slowly forward along the track toward a small building painted a dull red. It was very hot, very still, and the black flies buzzed about. Cris Mayo stepped down to stretch his legs and saw shade, so he walked yonder and sat beneath a cottonwood; and there the leaves brushed together, whispering stories to the wind, and Cris Mayo closed his eyes, liking the smell of the sun upon the grass and the sound of a trickle of water from somewhere close. He would get a drink before he boarded the train again, but first he would sit quiet for a moment. Far off he could hear voices calling in the shack, he heard the conductor swear, and sometime along there he closed his eyes, just for a bit. He opened them suddenly to a shrill whistle blowing, heard the grind of the train starting and came swiftly to his feet, sprinting for the track. He went up the slight bank, his feet slipped on the gravel, and he fell. The train was gathering speed. Swearing, he ran, but a fast forty rods only left him panting and the train disappearing, slowly drawing into itself with distance and the narrowing track. He stood staring and alone. Only the twin rails before and behind him, and the sky and grass large all about. He trudged down the track, walking back to the small station, a box of a place with a signal pole before it and a sidetrack alongside the main line. He wondered why they laid the ties so that a man could not walk upon them decently, but had to go a step and a half and then a step or so . . . arrah, a bothersome thing! It was hot, and there was nothing about but a bird, a meadow lark somebody had said; but with a fine sound to it, not like any lark he had heard, yet lovely still. The station was there, two windows facing him with blank eyes and a closed door\u2014why, in God's name, on such a hot day? He called out, but no one answered, his voice falling empty away from the dull red wall. Under his hand the door opened, and he spoke inquiringly into the room. A telegraph key chattered, chattered like the teeth of a frightened banshee. He walked in, leaving the door standing, but nobody was there, the room was empty. It looked empty, it felt empty, it was empty. The second room, for sleeping: also empty. The bed was unmade. How his old grandmother would have gone on about that, the middle of the day and the bed not made! A shocking thing, not to be believed. There was the station room with a bench for sitting, there was the bedroom with the unmade bed and a homemade washstand, and some old clothes on pegs. He stepped through the back door and stopped of a sudden, for there was the darkness of a stain on the stoop there, a stain of blood. Blood looks much the same when spilled in Skibbereen or in Boston or on the western plains, and Cris Mayo had seen a bit of blood in his time. Something or somebody had bled here, bled a sight more than was good for him. Yet when his eyes looked beyond there was nothing but the wide waving grass and the sky over it, with them meeting yonder, far off. All that empty land, he thought, and not a potato planted. A dreadful waste of soil. He went back within: a snug place for all it was only a shack, and built well against the winter to come. The instrument clicked angrily but he knew nothing of its operation. There was a chair beside it, and papers strewn all about the tiny desk with a pencil laid down as if the owner had just stepped away. Was there anybody here at all, then? Or had they found him injured and taken him aboard the train? What had happened to the man? Had he hurt himself, or been attacked? This was not Ireland, and Cris was a far piece from Clonakilty. There might be things here, deadly things, of which he did not know. The key was chattering, so he went to it and put his finger on it and chattered right back at them, a wild burst and then another. Silence\u2014utter, astonished silence. Then the machine erupted into a wild crescendo of sound, a quick, excited racket. When it was silent again, he touched the key just once. A short volley of clicks, then silence. He touched the key again. At least they knew that someone was here. When he was discovered missing from the train, they would surely know it was he who was at the station; yet would they come in time? For the first time he thought of eating and drinking. There must be something here, for the station agent or whatever he was called had to have supplies. He went into the bedroom and looked for food. It was there, of course. A couple of sides of bacon, a ham, jerked beef, dried apples, some coffee, flour . . . and there was a stove and a lamp. In the station room there had also been a couple of red lanterns. He wouldn't lack for light. He was getting up from peering into the lower part of the food box when he saw the rifle. It was on the floor, half under the bed. He picked it up carefully. It was almost new. When he worked the lever, it ejected a spent shell. There was a spot of blood on the floor near where the gun had lain, and what appeared to be blood on the stock. Building a fire in the stove, he made coffee, fried a dozen pieces of bacon, found some stale biscuits, and ate, sitting by the window with his eyes on the empty grass out there. When he had finished and washed the cup and plate, he tapped the key again. At once it sprang to life, chattering away with a will. It seemed to be asking questions, but he had no idea of how to answer, save with the single click. The sun was sinking, the sky a glory of color, the grass ablaze with red. He thought of the patch of blood by the back door and the vanished telegrapher. Snatches of conversation overheard on the train returned to trouble him. There was supposed to have been a signal on the pole near the track, and there had been none. He went to the door and looked down the track. Nothing. The twin rails merged and vanished. Right in front of the station there was a sidetrack that would take about two dozen cars; a small plank platform; a bench against the station wall. Sitting on the bench was a square box he had not noticed until now. He recalled seeing it in the car near where the brakeman sat. He tested the weight: heavy. Picking it up, he carried it into the station and put it down on the floor. Using a hammer that lay there with a few other tools, he opened the box. Ammunition. Bullets for the rifle. It was growing dark inside, yet he hesitated to light a lamp. What was out there? Was there anything? _Indians?_ The boys on the train had talked about them. Likely to scalp a man, they said, big, ugly devils, they said, all painted and screeching. They'd come sneaking through the grass with bows, arrows and tomahawks. Maybe the boys had only been trying to scare him. He wasn't afraid of any bloody red devils, not him. Not Crispin Mayo who had whipped those three lads from Dublin, whipped them all at once, and with bare fists. Thrashed them good, he had. And all because of a girl from Baltimore, that little seaport down the coast from his home in County Cork. He filled his cup again. The sun was gone, the sky was streaked with sullen red. A wind blew over the grass, a wind with the smell of far-off. He wondered what was out there, over the distant rim of the world from which the long wind blew. If he could work that instrument, he might get them to send a train for him. A train? For one Irish immigrant? Ah, not likely, that. He took up the rifle again, handling it gingerly. He had never fired a rifle, although he had heard much talk of it, had been told all about it by an uncle who had served in the French Army, and who, when drunk, persisted in going through all the instruction he had been given in the use of firearms. Cris heard it over and over, but whether Uncle Pat knew what he was talking about, he had no idea. How had Cris Mayo gotten into this fix, anyway? From fighting. Restlessness, fighting, and a blue-eyed girl with freckles on her nose. After he'd walloped the three Dubliners, he'd gone down to Skibbereen and fought the two O'Sullivans. Broad, fine lads they were, and quick with their fists, but not so quick as himself, nor so strong. He battered them, and all in good fun, too, but when he returned to his job he was discharged. Oh, he had seen that coming! They wanted to be rid of him from the moment he walked out with Barney Kinsella's daughter, her that another had set his eyes upon. They wished him gone, so when the excuse offered, they sent him packing. He'd started in to fish the waters off the Old Head of Kinsale, Rosscarbery, and the Bay of Glandore, to fish very seriously indeed; and it was the selling of fish that allowed him to put by a bit to start him on his own way. A rough enough time he had of it until he found himself aboardship. Then he'd been all right, because he was quick with his hands and a good man at rigging, splicing or handling sail; but most of the boys along the shores of Kerry or Cork could have done as well. Now he was alone here, in this far land, marooned in a tiny telegraph shack beside a railroad that went to nowhere. Westward they were laying track across the wide prairie, but the only place before them that he'd heard of was Hell-on-Wheels, the moving town at the end of the tracks. No, there was a fort, too, somewhere out there. He forgot its name. Black outside now . . . it was black with a storm coming and no stars. Leaves rustled and the grass bent before the wind. A sudden burst of that wind slammed against the walls and lightning flashed, once and again. Peering out the back window, he saw the rain coming in a solid wall, and _something . . . something else was there!_ Lightning flared once more. Something ghastly and white! Something rain-wet and walking, walking straight and stiff toward the shack! The blackness closed in and Cris Mayo stared, his throat gripped with superstitious terror. The lightning flamed, a sharp wicked stroke that struck somewhere near, and in its brightness the white thing lay sprawled on the grass not twenty feet from the shack: clearly, in that instant, a naked man. Fear forgotten, Cris Mayo slammed open the door and lunged across the stoop into the storm. Wind whipped at him, smashed his breath back down his throat, lashed him with sheets of rain. Head down, he plunged the few yards to the fallen man and his hands grasped the wet, cold body, half-dragging, half-carrying it in through the door. As he dropped it, a flare of lightning showed him what seemed two bulletholes, black and round, in the man's body. Shoving hard, he forced the door shut against the wind, and stood a moment to catch his breath. Then he struck a light and held it to the lamp's wick. Replacing the chimney, he carried the lamp into the room where the bed was, then returned for the man. With a dirty towel he wiped him dry, then covered him with the bed's blankets. He filled a kettle and put it on the stove to heat. He found a packet of tea in the cabinet and filled a pot. There was little enough he knew about wounds, but he'd heard it said that tea was good for shock, and certainly it was good for a man as wet and cold as this one. Rummaging around, he found a bottle of whiskey, and put it by. The man's skull was a mess. He'd been horribly beaten about the head, and shot twice. One of the bullets had gone through. The other must be someplace inside him. Obviously, he had been stripped and left for dead. Indians? The man's scalp was not taken, and Indians would surely have burned the shack and taken what else they wanted; yet who else would want to rob a poor man such as this? And where were they now? Miles it was, many miles, to any place a man other than an Indian was likely to be. How and why had they come to this empty spot? Such a far place, and then not even to take his rifle or food? It made no sense. Was this man the missing station agent? And why a station here at all? Of course, there was a spring yonder, and a well near the house, and it might be that they planned a water tank here. Cris had not really searched the place, but now he did it. The first thing he found was a pistol with an old worn scabbard that had seen use and much care, and belt for ammunition. He thought for a moment, shrugged, then belted on the gun. He had never used such a gun but he could at least fire it _at_ somebody. The man muttered unintelligibly in his delirium, then subsided. After a moment he sat up suddenly. \"Help,\" he said, \"help me.\" He looked at Mayo, but whether he saw him or not was a question. \"I've some tea, man. Drink it down now, I'm thinkin' it will help.\" The wounded man managed a couple of swallows. He lay down again, muttered, and slept. Cris made sure the man was covered, then blew out the light and with rifle and pistol at hand, sat down in a chair against the wall by the bedroom window and tried to relax. Thunder rolled, lightning flashed, and the rain beat against roof and wall and window, but Cris began to nod and closed his eyes. Through pounding rain a rider came from the night, lightning picking highlights from his glistening slicker, throwing deeper shadow under the turned-down hat-brim. The rider sat his restive mount, peering through the darkness at the station, then suddenly swung his horse and rode away. Crispin Mayo did not look out. He did not see the vanishing rider. Crispin Mayo was asleep. Chapter 2 **C** RIS MAYO OPENED his eyes to the gray of dawn, the silver rails before his eyes, the rain-wet grass stretching away forever. At first he sat still, looking through the window, remembering where he was, hearing the breathing of the man on the bed. Cris could recall no day when he had not risen before the first light. There had always been a furrow to plow, fish to catch, hay to stack, turf to cut. He liked the turfcutting best, for all the hard work it was. The poor layers on top must be laid aside to get at the black, brittle stuff that burned well, and that was always deep down. He got to his feet, stretching his stiff muscles and scratching his head. He glanced at the wounded man. His face was haggard, and his breathing ragged . . . if you could call it breathing. Cris went to the stove, found some glowing coals among the gray wood ash and fed in some bark shredded between his palms, then some slivers of pine. He added fuel as the flames climbed, replaced the lid and went to the water barrel. The spigot yielded only a few drops. Taking the wooden bucket, he went to the well and drew water. There was a tin dipper, and he tasted the water. It was good, a little brackish, but good. It needed a dozen trips to fill the barrel, and then he filled the bucket, for a man never knew when water would be needed and he had no wish to be without it. Anyway, it was the pattern of his life. If a bucket was empty, you filled it. If a woodbox was empty, you filled that, too. There were pink streaks in the sky. He looked slowly around. He had heard the trickle of water when he'd rested under the cottonwoods, so after a glance around, he walked to them. It was quiet there, among the trees, and there was a good bit of fuel and kindling to be gathered from the ground where limbs had fallen after windstorms. He found the stream, a tiny one, and followed it a quarter of a mile to a notch in the hills where it flowed from a crack under a slab of rock. Again he looked around, but there was nothing in sight or hearing, not even a bird. The wounded man was still sleeping when Cris walked back to the shack, so he fried bacon, made coffee, and ate. When he had finished the bacon he dipped stale biscuits in the grease and ate that. The coffee tasted good. Cris Mayo was a broad, powerful young man, five feet ten inches tall, weighing nearly one hundred and ninety. He had worked hard all his life and his hands were strong from the lifting and digging. As he drank his coffee he thought about what he must do. He knew from overheard talk that the end of track was far to the west and the nearest trackside settlement was over a hundred miles from here. Fort Sanders, that was the name! About forty miles west there was a slough from which the trains pumped water, but there was nothing there, nothing at all but the water and the cattails that surrounded it. He had no idea what he should do, or could do. He had no idea when there would be another train, for the trains carrying track-laying materials and supplies to the end of the line were few. It might be today, tomorrow, or a week from now. And it was a strange land in which he found himself, a land such as he had never seen. It was nothing like the cozy green hills of Ireland; only the endless grass stirring with the wind, and of course there was _that_ . . . the wind. It blew forever, softly, gently, but always, it seemed. He walked outside and looked through the dancing heat waves toward the horizon. Only those twin rails that melted together in the distance, and not even a cloud in the sky this morning. The storm had come suddenly, gone suddenly. Well, that at least was like Ireland, the abrupt weather changes. He went again to the wounded man, who appeared to be worse. He muttered, seemed to argue, to protest, none of it making sense. Cris Mayo listened and tried to think out what must have happened. Somebody had tried to kill this man . . . why? Not Indians, but somebody else. _Why?_ The man could have had nothing of value, and they had not robbed the station. Had the coming of the train prevented that? It could be, but then why had they not come back since? Or was there another reason than robbery? Something he did not know? Being an Irishman, he thought of politics. An Irishman is born to politics and to contention. There had always been contention with England, and often among their own people. The tribes and the septs had fought time and again. Was this something like that? Cris Mayo had never thought of himself as a bright man. He knew how to work and how to fight. He had acquired the ordinary skills that a working man knows, the easy ways to lift, the way to tip a barrel or a box, the way to rig a block and tackle for the best results. He knew something of his own country's history, but he knew nothing of America or the politics of it. There had been a war recently, of course he knew that. A war between the states over whether they should remain one country or divide into two, and slavery had been involved. He had no use for slavers. Ireland had had enough of that, as had most other countries. The Danes had raided the coasts of Ireland, as had the Algerians, for slavery had been a way of life the world around until men began to build machines to do the work for them. It was the same in Africa itself, he'd heard talk of that. Over there in the tribal wars they enslaved their prisoners or sold them . . . it had been that way forever, so far as he knew; and like as not, all over the world, too. Now the American war was over, and a good many Irishmen had died in it. He'd had acquaintances who had shipped over the sea to fight for the North, but with the war finished, there was little reason to believe that this muddle here had anything to do with it. So what then? A robbery? The men working on the railroad must be paid somehow, and the money must be shipped westward to where they were; so that might be it, but why kill the station agent? And strip his carcass? Wait now! Was the holdup to take place here? He thought of that and the logic of it appealed, yet several things disturbed him. Sitting staring out over the grasslands, he tried to think of how it might be done. That was important, but even more important was the getting away. That was the thing. It was one thing to get the boodle, another to get to where it could be spent. And where did one go from here? He had never seen a map of the country, and his only knowledge of it was from one of his companions on the train, Mick Shannon, who had been a soldier in the Army three years ago, and had served out here. To the south there was a stretch inhabited by Indians. America had friendly Indians in the eastern part, and wild, savage Indians in the west . . . which was right south of here. Beyond that was Texas, and from what he had heard of Texas, anything might happen there. To the north there were empty plains, with more Indians ready with their scalping knives. To the west somewhere were mountains. Where then would they go, if robbery was the idea? And what was more to the point, where were they _now?_ He was sorry he had thought of that, for they must be somewhere near, and that meant a camp, a base of operations, a place to wait until the train came. When he went to the wounded man again, his eyes were open and he was staring at the ceiling. Cris stood beside the bed and after a minute he said, \"I'll fix some broth. You'll be well to get something inside you, man.\" The man's eyes turned, and there was fear in them. \"I am Cris Mayo,\" Cris said. \"I got left behind when the train stopped. I was headed for the end of track to be a-helpin' with the liftin' of rails and the swingin' of hammers, like.\" He stirred the fire and shaved some beef jerky into the hot water he'd kept, and after a bit of stirring he carried it to the wounded man and spooned some of it into him. The man took half a dozen spoons and then shook his head weakly. \"You've been beaten,\" Cris said, \"and shot, and stripped.\" The man stared at him, his lips fumbling at words that wouldn't come. \"I found you out back.\" Cris pointed. \"You came up through the rain. It is in my mind that you were hauled away from here, hidden and left for dead. It was not Indians, I think?\" \"No.\" It was the first word. The man closed his eyes. Cris hesitated. The man should rest, but desperately he needed to know. \"Why?\" he asked. The man shook his head. Cris squatted on his heels. \"How many?\" he said. \"You'd best tell me. They might come back.\" The eyes opened. \"The train!\" he whispered hoarsely. \"Sherman!\" \"How many? Who are they?\" \"Ma . . . many. Nine, ten . . . more.\" The wounded man struggled to rise, got to his elbows. \"Call . . . must call! Help me!\" \"You lie down now. Take it easy, man. You'll be needing rest. There's time\u2014\" \"No! No time! The train!\" \"Is it a holdup?\" \"Sherman . . . it is Sherman.\" The man's voice trailed off and he fainted, falling back upon the bed. Sherman? He knew nothing of outlaws in the west. Whoever this Sherman was, he had the telegrapher scared. Mayo walked from front to back, staring out at the grasslands. They were returning, a lot of them, and they'd try to stop the train . . . but when? When was a train coming and why did they want to stop it? \"Crispin Mayo,\" he said aloud, \"this is no affair of yours. Get out of here, hide down yonder where the trees grow. You have no part in this. You came over from County Cork to lay track, and you'd best be at it, and nothing else at all.\" Yet he was not a callous brute, he could not leave a wounded man who needed care. He went to the telegraph key and banged away on it, but this time there was no chattering response, no sound at all. He tried again . . . nothing. He took out the pistol and examined it, looking to the loading of it. After a time he figured the weapon out. He walked from door to door staring outside, but there was nothing. It was hot and very still. He took off his black coat. It was growing shabby. He combed his hair in front of a piece of broken mirror. His hair looked black when wet down, but was actually a very dark red, something you couldn't see unless it caught the sun. He wore a candy-striped shirt and sleeve garters. His arms bulged with muscle, the kind they could use out there, laying track. He wiped the dust off his heavy brogans and tried to brush his pants clean. Then he looked out the doors and windows again. It was very hot, and very still. He stared toward the relative coolness of the cottonwoods, but dared not leave the station. He looked down at the pistol he was wearing and strutted a little. If they could only see him now! If only Maire could see him! He went back inside and rummaged about for something to read. He found a newspaper, several weeks old, and a book by Oliver Optic that was quite new. It was called _Brave Old Salt_. He opened the paper. Advertisements for patent medicine, the Sioux on the rampage in Dakota, and somebody named Rowdy Joe Lowe had killed a man: his second, some said, others claimed it for his third. A young girl lost with two children . . . he tried the silent telegraph key again, but there was no response. Walking outside onto the platform, he stood alone in all that vast and empty silence, staring along the tracks. His eyes followed the wires. As far as he could see in either direction they seemed intact, but he knew they had been cut. And the notion began to grow in him that if you wanted to stop a train, then just to make sure it stayed put you'd tear up a bit of the track farther on. Out of the tail of his eye he caught movement, and turned. Far out on the grass, a black dot. Then there were two . . . no, there were four . . . five. They came in dozens then, huge things with shaggy heads. Big, black cattle they were, like none he'd seen before, and all matted from rolling in the mud. All day long they kept coming, some of them brushing against the shack, and when night lowered they just bedded down where they were, paying no mind to the building or the men inside it. Little it was that Crispin Mayo slept that night, for the great creatures muttered and moaned, sometimes their horns clashed, and several times one arose to stretch and scratched himself so vigorously against the corner that the shack rocked on its base. It was after midnight when the wounded man awakened, and Cris sat down by him. \"It's all right now. It's a grand hearty lad you are, and you'll be up and about soon.\" The muttering stopped, and clear and sharp the voice said, \"Who is it? Who is there?\" \"It's me. The Irish lad left behind by the train.\" \"Train!\" His voice shrilled until Cris feared he would frighten the beasties out yonder. \"It's the train they're after. It's murder they plan!\" He muttered, cried out loudly a time or two, and only the fact that the great herd of beasts was now lying several hundred yards away kept them from milling about and perhaps knocking down the little station. Cris Mayo paced the floors of the two rooms. All was still. He was worried, knowing nothing he could do for the wounded man, and no way in which he could tell anyone of the trouble they were in. He could only wait for the next train to arrive and hope that the man would live that long, and that the bad ones, whoever they had been, would come no more. He sat on the floor, his back against the wall, but could not sleep. Hours later he was startled by a shot. He lunged up from the floor, then dropped to his hands and knees, groping for the rifle. Suddenly, some distance off, there was another shot, then a thunder of hoofs. He threw open the back door and by moonlight he saw them coming. Rushing out, he waved the red lantern he had kept lit in order to stop any train that might come through, and he shouted. Then, drawing the pistol, he fired it at the approaching mass. A big bull went to his knees not thirty paces off, started to scramble up, but another shot dropped him. Cris fired again, saw another stumble but recover. Waving the red lantern and shouting, he managed, with the help of the fallen bull, to turn some of them. Backing up, he paused at the door to fire again. He scored, and a second animal fell. Holstering the pistol, he grabbed the rifle from its place by the door, and wasted at least six shots that had no effect on anything. A big bull leaped one of the fallen animals, hit the corner of the station with a shoulder, jarring it to its foundations, then charged on. Again he fired, point-blank, but the beast crashed by as though Cris had but breathed in its face. The herd thundered on, parted now by the fallen bodies as well as by the building. Cris fumbled with the pistol, reloading it. When he looked through the door into the other room the wounded man was up on one elbow. \"What is it?\" he asked. \"Those black cows. They rushed upon us after somebody shot at them.\" The man lay back down. \"Buffalo. They're buffalo. The building shook. I thought it was going.\" The man lay still, breathing hoarsely. \"Who are you?\" \"The train left me. I told you.\" \"Can you handle a key? We've got to send word.\" \"I can't, but it makes no difference. The wire's destroyed and silent. I think it was cut.\" \"Likely. Likely they've torn up some track, too.\" \"It was my own thought,\" said Cris. \"Who is it behind the trouble? Is it you they're after?\" \"No.\" He looked at Mayo, trying to make up his mind. This man was a stranger, yet he looked like what he said he was. He wore a square derby, a shabby but neatly brushed suit, heavy brogans. Certainly he was no Western man. \"They're a bloody lot of renegades. They're going to take the train. I heard some talk after they'd caught me in bed and beat in my skull, and thought I was dead.\" He paused. \"They shot me out back there, when they found I was still alive, and dragged me a ways off to hide me. They want to kill somebody on the train, and I believe it's General Sherman.\" \"Why, is he important?\" \"He is. And he led the march from Atlanta in Georgia to the sea, burned plantations, tore up railroads, wrecked the country; but it broke the back of the South and helped to end the war.\" \"Is he on the train?\" \"They think so. He's supposed to be coming west. It's an inspection tour, or something of the kind.\" The wounded man closed his eyes and lay still, thinking. There was nothing he could do, no matter how much he worried over the situation. If the wires were down . . . and he had heard no sound from the instrument . . . they were helpless. Nor had he any idea just where or how the renegades hoped to seize the train. He tried to run over the possibilities in his mind, and he was still thinking of it when he fell asleep. Crispin Mayo went to the door and peered out. It was very dark. There were stars enough, and he could see the dark bulk of the two buffalo he had killed. They represented meat, and as he looked at the hugeness of them he thought briefly of what such a vast mound of food would have meant to him at various times in the old country. There he would have known what to do, what to do about everything; but all was strange here. The menace of \"they,\" whoever they were, worried him. He had no part in this fight, and wanted no part in it. They had tried once to kill the man within, and when they stampeded the buffalo they were probably meaning to wipe out all trace of the telegrapher and perhaps of the station. But what had that to do with Cris Mayo? The few moments of mental clarity on the part of the agent had helped him none at all, and it was gradually coming to him that nothing was going to help. He was caught in the midst of something that could mean the death of him and of all those fine dreams of going home to Maire Kinsella with her pert nose and freckles. Ah, those fine, foolish dreams! He had thought to return wearing fine clothes, with a great golden ring on his finger, and driving a flashy pair of blacks . . . he'd show them! Well, now he'd be lucky if he got out of this alive. He would fight. Naturally he would fight. It was never truly in his mind to do anything else, however he grumbled over it. That was the only way he knew, and he looked at the great dead black beasts yonder with a kind of pride. He had fired at them, and he had hit them. At the same time a wary little something in his mind warned him that they had been coming in a mass and how could he have missed? _Be sensible, boyo_ , he warned himself, _do you not be betrayed by a bit of luck_. Morning came again, and with it a renewed sense of vastness, of the enormous dome of the sky, of the sweep of the endless grass bowing before the wind. He recalled his village in Ireland, which could be dropped into this grassland and lost. Indeed, the whole of Ireland could be lost here. He backed away from the thought, and glanced around the shack's rooms, where things were small, confined, easily understood. When he looked outside, the sheer size of it all overwhelmed him, yet there was also the fact that the soil was good. He had run it through his fingers . . . you could grow barley here, or rye or wheat, and you could grow potatoes. . . . He was looking at the wounded man when he heard the pound of hoofs coming. His pistol was belted on under his coat, the rifle stood by the door. He walked to it, started to step outside, and then did not. Why let them know he was alone? Or that he was there at all, till it came to the moment of necessity? There were three; unshaven, dirty-looking men, one of them in an ill-fitting gray uniform coat like those that (Mick Shannon had told him) the Confederates had worn. They drew up a few yards off, seeing the faint smoke from the chimney. They looked at the dead buffalo in the space behind the station, and then one of the men rode a slow circle around the place. Mayo held himself out of sight, and waited. Finally one called out, \"Hallo, there!\" Mayo crouched near a window, watching them, but did not reply. They called again, and then one started forward, but another called him back. \" . . . dying,\" Cris caught the one word, and then, \" . . . you saw . . . got to be.\" There was more talk, of which he could distinguish nothing, and after a moment the three turned their horses and rode away to the east. He watched them go, and only when they had been gone for several minutes did he rise from his crouch. He found a butcher knife and went outside to cut up a buffalo. Butchering was no new thing, for at home in Ireland they often slaughtered and dressed their own animals. Inside, he hung some of the meat, then began frying a steak. He scowled, trying to think what he should do. These men who had nearly killed the telegrapher-agent would surely kill him and Cris both, if given the chance, and perhaps anyone who was on the train, too. He knew nothing of Sherman, but they'd no right to gang up on the man. What could Cris do? A thought came to him, and he puzzled over it, considering all aspects. In the heap of tools he found a shovel and a scythe, and went out across the tracks and cleared a wide space in the dry grass. In the center of it he piled some of that grass, then took a chance and went to the cottonwoods for small branches, bark, and dried wood. With these he prepared the makings of a fire. From a stack nearby he dragged some railroad ties . . . sleepers, some called them. The roof of the shack had been covered with tar paper and there was some left, fragments and trimmings. He gathered this and took it inside, where it at least would remain dry if there were a sudden shower. He lit several of the red lanterns, and kept them lit. The oil from one of the others he poured over his kindling, and some of the ties he placed near enough to throw on the fire once it started, if so be it that it ever started at all. The place he had chosen for the fire was across the main line and the sidetrack from the shack\u2014he did not wish to risk burning himself out\u2014and upon slightly lower ground. From the window it was invisible. He ate his buffalo steak and found it not at all bad. He went inside, but his patient was asleep. Cris Mayo sat down on the chair near the useless telegraph key and stared out at the empty plains, feeling lost and lonely. He was tired from nights with little sleep, worried about the hurt man and about the renegades. That they would come back he had no doubt. Finally, bored with nothing to do, he pulled out the drawers of the desk and ruffled through the papers he found there. One of them was a map like none he had ever seen before, but finally he realized that it was a cross section of the roadbed, indicating, among other things, elevations. As he was about to push the map away, he saw something that stopped him. East of the cottonwoods the railroad started to climb; and level as it looked, it actually had a definite grade. He recalled then that the locomotive had slowed some time before they reached the station, until when it passed the cottonwoods it was moving scarcely faster than a man could walk. From there on, according to the figures, the railroad levelled off for some distance. If riders were going to catch up to a train and board it, that would be the place, where the train had slowed to a walk. He had no doubt they knew all about that and had planned for it. There were soldiers to the east and to the west, and these renegades would know that once word reached them of General Sherman being taken from the train there would be pursuit, pursuit far beyond anything ever tried on the Western plains. So what then? If they were desperate enough to attempt such a thing they must be prepared for a fight, but undoubtedly they also had planned an escape. That meant they would need time, and that meant first that the telegraph line be put out of action, and second that the train be unable to carry the news, because of the tracks being ruined or the crew killed. This would give them perhaps a few days of flight, in which they might scatter to reassemble elsewhere. He butchered as much of the meat as he could, then tying a piece of rope to the carcass he tugged and pulled until he had hauled it away out of smelling range. The other was too heavy, so he had to let it lie there for a time until he could find some other means to be rid of it. Crispin Mayo turned again to the plains and stopped, staring. A rider with a led horse was coming toward him. The led horse dragged something behind it. He stood waiting, standing very still. The rider came on toward the station, and he saw it was an Indian woman, a woman with a small child. The led horse dragged two poles behind it, the ends trailing through the grass. She drew up when she saw him. She looked from him to the buffalo. \"Eat,\" she said, indicating the child and herself. \"Sure,\" Cris said. \"I got some grub inside.\" For the first time he saw there was a man lying on a blanket across the poles, an Indian man. His eyes opened when Mayo came toward him and he made a slow move toward a tomahawk in his belt. \"Lay off,\" Cris said, waving his hand, \"you'll not be needin' that. We got one hurt man already.\" The woman had been watching him, and he turned to her. \"One inside,\" he said, \"hurt.\" She took her baby from the saddle and dismounted. She started to build a fire and he shook his head, pointing inside. He waited while she went in; shortly she returned, cut meat from the second buffalo carcass, and went back inside. Cris got a dipper of water from the well and brought it to the injured Indian. After a cautious moment the Indian accepted it and drank thirstily, so Cris went for another dipper, and the Indian drank that too. There was a trough at the"} +{"id":"RedPajamaBook.0002","text":"LUKE JENSEN, BOUNTY HUNTER BLOODY SUNDAY WILLIAM W. JOHNSTONE WITH J. A. JOHNSTONE PINNACLE BOOKS Kensington Publishing Corp. www.kensingtonbooks.com All copyrighted material within is Attributor Protected. Table of Contents Title Page CHAPTER 1 CHAPTER 2 CHAPTER 3 CHAPTER 4 CHAPTER 5 CHAPTER 6 CHAPTER 7 CHAPTER 8 CHAPTER 9 CHAPTER 10 CHAPTER 11 CHAPTER 12 CHAPTER 13 CHAPTER 14 CHAPTER 15 CHAPTER 16 CHAPTER 17 CHAPTER 18 CHAPTER 19 CHAPTER 20 CHAPTER 21 CHAPTER 22 CHAPTER 23 CHAPTER 24 CHAPTER 25 Turn the page for an exciting preview! Copyright Page CHAPTER 1 Some people said that a bullet going close past a man's ear sounded like a hornet, but Luke Jensen knew better than that because he had heard plenty of them. What it sounded like was a bullet coming too blasted close to blowing his brains out. He kicked his feet free of the stirrups and left the saddle in a dive that landed him on the hard ground with a jolt he felt all through his body. He was getting too old for this, he thought as he rolled behind a rock barely big enough to give him any cover. Another slug ricocheted off the rock with a wicked whine. Luke hadn't been expecting trouble, so he hadn't been riding with his Winchester across his saddle's pommel as he did when he knew hell might start to pop. Nor had he had time to drag it from its sheath as he was diving off the dun's back. That meant his only weapons were the twin Remington revolvers he carried in cross-draw holsters and a sheathed knife on his left hip, just behind the gun on that side. None of them were any good for distance work. He thought back a few seconds to the moment when he had spotted a glint of reflected sunlight on top of a sandstone bluff in front of him. That warning had barely had time to register before the bullet buzzed past his ear. The bluff was at least a hundred yards away. The Remingtons wouldn't carry that far, not with any degree of accuracy, anyway. Luke looked to his left. The dun had bolted off in that direction, spooked not so much by the gunfire as by Luke's reaction to it. The horse, like Luke, was accustomed to violence. In one sense, they were partners in the bounty hunting business. Another shot rang out in the hot, still air. It hit just in front of the rock and threw up a shower of dirt and grit that spilled over into Luke's face. He lowered his head and muttered a curse as he blinked. He had no idea who was trying to kill him or how he was going to get out of this. A frown creased his forehead as a quick spattering of gunshots followed the latest crack of the rifle. Somebody else was horning in on this fight, which was fine with him. He could use the distraction. He surged to his feet and ran toward the dun. No more slugs ripped the air around him. He grabbed the horn, went into the saddle in a hurry, and leaned forward over the horse's neck to make himself a smaller target as he kicked it into a gallop. A cloud of dust boiled into the air near the bluff ahead of him. It headed to his right, telling him that a group of men on horseback were fleeing in that direction. He hauled the dun's head around and rode hard to intercept them. The bluff hemmed them in. Luke caught sight of four or five men as their mounts raced through the chaparral along its base. More men rode along the top of the bluff and fired down at the fleeing riders. The fugitives tried to veer away from the rise, but Luke had the angle on them from that direction. He had the dun's reins in his left hand. He used his right to draw one of the Remingtons and thumbed off a pair of shots. He didn't hope to hit anything but rather to herd the riders back toward the bluff. So he was surprised when one of the men threw his arms in the air and pitched from the saddle in an obvious death sprawl. Luke didn't like killing a stranger when he didn't even know the reason for it, but one of this bunch had been the rifleman who nearly put a bullet through his head, so he wasn't going to lose a lot of sleep over it. He fired again. Without any warning, the four men who still fled abruptly disappeared. Luke didn't have any idea where they had gone until he drew closer and saw a dry wash twisting away across the West Texas landscape. The wash gave them the cover they needed to get away from the men on top of the bluff. Those men reined in and continued firing rifles and handguns toward the arroyo, but they were shooting blind. The bluff was too steep here for them to get their horses down. Luke thought about pursuing the men into the wash, but he decided there were too many places where they could stop and ambush him. Instead, he turned his horse and rode toward the man he had shot, who still lay motionless on the ground where he had landed next to a scrubby mesquite bush. As he brought the dun to a halt not far from the dead man, somebody hailed him from the top of the bluff. \"Stay right there, mister!\" the man called, then disappeared as he turned his horse away from the rimrock. Luke didn't like being told what to do, but he was curious about what had happened here and waiting for the others to join him seemed like the quickest, easiest way to find out. As long as they didn't start taking potshots at him, too. He swung down from the saddle and left the dun's reins hanging. The man he had shot lay on his side in a pool of blood that the thirsty ground would soon soak up. Luke could see part of the hombre's face as he approached. He slipped one of the Remingtons from its holster just in case, even though he was convinced the man wasn't playing possum. As a bounty hunter, Luke had seen more outlaws than he liked to think about. This man fit the type. He wore rough range clothes and had a beard-stubbled face that bore marks of dissolution. As far as Luke could remember, he had never seen the man before, either in person or as a likeness on a wanted poster. The men in the second bunch must have found a way down off the bluff. Luke heard hoofbeats and looked up to see them riding toward him. He kept the Remington in his hand but let it hang beside his leg as they approached. This group consisted of eight men. They reined in when they were about twenty feet away and watched Luke warily. One man walked his horse forward to close the gap between them. His hand rested on the butt of the gun holstered on his right hip. Luke understood why they were being cautious. He was a stranger to them, and a heavily armed one, at that. Dressed in black from head to foot, his hat, clothes, and boots were covered with a layer of gray trail dust that showed he'd been traveling for quite a ways. His craggy face and dark, narrow mustache gave him a somewhat sinister air. He looked like a bad man to have for an enemy. That much was true about him, anyway. What didn't show was the real nature of the man. Luke Jensen was a bounty hunter, a ruthless man-hunter, and a dangerous foe, no doubt about that. He was also a very well-read man who knew the classics, who enjoyed a fine cigar and a snifter of cognac, who was just as much at home in an opera house as he was in a trail town saloon. He carried the scars of a violent life on his body and the scars of a tragic past on his soul, although he wasn't the sort to brood about either. But none of the cowboys confronting him now with their guns ready for trouble knew about any of that, so he just gave their apparent leader a noncommittal nod and said, \"Howdy.\" \"You're on MacCrae range, mister,\" the man said. \"Mind telling me who you are?\" \"I assume you have a right to ask that question?\" The man grunted and said, \"Damned right I do. I ramrod the crew. Name's Gabe Pendleton. Now, I've told you who I am, so I'd appreciate it if you'd return the favor.\" Pendleton was a stocky man with a thatch of straw-like hair under his battered brown hat. His eyes were a washed-out blue, Luke noted, and at the moment were narrow with suspicion. \"I'm Luke Jensen,\" Luke introduced himself. He was used to people asking him if he was related to Smoke Jensen, the famous gunfighter. As a matter of fact, he and Smoke were brothers, although Luke didn't go out of his way to publicize that relationship. He had made plenty of enemies of his own without having everybody with a grudge against his brother gunning for him, too. \"What are you doing here?\" \"I was riding along minding my own business when somebody on top of that bluff started shooting at me. Whoever it was had me pinned down. Then you and your friends came along and rousted him out, and he and his friends lit a shuck. I owe you some thanks for that, by the way.\" Luke shrugged. \"Now you know as much about this dustup as I do. More, I would guess.\" Pendleton nodded toward the dead man and asked, \"You know who that is?\" \"I never saw him before,\" Luke said. \"We don't mean you any harm. How about pouching that iron?\" \"I'd be glad to . . . as soon as you and these other men take your hands off your guns.\" Pendleton jerked his head in a command, and the other men relaxed and lifted hands from gun butts. Luke slid the Remington he held back into its holster. Pendleton motioned to his men and said, \"Take a look at that hombre and see if any of you know him.\" He dismounted, and the others followed suit and gathered around the corpse while Luke and Pendleton moved to one side. One of the cowboys said, \"I think I've seen him before, Gabe, maybe in one of the saloons at Painted Post, but I don't know his name.\" \"His name don't matter,\" another man said. \"All that counts is that he works for Harry Elston.\" Pendleton said, \"We don't know that for a fact.\" That brought a snort of disbelief from the man who had just spoken. \"Who else would be out here usin' a runnin' iron on our critters?\" the man wanted to know. Pendleton just grunted and didn't have any other answer for the question. A swift, sudden rataplan of hoofbeats would have kept him from replying, anyway. The sound made all the men look around, including Luke. He saw a single rider coming toward them on a big white horse. \"That looks like the boss,\" one of the men said. \"Yeah,\" Pendleton agreed. A nervous expression appeared on his face. The owner of this ranch must have been a real fire-breather to have that effect on the tough foreman, Luke thought. From everything he had heard about Sam MacCrae, that was the case. But the newcomer wasn't the old Scotsman, Luke realized a moment later. The rider's faded blue shirt hugged curves that were undeniably female. Luke spotted long, black hair that was pulled back and tied in a ponytail that hung down the woman's back. She wore a flat-crowned black hat with its neck strap tight under her chin. When she reined her mount to a halt and swung down from the saddle, Luke saw that she wore a divided canvas riding skirt as well, which explained how she was able to ride astride the way she did. She led the horse toward them. She didn't walk like a man, but there was nothing mincing or affected about her stride, either. \"I saw the branding fire, Gabe,\" she said. Pendleton nodded and said, \"Yes, ma'am.\" Luke noticed that the foreman had moved so that he stood between the woman and the man on the ground. It didn't do any good, because she asked, \"Is that a dead man behind you?\" \"Yes, ma'am, but you don't want to be looking at him.\" \"Is he one of our men, or one of the rustlers?\" \"He's not one of us,\" Pendleton said. \"Let me have a look.\" Pendleton hesitated. Clearly, he didn't want to expose her to the sight of a grisly corpse. Luke's bullet had ripped through the man's torso from side to side, and there was a lot of blood on the ground around him. The woman wore a determined expression, though, so after a few seconds Pendleton gave a tiny shrug and stepped aside. The woman came forward a few steps to peer down at the dead man. Her face went pale for a second under its healthy tan, but her expression remained steady and composed. She shook her head and said, \"I don't know him.\" \"None of us do,\" Pendleton told her, \"although Chuck said he might've seen the man in one of the saloons in Painted Post.\" \"That doesn't mean anything. It's the closest place for Harry Elston's men to drink.\" \"Yeah, that's true.\" The woman turned her head to look at Luke. She said bluntly, \"I don't think I know you.\" \"This fella is the one who downed that rustler,\" Pendleton explained. \"The way I figure it, a couple of them were working the branding fire while two more drove our steers up. They put one man up on top of the bluff to keep a lookout and make sure they weren't disturbed. When Jensen here came along, the sentry got spooked and started shooting. The boys and I heard the shots and got here as quick as we could.\" \"Mr. Jensen, is it?\" the woman said to Luke. \"That's right,\" he said. \"Luke Jensen.\" She wore riding gloves, but she used her left hand to pull the glove off her right and then stuck it out like a man. \"I'm Glory MacCrae,\" she introduced herself. Luke shook hands with her, and as he did he thought that she had just confirmed what he already suspected. She was the woman he had come here to find. The woman who had a price on her head for murder. CHAPTER 2 It had started a few weeks earlier in San Antonio, where Luke had brought the body of an outlaw named Joe Jack Talcott. Luke had caught up to Talcott at a road ranch between Schulenberg and San Antonio and gotten the drop on him\u2014or so he'd thought\u2014while the outlaw was in bed with a soiled dove named Juanita. What Luke didn't find out until later was that Juanita's brother, who was something of a desperado himself, had been gunned down by a bounty hunter a couple of years earlier, so when Talcott, with his hands up and his long underwear down, had paused in his cussing long enough to call Luke a no-good bounty hunter, Juanita had gone loco. Practically spitting fire, she had rolled out of the sheets with a flash of sleek, golden-brown skin and grabbed a bottle of tequila from the little table beside the bed. She flung it at Luke's head, and her aim was good. He had to throw his left arm up to block the bottle. The next instant, Talcott crashed into him, desperation prompting the outlaw to try a diving tackle despite the fact that Luke's gun was still pointed in his general direction. The Remington had gone off as the collision drove Luke backwards off his feet, but the bullet missed Talcott and tore through the oilcloth shade over the room's single window instead. Outside, it creased the rump of one of the horses tied at a hitch rack and set off an explosion of bucking and squealing that spooked the other mounts and made them jerk their reins loose and stampede away. While that was going on, Luke was locked in a deadly struggle with Joe Jack Talcott. The outlaw got a hand on the barrel of Luke's gun and tried to twist the weapon around so that it pointed at its owner. Luke resisted that effort. Juanita came up and tried to kick him in the head with a bare foot. Actually, she was bare all over, which was very evident from Luke's vantage point on the floor, although he was in no position, physical or otherwise, to appreciate the view. After jerking his head out of the way of Juanita's foot a couple of times, he grabbed her ankle with his free hand and heaved. She went over backwards and landed hard enough on her rump to knock the breath out of her and take her out of the fight for the moment. Luke balled that hand into a fist and slammed it a couple of times into the side of Talcott's head. The outlaw's eyes glazed over. He lost his grip on Luke's gun and Luke shoved him away. Unfortunately, Talcott rolled within reach of his Colt, which rested in a holster attached to a shell belt hung over one of the posts at the foot of the bed. He regained his wits enough to make a grab for the gun, even though Luke yelled for him not to do it. The Colt slid out of leather and Talcott started to swing it up. Luke shot him in the chest. The Remington boomed three times and made Juanita scream and clap her hands over her ears. The first shot probably killed Talcott instantly, but Luke knew there was nothing worse than thinking some varmint was dead and then finding out that he wasn't, so he put two more slugs into the outlaw, each within a few inches of the blood-pouring hole where the first bullet had struck him. With the Colt still in his hand, Talcott sagged sideways on the floor. Luke pushed himself onto one knee, then onto his feet and took a step back so he could cover Talcott and Juanita at the same time. Neither appeared to be a threat anymore. Talcott was dead and Juanita was curled up in a ball, sobbing in fear. The fella who ran the place came in the door with a shotgun. He was a fat, bald-headed gent named Edwards with a long gray beard that hung down over his chest. Luke was ready to shoot him, too, if need be, but Edwards quickly pointed the shotgun at the floor and backed off. \"Take it easy, mister,\" he said in an urgent voice. \"Just take it easy.\" After that it was just a matter of explaining everything and showing Edwards the wanted poster with Joe Jack Talcott's picture on it. The proprietor insisted that he hadn't known the man who had taken Juanita into one of the rooms was really a wanted killer. Luke didn't know whether or not Edwards was telling the truth and didn't really care one way or the other. The only ones who were really upset were the men whose horses had run off, and after taking a look at Luke they appeared to decide it wasn't worth raising a ruckus over. All that was left was getting some clothes on Talcott's corpse, throwing it over the saddle on his horse, lashing the dead outlaw in place, and taking him to San Antonio. The State of Texas had placed the bounty on Talcott's head, so Luke figured the easiest way to collect would be to turn the body over to the Rangers. That was how he came to find himself in the office of Major John B. Jones, the head of the Frontier Battalion. The major didn't seem to be overly fond of bounty hunters, but what Luke did for a living wasn't illegal and there was a reward for Talcott, dead or alive, so Luke had $800 coming to him. \"Next time you should just take the body to the nearest undertaker and get a local lawman or other official to vouch for the fact that you brought him in,\" Jones said. \"You didn't have to haul Talcott all the way here to San Antonio.\" \"The place where I caught up with him was halfway between here and Schuelenberg,\" Luke explained. \"I thought I'd probably get my money faster if I brought him to you.\" Jones grunted and said, \"The money's all that matters to you, isn't it?\" \"Talcott's killed three men in the commission of his crimes, that we know of,\" Luke pointed out. \"There's a good chance he's also the one who burned down that store in Hallettsville after it was robbed, and the bodies of two more men were found in the ashes. I'd say it's a pretty good thing Talcott won't be around to keep on robbing and killing, because I don't think he planned on stopping anytime soon.\" The bearded ranger inclined his head in acknowledgment of Luke's argument. \"I'll have the voucher for your reward drawn up right away,\" he said. \"You can come back by the office and pick it up later this afternoon. Take it to any bank in San Antonio and they'll honor it.\" \"I'm obliged to you.\" Luke nodded toward a stack of papers on Jones's desk. \"That looks like a bunch of new wanted posters.\" \"Already thinking about where your next payoff is coming from, eh?\" Jones shoved the reward dodgers toward Luke. \"You can take a look at them, but don't carry any of them off with you. My men haven't even seen them yet.\" \"Obliged again,\" Luke said as he picked up the stack. The first dozen posters he flipped through were the usual motley assortment of bank, train, and stagecoach robbers, rustlers, horse thieves, backshooters, and rapists. Many of them were illustrated with crude drawings of the wanted men, and a few didn't have pictures at all. But then Luke came to one that made him pause as his eyebrows rose in surprise. He said, \"What do we have here?\" \"What?\" Major Jones asked distractedly without looking up from the paperwork he had already gone back to. Luke turned the reward dodger around and held it out so that Jones could see the picture on it. This was a photograph, not a drawing, and the portrait was of an undeniably beautiful young woman with dark hair. Jones grunted as he leaned forward to take a look at the wanted poster. He started rummaging through some of the papers on his desk as he said, \"I think I've got a notice about her somewhere here. Yeah, there it is.\" He handed a couple of pages to Luke. One was a letter from the chief of police in Baltimore, Maryland, asking the Rangers to be on the lookout for a fugitive, and the other was a report from a Pinkerton Detective Agency operative. \"Gloria Jennings,\" Luke mused as he studied the documents. \"Wanted for murder. That's a little unusual, isn't it?\" \"You've never hunted down a female killer before?\" \"Actually I have, several times, in fact. But it's still not all that common. I see here that she murdered her husband.\" \"Alfred Jennings,\" Major Jones said. \"A rich man, considerably older than Mrs. Jennings, who was his, ah, second wife.\" \"Funny how often it happens that way,\" Luke said. \"This says that Jennings had interests in banks, warehouses, even a shipping line. He must've had a lot of money.\" \"Less when his wife got through with him. In addition to the murder, there's a hundred thousand dollars missing.\" Luke let out a low whistle. \"I suppose that's why the family can afford to post a five thousand dollar reward.\" The amount of the bounty was the second thing Luke had noticed, the first being the fact that Mrs. Gloria Jennings was an exceptionally good-looking woman. Most of the time he brought in outlaws who were worth less than a thousand dollars, like Joe Jack Talcott. He made a decent living doing that, but most likely he would never get rich at it. He tapped the detective's report and said, \"It says here the Pinks tracked her to Fort Worth.\" \"That's right, and while she was there she boarded a train bound for San Antonio.\" \"Do you know if she ever got here?\" \"I have no idea,\" Major Jones said. \"I'm not a Pinkerton detective or a bounty hunter. I've got a big stretch of country between here and the border to ride herd on. I can't go out looking for one fugitive who hasn't committed any crimes in Texas that I know of, and my men can't, either. I'll make sure they know about Mrs. Jennings, in case they happen to run across her, but capturing her isn't going to be a priority.\" \"How long ago was this?\" Luke asked. \"The dates are on the paperwork.\" Luke looked at the documents again, then said, \"She killed her husband and vanished from Baltimore almost a year ago. This report saying she was in Fort Worth is almost eight months old. You're just getting a wanted poster on her now?\" \"I don't have any control over when those things are sent out,\" Jones said testily. \"Paperwork takes a long time.\" \"Why were these documents still on your desk?\" \"They weren't. I had a vague memory of the case, so I had my clerk go through the files and pull them out after I saw the lady's picture on the poster. I wanted to refresh my memory on the details.\" Luke grinned and said, \"You wanted to know more about the pretty lady.\" \"If we're done here, Jensen . . .\" Luke tossed the documents back onto the desk and stood up. He would have liked to take them with him, along with the reward poster, but he had a good memory for facts. And for faces as well, when they were as attractive as the one belonging to Gloria Jennings. \"Since this particular fugitive isn't a high priority of yours, I don't suppose you'd mind if I took a shot at tracking her down, would you, major?\" \"Help yourself,\" Jones said. \"As long as you don't break the law or interfere with me or my men, I don't care what you do. The trail's bound to be pretty cold by now, though.\" \"I've picked up colder ones,\" Luke said. As it turned out, it took him a week of asking questions at hotels, boardinghouses, and the railroad station before he found someone who remembered seeing Gloria Jennings. That led him to a porter who recalled helping her with her bags as she boarded a westbound train. More searching and asking questions turned up the conductor on that run, who told Luke, \"The lady didn't go all the way to El Paso, I remember that for sure. It's not every day you come across a woman who's so easy on the eyes.\" \"Where did she get off?\" Luke asked. The conductor, a pudgy, mostly bald gent with a high-pitched voice, took off his cap and scratched his bare scalp. \"I don't rightly recall,\" he said. Luke reached for his pocket. \"No, no, I'm not hinting for a bribe, mister,\" the conductor said quickly. \"I honestly don't remember. I'm pretty sure it was somewhere pretty far west, but not all the way to El Paso. There are several little towns in that ranching country out there north of the Big Bend. That's where it was she got off the train, in one of those settlements.\" Well, that narrowed it down some, anyway, Luke thought. He thanked the conductor, put together a load of supplies, picked up his horse from the livery stable, and headed west. He could have taken the train and retraced Gloria's route that way, but he preferred to ride. As cold as the trail already was, a little more time wouldn't make any difference. Besides, if she was trying to elude pursuit she might have doubled back, and this would give him a chance to stop and ask questions in every little town he came to. He was in a wide place in the road called Bracken's Crossing when the man who ran the general store listened to his description of Gloria Jennings and then said, \"That sounds a lot like the gal who married old Sam MacCrae a while back. She's from back East somewhere, I hear tell. Young and a real looker, too. That ol' dog Sam.\" \"Who's MacCrae?\" Luke asked. \"Where does he live?\" \"He owns a ranch over on the other side of Painted Post, about fifty miles from here.\" Luke's interest picked up at that news. He said, \"A good-sized spread, is it? Or just a little greasy sack outfit?\" The storekeeper snorted. \"Greasy sack, my hind foot. The MacCrae spread is the biggest outfit in that part of Texas. Takes up the whole of Sabado Valley and more besides.\" \"So MacCrae's a rich man,\" Luke said. \"You called him old Sam. How old?\" \"Shoot, I don't know for sure. He's in his fifties, I'd say.\" So far, everything Luke was hearing meshed perfectly with what he knew about Gloria Jennings. She had married a rich, older man back in Baltimore. There was no reason to think she wouldn't marry another one here in Texas if she got the chance. Of course, she had already stolen a hundred thousand dollars from Alfred Jennings when she killed him, so she probably didn't need money, but for some people, plenty was never enough. No matter how much they had, they always wanted more, especially when it came to money and power. \"Do you recall the name of MacCrae's new wife?\" Luke asked the storekeeper. \"Don't know that I ever heard it,\" the man replied. \"All I know is some of my customers gossiped about ol' Sam getting himself a young, pretty wife. That's all I can tell you, mister.\" \"There's one more thing you can tell me,\" Luke said. \"How to get to Painted Post.\" The storekeeper was glad to supply him with directions, especially after Luke bought some supplies. A couple of days' ride brought him to Painted Post, a sleepy cow town not much different from a hundred others Luke had seen. While he was there, he picked up some more gossip about Sam MacCrae and the rancher's new wife. MacCrae had been a widower for quite a few years, and evidently he had fallen hard for the young woman who had gotten off the train and settled in at the hotel. A whirlwind courtship later, the couple had gotten married in the Painted Post Baptist Church, and the woman\u2014her name was Glory, Luke was told\u2014had gone off to live on the ranch with her new husband. All that information combined to convince Luke that he was on the right trail. Glory MacCrae had to be the fugitive murderer Gloria Jennings. All he needed to do was get a look at her to be absolutely certain of her identity. Even though it had been a while, in his mind's eye he could still see the portrait of the woman he had seen on that wanted poster in Major Jones's office. Now, as he stood there with Glory MacCrae's warm hand gripped in his, he was dead solid sure. CHAPTER 3 \"Welcome to the MC Ranch, Mr. Jensen,\" Glory said. \"I don't know what brings you here, but you've done us a favor.\" She nodded toward the dead man. \"This is one less gunnie to do Harry Elston's bidding.\" She gave his hand a final squeeze and let go of it. Luke was a little sorry not to be holding her hand anymore. She was the sort of woman whose beauty possessed a raw, primitive power over men, and Luke wasn't immune to it . . . although he would never let it make his decisions for him, either. \"I don't know anything about this fella Elston,\" he said. \"All I know is that somebody in that bunch tried to kill me, and I don't take kindly to that. Could've even been this hombre. If it wasn't . . .\" A cold smile curved Luke's mouth under the mustache. \"Then I reckon he was guilty by association.\" \"Elston's men are all guilty of one thing: associating with a skunk.\" Glory turned to Pendleton and went on: \"Put him on a horse and take him back to headquarters, Gabe. From there one of the men can take the body to Painted Post in a wagon and leave it at the undertaker's.\" \"You aim to pay for planting him, Miz MacCrae?\" the foreman asked. \"Not if there's enough of Harry Elston's dirty money in his pockets to pay for a pine box, I don't,\" Glory answered without hesitation. Then she shrugged and added, \"But whoever takes the body to town can tell the undertaker that I'll cover the difference, if there is any.\" Pendleton's voice hardened as he said, \"I'll make sure you get an honest accounting, ma'am.\" \"Thank you, Gabe.\" Glory turned back to Luke. \"If you're not in a hurry, Mr. Jensen, I hope you'll come on to the ranch house with us and have supper. You're welcome to spend the night in the bunkhouse, as well.\" \"That's kind of you,\" Luke said with a nod. \"I accept.\" \"Not at all. Like I said, you did us a favor . . . and I like to repay any favors that I owe.\" She was a plainspoken, straightforward woman, Luke thought as they mounted up. He liked that about her, over and above her good looks. It was a shame he was going to have to take her in and turn her over to the law. It would be even more of a shame when they put a hang rope around that pretty neck of hers and stretched it for murdering her husband. Her other husband, Luke corrected himself as he moved the dun alongside her horse and they began to ride along the base of the bluff. Behind them, a couple of the hands rounded up the dead man's horse so they could throw the corpse over the saddle. \"Are you from somewhere around these parts, Mr. Jensen?\" Glory MacCrae asked. \"I don't think I've heard your name before.\" \"No, ma'am. Originally I'm from Missouri, but I've moved around a lot in recent years. I consider myself a citizen of the world.\" \"I like that,\" she said with a smile. \"Where are you from?\" he asked. \"You don't really sound like a Texan.\" She laughed and said, \"Those can be fighting words around here. Although a lot of people in Texas these days weren't born here.\" Luke knew that was true. After the end of the war, there had been nothing left in the conquered Southern states for many of the returning Confederate soldiers. The brutal, vindictive Yankee reconstructionists and carpetbaggers had seen to that. So most of those men had headed west, looking for new lives on the frontier. Luke's experience had been different in some details, although there were certain similarities. He didn't consider himself an unreconstructed rebel, though. The war was too far in the past for that. He noticed that Glory had dodged his question about where she was from, but he didn't press her on the issue. Anyway, he already knew the answer. Her voice had a slight trace of a Southern accent, another indication that she was from Baltimore, which straddled the cultural line dividing north from south. To pass the time, Luke said, \"Tell me about this hombre Elston. Why would he want his men to rustle some of your stock?\" \"Why will a rattlesnake sink its fangs in anything that moves?\" Glory asked in return. \"It's filled with venom, and that venom has to come out somewhere.\" As they passed the embers of a fire that had burned down to almost nothing, she pointed at them and went on: \"They were using that as a branding fire, venting the MC brand into a Lazy EO with a running iron. We've caught them doing it before.\" Luke frowned and said, \"I don't see how they thought they could get away with that. It would be easy enough to spot an altered brand if you killed the cow and peeled the hide off. Don't you have a cattleman's association to send in some brand inspectors and put a stop to it?\" \"The brand inspectors have been in, and they've warned Elston,\" Glory said. \"He claimed his men were doing it without his knowledge. He fired some of them, ran them off.\" She laughed, but there was no humor in the sound. \"Paid them off, is more like it. He put on a show of being angry about it, but he really gave the men money to go somewhere else and find another job. I'm convinced of that.\" They left the branding fire behind. Luke said, \"It doesn't seem like you could steal enough cattle that way to make it worthwhile unless you had a little outfit and were just barely hanging on.\" \"Well, it's not like Harry Elston is trying to stock his ranch. He has his own herds. What he really wants is my range and my water. Sabado Creek runs through the valley and is the best source of water around here. Elston just wants to make enough of a nuisance of himself that I'll give up and sell out to him.\" Starting out, Luke hadn't been sure why he was questioning Glory MacCrae about what was going on around here. He didn't care about the ranch's troubles. He was just here to make sure she was the fugitive he was after and then figure out a way to get her behind bars. She had said some things that intrigued him, though, and his interest grew even stronger when he recalled how one of the ranch hands had referred to her as \"the boss\" when he spotted Glory approaching. \"Mrs. MacCrae,\" he said, \"how does your husband feel about all this?\" Glory's horse broke stride a little, and Luke knew his question had caused her to jerk the reins. She looked over at him and said, \"My husband is dead, Mr. Jensen. The MC Ranch is mine now.\" Well, thought Luke, given this woman's history, that wasn't really much of a surprise. \"I'm sorry,\" he said. \"I didn't know.\" She shrugged and said, \"Since you're a stranger in these parts, there's no reason you should have.\" That storekeeper back in Bracken's Crossing could have told him, he thought. Of course, it was possible the man hadn't known about Sam MacCrae's death, especially if it had occurred recently. \"You have my condolences,\" Luke said. \"If you don't mind my asking, how long ago . . . ?\" \"Three months.\" Glory glanced down at the riding clothes she wore and went on: \"I know, these aren't exactly widow's weeds, are they? But I don't have time to sit around in a dark room with a veil over my face, weeping and wailing. There's a ranch that has to be run. The last thing in the world Sam would have wanted was for me to let things go to hell around here.\" She was good, Luke thought. Every word out of her mouth sounded genuine and sincere, but he knew she was lying through her teeth. The most likely explanation was that she had killed Sam MacCrae, gotten away with it somehow without being suspected, and now intended to strip her late husband's ranch of every penny she could before she disappeared again. \"I did my mourning for a few days,\" Glory was saying as those thoughts ran through Luke's brain. \"Gabe and the other men kept things going. But then it was time to move forward again instead of looking back. I had my time with Sam. It was too short, but other than that it . . . it was everything a woman could ask for.\" That little catch in her voice was perfect. Anybody else hearing it would believe that deep down she was still devastated by the loss of her husband. \"How long were you married?\" Luke asked. \"Three months. Like I said, not nearly long enough.\" But long enough for Sam MacCrae to have changed his will, Luke was willing to bet. Wasn't anybody around here suspicious of this woman? Had she managed to fool them all just because she was beautiful? They came to a place where the bluff had caved in, a long time in the past. An easy trail led to the top. As they rode up it, Luke glanced back and saw Pendleton and the other MC hands strung out behind them. One of the cowboys was leading a horse with the dead man draped over the saddle. \"How far is it to your headquarters?\" \"About five miles,\" Glory said. \"It's over there at the edge of those foothills to the west.\" A couple of ranges of small mountains, not much more than hills themselves, bordered the valley on the northeast and southwest. The settlement of Painted Post was ten or twelve miles back to the southeast. This whole area between the mountain ranges was known as Sabado Valley\u2014Sabbath Valley, in English\u2014and it all belonged to Glory MacCrae now. Some of the landscape Luke could see was brown and arid, but a large swath of the valley was verdant with grass and brush. Luke wasn't a cattleman, but he had been around enough ranches to know good grazing land when he saw it. Maybe Glory wasn't planning on running out after all. Maybe she was sincere about keeping the ranch going. It was possible she had lucked into something by marrying Sam MacCrae, something that would allow her to settle down. Of course, she still had a murder charge hanging over her head, and unless Luke missed his guess, that wasn't the only murder she had committed. He had to pretend to be taken in by the web of lies she was spinning, but he couldn't let himself actually be convinced she was telling the truth. She was worth five thousand dollars, after all! They passed more cattle as they rode, good-looking animals, Luke thought, although he wasn't really a judge of such things. After a few minutes, Glory said, \"You never did tell me what you're doing on this range, Mr. Jensen.\" \"I'm headed for El Paso,\" Luke said, \"but I'm taking my time getting there and seeing some of the country while I'm at it.\" \"What's in El Paso? Family? Friends?\" For a long time after the war, Luke hadn't had either of those things in his life. He hadn't even known at first that the famous gunman Smoke Jensen was really his little brother Kirby. Since then he had met not only Smoke, but also their adopted brother, Matt, along with the old mountain man known as Preacher who had been Smoke's mentor for many years. So, yeah, he had family now, and friends, and they were the same. But in answer to Glory's question he said, \"No, none of that. But I'm told there's always a big poker game going on in the bar of the Camino Real Hotel.\" Glory laughed and said, \"So you're a gambler?\" \"When you get up in the morning, you're betting that you'll make it through the day, aren't you? And when you lay your head down at night, you've made a wager that you'll wake up again.\" \"That's a rather . . . fatalistic way of looking at things, isn't it?\" \"I suppose you're right,\" Luke said with a chuckle of his own. \"Let's just say I enjoy a good game of cards.\" \"Fine. That means it won't be keeping you from anything important if you have dinner with me tonight and stay a day or two.\" It didn't escape Luke's notice that she had gone from asking him to spend the night at the ranch to saying that he could stay a day or two. He didn't comment on it, though. They came within sight of the ranch headquarters. It was a fine-looking place. The house was whitewashed adobe with a tile roof and several cottonwood trees around it. A long, low adobe bunkhouse sat to one side. There were a couple of barns built of rough-planed lumber with a network of corrals between and around them. Other outbuildings were scattered here and there. Luke could tell the ranch was successful. A couple of big, shaggy dogs, one yellow, and one gray and brown, ran out to greet them with full-throated barks. A woman with gray hair braided and wrapped around her head came out of the main house, and a couple of young punchers emerged from one of the barns. One of the youngsters hurried up and took hold of the headstall on Glory's horse as she reined to a halt. \"I'll put him up for you, ma'am,\" the boy said. He was a stocky, redheaded youngster with a scattering of freckles across his face. \"Thank you, Ernie,\" Glory told him, and as she expressed her gratitude a smile as bright as the sun broke out on the boy's face. He looked like he'd just been given the world's best present on Christmas morning. Glory swung down from the saddle, and so did Luke. Glory said to the other young man, \"Vince, take care of Mr. Jensen's horse, will you?\" \"Sure,\" Vince said. He was taller, leaner, and darker than Ernie, and he looked like it would take a lot more than a fleeting smile from Glory MacCrae to make him beam like the sun. The other hands who had been with Gabe Pendleton during the fight with the rustlers were headed for the barn, except for Pendleton and the cowboy leading the dead man's horse. Pendleton hipped around slightly in his saddle, peered to the north, and said, \"Company coming, Miz MacCrae.\" \"Can you tell who it is?\" Glory asked. Pendleton's voice hardened as he said, \"Looks like a buggy with three or four riders trailing it. Coming from that direction, you know what that means.\" \"Yes,\" Glory said. Her voice had gone flinty, too. \"Harry Elston is coming to pay us a visit.\" CHAPTER 4 The gray-haired woman came closer. She said to Glory, \"You should go inside, se\u00f1ora. Let Gabe deal with Se\u00f1or Elston.\" Her lined face was nut brown, her eyes dark and piercing. Luke couldn't tell for sure how old she was. She could have been anywhere from fifty to eighty. \"I'm not going to let Harry Elston make me hide in the house, Teresa,\" Glory said. \"Whatever he wants, he can deal with me.\" \"Se\u00f1or MacCrae would not want you doing this, se\u00f1ora.\" \"I think I'm a better judge of what Sam would want,\" Glory snapped. \"After all, I was his wife.\" Luke saw the older woman's already grim mouth draw down into an even thinner line, but Teresa didn't say anything else. Luke had a hunch that she had been Sam MacCrae's cook, housekeeper, something like that, quite possibly for many years, ever since MacCrae's first wife passed away. It wouldn't surprise him if Teresa had been in love with MacCrae, too, although as a servant she'd probably kept that emotion to herself. She was bound to resent Glory for coming in and first marrying MacCrae, then taking over the ranch after his death. Glory turned away dismissively from the older woman and strode across the ranch yard toward the approaching buggy with its trailing riders. The buggy was close enough now for Luke to see that a thickset man in a gray tweed suit and narrow-brimmed dark brown hat was handling the reins. That would be Harry Elston, he thought, owner of the Lazy EO. The men on horseback behind the buggy rode with easy, arrogant slouches. They wore range clothes, but they were all armed with holstered handguns, which meant they weren't regular cowboys. A man who worked with cows all day from horseback generally didn't pack an iron, just a rifle for shooting snakes or coyotes. Luke glanced over at Gabe Pendleton, who looked pretty tense. \"Is this fixing to be trouble?\" Luke asked quietly. \"Don't know.\" Pendleton bit out the words with his jaw clenched. \"See that lean fella with the sandy hair?\" Luke knew Pendleton was referring to one of the riders following Elston's buggy. He said, \"I see him.\""} +{"id":"RedPajamaBook.0003","text":"ALSO BY STEPHEN WHITE Line of Fire The Last Lie The Siege Dead Time Dry Ice Kill Me Missing Persons Blinded The Best Revenge Warning Signs The Program Cold Case Manner of Death Critical Conditions Remote Control Harm's Way Higher Authority Private Practices Privileged Information DUTTON Published by the Penguin Group Penguin Group (USA) Inc., 375 Hudson Street, New York, New York 10014, USA USA | Canada | UK | Ireland | Australia | New Zealand | India | South Africa | China Penguin Books Ltd, Registered Offices: 80 Strand, London WC2R 0RL, England For more information about the Penguin Group visit penguin.com. Copyright \u00a9 2013 by Stephen W. White All rights reserved. No part of this book may be reproduced, scanned, or distributed in any printed or electronic form without permission. Please do not participate in or encourage piracy of copyrighted materials in violation of the author's rights. Purchase only authorized editions. REGISTERED TRADEMARK\u2014MARCA REGISTRADA LIBRARY OF CONGRESS CATALOGING-IN-PUBLICATION DATA has been applied for. White, Stephen, 1951\u2013 Compound fractures \/ Stephen White. pages cm ISBN 978-1-101-58552-8 1. Psychotherapists\u2014Fiction. 2. Therapist and patient\u2014Fiction. I. Title. PS3573.H47477C66 2013 813'.54\u2014dc23 2013016252 Designed by Leonard Telesca Photograph credit: page vii, Boulder Historical Society Collection of the Carnegie Branch Library for Local History Quotation credit: page 430, from _On the High Wire_ _,_ ___by Philippe Petit, reprinted by permission of the author_ PUBLISHER'S NOTE This book is a work of fiction. Names, characters, places, and incidents either are the product of the author's imagination or are used fictitiously, and any resemblance to actual persons, living or dead, business establishments, events, or locales is entirely coincidental. ## CONTENTS _Also by Stephen White_ _Title Page_ Copyright Dedication Epigraph PROLOGUE Chapter 1 Chapter 2 Chapter 3 Chapter 4 Chapter 5 Chapter 6 Chapter 7 Chapter 8 Chapter 9 Chapter 10 Chapter 11 Chapter 12 Chapter 13 Chapter 14 Chapter 15 Chapter 16 Chapter 17 Chapter 18 Chapter 19 Chapter 20 Chapter 21 Chapter 22 Chapter 23 Chapter 24 Chapter 25 Chapter 26 Chapter 27 Chapter 28 Chapter 29 Chapter 30 Chapter 31 Chapter 32 Chapter 33 Chapter 34 Chapter 35 Chapter 36 Chapter 37 Chapter 38 Chapter 39 Chapter 40 Chapter 41 Chapter 42 Chapter 43 Chapter 44 Chapter 45 Chapter 46 Chapter 47 Chapter 48 Chapter 49 Chapter 50 Chapter 51 Chapter 52 Chapter 53 Chapter 54 Chapter 55 Chapter 56 Chapter 57 Chapter 58 Chapter 59 Chapter 60 Chapter 61 Chapter 62 Chapter 63 Chapter 64 Chapter 65 Chapter 66 Chapter 67 Chapter 68 Chapter 69 Chapter 70 Chapter 71 Chapter 72 Chapter 73 Chapter 74 Chapter 75 Chapter 76 Chapter 77 Chapter 78 EPILOGUE _ACKNOWLEDGMENTS_ _ABOUT THE AUTHOR_ To my readers [It's] the greatest poison in the world. One drop could kill you. Ivy Baldwin PROLOGUE DOCTOR LILA ONE SESSION STOOD OUT. It was our second. I have replayed the session in my head at least ten times. It was when my perspective changed. The day I got suspicious. On occasion I went back over it to see if there was a nuance I missed. Other times the loop replayed itself, an earworm, a melody my memory couldn't cut loose. It's not in my personality to recall moments of assurance with much clarity. What I tend to recall vividly are my doubts and my fears. That therapy loop earned the replays because it was the session when my doubts and my fears began to crystallize, when I went from thinking that I might be in over my therapeutic head to wondering what the hell I might have gotten myself into with Dr. Alan Gregory. Or as I called him, my patient. MY NAME IS DELILAH MARY TRAVIS. My friends call me Lila. Most of my patients call me Dr. Travis, or Delilah. Alan Gregory called me Lila. But we weren't friends. It was the third week of January. The session had been fitful. I felt no rhythm in his words. As the end of our time approached I said, \"I don't know what happened that morning. The day of the fire. The morning of the shooting. Moment by moment. You may think I know. You may wish I knew. You may want to proceed as though I know what you need me to know. But I don't know.\" He didn't reply. That happened frequently with us. During Alan's previous visit I'd asked him why he'd picked me to be his therapist. He said it was because he wanted a therapist he didn't know\u2014he knew almost everybody in Boulder\u2014and because someone he trusted had once said good things about my work. I'd asked him why he didn't go to Denver; there had to be therapists there he didn't know. He said it was too much for him then. An almost three-hour round-trip? He said he couldn't do it. I began to think he'd been less than honest. I began to believe he chose me because I was inexperienced. He thought he could manipulate me. I said, \"I imagine it will be tender for you, sharing the story. But at some point you will need to tell me those details.\" He stood. His timing was impeccable; he rose within seconds of the precise forty-five-minute mark. As a therapist he had sat through a million forty-five-minute hours. After the first few thousand or so he'd undoubtedly internalized the session interval. I had not. My hours in the consultation chair were still in high triple-digits. The clock I relied upon was digital. It was not visible from his seat. \"Who does, Lila?\" he replied. \"Know? What happened, I mean.\" _Who knows? You're going existential about that? You were there, I wasn't. If I had been there I would know what the hell happened._ I kept the rant to myself. I said, \"Are you unsure what happened that day?\" _No dissociation, please._ _I don't have the chops for fugue. Not your fugue._ His face adjusted into an expression I couldn't interpret. He had a few of those. Then he said, \"Am I 'sure'? A lot of certainty is squeezed into that syllable. Certainty is elusive for me. Death? Certain. Everything else? Uncertain.\" _God._ \"Okay,\" he said. \"Here's part of what happened that morning that you don't know. That maybe no one else knows.\" He took a deep breath. \"My wife was in my office to caution me about a development in a case she was working. When she came to see me she didn't understand the implications of what she had learned. She thought she did, but she did not. She was being generous, maybe loving\u2014I go back and forth about that\u2014by warning me about legal action that was coming against someone I know.\" \"Legal action?\" \"Taking that person into custody. For questioning. Or arrest. Like that.\" \"Thanks,\" I said. Why I thanked him I did not know. \"I told her that if she were to start arresting people she would have to begin by arresting me.\" I was disbelieving. I'm sure I looked it. I said, \"You?\" He said, \"It's complicated. This may help: After Lauren told me what she was about to do, I knew the time had arrived to reveal some secrets I'd been keeping from her. I did that\u2014I revealed some things I had done.\" \"Things?\" _Jesus._ \"Acts.\" _That sure clears things up._ I said, \"You're being vague.\" \"Intentionally. I am revealing I have secrets, but I am not revealing those secrets.\" \"Trust?\" I said. Not exactly a therapeutic reach on my part. It was like a meteorologist forecasting rain seconds after she opens her umbrella. \"Yes. Lauren recognized the implications of what I told her. I knew she would, but I had hoped that my admission might alter the tilt of her heart. In my favor.\" To him, his failure to trust me required no exploration. I felt it as a wound. \"I was wrong,\" he said. \"Lauren was angry. Not understanding. All that my revelation changed for her that morning was her thinking about whom to arrest.\" Alan Gregory was one of those people who confused me when he told me things intended to alleviate my confusion. By then that wasn't news for me. I said, \"She was going to arrest you? When she was shot?\" \"Not at the beginning of her visit but, yes, by the end. When she was shot.\" His shoulders fell. Some amount of tension disappeared from his temples and his jaw. He seemed relieved to have breached this wall with me. We made brief eye contact. The intimacy of it all stunned me. Part of me melted with his glance, as though for that instant alone our arteries shared the same pumping heart. He shook his head, as though he were as amazed as I was. His breath was shallow. \"That morning? The fire up the street? Don't forget the fire.\" My breathing was shallow, too. The mirroring was not intentional. No, I had not forgotten the fire. In a way that I don't think I had ever felt before in my time as a therapist, I was aware that a patient was sharing a dangerous secret with me. Not just a sensitive truth\u2014that's routine\u2014but a dangerous one. Dangerous for him. And possibly dangerous for me. Alan Gregory woke to foreboding every morning of his life. To help him I would need to understand his foreboding. Perhaps even to feel it. I said, \"Could you please sit back down, Alan?\" If he considered me a peer he wouldn't put me in the position I was in. I knew that. I didn't like it. \"Our time is up,\" he said. I swallowed a sigh. \"That's my call. This is my office. I am your therapist.\" I shouldn't have had to remind him of that. We'd work on that issue later. The list of what we would work on later was becoming unwieldy. He nodded. But he remained standing. He seemed more paralyzed than defiant. \"Your wife was about to have you arrested for what?\" \"Something serious,\" Alan said. \"A felony. I can't discuss it.\" \"Can't?\" He sat down. \"I will tell you what I told Lauren that morning: my caution has to do with clean hands.\" He looked at his hands as though he couldn't not look at his hands. With monumental self-control I managed not to look at my hands. I was aware that his wife was shot not too many moments after he told her whatever he told her that morning. Apparently about clean hands. \"Yours?\" I asked. \"Your clean hands?\" He stood back up. \"No,\" he said. \"Yours.\" That did it. I looked at my hands. I said, \"Sit, please.\" He didn't. _Shit._ \"She had a reason to arrest you? The felony?\" \"Yes. Definitely.\" \"You say 'definitely' yet you continue to be vague. You seem to be admitting . . . what, guilt? Yes? Are we talking about trust again? Right now? Between you and me?\" Air escaped his nostrils in a little huff. \"Guilt? No question. Right and wrong. Morality? That's murky. Between us? Of course it's about trust.\" He paused. I look back now and I wonder about that pause. I think he was telling me something. But I was missing it. He tried to explain. \"Trust is not only an issue between you and me. It was there between my wife and me. Maybe it is there between my friend\u2014or friends\u2014and me. There is a lot on the line here beyond my mental health. Culpability. Survival. Freedom. All of those.\" Before I could acknowledge that gravity, he refocused on the mundane. He said, \"We need to talk about your notes. Session notes, process notes, whatever. And supervision.\" _What?_ \"Please sit. If you don't I am going to have to stand.\" He sat. I said, \"Thank you. What about supervision? What about my notes?\" \"Are you being supervised on this case?\" I had never before been asked that question. Few patients know that supervision\u2014oversight of a treatment by a senior practitioner\u2014exists as an option for their therapist. But Alan Gregory knew. He was one of those senior practitioners. In Boulder he was a supervisor. \"This therapy?\" I said. \"With you?\" He nodded. \"No. I am not being supervised.\" \"If you change your mind\u2014about supervision\u2014will you agree to inform me? I can't have what I tell you leave this room. Not even to a supervisor. Clean hands?\" \"That's irregular,\" I said. \"You know that.\" \"It's essential. Without that assurance, I can't proceed. Won't.\" \"I need to think about it. We can discuss it next time. What about my notes?\" \"I would like you to make them sparse,\" he said. \"Short? Or, or lacking detail? What kind of sparse?\" He nodded. Then he shook his head. I made a _so-WTF_ face. If I'd had a supervisor she would have been directing me to continue to work on maintaining a therapeutic expression. They all did. He said, \"Lacking content. No names. No facts. No he-said, I-said. Process? Go to town. Whatever's helpful.\" \"I don't show my clinical notes to anyone, Alan. Ever. You don't have to worry.\" His eyes were dismissive. \"I wouldn't be here if I thought you would. I am concerned about people who would look at them without your consent.\" I felt a chill. _Huh?_ I looked at my hands again. He said, \"You may not have experience with those people. I do.\" \"I don't,\" I said. With another patient, I would not have admitted that. Alan Gregory was not another patient. \"Those people may know that I am coming to see you for therapy,\" he said. It is typically no more a presence in my body than my liver, but my heart suddenly became an entity in my chest. _Bump-bump. Bump-bump._ I began to question things I should have questioned sooner. My mind reassembled fragments and pieces he had allowed to leak out along the way. _A wildfire. Arrest. A gun. Shots in the back. A witness. His partner. A felony. A little boy. Trust. A leg wound. A wife in ICU. A cabbist._ _Oh shit. And . . . holy shit. The felony. Trust. Guilt?_ I realized what he was admitting to me. I began to speak. My breath caught in my throat. I tried again. I said, \"You had a motive? That morning? To shoot your wife, didn't you?\" \"If you choose to stop treating me, I understand.\" \"I asked you a question,\" I said. _Bump-bump. Bump-bump_. He looked out the window. \"My request about your notes?\" _Jesus. Did you hear what I just asked you?_ \"Uh, I will be careful. I will take a look at what I've written. Next time we can talk about what I decide about shredding and starting over. Did\u2014\" \"Handwritten or digital?\" he asked. \"Dictated? I hope you don't have them in the cloud.\" \"Handwritten.\" \"If you shred, it needs to be cross-shred, not strip-shred. Separate the confetti into piles. Dispose of the piles in different places. Or set the shreds on fire. Either works.\" My patient wanted me to torch my notes. I added paranoia to his differential diagnosis. _Great. This is great._ \"Alan, did you have a motive to shoot your wife?\" Without any further hesitation, he said, \"I did. That's the problem. At some point, they'll figure that out. He certainly will. And he won't let go. That, by the way, is the exact sort of thing that can't go in your notes.\" _He?_ _Bump-bump_. ## 1 Before That Morning SAM AND LUCY THE DEAD GUY? He was, what, a psychologist or some-thing? Psychiatrist?\" Sam Purdy didn't reply to the man's questions. He introduced himself curtly, slammed his car door, and took a few steps away. The detective had responded to the call on Prado expecting to see a familiar house. But the house was gone. He walked up near the edge of the debris and faced the wide _V_ __ that Eldorado Canyon carves into the Front Range of the Colorado Rockies. Sam was aware that he shouldn't be able to see Eldorado at all. The damn house should be in the way. The last time Purdy had been on Prado was the week of 9\/11. In 2001. Since then Prado had been but one tile in the mosaic that made up his 9\/11 grief and confusion. _The damn void changes everything. I can see things I couldn't see._ Sam wanted to chew on that. To weigh the possibility that moving beyond the old grief\u2014he hadn't\u2014might require his willingness to see things that weren't visible before. The RP, the reporting party, had a different idea. The man, fit and gray, stepped in front of the detective, blocking his view. \"Took you long enough to get here. I called 911 like three hours ago.\" The man's thumbs were tapping at his phone, a touch screen the size of a slab of Spam. \"Two hours and thirteen minutes to be precise. I started my phone's stopwatch.\" He held it up in case the detective doubted him. Purdy sighed a sigh of capitulation. \"This is your property?\" \"In six months it'll be my castle. Where you been?\" The man tapped his wrist. \"Time is money.\" Purdy noted the absence of a watch on the tapped wrist. He said, \"This? Not an emergency. And this? Not a conversation. I ask questions. You answer them.\" The man nodded. Sam refocused on the absent house. He wasn't done reflecting on absence and opportunity. Not even close. The RP couldn't stay quiet. Purdy tuned back in as the man said, \". . . have to admit that this is big. You guys missed the gun. Could it have come after? No way. You're going to have to, what, reopen? Is that what you say? Big deal.\" Sam watched the man punctuate his self-congratulation with a tightened fist and a muted arm clench, mimicking Kobe after a clutch three. The guy had no way to know that Sam hated Kobe Bryant like he hated jock itch. Sam moved a finger to his lips. In a low voice he said, \"Quiet. Shhh.\" The ensuing peace lasted no more than half a minute before the man blurted, \"I love northern light. It's soft. You have any? At your house?\" The question left Sam at a loss. In Sam's world, if you have southern light and you turn around, you get northern light. How could a house have one and not the other? The RP brought his outstretched hands together above his head. He slipped one foot from a sandal and shaped the arch to the other leg's knobby knee. \"Six months from now? Maybe seven. Ten? Kitchen there. Study here.\" He indicated floor plan features with thrusts of his head. \"This wall glass, triple-paned. Ceilings, twelve feet. I was thinking fourteen, but\u2014 Trim? Beetle-kill, painted. No VOC. LEED Platinum or Diamond, whatever is best. Can houses get that? My kid has allergies. Hell, my dog has allergies. I want the best LEED.\" The guy said \"LEED\" and Sam understood him. That told Sam two important things about himself. It indicated he was conversant with contemporary environmental building standards. And it meant maybe he'd been in Boulder too long. \"The vista will do all the heavy lifting. Across the mesa. Flatirons at dawn? I'm up early. You? Cannot wait. No sun in my eyes. Not a ray. Pool table there. No shadows.\" He cackled in anticipatory glee. Sam wondered if there were people troubled by shadows on their pool tables. His friends, Alan and Lauren, had a pool table in a room that faced west. _Has Lauren been bothered all these years by shadows? At least she's had the good sense not to bitch about it._ \"Sounds sublime,\" Sam said. Faking interest in rich people's concerns had long been a reflex for him. He thought the time had come for rich people to feign interest in his problems. He was still waiting on that. He faced the homeowner. \"What did you touch before I got here? Be specific.\" The man's pace of speech went from zero to sixty in two seconds flat. \"Bricks. Sorting bricks. Kicking bricks. Stacking bricks. Saving bricks. See that? Four-by-four-by-eight. Two of those. One, two. Four-by-four-by-eight-by-two. That's two hundred fifty-six bricks. I'm on my way to four stacks, four-by-four-by-eight-by- _four._ Five hundred and twelve.\" Deep breath. \"Bricks.\" During a second inhale he pointed in the direction of the neat piles on the edge of a driveway that led to the slab for a garage that was no longer there. \"That neighbor\u2014Thomas? Tom\u00e1s? I don't know\u2014asked for bricks from the demo. His house was built in the late fifties, same as this, maybe same builder. He's old. Thomas, not the builder. Builder's probably dead. He wants a patio wall or a barbecue or\u2014 Who cares? I was being helpful. Sure. Sure\u2014 Also trying to prevent NIMBY problems. Two birds, five hundred and twelve stones. Yah!\" Sam's on-the-fly diagnosis was that the RP operated in too many simultaneous dimensions. Sam blamed that, too, on Boulder. He'd seen it take down lesser men. Sam asked, \"Were you wearing those gloves?\" Work gloves were tucked in the man's belt. Canvas. Leather. \"When you touched the bricks.\" \"Yes.\" \"Sure?\" \"Yes.\" \"And the gun you found? What about the gun?\" \"No.\" \"No, you didn't touch it? Or no, you weren't wearing the gloves when you did?\" The guy pulled out his phone, began pecking with two thumbs. \"I saw the gun when I lifted a brick. Took a photo. Here it was when I found it. There. See? Then I called you guys. Two hours and thirteen minutes later\u2014\" \"Yeah, got that part. Show me the gun.\" The man led the detective near the edge of the debris. He pointed at the revolver. Sam said, \"So, when we run prints we won't find yours? No stray DNA? We won't see any disturbance in the dust that shows you moved the gun?\" Purdy detected some hesitation. _Damn._ \"Want to change your story, Mr. . . . Picker?\" He recalled the man's name from the call he got from dispatch. \"It's Pichter, like _pitcher_ in baseball, but in a Jumble. And it's not a story.\" _In a Jumble?_ \"Let's walk through it one more time, Mr. Pich-ter. So I understand.\" \"Like you're slow?\" Mr. Pichter said, stretching the last vowel a couple of beats. Purdy sucked his tongue to the roof of his mouth to keep from saying what he was thinking. It worked. \"Sure,\" Sam said, \"like I'm slow.\" Old-time Iron Rangers could turn a vowel into a fable. Sam did that with the _o_ in _slow._ \"You never lived here, Mr. Pichter? In this house. Yes or no.\" \"Got it thirty-two months ago. Short sale. Good deal, not a great deal. Land plus plus plus. I mean, this location? Let's be real. Wanted a lot on this side of Prado since . . . for\u2014uh-uh\u2014ever. Who doesn't? Had a tenant until Easter. Young guy. Does disaster response for State Farm. Tornados, fires, floods, hurricanes, whatnot. Not a lot of earthquakes lately. What's that about, you think? Huh? Since he left, vacant. Approvals and permits? Pain pain pain. Delays\u2014cost of money alone\u2014twenty grand. That's with interest rates in the crapper.\" He shrugged a what-are-you-gonna-do shrug. Sam was speechless. Jumble Guy wasn't. \"Luck? Me? Don't feel bad for me. I've had my share. I got a shitload of Apple when it was sixty-eight. Not in sixty-eight. _At_ sixty-eight. It's my iStock. And my brother-in-law got me a hunk-hunka of the Chipotle IPO. My brother-in-law? Burritos? I like Mexican food even less than I like him. Now I'm rolling in the tortillas. Get it? And\"\u2014he held up his phone\u2014\"I'm an Android guy. Ha.\" When the 2008 crash came, Sam learned that his retirement funds were invested in GM, some squirrelly mortgage bonds, and AIG. _This assbite is sitting on a golden throne of Apple and the Chipotle IPO. Now he's building a McPalace on Prado._ _Yeah,_ Sam thought, _life is fair._ \"The demolition was when?\" Sam asked. \"Yesterday. Front loader had a hydraulic failure. They'll be back to finish tomorrow first thing in the A.M.\" Purdy returned his gaze to the cleft in the Rockies. Eldorado was sucking in the afternoon shadows as though it were a black hole. He turned his body right to face the mesa that rose up from South Boulder Creek. He shifted his focus back to the debris to try to digest anew the tragedy of demolishing what for over half a century had been a solid home. _What a waste. Oh well. Money does what money does._ Sam squatted to examine the revolver, a Smith & Wesson .38 Special. He guessed it was an Airweight, though he'd have to move a brick to be sure. It sat among chunks of mortar on the old concrete hearth. The gun was why he was there. He was tempted to get all self-critical about not looking up the damn chimney back then. The week of 9\/11. But that was a week he'd been looking for terrorists, not for guns in chimneys. He stared at the revolver for half a minute praying it would speak some truth to him. It didn't. It was a common enough handgun in a place he'd almost given up expecting to see one. Sam used his cop voice, absent any Iron Range embellishment, to say, \"No. Sir.\" \"No what?\" Jumble Man replied. His reply was na\u00efve and hopeful, as though he anticipated learning something interesting about the .38 he'd discovered in the rubble of the chimney of the house he'd just knocked down. \"No, your demo crew won't be back tomorrow.\" Sam used his radio to request forensic support just as his partner was rolling her vehicle to a stop directly behind Jumble Guy's dusty Porsche SUV. Lucy's phone was to her ear. Sam knew she was running the Porsche's plates. She nodded a greeting. Sam nodded back wide-eyed\u2014a silent caution to her to be careful about Jumble Guy. The man saw it all. \"What? Who's she? Come on, guy. Let's work this out.\" \"Detective Purdy. Not 'guy.' That's Detective Davenport. Don't even think about calling her 'girl.' Won't go well for you.\" \"I got a schedule. Cleanup in the morning, excavators in the afternoon. The diggers won't break ground without a clean lot. Form guys on their heels. Then concrete, with a pumper. You know what a pumper costs? For a day? Foundation insulation, plumbing rough-ins. The plumbers were so hard to pin down. We're drilling halfway to hell for the thermal heat.\" He clapped his hands three times. \"Bam. Bam. Bam. Bam. Schedule is king. _King._ \" Sam considered pointing out that there had been three claps but four _bams_. And only two kings. He didn't. He said, \"Bummer.\" Jumble Guy said, \"I didn't have to call. I was being a good citizen. That should be rewarded.\" Sam smiled. \"You're going with that? I'll make sure it's in the report. We give citations sometimes. To good citizens. You could hang yours near your pool table. In the room with the northern windows. The one with no shadows.\" \"I did not have to call.\" \"But you did. Now? This is a crime scene. Pretend there's yellow tape everywhere the house you hated used to be. Your job? Stay outside that tape.\" \"Give me a break.\" Sam thought about it. Rejected it. He asked, \"Do you know what _prado_ means?\" Jumble Guy mistook the question for a quiz, with a prize he wanted to win. He said, \"In English? Damn, I should know that. My own street name. I give up, what does it mean?\" \"I don't know,\" Sam said. \"My Spanish sucks. Do you know anything about Ivy Baldwin? From way back?\" Jumble Guy made a face that exposed too many teeth, like an aggrieved rodent. \"Who's she? I don't know her. Is that one of my new neighbors? I only know Thomas. Tom\u00e1s. The brick guy. Come on. One more. Give me an easier one.\" Sam kicked at a broken brick. \"Never mind,\" he said. \"You lose.\" ## 2 HOW DO YOU SEE it, boss?\" Lucy asked. Sam made a noncommittal puffing sound through pursed lips. Pichter had started taking pictures of everything in sight with his damn phone. Maybe even video, which meant audio. Sam was behaving as though he was about to be on YouTube. One night shortly before Sam met Ophelia he'd descended into a funky muse about the actuarial likelihood that his lifetime could end up being split almost evenly between two centuries, the twentieth and twenty-first. By the time his lubricated lifespan contemplation neared completion, Sam reached a subjective conclusion that of the two centuries he would inhabit, the twenty-first was not shaping up to be his favorite. What happened on 9\/11 was one of the reasons. YouTube was another. Sam had developed a persistent fear of becoming a trending topic on YouTube. He knew whatever video of him might captivate a YouTube audience would not reflect well on his character. \"Nothing coherent.\" Sam answered Lucy's question in a low register so that Jumble Guy couldn't eavesdrop. She gave Sam a chance to go on before she said, \"This all happened _that_ week, Sammy. I didn't work this case with you, so you're going to have to explain why finding a gun here all these years later is such a big deal.\" Sam turned his back on Jumble Guy. \"The scene inside this house was an epic mess. Body cooked for three days before we got it. Which was after raccoons came in through a doggie door and did their gnawing thing.\" Sam pronounced _gnaw_ with a hard _g_ as though the word had two distinct syllables. Lucy had known Sam forever but even she couldn't tell whether he had mispronounced the word or if he was making a point. \"Maybe a coyote, too. Don't recall the details. Wild things. By the time I walked in? What the deceased most resembled was a gunshot victim a few days after zombies had feasted on his flesh.\" \"Nice image. Thank you for that, Sam.\" \"Welcome. But we never found a gun.\" The last time he was here, all those years earlier, he had thought of Lucy as his young partner. _Damn._ _The woman is almost middle-aged. How the hell did that happen?_ She said, \"Now you have your gun. That's good, yeah?\" \"You would think. But this pistol comes with a surprise\u2014that skinny chain you see on the trigger guard. That's a complicating factor.\" Lucy had noticed the chain. She had a ready explanation. \"Maybe whoever stashed it wanted to make sure it didn't fall out of the chimney. Used the chain to keep it up there. Away from the kids.\" \"Say that's right. But if this was a self-inflicted wound\u2014which is where I had my money back then\u2014how did the gun get back up the chimney? How does that happen?\" \"So now you're thinking homicide?\" Lucy knew that a change in manner of death from suicide to homicide would turn this old case into a cold case. \"The death has been 'undetermined' all this time. Nobody ever got off the fence. Back then it looked like suicide, it smelled like suicide. If it had been a zombie it would have walked like a suicide. But without a weapon nobody would make the call.\" \"Watching a lot of zombie shit on cable with Simon lately, Sam?\" Sam grinned. \"We bond over it, do Netflix marathons. Father, son, the living dead. That week, Luce? Nothing was clear. This death just got tossed into the big pile of crap that wasn't clear.\" \"Where was the dog? There was a doggie door. Whose dog was it?\" Sam was stumped. \"I don't know. I don't . . . know. Vic's or his roommate's, I guess.\" \"Any gunshot residue on the vic? Did he pull the trigger?\" Lucy asked. \"Inconclusive, like everything else. Found residue, but some of the essential locations were . . . gone.\" \"Gone? What does that mean?\" \"The wild things. The vic was the feast. The guests were moveable.\" \"Yuck again, Sam,\" Lucy said. \"You been practicing grossing me out?\" \"A little bit.\" He smiled. \"Spatter? Was it consistent with suicide?\" \"I don't recall it being inconsistent. What this didn't look like was terrorism. That week, suicide was not priority one. That week, the rest of that year, we were chasing terrorist ghosts.\" \"Hey,\" Lucy said, \"we've both seen citizens hide guns in funny places. Inside a flue? If the fireplace was no longer in use, why not? I've seen stranger stashes. Maybe this was just a gun stash some citizen forgot about. Unrelated. Or, we could get lucky and lift some latents off the gun. If they're the vic's\u2014\" \"You feel lucky, Luce? I don't. Prints or not, if the gun was stashed back up that chimney, then it wasn't the suicide weapon. A guy can't shoot himself under the chin and then put the pistol away in some hidey-hole. Right?\" \"Fair assumption. If this was the gun, then someone else was here.\" \"But . . . the crime scene guys said the scene was not disturbed by people. Just critters. Who would know a guy had a gun stashed up the chimney? Guy who put it there. Who else? Other people who lived here? Maybe.\" \"Another fair assumption.\" She watched his face, hoping for an indication of his mood, before she put a hand on each of his shoulders. \"You really want to dig this up, Sam? The heroes died that week. The rest of us? We didn't have a great week. You don't need to make this perfect. I haven't been hearing any clamor for a new conclusion.\" \"I should forget it?\" \"I'll write an addendum about finding the handgun, put it in the file. We move on. Catch us some new criminals.\" \"Ballistics?\" Sam asked. \"Was there a slug for a match?\" Sam shrugged. \"I don't recall. Probably.\" \"Shit, who cares? I vote to let it go. We have two different armed robbers out there right now that need arresting. That's what we should be doing. Not this.\" \"You really think it's two different assholes, not one?\" Sam said. \"Captain's sure it's one.\" \"He's wrong. That surveillance video shows a pistol with a wood grip. Second holdup? A witness says no wood grip. Different weapons mean different assholes. You can make that one of your infamous second rules. I'll pretend you made it up.\" \"Let's stick with one crime at a time, Luce.\" Sam gestured at Jumble Guy. \"Today we got us a .38 on a chain. We also have one nightmare RP; he's like a rodent with ADD. I probably shouldn't have pissed him off. You watch\u2014he won't let this go.\" Sam squatted near the hearth. \"What do you make of the chain?\" Lucy did yoga regularly, though not religiously. Not quite as often as Sam ate meat with nitrates, but close. When she bent from her waist to examine the gun, Sam found himself becoming annoyed at the posture she adopted\u2014mostly because he hadn't been able to approximate that position since the death of disco. He used his pinky to indicate the trigger guard of the revolver. \"The gun wasn't hung from the chain. It's _attached_ to the chain. It's locked on with a bolt and a wing nut. You ever see someone attach a gun like that?\" \"Rhetorical? Why wouldn't that chain interfere with the trigger action?\" \"It's tight and forward on the guard. Look how long the chain is.\" He stood to chase the path of the chain into the mess of bricks that had tumbled down around the revolver. \"Three feet or so here, give or take. Four there.\" He pointed. Took a half step. \"Over this way, five. Under the flue, back out, eight, ten, twelve maybe? More?\" He looked at Lucy. \"Why hide a gun in a chimney at the end of a chain that long?\" Lucy said, \"To reach the chimney cap? It had to attach somewhere, either the flue or the cap, right? Did you find the other end? Is there a hook?\" \"Haven't gotten that far.\" The end of the chain disappeared beneath broken bricks and cracked mortar. While Lucy snapped photos, Sam pulled on a glove and used his index finger to shift a brick to one side, exposing the end of the chain. Lucy said, \"Fuck, there it is. That hook is crimped onto the chain. No way to hang that onto the cap. There has to be more. Move those two bricks next.\" Sam stood. His spine crackled like it was made of caramel corn. \"I have to start doing crunches,\" he mumbled. Lucy said, \"What?\" Sam wasn't ready to bend over again. He said, \"Ophelia thinks I cuss too much. I'm working on it. You should, too.\" Lucy said, \"Fuck that. But I like Ophelia, Sam.\" \"You know she's older than me? First time I've . . . been there.\" \"Been where?\" Lucy turned away. She didn't want Sam to know she was smiling. \"Been involved with a woman who's older.\" \"So? You'll die first anyway. The way you fucking eat.\" Sam laughed. \"You do cuss a lot.\" \"I haven't liked most of your girlfriends. I can't think of a single one I liked before Ophelia.\" \"Not Carmen? I thought you liked Carmen.\" \"Not even a little.\" \"Huh. You would have liked Dee.\" \"Dee? That mythical preggers sprite from back East? When was she your girlfriend? In a wet dream?\" \"She wasn't. Not, you know . . . well, at all. We had\u2014 Don't know why I said that. We both like Ophelia. Maybe my search ends there.\" \"Don't blow this one like the others, Sam. The tits on Ophelia? Woman her age? You'd be a fool.\" Sam laughed before Lucy did. Everybody had an opinion about Ophelia's breasts. Sam was used to it. Kind of. Lucy lowered her upper body to get even closer to the end of the chain, balancing her weight on her left foot while allowing her right leg to float behind her as yoga ballast. \"Now you're showing off,\" Sam said. \"You think maybe that hook was part of a bungee?\" Her index finger was inches from multiple frayed lengths of thin deteriorating elastic bands that extended out from the hook that had been crimped to stay fixed on the end of the chain. \"Now that you mention it, I am thinking that.\" Lucy said, \"Well, that means\u2014\" A brash, husky crack of thunder erupted from the direction of Gross Reservoir. A brilliant flash of lightning followed before Sam could even begin counting. Lucy tumbled onto her back from the shock of it all. Sam offered his hand. While they'd been distracted by the gun on the chain, the sky above the Front Range had turned the gray of bad dreams. \"You got a tarp in your car?\" Sam asked. \"We should cover what we can for the crime scene guys. There has to be another end to that bungee someplace in the debris. Don't want it floating away during a monsoon.\" Lucy was on the run toward her vehicle. She called back, \"You have noticed that the crime scene guys are almost all women now? Yes?\" \"I have not. I'm thinking that noticing that would be sexist. Wouldn't it? Or am I missing something about the nature of the progress you've been wanting me to make?\" Lucy opened her mouth. She didn't know how to respond. They used some of Jumble Guy's carefully stacked bricks to secure Lucy's tarp in place. By the time they finished, rain was falling in fat drops. Lucy was a step behind Sam as he dashed to his Cherokee for cover. Sam said, \"Most days I love the monsoons. And we need the rain. But then most days I'm inside and I don't worry much about being hit by lightning.\" Lucy was trying to remember the last steady downpour. She couldn't. Red Flag Warnings had been posted since spring along the entire length of the Front Range. Boulder County was kindling. Everybody knew a wildfire was coming. A bad one. She said, \"The gun is a gun. Vic was shot, there had to be one. That chain, though? There didn't need to be a chain.\" \"Chain makes it a puzzle, Luce. You know me, I like the puzzles. But a bungee? Bungee makes it goofy. Let's say you're a guy crazy enough to stash your pistol in the chimney. Why not just run the chain to the top? Why add a bungee to the mix?\" \"At the risk of sounding obvious, it makes the contraption spring-loaded,\" Lucy said. \"Does. The handgun would disappear up the chimney right after you let go. Or after you died. Again, why? Why would somebody shoot himself and want the gun to disappear?\" \"To fuck with us,\" Lucy said. \"I hate it when citizens fuck with the cops.\" \"Language, language,\" Sam said. \"A disappearing gun? I've been doing this a long time. But that's a first. Goofy, like I said.\" \"Rain's stopping,\" Lucy said. \"We got, what, three minutes of monsoon? Nada.\" \"It's so dry,\" Sam said. \"We're going to get a fire soon. You watch.\" They got out of the car and began to remove the tarp. Sam said, \"Have you heard the old stories about Ivy Baldwin? What he did up here? In Eldorado?\" \"Amazing man,\" she said. \"No, astonishing man. Hard to believe what he did.\" \"Do you think he really did what they say? Crossed that canyon on a wire?\" Sam pointed to the canyon. \"Has to be half a mile across. Quarter mile up.\" \"Absolutely. I have pictures in a book at home. Guy named Ed Tangen took a lot of photos of him.\" \"No net? Dozens of times? For real?\" \"He even did it in his eighties. He was eighty-two, I think, the last time. My grandfather met Ivy once at Elitch's. He used to perform there when it first opened.\" \"Damn.\" Sam got quiet for a moment before he asked, \"Do you know what _prado_ means? In Spanish?\" Lucy said, \"Means 'meadow.'\" \"Huh. Wouldn't have guessed that. Thought it meant vista, or view. Or foothills maybe.\" \"And that,\" Lucy said, \"is why there are fucking dictionaries.\" ## 3 After That Morning ALAN LAUREN HAD PLANNED her own service. The document describing her wishes for what would take place after her death was in the shared file where we stored our wills in our home office. The file was marked WHEN I AM DEAD in block letters. I had not known she had given her funeral any thought, but I was grateful for the road map she left behind. It allowed me an interlude when I would not need to make important decisions. When the time arrived I would hand off the funeral directions to her sister Teresa, who was eager to be useful. LAUREN'S DEATH WAS AN ANTICLIMAX. I had stepped into the kitchen for a glass of water. When I came back she had ceased breathing. Stopped living. Begun being dead. Just like that. I wasn't at her bedside when it happened. The feelings that were so overwhelming to me that morning, the morning she was shot, all came back with fresh intensity. I sat alone with her and cried. I felt some anger. But I felt mostly sad. And very much alone. The only person in the house with me was Sofie, Lauren's teenaged daughter from Holland. Sofie had arrived in Colorado only two days before. That was when she and I met. Sofie was a revelation to me. She entered our fractured, wounded family with grace and familiarity, almost as though she were reentering our family, naturally finding her place in seams and gaps that I didn't perceive until she filled them. She heard me crying beside her mother's body. She joined me. We sat for a while, crying together, arms around each other. To comfort me and maybe herself, she told me stories about her mother's visit to the Netherlands. TERESA GAVE ME INSTRUCTIONS. Because she thought I'd forget, she emailed me schedules. And she texted me reminders about the schedules. She told me what time to be ready to leave the house, when to have the kids ready to go. I did my best to comply. I texted her back so that she didn't have to text me again. Grace wanted her sister, Sofie, not her aunt Teresa, to help with her hair. But it was Teresa who told Grace she couldn't wear that to this, or vice versa. I was grateful for Teresa's help with the daughter wrangling. I would have given in to Grace on everything. Had someone asked me before\u2014before that morning, the morning everything changed\u2014I would have guessed that Lauren would choose cremation. As with so many other things having to do with the end of our lives together, I got that part wrong. The final remembrances were to conclude with a traditional motorcade\u2014a couple of black limousines chasing a black hearse\u2014to a cemetery for an old-fashioned hole-in-the-ground burial. Teresa guided me into place near the gravesite with the frustrated resolve of a choreographer who was exasperated with her most-challenged student. The Indian summer sun shone brilliantly in the southwest sky. I stood where Teresa put me, a half-dozen feet back from a dark pit excavated in a slightly uphill expanse of gray-green turf. I called her back. I said, \"Please. One thing?\" I asked her to have the cemetery staff remove the turf-hued carpet from around the mechanical apparatus that would lower the weight of my wife's coffin into the earth. I was certain that Lauren would not have been pleased by the faux-grass accompaniment. A man from the cemetery rolled up the grass rugs. The unadorned hole looked like a scar in the earth. That felt right to me. The day was about raw dirt. Around me were my children. I was grateful. For them. For their lives. For their presence in mine. For the support they didn't know they gave. In that moment, and forever, for the chance to support them. Around us, mostly behind us, but some on each side, and a few dozen more across the way, were a hundred people, give or take. I only glanced up at their faces a couple of times. I saw many strangers. _How could that be, that so many people I don't recognize want to see my wife's body lowered into the ground?_ Once I learned of Lauren's wish that she be buried, I'd made a guess that the gravesite she preselected would be in the shade of a tree, or on a north-facing slope. It turned out that I got that wrong, too. After years of avoiding sunshine as a reluctant homage to the multiple sclerosis that had plagued her since shortly before we'd met, she wanted her body to disintegrate for eternity in as sun-washed a spot as the high plains could provide. Damn the summer heat. Damn the UV rays. Lauren also surprised me by identifying a friend\u2014someone I wasn't sure I had met, a woman she had once volunteered with somewhere\u2014to act as \"spiritual presence and guide\" at the final service at the cemetery. If forced to rate it before that morning, I would have placed Lauren's spiritual inclinations at no higher than a two on a ten-scale. I allowed that it was possible that I had that wrong, too, about my wife. The cynical side of me entertained and then rejected before finally accepting the alternative conclusion that, should there turn out to be an afterlife, my wife wanted to have greased the skids. Just in case. Maybe. When Lauren's friend stepped forward to begin her role as our spiritual presence, and to guide us, I tried to match her face with a name. I thought Teresa had told me that her name was Crystal. But she introduced herself to us mourners as Clover. Clover spoke for a few minutes. Nothing she said registered. It was babble; her words had nothing to do with Lauren's life. She concluded by looking up at the sky with great drama. She announced that Lauren had asked that a song be played before she was lowered into the earth. I didn't know what the sky had to do with it. But I had woken that morning determined to be well behaved. The determination was essential because I didn't feel at all like being well behaved. In fact I was fighting a strong urge to be a requiem rebel. Lauren's MS had left her music averse for the last years of her life, but she had chosen to have music played when she could no longer be discomfited by it, just as she had wanted the sun to shine when its heat could no longer create any havoc for her. The song she had chosen for the end was \"The Weight\" by the Band. I don't"} +{"id":"RedPajamaArXiv.0000","text":"\\section{Introduction}\\label{sec:intro} \\subsection{Context} The multiple detections of gravitational wave events from inspiralling compact binary systems by the LIGO-Virgo observatory has allowed for a new era of gravitational wave (GW) precision astronomy~\\cite{LIGOScientific:2020ibl}. They have already led to significant progress in a wide range of fields such as relativistic astrophysics, cosmology and fundamental physics. In the future, the space-based LISA observatory coupled to the next generation of ground-based detectors, such as the Einstein Telescope, will help further improve our understanding of the Universe and the fundamental forces that govern it. However, our ability to challenge the current gravitational paradigm, based on general relativity (GR), strongly relies on the construction of very precise and reliable banks of waveform templates for compact binary systems in various alternative theories. In order to perform precise tests of GR with compact binary systems, one can either design some theory-dependent tests or remain agnostic on the choice and existence of a preferred theory of gravity. The former option consists in developing complete (inspiral-merger-ringdown) waveforms in a specific theory of gravity, that would complement the bank of GR templates currently being used~\\cite{Khan:2015jqa,Bohe:2016gbl}. Conversely, the latter path uses general formalisms such as the parametrized post-Newtonian (PPN) formalism~\\cite{Will:2018bme}, the post-Einsteinian formalism~\\cite{Yunes:2009ke,Mirshekari:2011yq} and blind tests of PN parameters~\\cite{Blanchet:1994ex,Mishra:2010tp}. In this paper, we will opt for the first approach and construct gravitational waveforms within the class of scalar-tensor (ST) theories of gravity. These theories were introduced by Jordan~\\cite{jordan1955schwerkraft}, Fierz~\\cite{Fierz:1956zz} and Brans \\& Dicke~\\cite{Brans:2008zz}, and later generalized in~\\cite{Nordtvedt:1970uv,Wagoner:1970vr}. Since then, they have been extensively studied, both from the theoretical and observational points of view. In particular, binary pulsar observations have already put strong constraints on the parameters entering the models, see~\\cite{Damour:1992we,Fujii:2005,DeFelice:2010aj} for reviews. Due to the no-hair theorem in ST theory, valid for stationary \\emph{isolated} black~holes~\\cite{Hawking:1972qk,Sotiriou:2011dz}, one expects that the motion and radiation of \\emph{binary} black holes are indistinguishable from those of the GR solution. To some extent, this expectation has been confirmed by numerical relativity calculations~\\cite{Healy:2011ef}. Consequently, relevant theory-dependent tests for ST theory involve binary neutron stars (or more exotic extended compact objects) as well as asymmetrical black hole-neutron star (BH-NS) binaries, such as the ones recently discovered by LIGO-Virgo~\\cite{LIGOScientific:2021qlt}. We will focus on the inpiral phase of coalescing binary systems, for which the PN formalism, \\textit{i.e.} an approximation for weak gravitational fields and small orbital velocities, can be applied. Previous results on the PN expansion in ST~theories were derived using the effective field theory~\\cite{Damour:1992we,Damour:1995kt} and the Direct Integration of the Relaxed field Equations (DIRE) method~\\cite{Wiseman:1992dv,Will:1996zj}. The implementation for the matched filtering analysis in the LISA detector was studied in~\\cite{Scharre:2001hn}. Important previous results include the derivation of the dynamics of compact binaries at 2.5PN beyond Newtonian, \\textit{i.e.}~$\\sim\\left(v\/c\\right)^5$ order~\\cite{Mirshekari:2013vb}, as well as the computation of the waveform at 2PN order for the tensor modes~\\cite{Lang:2013fna} and 1.5PN order for the scalar modes~\\cite{Lang:2014osa} (where PN orders with respect to waveforms and fluxes are counted relatively to the quadrupolar emission, which is leading order in general relativity). More recently, the equations of motion of compact binaries were computed to 3PN order beyond Newtonian gravity~\\cite{Bernard:2018hta,Bernard:2018ivi} using the multipolar-post-Minkowskian post-Newtonian formalism (MPM-PN)~\\cite{Blanchet:2013haa} coupled to a Fokker Lagrangian approach~\\cite{Bernard:2015njp}. Note that at 3PN order in ST theory, the level of difficulty is similar to 4PN order in GR. The result comes with the presence of a new dipolar non-local tail term at 3PN order and the need to use a dimensional regularisation scheme to treat both the ultraviolet (UV) and infrared (IR) divergences. Finally, the 3PN results were complemented by the derivation of the scalar tidal effects to leading order in ST theories, which also arise at 3PN order due to the presence of the scalar dipole~\\cite{Bernard:2019yfz}. In the present work, we extend previous results by computing the energy flux to 1.5PN order beyond the quadrupolar radiation in GR (previously, the flux was only known to 1PN order) and we compute for the first time the scalar modes to 1.5PN order. In particular, we include the nonlinear memory effect entering at 1.5PN order associated with the dipole radiation. Recent investigations of the memory effect in ST theory can also be found in Refs.~\\cite{Koyama:2020vfc,Hou:2020tnd,Seraj:2021qja}. We also treat the dipolar and quadrupolar tail effects which enter respectively at 0.5PN and 1.5PN order. Contrary to the work of Lang~\\cite{Lang:2013fna,Lang:2014osa}, who uses moments named after Epstein and Wagoner (EW)~\\cite{Epstein:1975}, we adopt symmetric-trace-free (STF) definitions for the multipole moments~\\cite{Thorne:1980ru}. Furthermore, the formalism used in the works~\\cite{Lang:2013fna,Lang:2014osa} to tackle non-linear effects is the DIRE formalism of Will and Wiseman~\\cite{Will:2005sn}, which, although different, was shown to be equivalent to the present MPM-PN formalism~\\cite{Blanchet:2013haa}. Thus, the present paper provides a necessary alternative derivation of the results found by Lang~\\cite{Lang:2013fna,Lang:2014osa}, in addition to extending the flux by a half post-Newtonian order. The paper is organized as follows. In Sec~\\ref{sec:STtheory}, we define the class of massless scalar-tensor theories we are interested in and derive the corresponding field equations. In Sec.~\\ref{sec:MPNinST}, we adapt the multipolar post-Minkowskian formalism to the case of ST theories, focusing in particular on the memory and tail effects. Then, in Sec.~\\ref{sec:compactbin}, we apply this formalism to the specific case of compact binaries, obtain the explicit expressions of the source moments and energy fluxes, and compare them with the literature. In Sec.~\\ref{sec:circular}, we reduce our results to the case of circular orbits, giving the fluxes and the orbital phase evolution for dipolar-driven systems. Finally, in Sec.~\\ref{sec:WF}, we compute for the first time the scalar modes, together with the previously known gravitational modes. Explicit expressions for dissipative terms in the equations of motion are also given for the first time in Appendix~\\ref{app:EOM}; long results concerning the multipole moments are displayed in Appendix~\\ref{app:moments} (including transformation formulae between EW and STF moments); and the very long expression of the instantaneous scalar flux is relegated to Appendix~\\ref{app:fluxcoeffs}. \\subsection{Main notation and summary of parameters} \\label{sec:not} In this section, we present the notation that will be used throughout the article. Some quantities are related to ST theories and their generalized PPN parameters, while others are linked to compact objects and binary systems. \\begin{itemize} \\item We adopt the convention that all PN orders are relative to the standard quadrupole radiation in GR. Thus, the dominant dipole radiation enters at $-$0.5PN order in the waveform and at $-$1PN order in the energy flux. The 1.5PN order aimed at in this paper for the waveform means 2PN order beyond the leading dipolar contribution in the waveform; the 1.5PN order for the flux means 2.5PN relatively to the dipole term in the flux. \\item We use boldface letters to represent three-dimensional Euclidean vectors; we denote by $\\bm{y}_{A}(t)$ the two ordinary coordinate trajectories in a harmonic coordinate system $\\left\\{t,\\mathbf{x}\\right\\}$, by $\\bm{v}_{A}(t)=\\dd\\bm{y}_{A}\/\\dd t$ the two ordinary velocities and by $\\bm{a}_{A}(t)=\\dd\\bm{v}_{A}\/\\dd t$ the two ordinary accelerations; retarded time and advanced time are respectively denoted $u=t-r\/c$ and $v=t+r\/c$; the ordinary separation vector reads $\\bm{n}_{12}=(\\bm{y}_{1}-\\bm{y}_{2})\/r_{12}$, where $r_{12}=\\left\\vert\\bm{y}_{1}-\\bm{y}_{2}\\right\\vert$; ordinary scalar products are denoted by parentheses, \\textit{e.g.} $\\left(n_{12}v_{1}\\right)=\\bm{n}_{12}\\cdot\\bm{v}_{1}$, while the two masses are indicated by $m_{1}$ and $m_{2}$; the 3-dimensional Dirac function is denoted $\\delta^{(3)}(\\mathbf{x})$, and its value at the position $\\bm{y}_A$ is written $\\delta_A \\equiv \\delta^{(3)} (\\mathbf{x} - \\bm{y}_A) $. \\item Additionally, to express quantities in the center-of-mass (CM) frame, we introduce the notations $\\bm{n}=\\bm{n_{12}}$, $r=r_{12}$ and define the relative position $\\bm{x}=\\bm{y_{1}}-\\bm{y_{2}}$, velocity $\\bm{v}=\\bm{v_{1}}-\\bm{v_{2}}$, and acceleration $\\bm{a}=\\bm{a_{1}}-\\bm{a_{2}}$; we pose $v^2=(vv)=\\bm{v}\\cdot\\bm{v}$ and $\\dot{r}=(nv)=\\bm{n}\\cdot\\bm{v}$; the orbital frequency $\\omega$ is defined by the relation $v^2=\\dot{r}^2+r^2\\omega^2$, and will be used when dealing with quasi-circular orbits in Sec.~\\ref{sec:circular}. In the CM frame we use the total mass $m=m_1+m_2$, the reduced mass $\\mu = m_1 m_2 \/ m$, the symmetric mass ratio $\\nu= \\mu\/ m \\in \\ ]0,1\/4]$ and the relative mass difference $\\delta = (m_1-m_2)\/m \\in \\ [0,1[ $. Note that the symmetric mass ratio and the relative mass difference are linked by the relation $\\delta^2 = 1-4\\nu$. \\item We denote $L=i_1\\cdots i_\\ell$ a multi-index with $\\ell$ spatial indices; $\\partial_L = \\partial_{i_1}\\cdots\\partial_{i_\\ell}$, $\\partial_{aL-1} = \\partial_a\\partial_{i_1}\\cdots\\partial_{i_{\\ell-1}}$ and so on; similarly, $n_{L} = n_{i_1}\\cdots n_{i_\\ell}$, $n_{aL-1} = n_a n_{i_1}\\cdots n_{i_{\\ell-1}}$. The symmetric trace-free (STF) part is indicated using a hat or angled brackets: for instance, $\\mathrm{STF}_L [\\partial_L] = \\hat{\\partial}_L = \\partial_{\\langle i_1} \\partial_{i_2}\\cdots \\partial_{ i_\\ell \\rangle}$, $\\mathrm{STF}_L [n_L] = \\hat{n}_L = n_{\\langle i_1} n_{i_2}\\cdots n_{ i_\\ell \\rangle}$ and $\\mathrm{STF}_L [x_L] = \\hat{x}_L = r^\\ell n_{\\langle i_1} n_{i_2}\\cdots n_{ i_\\ell \\rangle}$. \\item The $n$-th time derivative of a function $F(t)$ is denoted $F^{(n)}(t) = \\dd^n F \/ \\dd t^n$, while the $n$-th time anti-derivative is $F^{(-n)}(t) = \\int_{-\\infty}^t \\dd t_1 \\int_{-\\infty}^{t_1} \\cdots \\int_{-\\infty}^{t_{n-1}} \\dd t_n\\, F(t_n)$. We assume that there exists a time $-\\mathcal{T}$ in the remote past such that the fields are stationary, so that $F(t)=0$ when $t<-\\mathcal{T}$ for all considered cases. \\item In order to later present our results, following~\\cite{Bernard:2018hta}, we introduce a number of ST and post-Newtonian parameters. The ST parameters are defined based on the value $\\phi_0$ of the scalar field $\\phi$ at spatial infinity, on the Brans-Dicke-like scalar function $\\omega(\\phi)$ and on the mass-functions $m_A(\\phi)$. We pose $\\varphi\\equiv\\phi\/\\phi_{0}$. The post-Newtonian parameters naturally extend and generalize the usual PPN parameters to the case of a general ST theory~\\cite{Will:1972zz,Will:2018bme}. All these parameters are given and summarized in the following Table~\\ref{table}. \\end{itemize} \\hspace{0.5cm}\\begin{small} \\begin{center} \\begin{tabular}{|c||cc|} \\hline & \\multicolumn{2}{|c|}{\\textbf{ST parameters}} \\\\[2pt] \\hline &&\\\\[-10pt] general & \\multicolumn{2}{c|}{$\\omega_0=\\omega(\\phi_0),\\qquad\\omega_0'=\\eval{\\frac{\\dd\\omega}{\\dd\\phi}}_{\\phi=\\phi_0}, \\qquad\\omega_0''=\\eval{\\frac{\\dd^2\\omega}{\\dd\\phi^2}}_{\\phi=\\phi_0},\\qquad\\varphi = \\frac{\\phi}{\\phi_{0}},\\qquad\\tilde{g}_{\\mu\\nu}=\\varphi\\,g_{\\mu\\nu},$} \\\\[12pt] & \\multicolumn{2}{|c|}{$\\tilde{G} = \\frac{G(4+2\\omega_{0})}{\\phi_{0}(3+2\\omega_{0})},\\qquad \\zeta = \\frac{1}{4+2\\omega_{0}},$} \\\\[8pt] & \\multicolumn{2}{|c|}{$\\lambda_{1} = \\frac{\\zeta^{2}}{(1-\\zeta)}\\left.\\frac{\\dd\\omega}{\\dd\\varphi}\\right\\vert_{\\varphi=1},\\qquad \\lambda_{2} = \\frac{\\zeta^{3}}{(1-\\zeta)}\\left.\\frac{\\dd^{2}\\omega}{\\dd\\varphi^{2}}\\right\\vert_{\\varphi=1}, \\qquad \\lambda_{3} = \\frac{\\zeta^{4}}{(1-\\zeta)}\\left.\\frac{\\dd^{3}\\omega}{\\dd\\varphi^{3}}\\right\\vert_{\\varphi=1}.$} \\\\[7pt] & \\multicolumn{2}{|c|}{$1 \\leftrightarrow 2$ switches the particle's labels (note the index on the $\\lambda_i$'s in not a particle label)} \\\\[7pt] \\hline &&\\\\[-7pt] ~sensitivities~ & \\multicolumn{2}{|c|}{$s_A = \\eval{\\frac{\\dd \\ln{m_A(\\phi)}}{\\dd\\ln{\\phi}}}_{\\phi=\\phi_0},\\qquad s_A^{(k)} = \\eval{\\frac{\\dd^{k+1}\\ln{m_A(\\phi)}}{\\dd(\\ln{\\phi})^{k+1}}}_{\\phi=\\phi_0},\\qquad(A=1,2)$} \\\\[9pt] & \\multicolumn{2}{|c|}{$s'_A = s_A^{(1)},\\qquad s''_A = s_A^{(2)},\\qquad s'''_A = s_A^{(3)},$} \\\\[5pt] & \\multicolumn{2}{|c|}{$\\mathcal{S}_+ = \\frac{1-s_1 - s_2}{\\sqrt{\\alpha}}\\,,\\qquad \\mathcal{S}_- = \\frac{s_2 - s_1}{\\sqrt{\\alpha}}.$} \\\\[7pt] \\hline\\hline Order & \\multicolumn{2}{|c|}{\\textbf{PN parameters}} \\\\[2pt] \\hline &&\\\\[-10pt] N & \\multicolumn{2}{|c|}{$\\alpha= 1-\\zeta+\\zeta\\left(1-2s_{1}\\right)\\left(1-2s_{2}\\right)$} \\\\[5pt] \\hline &&\\\\[-10pt] 1PN & $\\overline{\\gamma} = -\\frac{2\\zeta}{\\alpha}\\left(1-2s_{1}\\right)\\left(1-2s_{2}\\right),$ & Degeneracy \\\\[5pt] & ~~$\\overline{\\beta}_{1} = \\frac{\\zeta}{\\alpha^{2}}\\left(1-2s_{2}\\right)^{2}\\left(\\lambda_{1}\\left(1-2s_{1}\\right)+2\\zeta s'_{1}\\right),$~~~~& $\\alpha(2+\\overline{\\gamma})=2(1-\\zeta)$ \\\\[5pt] & $\\overline{\\beta}_{2} = \\frac{\\zeta}{\\alpha^{2}}\\left(1-2s_{1}\\right)^{2}\\left(\\lambda_{1}\\left(1-2s_{2}\\right)+2\\zeta s'_{2}\\right),$~~~~& \\\\[5pt] & $\\overline{\\beta}_+ = \\frac{\\overline{\\beta}_1+\\overline{\\beta}_2}{2}, \\qquad \\overline{\\beta}_- = \\frac{\\overline{\\beta}_1-\\overline{\\beta}_2}{2}.$ & \\\\[5pt] \\hline &\\\\[-10pt] 2PN & $\\overline{\\delta}_{1} = \\frac{\\zeta\\left(1-\\zeta\\right)}{\\alpha^{2}}\\left(1-2s_{1}\\right)^{2}\\,,\\qquad \\overline{\\delta}_{2} = \\frac{\\zeta\\left(1-\\zeta\\right)}{\\alpha^{2}}\\left(1-2s_{2}\\right)^{2},$ & Degeneracy \\\\[5pt] & $\\overline{\\delta}_+ = \\frac{\\overline{\\delta}_1+\\overline{\\delta}_2}{2}, \\qquad \\overline{\\delta}_- = \\frac{\\overline{\\delta}_1-\\overline{\\delta}_2}{2},$ & $16\\overline{\\delta}_{1}\\overline{\\delta}_{2} = \\overline{\\gamma}^{2}(2+\\overline{\\gamma})^{2}$\\\\[5pt] & $~~\\overline{\\chi}_{1} = \\frac{\\zeta}{\\alpha^{3}}\\left(1-2s_{2}\\right)^{3}\\left[\\left(\\lambda_{2}-4\\lambda_{1}^{2}+\\zeta\\lambda_{1}\\right)\\left(1-2s_{1}\\right)-6\\zeta\\lambda_{1}s'_{1}+2\\zeta^{2}s''_{1}\\right],~~$ & \\\\[5pt] & $\\overline{\\chi}_{2} = \\frac{\\zeta}{\\alpha^{3}}\\left(1-2s_{1}\\right)^{3}\\left[\\left(\\lambda_{2}-4\\lambda_{1}^{2}+\\zeta\\lambda_{1}\\right)\\left(1-2s_{2}\\right)-6\\zeta\\lambda_{1}s'_{2}+2\\zeta^{2}s''_{2}\\right],$ & \\\\[5pt] & $\\overline{\\chi}_+ = \\frac{\\overline{\\chi}_1+\\overline{\\chi}_2}{2}, \\qquad \\overline{\\chi}_- = \\frac{\\overline{\\chi}_1-\\overline{\\chi}_2}{2}.$ & \\\\[5pt] \\hline \\end{tabular} \\captionof{table}{Summary of parameters for the general ST theory and our notation for PN parameters. \\label{table}} \\end{center} \\end{small} \\section{Massless scalar-tensor theories}\\label{sec:STtheory} We consider a generic class of scalar-tensor theories in which a single massless scalar field $\\phi$ minimally couples to the metric $g_{\\mu\\nu}$. It is described by the action \\begin{equation}\\label{STactionJF} S_{\\mathrm{ST}} = \\frac{c^{3}}{16\\pi G} \\int\\dd^{4}x\\,\\sqrt{-g}\\left[\\phi R - \\frac{\\omega(\\phi)}{\\phi}g^{\\alpha\\beta}\\partial_{\\alpha}\\phi\\partial_{\\beta}\\phi\\right] +S_{\\mathrm{m}}\\left(\\mathfrak{m},g_{\\alpha\\beta}\\right)\\,, \\end{equation} where $R$ and $g$ are respectively the Ricci scalar and the determinant of the metric, $\\omega$ is a function of the scalar field and $\\mathfrak{m}$ stands generically for the matter fields. The action for the matter $S_{\\mathrm{m}}$ is a function only of the matter fields and the metric. A major difference in scalar-tensor theories compared to GR is that, as a consequence of the breaking of the strong equivalence principle, we have to take into account the internal gravity of each body. Indeed, the scalar field determines the effective gravitational constant, which in turn affects the competition between gravitational and non-gravitational forces within the body. Thus, the value of the scalar field has an indirect influence on the size of the compact body and on its internal gravity. Here, we follow the approach pioneered by Eardley~\\cite{Eardley1975} (see also~\\cite{Nordtvedt:1990zz}) and we take for $S_{\\mathrm{m}}$ the effective action for $N$ non-spinning point-particles with the masses $m_A(\\phi)$ depending in an unspecified manner on the value of the scalar field at the location of the particles, \\textit{i.e.} \\begin{equation}\\label{matteract} S_{\\mathrm{m}} = - c \\sum_{A} \\int\\,m_{A}(\\phi) \\sqrt{-\\left(g_{\\alpha\\beta}\\right)_{A}\\dd y_{A}^{\\alpha}\\,\\dd y_{A}^{\\beta}}\\,, \\end{equation} where $y_A^\\alpha$ denote the space-time positions of the particles, and $\\left(g_{\\alpha\\beta}\\right)_{A}$ is the metric evaluated at the position of particle~$A$. Thus, the matter action depends indirectly on the scalar field, and we define the sensitivities of the particles to variations in the scalar field by \\begin{equation}\\label{sAk} s_A \\equiv \\eval{\\frac{\\dd\\ln{m_A(\\phi)}}{\\dd\\ln{\\phi}}}_{\\phi=\\phi_0}\\,,\\qquad\\quad s_A^{(k)} \\equiv \\eval{\\frac{\\dd^{k+1}\\ln{m_A(\\phi)}}{\\dd(\\ln{\\phi})^{k+1}}}_{\\phi=\\phi_0} \\quad \\text{for } k\\geqslant 2\\,, \\end{equation} where $\\phi_0$ is the value of the scalar field at spatial infinity that is assumed to be constant in time, \\textit{i.e.} we neglect the cosmological evolution. Since we expand systematically around the asymptotic value of the scalar field, we neglect scalarization~\\cite{Damour:1993hw,Palenzuela:2013hsa}. The sensitivity of neutron stars depends on the mass and internal equation of state. In the weak-field limit, $s_A$ is proportional to the gravitational energy per unit mass of the body and is of order $0.2$. For stationary black holes, since all information regarding the matter which formed the black hole has disappeared behind the horizon, the mass can depend only on the Planck scale, $m_A \\propto M_\\text{Planck} \\propto G^{-1\/2} \\propto \\phi^{1\/2}$ hence $s^\\text{BH}_A=\\frac{1}{2}$. In this work, we will assume that $s^\\text{BH}_A=\\frac{1}{2}$ for each of the black holes in a binary system and check that all our PN results will be indistinguishable from GR in the case of BBHs. The action~\\eqref{STactionJF} is usually called the ``metric'' or ``Jordan''-frame action, as the matter only couples to the Jordan or ``physical'' metric $g_{\\alpha\\beta}$. Then, we define the re-scaled scalar field and the conformally related metric as \\begin{equation} \\varphi\\equiv \\frac{\\phi}{\\phi_{0}}\\,,\\qquad\\qquad\\tilde{g}_{\\alpha\\beta}\\equiv \\varphi\\,g_{\\alpha\\beta}\\,, \\end{equation} so that the physical and conformal metrics have the same asymptotic behaviour at spatial infinity. In terms of these new variables, the action~\\eqref{STactionJF} can be rewritten as \\begin{equation}\\label{STactionEF} S^\\text{GF}_{\\mathrm{ST}} = \\frac{c^{3}\\phi_{0}}{16\\pi G} \\int\\dd^{4}x\\,\\sqrt{-\\tilde{g}}\\left[ \\tilde{R} -\\frac{1}{2}\\tilde{g}_{\\mu\\nu}\\tilde{\\Gamma}^{\\mu}\\tilde{\\Gamma}^{\\nu} - \\frac{3+2\\omega(\\phi)}{2\\varphi^{2}}\\tilde{g}^{\\alpha\\beta}\\partial_{\\alpha}\\varphi\\partial_{\\beta}\\varphi\\right] +S_{\\mathrm{m}}\\left(\\mathfrak{m},g_{\\alpha\\beta}\\right)\\,, \\end{equation} where we have inserted the harmonic gauge-fixing (GF) term $-\\frac{1}{2}\\tilde{g}_{\\mu\\nu}\\tilde{\\Gamma}^{\\mu}\\tilde{\\Gamma}^{\\nu}$ associated with the conformal metric, with $\\tilde{\\Gamma}^{\\mu}\\equiv \\tilde{g}^{\\rho\\sigma}\\tilde{\\Gamma}^{\\mu}_{\\rho\\sigma}$ and $\\tilde{\\Gamma}^{\\mu}_{\\rho\\sigma}$ the Christoffel symbols of that metric, and $\\tilde{R}$ the associated Ricci scalar. As the scalar field is now minimally coupled to the conformal or ``Einstein'' metric, the action~\\eqref{STactionEF} is called the ``Einstein''-frame action. We will perform most of our computations in this frame and go back to the physical metric only in the end when computing observable quantities. Next, we define the scalar and metric perturbation variables $\\psi\\equiv\\varphi-1$ and $h^{\\mu\\nu}\\equiv \\sqrt{-\\tilde{g}}\\tilde{g}^{\\mu\\nu}-\\eta^{\\mu\\nu}$ where $\\eta^{\\mu\\nu}~=~\\text{diag}(-1,1,1,1)$ is the Minkowski metric. Then, the field equations derived from the harmonic gauge-fixed action~\\eqref{STactionEF} read \\begin{subequations}\\label{rEFE} \\begin{align} & \\Box_{\\eta}\\,h^{\\mu\\nu} = \\frac{16\\pi G}{c^{4}}\\tau^{\\mu\\nu}\\,,\\\\ & \\Box_{\\eta}\\,\\psi = -\\frac{8\\pi G}{c^{4}}\\tau_{s}\\,, \\end{align} \\end{subequations} where $\\Box_{\\eta}$ denotes the ordinary flat space-time d'Alembertian operator, and where the source terms read \\begin{subequations} \\begin{align}\\label{taumunu} & \\tau^{\\mu\\nu} = \\frac{\\varphi}{\\phi_{0}} \\vert g\\vert T^{\\mu\\nu} +\\frac{c^{4}}{16\\pi G}\\Lambda^{\\mu\\nu}\\,,\\\\ \\label{taus} & \\tau_{s} = -\\frac{\\varphi}{\\phi_{0}(3+2\\omega)}\\sqrt{-g}\\left(T-2\\varphi\\frac{\\partial T}{\\partial \\varphi}\\right) -\\frac{c^{4}}{8\\pi G}\\Lambda_s\\,. \\end{align} \\end{subequations} Here $T^{\\mu\\nu}= 2 (-g)^{-1\/2}\\delta S_{\\mathrm{m}}\/\\delta g_{\\mu\\nu}$ is the matter stress-energy tensor, $T\\equiv g_{\\mu\\nu}T^{\\mu\\nu}$ and $\\partial T\/\\partial \\varphi$ is defined as the partial derivative of $T(g_{\\mu\\nu}, \\varphi)$ holding $g_{\\mu\\nu}$ constant. The non-linearities in the scalar source read \\begin{equation}\\label{lambdas} \\Lambda_s = -h^{\\alpha\\beta}\\partial_{\\alpha}\\partial_{\\beta}\\psi-\\partial_{\\alpha}\\psi\\partial_{\\beta}h^{\\alpha\\beta} +\\left(\\frac{1}{\\varphi}-\\frac{\\phi_{0}\\omega'(\\phi)}{3+2\\omega(\\phi)}\\right)\\tilde{\\mathfrak{g}}^{\\alpha\\beta}\\partial_{\\alpha}\\psi\\partial_{\\beta}\\psi\\,. \\end{equation} We write the tensor source as $\\Lambda^{\\mu\\nu} = \\Lambda^{\\mu\\nu}_{\\mathrm{LL}}+\\Lambda_{\\mathrm{H}}^{\\mu\\nu}+\\Lambda^{\\mu\\nu}_{\\mathrm{GF}}+\\Lambda_{\\phi}^{\\mu\\nu}$, where $\\Lambda^{\\mu\\nu}_{\\mathrm{LL}}$ is the Landau-Lifshitz pseudo-energy tensor~\\cite{Landau1971}, $\\Lambda^{\\mu\\nu}_{\\mathrm{H}}$ comes from our use of the flat version of the d'Alembertian operator in Eqs.~\\eqref{rEFE}, $\\Lambda^{\\mu\\nu}_{\\mathrm{GF}}$ is due to the gauge-fixing term in the action and $\\Lambda_{\\phi}^{\\mu\\nu}$ is sourced by the scalar field. Note that $\\Lambda_{\\mathrm{GR}}^{\\mu\\nu}=\\Lambda^{\\mu\\nu}_{\\mathrm{LL}}+\\Lambda_{\\mathrm{H}}^{\\mu\\nu}+\\Lambda^{\\mu\\nu}_{\\mathrm{GF}}$ will take the same form as in GR. The expressions of these source terms are given by \\begin{subequations}\\label{exprLambda} \\begin{align}\\label{LambdaLL} & \\Lambda_{\\mathrm{LL}}^{\\alpha\\beta} =\\ \\frac{1}{2}\\tilde{\\mathfrak{g}}^{\\alpha\\beta}\\tilde{\\mathfrak{g}}_{\\mu\\nu}\\partial_{\\lambda}h^{\\mu\\gamma}\\partial_{\\gamma}h^{\\nu\\lambda}-\\tilde{\\mathfrak{g}}^{\\alpha\\mu}\\tilde{\\mathfrak{g}}_{\\nu\\gamma}\\partial_{\\lambda}h^{\\beta\\gamma}\\partial_{\\mu}h^{\\nu\\lambda} -\\tilde{\\mathfrak{g}}^{\\beta\\mu}\\tilde{\\mathfrak{g}}_{\\nu\\gamma}\\partial_{\\lambda}h^{\\alpha\\gamma}\\partial_{\\mu}h^{\\nu\\lambda} \\nonumber&\\\\ &\\qquad\\quad +\\tilde{\\mathfrak{g}}_{\\mu\\nu}\\tilde{\\mathfrak{g}}^{\\lambda\\gamma}\\partial_{\\lambda}h^{\\alpha\\mu}\\partial_{\\gamma}h^{\\beta\\nu} +\\frac{1}{8}\\left(2\\tilde{\\mathfrak{g}}^{\\alpha\\mu}\\tilde{\\mathfrak{g}}^{\\beta\\nu}-\\tilde{\\mathfrak{g}}^{\\alpha\\beta}\\tilde{\\mathfrak{g}}^{\\mu\\nu}\\right)\\left(2\\tilde{\\mathfrak{g}}_{\\lambda\\gamma}\\tilde{\\mathfrak{g}}_{\\tau\\pi}-\\tilde{\\mathfrak{g}}_{\\gamma\\tau}\\tilde{\\mathfrak{g}}_{\\lambda\\pi}\\right)\\partial_{\\mu}h^{\\lambda\\pi}\\partial_{\\nu}h^{\\gamma\\tau} \\,, \\\\ \\label{LambdaH} &\\Lambda_{\\mathrm{H}}^{\\alpha\\beta} = -h^{\\mu\\nu}\\partial_{\\mu}\\partial_{\\nu}h^{\\alpha\\beta} +\\partial_{\\mu}h^{\\alpha\\nu}\\partial_{\\nu}h^{\\beta\\mu} \\,,\\\\ \\label{Lambdagf} & \\Lambda_{\\mathrm{GF}}^{\\alpha\\beta} = - \\partial_{\\lambda}h^{\\lambda\\alpha} \\partial_{\\sigma}h^{\\sigma\\beta} - \\partial_{\\lambda}h^{\\lambda\\rho}\\partial_{\\rho}h^{\\alpha\\beta} -\\frac{1}{2}\\tilde{\\mathfrak{g}}^{\\alpha\\beta}\\tilde{\\mathfrak{g}}_{\\rho\\sigma} \\partial_{\\lambda}h^{\\lambda\\rho} \\partial_{\\gamma}h^{\\gamma\\sigma} +2\\tilde{\\mathfrak{g}}_{\\rho\\sigma}\\tilde{\\mathfrak{g}}^{\\lambda(\\alpha} \\partial_{\\lambda}h^{\\beta)\\rho}\\partial_{\\gamma}h^{\\gamma\\sigma} \\,,\\\\ \\label{Lambdas} &\\Lambda_{\\phi}^{\\mu\\nu} = \\frac{3+2\\omega(\\phi)}{\\varphi^2}\\left(\\tilde{\\mathfrak{g}}^{\\mu\\alpha}\\tilde{\\mathfrak{g}}^{\\nu\\beta} -\\frac{1}{2}\\tilde{\\mathfrak{g}}^{\\mu\\nu}\\tilde{\\mathfrak{g}}^{\\alpha\\beta}\\right)\\partial_{\\alpha}\\psi\\partial_{\\beta}\\psi\\,. \\end{align} \\end{subequations} Note that the gauge-fixing term~\\eqref{Lambdagf} contains the harmonicities $\\partial_{\\nu}h^{\\mu\\nu}$ which are not zero off-shell, \\textit{i.e.} when the accelerations are not replaced by the equations of motion. However, this term will ensure that, on-shell, our results are in harmonic coordinates. \\section{The Multipolar post-Minkowskian formalism in scalar-tensor theories}\\label{sec:MPNinST} \\subsection{The scalar-tensor multipole moments} In this section, we solve the ST vacuum field equations, $\\Box h^{\\mu\\nu} = \\Lambda^{\\mu\\nu}$ and $\\Box \\psi = \\Lambda_s$, in the exterior region of the isolated matter system by means of a multipolar decomposition (indicated by $\\mathcal{M}$) conjointly with a non-linear post-Minkowskian expansion~\\cite{Blanchet:1985sp}. Thus, the solution is written as \\begin{subequations} \\begin{align} h^{\\mu\\nu}_{\\mathrm{ext}} &\\equiv \\mathcal{M}(h^{\\mu\\nu}) = G h_1^{\\mu\\nu} + G^2 h_2^{\\mu\\nu} + \\calO\\left( G^3\\right)\\,,\\label{h1h2}\\\\ \\psi_{\\mathrm{ext}} &\\equiv \\mathcal{M}(\\psi) = G \\psi_1 + G^2 \\psi_2 + \\calO\\left(G^3\\right)\\,. \\end{align} \\end{subequations} The multipolar expansion is entirely specified by the most general expressions for the multipolar decomposition of the linear coefficients $h_1^{\\mu\\nu}$ and $\\psi_1$. Starting with the tensor coefficient $h_1^{\\mu\\nu}$ which satisfies the vacuum equations, $\\Box h_1^{\\mu\\nu} = \\partial_\\nu h_1^{\\mu\\nu} = 0$, we adopt the same definition of multipole moments as in GR, \\textit{i.e.} we write the most general solution in harmonic coordinates as \\begin{equation}\\label{h1mult} h_{1}^{\\mu\\nu} = k_1^{\\mu\\nu} + \\partial^\\mu \\xi_1^\\nu + \\partial^\\nu \\xi_1^\\mu - \\eta^{\\mu\\nu} \\partial_\\sigma \\xi_1^\\sigma \\,,\\end{equation} where the gauge vector $\\xi_1^\\mu$ obeys $\\Box \\xi_1^\\mu = 0$, and where $k_1^{\\mu\\nu}$ takes a ``canonical'' form~\\cite{Thorne:1980ru} in terms of two sets of source multipole moments $I_L(u)$ (mass type) and $J_L(u)$ (current type), with $u\\equiv t-r\/c$. The moments $I_L$ and $J_L$ are symmetric-trace-free (STF) with respect to the $\\ell$ indices composing $L$. We pose \\begin{subequations}\\label{k1mult} \\begin{align} k_1^{00} &= - \\frac{4}{c^2}\\sum_{\\ell= 0}^{+\\infty}\\frac{(-)^\\ell}{\\ell!}\\partial_L\\left[\\frac{I_L(u)}{r}\\right]\\,,\\\\ k_1^{0i} &= \\frac{4}{c^3}\\sum_{\\ell= 1}^{+\\infty}\\frac{(-)^\\ell}{\\ell!} \\left(\\partial_{L-1}\\left[\\frac{1}{r}\\overset{(1)}{I_{iL-1}}(u)\\right] + \\frac{\\ell}{\\ell+1} \\partial_{aL-1} \\left[ \\frac{1}{r}\\varepsilon_{iab}J_{bL-1}(u) \\right]\\right)\\,,\\\\ k_1^{ij} &= -\\frac{4}{c^4}\\sum_{\\ell= 2}^{+\\infty}\\frac{(-)^\\ell}{\\ell!} \\left(\\partial_{L-2}\\left[\\frac{1}{r}\\overset{(2)}{I_{ijL-2}}(u)\\right] + \\frac{2\\ell}{\\ell+1} \\partial_{aL-2} \\left[ \\frac{1}{r}\\varepsilon_{ab(i}\\overset{(1)}{J}_{j)bL-2}(u) \\right]\\right) \\,. \\end{align} \\end{subequations} The moments are defined in such a way that they reduce to the familiar expressions of the Newtonian moments at leading order~\\cite{Thorne:1980ru}. The lowest monopolar and dipolar moments satisfy the usual conservation laws $\\dd I\/\\dd t =0$, $\\dd^2 I_i\/\\dd t^2 =0$ and $\\dd J_i\/\\dd t =0$, which are consequences of the harmonic gauge condition $\\partial_\\nu k_1^{\\mu\\nu} = 0$. In particular, the monopole $I$ is directly related to the ADM mass $M$ of the system, defined in the usual way at spatial infinity (for either the physical or Einstein metric) by $I=M\/\\phi_0$.\\footnote{Indeed, from $\\Box\\,h^{\\mu\\nu} = \\frac{16\\pi G}{c^{4}}\\tau^{\\mu\\nu}$ we infer that $h^{00} = -\\frac{4G I}{c^2} + \\cdots$ where $I = c^{-2}\\int \\dd^3\\mathbf{x}\\,\\tau^{00}$. For a system of point masses which are initially in free motion (when $t\\to -\\infty$), the ADM mass is given by $M=\\sum_A m_A$, while from Eq.~\\eqref{taumunu} we see that at spatial infinity $\\tau^{00}=T^{00}\/\\phi_0 = c^2 \\sum_A m_A\\delta_A\/\\phi_0$, hence we have $I=M\/\\phi_0$.} The linear gauge vector $\\xi^\\mu$ in~\\eqref{h1mult} similarly admits a decomposition in terms of four moments called the gauge moments, $W_L$, $X_L$, $Y_L$ and $Z_L$ adopting the same definition as in GR, and given by Eqs.~(37) in~\\cite{Blanchet:2013haa}. To obtain the expressions of the moments $I_L$, $J_L$ (and also $W_L$, $X_L$, $Y_L$ and $Z_L$) as functions of the source, the procedure is essentially the same as in GR. The multipole expansion of $h^{\\mu\\nu}$ is obtained using a matching to the PN expansion in the near zone of the source as~\\cite{Blanchet:1998in} \\begin{subequations} \\begin{align}\\label{Mhmunu} \\mathcal{M}(h^{\\mu\\nu}) &= \\mathop{\\mathrm{FP}}_{B=0}\\, \\Box^{-1}_\\mathrm{ret} \\Bigl[ \\tilde{r}^B \\mathcal{M}(\\Lambda^{\\mu\\nu})\\Bigr] - \\frac{4 G}{c^4} \\sum_{\\ell=0}^{+\\infty} \\frac{(-)^\\ell}{\\ell!}\\,\\partial_L\\!\\left[\\frac{\\mathcal{F}_L^{\\mu\\nu}(u)}{r}\\right] \\,. \\end{align} The first term is a solution of the wave equation defined with a specific regularization to cope with the divergence of the multipole expansion when $r\\to 0$. The source term $\\mathcal{M}(\\Lambda^{\\mu\\nu})$ is multiplied by the regularization factor $\\tilde{r}^B \\equiv (r\/r_0)^B$ where $B\\in\\mathbb{C}$ and $r_0$ is a regularization length scale, and a Hadamard finite part (FP) procedure is applied on the Laurent expansion of the analytic continuation of the retarded integral when $B\\to 0$. The second term in~\\eqref{Mhmunu} represents a homogeneous retarded solution parametrized by the multipole moment function (STF in its indices $L$) \\begin{align}\\label{FLmunu} \\quad\\mathcal{F}_L^{\\mu\\nu}(u) &= \\mathop{\\mathrm{FP}}_{B=0}\\int \\dd^3\\mathbf{x}\\,\\tilde{r}^B\\,\\hat{x}_L\\,\\int_{-1}^1 \\dd z \\,\\delta_\\ell(z)\\,\\overline{\\tau}^{\\mu\\nu}(\\mathbf{x},u+ z r\/c)\\,, \\end{align} \\end{subequations} where $\\delta_\\ell (z) \\equiv \\frac{(2\\ell+1)!!}{2^{\\ell+1} \\ell!}(1-z^2)^\\ell$ is such that $\\int_{-1}^{1} \\dd z\\,\\delta_\\ell(z) = 1$ and $\\lim_{\\ell\\to+\\infty}\\delta_\\ell (z) = \\delta(z)$. The function $\\mathcal{F}_L^{\\mu\\nu}(u)$ is expressed in full generality in terms of the PN expansion of the pseudo-tensor $\\overline{\\tau}^{\\mu\\nu}$ defined in~\\eqref{taumunu}. From the result~\\eqref{Mhmunu}, we can identify the linearized piece $G h_1^{\\mu\\nu}$ in~\\eqref{h1h2} as being essentially given by the second term in~\\eqref{Mhmunu}. However, the situation is more complicated because one also has to take into account the harmonic gauge condition which is not satisfied separately by the second term in~\\eqref{Mhmunu}. In the end, the source moments follow from the irreducible decomposition of the space-time components $\\mathcal{F}_L^{\\mu\\nu}(u)$. Defining $\\Sigma \\equiv (\\bar\\tau^{00} + \\bar\\tau^{ii})\/c^2$, $\\Sigma_i \\equiv \\bar\\tau^{0i}\/c$ and $\\Sigma_{ij} \\equiv \\bar\\tau^{ij}$, we get \\begin{subequations}\\label{momentsIJ} \\begin{align} I_L(u) &= \\mathop{\\mathrm{FP}}_{B=0}\\int \\dd^3 \\mathbf{x} \\,\\tilde{r}^B \\int_{-1}^1 \\dd z \\bigg[ \\delta_\\ell(z) \\hat{x}_L \\Sigma - \\frac{4(2\\ell +1)}{c^2(\\ell+1)(2\\ell+3)} \\delta_{\\ell+1}(z) \\hat{x}_{iL} \\Sigma^{(1)}_i \\nonumber\\\\ & \\qquad \\qquad \\qquad \\qquad \\qquad \\qquad \\qquad \\qquad + \\frac{2(2\\ell + 1)}{c^4 (\\ell+1)(\\ell+2)(2\\ell+5)} \\delta_{\\ell+2}(z) \\hat{x}_{ijL} \\Sigma^{(2)}_{ij} \\bigg] ( \\mathbf{x}, u+z r\/c) \\,,\\\\ J_L(u) &= \\mathop{\\mathrm{FP}}_{B=0} \\int \\dd^3 \\mathbf{x} \\,\\tilde{r}^B \\int_{-1}^1 \\dd z \\,\\varepsilon_{ab\\langle i_\\ell} \\bigg[ \\delta_\\ell(z) \\hat{x}_{L-1\\rangle a} \\Sigma_b -\\frac{2\\ell+1}{c^2(\\ell+2)(2\\ell+3)} \\delta_{\\ell+1}(z) \\hat{x}_{L-1\\rangle ac} \\Sigma^{(1)}_{bc}\\bigg]( \\mathbf{x}, u + z r\/c)\\,. \\end{align} \\end{subequations} These expressions are formally identical as those in GR, but of course in ST theory the source terms $\\Sigma$, $\\Sigma_i$ and $\\Sigma_{ij}$ depend on the scalar field through Eqs.~\\eqref{exprLambda}. Similarly, the gauge moments' expressions are formally identical to the GR case and are given by Eqs.~(125) in~\\cite{Blanchet:2013haa}. Next, in ST theory the scalar field brings, in addition to $I_L(u)$ and $J_L(u)$, a new set of multipole moments which we call $I_L^s(u)$, also chosen to be STF. Finding their expression is simpler than in GR (we do not need a correction due to the gauge condition) and the linear piece $G \\psi_1$ can be directly identified from the multipole expansion of $\\psi$. We find \\begin{subequations} \\begin{align} \\mathcal{M}(\\psi) &= \\mathop{\\mathrm{FP}}_{B=0}\\, \\Box^{-1}_\\mathrm{ret} \\Bigl[ \\tilde{r}^B \\mathcal{M}(\\Lambda^s)\\Bigr] + G \\psi_1 \\,,\\label{Mpsi}\\\\ \\text{with}\\quad\\psi_1 &= - \\frac{2}{c^2} \\sum_{\\ell=0}^{+\\infty} \\frac{(-)^\\ell}{\\ell!}\\,\\partial_L\\!\\left[\\frac{I_L^s(u)}{r}\\right]\\,.\\label{psi1} \\end{align} \\end{subequations} Similarly to the GR case, the scalar moments are obtained in closed form and we have, defining $\\Sigma^s \\equiv - \\bar\\tau_s\/c^2$, \\begin{equation}\\label{psi1mult} I^s_L(u) = \\mathop{\\mathrm{FP}}_{B=0} \\int \\dd^3 \\mathbf{x}\\,\\tilde{r}^B \\int_{-1}^1 \\dd z \\,\\delta_\\ell(z) \\,\\hat{x}_L \\Sigma^s ( \\mathbf{x}, u+z r\/c)\\,. \\end{equation} Note that in contrast to the tensor monopole $I$, the scalar monopole $I^s$ is not constant but its time-variation will be a post-Newtonian effect, \\textit{i.e.} $\\dd I^s\/\\dd t = \\mathcal{O}(c^{-2})$. Later, we will define $I^s(u) = \\phi_0^{-1}[ m^s+\\frac{1}{c^2}E^s(u) ]$ where $m^s$ is constant and $E^s(u)$ is the time-varying PN correction, see Eq.~\\eqref{Is}. \\subsection{Memory and tail effects in ST theory} Once the vacuum linearized solutions~\\eqref{k1mult} and~\\eqref{psi1} are obtained, with explicit expressions for the multipole moments as integrals over the PN expansions of $\\tau^{\\mu\\nu}$ and $\\tau_s$, the non-linear contributions can be computed by adapting to ST theories the Multipolar-post-Minkowskian (MPM) algorithm of~\\cite{Blanchet:1985sp}. In the following, we will focus our discussion on the new effects specific to ST theories but at the end, we will give the complete non-linear contributions needed to control the waveform to 1.5PN order beyond the quadrupole radiation of GR. In GR, the non-linear memory~\\cite{Christodoulou:1991cr,Thorne:1992sdb,Blanchet:1992br,Wiseman:1991ss} is a non-local effect due to the radiation of linear waves by the stress-energy tensor, dominantly associated with the mass quadrupole moment. In ST theory, there is a new type of memory effect associated with the scalar dipole radiation that comes from the quadratic interaction between two scalar dipole moments, say $I_i^s \\times I_j^s$. As we shall see, such an effect arises at 1.5PN order in the waveform. For the dipole radiation, the linear approximation to the scalar field given by~\\eqref{psi1} reads (with $c=1$) \\begin{equation}\\label{psi1dipole} \\psi_1{\\Big|}_{I_i^s} = -2 \\partial_i\\left[\\frac{I_i^s(u)}{r}\\right] = 2 n^i\\Bigl[ r^{-1} \\overset{(1)}{I^s_i}(u) + r^{-2} I^s_i(u) \\Bigr]\\,.\\end{equation} The equation to be solved for the quadratic interaction $I_i^s \\times I_j^s$, including the non-linear memory effect, is\\footnote{The memory effect arises only in the tensor part $h^{\\mu\\nu}_2$ and not in the scalar part $\\psi_2$, though there will be a local (non-memory) contribution in the scalar field due to the interaction $I_i^s \\times I_j^s$, see Eq.~\\eqref{radUs} below.} \\begin{subequations}\\label{eqordre2} \\begin{align} & \\Box h^{\\mu\\nu}_2{\\Big|}_{I_i^s \\times I_j^s} = \\Lambda^{\\mu\\nu}_2{\\Big|}_{I_i^s \\times I_j^s}\\,,\\\\ \\label{source2} \\text{with }\\quad &\\Lambda^{\\mu\\nu}_2{\\Big|}_{I_i^s \\times I_j^s} \\equiv \\left(3+2\\omega_0\\right)\\left(\\eta^{\\mu\\rho}\\eta^{\\nu\\sigma}-\\frac{1}{2}\\eta^{\\mu\\nu}\\eta^{\\rho\\sigma}\\right)\\partial_\\rho\\psi_1\\partial_\\sigma\\psi_1{\\Big|}_{I_i^s \\times I_j^s}\\,, \\end{align} \\end{subequations} where the source term has been obtained from Eq.~\\eqref{Lambdas}. Following the MPM algorithm, we shall obtain the solution of this equation, together with the harmonic coordinate condition, by the following two steps process: \\begin{subequations}\\label{MPM} \\begin{align} h^{\\mu\\nu}_2{\\Big|}_{I_i^s \\times I_j^s} &= u^{\\mu\\nu}_2 + v^{\\mu\\nu}_2{\\Big|}_{I_i^s \\times I_j^s}\\,. \\end{align} The first step consists in constructing a particular solution $u^{\\mu\\nu}_2$ of Eq.~\\eqref{eqordre2} using the regularized retarded Green's function. However, as it does not satisfy the harmonicity condition it is not an acceptable solution yet. To overcome this difficulty, in the second step, we compute the divergence $w_2^\\mu = \\partial_\\nu u_2^{\\mu\\nu}$ and then apply the MPM algorithm, symbolized below by the operator $\\mathcal{H}$ acting on the vector $w_2^\\mu$. More precisely, it consists in constructing a homogeneous solution $v_2^{\\mu\\nu}$ of the wave equation such that its divergence is exactly the opposite of the divergence of $u_2^{\\mu\\nu}$, \\textit{i.e.} $\\Box v_2^{\\mu\\nu}=0$ and $\\partial_\\nu v_2^{\\mu\\nu} = - w_2^{\\mu}$. The algorithm $\\mathcal{H}$ is defined by Eqs.~(2.12) of~\\cite{Blanchet:1997ji}. To summarize, the two steps read \\begin{align} \\text{(i)}\\qquad u^{\\mu\\nu}_2{\\Big|}_{I_i^s \\times I_j^s} &= \\mathop{\\mathrm{FP}}_{B=0}\\, \\Box^{-1}_\\mathrm{ret} \\Bigl[ \\tilde{r}^B \\Lambda^{\\mu\\nu}_2\\Bigr]{\\Big|}_{I_i^s \\times I_j^s}\\,,\\label{u2}\\\\ \\text{(ii)}\\qquad v^{\\mu\\nu}_2{\\Big|}_{I_i^s \\times I_j^s} &= \\mathcal{H}\\Bigl[w^{\\mu}_2\\equiv \\partial_\\nu u^{\\mu\\nu}_2\\Bigr]{\\Big|}_{I_i^s \\times I_j^s}\\,. \\end{align} A useful point is that the divergence of the particular solution $u_2^{\\mu\\nu}$ comes only from the differentiation of the regularization factor $\\tilde{r}^B$ (since the source term obeys $\\partial_\\nu \\Lambda_2^{\\mu\\nu} =0$), hence \\begin{equation}\\label{w2} w^{\\mu}_2{\\Big|}_{I_i^s \\times I_j^s} = \\mathop{\\mathrm{FP}}_{B=0}\\, \\Box^{-1}_\\mathrm{ret} \\Bigl[ B\\, \\tilde{r}^B \\frac{n^i}{r}\\Lambda^{\\mu i}_2\\Bigr]{\\Big|}_{I_i^s \\times I_j^s}\\,. \\end{equation} \\end{subequations} Due to the presence of the explicit factor $B$, we only have to look at the pole $\\propto 1\/B$ coming from the integration. It turns out that, even without having controlled the full $u_2^{\\mu\\nu}$ before, the result~\\eqref{w2} is very simple to compute. Inserting the source term~\\eqref{source2} computed with~\\eqref{psi1dipole}, and integrating by means of Eq.~(A18) of~\\cite{Blanchet:1997ji}, we get, to the leading $1\/r$ order when $r\\to+\\infty$, \\begin{align} w_2^0{\\Big|}_{I_i^s \\times I_j^s} &= \\frac{3+2\\omega_0}{r}\\left[ -\\frac{4}{3} \\overset{(2)}{I}{}^s_i \\overset{(2)}{I}{}^s_i + \\frac{\\dd}{\\dd u}\\left(\\frac{4}{3}\\overset{(1)}{I^s_i} \\overset{(2)}{I^s_i} - \\frac{8}{9}\\overset{}{I}{}^s_i \\overset{(3)}{I^s_i}\\right)\\right] + \\mathcal{O}\\left(\\frac{1}{r^2}\\right)\\,,\\\\ w_2^i{\\Big|}_{I_i^s \\times I_j^s} &= \\frac{3+2\\omega_0}{r}\\frac{\\dd}{\\dd u}\\left(\\frac{4}{9} n^i \\overset{}{I}{}^s_j \\overset{(3)}{I^s_j} + \\frac{8}{9} n^j I^s_j \\overset{(3)}{I^s_i} - \\frac{4}{9} n^j \\overset{}{I^s_i}{} \\overset{(3)}{I^s_j}\\right) + \\mathcal{O}\\left(\\frac{1}{r^2}\\right)\\,. \\end{align} Applying the algorithm $\\mathcal{H}$ or, rather, its version at leading order $1\/r$ explained in Appendix B of~\\cite{Blanchet:1997jj}, and keeping only the non-local (hereditary) terms (we shall add all instantaneous terms in the end results below), we get \\begin{equation}\\label{v200} v_2^{00}{\\Big|}_{I_i^s \\times I_j^s} = \\frac{3+2\\omega_0}{r}\\left[\\frac{4}{3} \\int_{-\\infty}^u \\dd v \\, \\overset{(2)}{I^s_i}(v) \\overset{(2)}{I^s_i}(v) + \\text{``inst.''}\\right] + \\mathcal{O}\\left(\\frac{1}{r^2}\\right)\\,, \\end{equation} while $v_2^{0i}$ and $v_2^{ij}$ are purely instantaneous. The term~\\eqref{v200} has the form of a mass correction, and taking into account $k_1^{00} = -4 I\/r+\\cdots$ together with the link $I = M\/\\phi_0$, where $M$ is the constant ADM mass, we obtain the Bondi-type mass taking into account radiation loss as \\begin{equation}\\label{MB} M_\\text{B} (u) = M - \\frac{\\left(3+2\\omega_0 \\right)\\phi_0}{3} \\int_{-\\infty}^u \\dd v \\, \\overset{(2)}{I^s_i}(v) \\overset{(2)}{I^s_i}(v)\\,, \\end{equation} which implies the standard dipolar mass law in ST theory, as given for instance by Eq.~(9) in~\\cite{Bernard:2019yfz}. Let us now consider the piece $u_2^{\\mu\\nu}$ defined by~\\eqref{u2}, and look for non-local effects therein. For any wave equation whose source term is made of quadratic products of linear waves, like Eq.~\\eqref{psi1dipole}, we know that the non-local terms arise only from the coefficient $1\/r^2$ in the source, see the proof in~\\cite{Blanchet:1997ji}. For the dipolar waves, this takes the form of the stress-energy tensor of massless radiation, namely \\begin{align}\\label{1surr2} \\Lambda^{\\mu\\nu}_2 &= \\frac{k^\\mu k^\\nu}{r^2} \\sigma(u,\\bm{n}) + \\mathcal{O}\\left(\\frac{1}{r^3}\\right)\\,, \\end{align} where $k^\\mu=(1,n^i)$ is the Minkowski null vector and the energy density in the dipolar wave is given by \\begin{align}\\label{sigma} \\sigma(u,\\bm{n}){\\Big|}_{I_i^s \\times I_j^s} &= 4 \\left(3+2\\omega_0\\right) n^i n^j \\overset{(2)}{I^s_i}(u) \\overset{(2)}{I^s_j}(u) \\,. \\end{align} Thus, the energy distribution in the dipolar waves is \\begin{align}\\label{dEwavedOmega} \\frac{\\dd E^\\text{wave}}{\\dd \\Omega} &= \\frac{1}{16\\pi\\phi_0}\\int_{-\\infty}^u \\dd v \\,\\sigma(v,\\bm{n})\\,, \\end{align} with the total energy in the waves given by $\\Delta E^\\text{wave} \\equiv \\int\\dd\\Omega\\,\\frac{\\dd E^\\text{wave}}{\\dd \\Omega} = M - M_\\text{B}$. As we have already mentionned, the only hereditary contributions in $u_2^{\\mu\\nu}$ comes from the piece~\\eqref{1surr2}. At this stage, it is convenient to perform a gauge transformation with gauge vector~\\cite{Blanchet:1986dk} \\begin{align}\\label{zeta2} \\zeta^{\\mu}_2 \\equiv \\mathop{\\mathrm{FP}}_{B=0}\\, \\Box^{-1}_\\mathrm{ret} \\Bigl[ \\tilde{r}^B \\frac{k^\\mu}{2 r^2} \\int_{-\\infty}^u \\dd v \\,\\sigma(v,\\bm{n})\\Bigr]\\,. \\end{align} Posing ${u'}^{\\mu\\nu}_2=u^{\\mu\\nu}_2+\\partial^\\mu\\zeta^{\\nu}_2+\\partial^\\nu\\zeta^{\\mu}_2-\\eta^{\\mu\\nu}\\partial_\\rho\\zeta^{\\rho}_2$ and adding Eq.~\\eqref{v200}, we then obtain the metric in the new gauge, \\textit{i.e.} ${h'}^{\\mu\\nu}_2 \\equiv {u'}^{\\mu\\nu}_2 + {v}^{\\mu\\nu}_2$, in the form \\begin{align}\\label{h'munu2} {h'}^{\\mu\\nu}_2 = \\frac{1}{r}\\left[\\int_{-\\infty}^u \\dd v \\,\\mathcal{H}^{\\mu\\nu}_2(v,\\bm{n}) + \\text{``inst.''} \\right] + \\mathcal{O}\\left(\\frac{1}{r^2}\\right) \\,, \\end{align} where the non-local contributions read \\begin{subequations}\\label{Hmunu2} \\begin{align} \\mathcal{H}^{00}_2{\\Big|}_{I_i^s \\times I_j^s} &= \\frac{2 \\left(3+2\\omega_0\\right)}{3} \\,\\overset{(2)}{I^s_i}\\overset{(2)}{I^s_i}\\,,\\\\ \\mathcal{H}^{0i}_2{\\Big|}_{I_i^s \\times I_j^s} &= \\frac{2 \\left(3+2\\omega_0\\right)}{3} \\left[n^{ijk}\\overset{(2)}{I^s_j}\\overset{(2)}{I^s_k} + n^{i}\\overset{(2)}{I^s_j}\\overset{(2)}{I^s_j} - n^{j}\\overset{(2)}{I^s_i}\\overset{(2)}{I^s_j} \\right]\\,,\\\\ \\mathcal{H}^{ij}_2{\\Big|}_{I_i^s \\times I_j^s} &= \\left(3+2\\omega_0\\right) \\left[ n^{ijkl}\\overset{(2)}{I^s_k}\\overset{(2)}{I^s_l} + \\frac{1}{3} n^{ij} \\overset{(2)}{I^s_k}\\overset{(2)}{I^s_k} - \\frac{1}{3} \\delta^{ij} n^{kl} \\overset{(2)}{I^s_k}\\overset{(2)}{I^s_l} - \\frac{2}{3} \\overset{(2)}{I^s_i}\\overset{(2)}{I^s_j} + \\frac{1}{3} \\delta^{ij}\\overset{(2)}{I^s_k}\\overset{(2)}{I^s_k} \\right]\\,. \\end{align} \\end{subequations} It is then straightforward to see that this implies a correction in the observable radiative quadrupole moment (defined in Eq.~\\eqref{GWFs} below) due to the dipolar memory effect as given by \\begin{align}\\label{deltaUmemory} \\delta \\mathcal{U}^\\text{memory}_{ij}{\\Big|}_{I_i^s \\times I_j^s} = \\frac{3+2\\omega_0}{3} \\int_{-\\infty}^u \\dd v \\, \\overset{(2)}{I^s_{\\langle i}}(v) \\overset{(2)}{I^s_{j\\rangle}}(v) \\,. \\end{align} Focusing now on the dipolar tail effect, it arises from the quadratic interaction between the conserved gravitational monopole $I=M\/\\phi_0$ and the scalar dipole moment $I_i^s(u)$. At second order, we have to solve, for this particular interaction $I \\times I_j^s$, using Eqs.~\\eqref{lambdas} and~\\eqref{psi1dipole}, \\begin{align}\\label{Boxpsi2} \\Box \\psi_2{\\Big|}_{I \\times I_j^s} = \\frac{8 I}{r^2} \\,n^i \\overset{(3)}{I^s_i}(u) + \\mathcal{O}\\left(\\frac{1}{r^3}\\right)\\,. \\end{align} Using Eq.~(A8b) in~\\cite{Blanchet:1997ji}, we obtain \\begin{align}\\label{psi2tail} \\psi_2^\\text{tail}{\\Big|}_{I \\times I_j^s} = \\frac{4 I}{r} \\left[ n^i \\int_{-\\infty}^u \\dd v \\,\\overset{(3)}{I^s_i}(v) \\ln\\left(\\frac{u-v}{2 r}\\right)+ \\text{``inst.''} \\right] + \\mathcal{O}\\left(\\frac{1}{r^2}\\right)\\,. \\end{align} Finally, we present the complete results for the observable radiative moments including memory and tail contributions up to the 1.5PN order, as well as all instantaneous terms. We introduce a radiative type coordinate system $(T, R)$, with $U \\equiv T - R\/c$ being an asymptotically null coordinate such that \\begin{equation}\\label{Uu} U = u - \\frac{2 G I}{c^3}\\ln\\left(\\frac{r}{c b}\\right) + \\mathcal{O}\\left(\\frac{1}{r}\\right)\\,, \\end{equation} where $I$ is the mass monopole moment and $b$ is an arbitrary constant time-scale. Then, we denote $\\mathcal{U}_L$, $\\mathcal{V}_L$ and $\\mathcal{U}^s_L$ the radiative moments and parametrize the asymptotic transverse-tracefree (TT) tensorial waveform and the scalar waveform in the radiative coordinate system at leading order $1\/R$ in the distance. We have\\footnote{We restore the factors $G$ and $c$. In~\\eqref{GWFa} we denote by $h_{ij}^\\text{TT}$ the TT projection of the gothic spatial metric deviation, which differs by a sign from the ordinary (covariant) spatial metric deviation.} \\begin{subequations}\\label{GWFs} \\begin{align} h_{ij}^\\text{TT} &= - \\frac{4G}{c^2 R} \\perp^\\text{TT}_{ijab} \\sum_{\\ell=2}^{+\\infty} \\frac{1}{c^\\ell \\ell!}\\Big( N_{L-2}\\,\\mathcal{U}_{ab L-2}(U) - \\frac{2\\ell}{c(\\ell+1)} N_{c L-2} \\varepsilon_{cd(a}\\mathcal{V}_{b)dL-2}(U)\\Big) + \\mathcal{O}\\Big(\\frac{1}{R^2}\\Big)\\,,\\label{GWFa}\\\\ \\psi &= - \\frac{2G}{c^2 R}\\sum_{\\ell=0}^{+\\infty} \\frac{1}{c^\\ell \\ell!} N_L \\mathcal{U}_L^s(U) + \\mathcal{O}\\Big(\\frac{1}{R^2}\\Big)\\,, \\end{align} \\end{subequations} where $\\perp^\\text{TT}_{ijab}\\equiv\\frac{1}{2}(\\perp_{ia}\\perp_{jb}+\\perp_{ja}\\perp_{ib}-\\perp_{ij}\\perp_{ab})$ with $\\perp_{ij}=\\delta_{ij}-N_iN_j$ being the TT projection operator (we remind that \\textit{e.g.} $N_{L-2}=N_{i_1}\\cdots N_{i_{\\ell-2}}$). Since the matter fields are minimally coupled to the physical metric $g_{\\mu\\nu}=\\varphi^{-1}\\tilde{g}_{\\mu\\nu}$, the GW detector will respond to the tidal field associated with the physical metric, \\textit{i.e.} the linearized Riemann tensor of the physical metric. Thus, the separation vector between the entry and end mirrors of one arm of a laser-interferometric detector will obey the standard GR law at linear order, $\\ddot{\\xi} = c^{2} R^\\text{lin}_{0i0j}\\,\\xi^j$, but with the Riemann tensor being in ST theory related to both the tensorial and scalar waveforms~\\eqref{GWFs}. We have, see Eq.~(18) in~\\cite{Sennett:2016klh}, \\begin{equation} c^{2}R^\\text{lin}_{0i0j} = \\frac{1}{2} \\ddot{h}_{ij}^\\text{TT} + \\frac{1}{2} \\!\\perp_{ij}\\!\\ddot{\\psi}\\,, \\end{equation} showing explicitly the decomposition of the detector's response into tensorial and scalar modes. We now present the results for the radiative type moments. The tensorial and scalar fluxes $\\mathcal{F}$ and $\\mathcal{F}^s$ are deduced in terms of them directly from the waveforms~\\eqref{GWFs} as \\begin{subequations}\\label{fluxes} \\begin{align} \\mathcal{F} &= \\frac{c^3 R^2 \\phi_0}{32 \\pi G} \\int \\!\\dd\\Omega \\left(\\frac{\\partial h_{ij}^\\text{TT}}{\\partial U}\\right)^2 \\!\\!= \\sum_{\\ell=2}^{+\\infty} \\frac{G \\phi_0}{c^{2\\ell+1}}\\Bigg( \\frac{(\\ell+1)(\\ell+2)}{(\\ell-1) \\ell \\ell! (2\\ell+1)!! } \\overset{(1)}{\\mathcal{U}}_L\\overset{(1)}{\\mathcal{U}}_L + \\frac{4 \\ell (\\ell+2)}{c^2 (\\ell-1) (\\ell+1)! (2\\ell+1)!!} \\overset{(1)}{\\mathcal{V}}_L\\overset{(1)}{\\mathcal{V}}_L\\Bigg) \\,,\\\\ \\mathcal{F}^s &= \\frac{c^3 R^2 \\phi_0 \\left(3+2\\omega_0\\right)}{16\\pi G} \\int\\!\\dd\\Omega \\left( \\frac{\\partial \\Psi}{\\partial U}\\right)^2 = \\sum_{\\ell=0}^{+\\infty} \\frac{G \\phi_0 \\left(3+2\\omega_0\\right)}{c^{2\\ell+1} \\ell! (2\\ell+1)!!}\\overset{(1)}{\\mathcal{U}^s}_L\\overset{(1)}{\\mathcal{U}^s}_L\\,. \\end{align} \\end{subequations} To 1.5PN order, only the mass quadrupole radiative moment differs from its twice-differentiated source counterpart, \\begin{align}\\label{radUij} \\mathcal{U}_{ij} = \\overset{(2)}{I_{ij}} &+ \\frac{2G M}{\\phi_0 c^3} \\int_{-\\infty}^U \\!\\dd V \\overset{(4)}{I_{ij}}(V) \\left[ \\ln{\\left(\\frac{U-V}{2b} \\right)} + \\frac{11}{12} \\right]\\nonumber \\\\ &+ \\frac{G\\left(3+2\\omega_0\\right)}{3c^3}\\Bigg( \\int_{-\\infty}^U \\!\\dd V \\overset{(2)}{I^s_{\\langle i}}(V)\\overset{(2)}{I^s_{j\\rangle}}(V) -I^s_{\\langle i}\\overset{(3)}{I^s_{j\\rangle}}- \\overset{(1)}{I^s_{\\langle i}}\\overset{(2)}{I^s_{j\\rangle}} -\\frac{1}{2}I^s \\overset{(3)}{I^s_{ij}} \\Bigg)+ \\bigO5 \\,. \\end{align} The difference from $\\overset{(2)}{I_{ij}}$ is made of two contributions, both of them being at 1.5PN order: \\begin{itemize} \\item[(i)] the usual mass quadrupole tail correction in GR with the usual instantaneous term with coefficient $\\frac{11}{12}$, except that the mass monopole $I$ therein is related to the ADM mass by $I=M\/\\phi_0$; \\item[(ii)] the dipolar memory effect found in Eq.~\\eqref{deltaUmemory}, to which we have added the corresponding instantaneous contributions obtained by a detailed calculation. \\end{itemize} In addition, we find that for the 1.5PN ST waveform the radiative type scalar monopole, dipole and quadrupole moments acquire some important tail contributions, namely \\begin{subequations}\\label{radUUiUijs} \\begin{align} \\mathcal{U}^s &= I^s + \\frac{2 G M}{\\phi_0 ^2 c^5} \\int_{-\\infty}^U \\dd V \\overset{(2)}{E^s}(V)\\ln\\left(\\frac{U-V}{2b}\\right) + \\frac{G}{ c^5}\\left(1-\\frac{\\phi_0 \\omega_0'}{3+2\\omega_0}\\right) \\Bigg[\\frac{2}{9} I_k^s\\overset{(3)}{I_k^s}-2 I^s \\frac{\\overset{(1)}{E^s}}{\\phi_0}\\Bigg]+\\bigO7 \\,,\\label{radUs}\\\\ \\mathcal{U}_i^s &= \\overset{(1)}{I_i^s} + \\frac{2GM}{\\phi_0 c^3} \\int_{-\\infty}^U \\dd V \\overset{(3)}{I_i^s}(V) \\left[ \\ln{\\left(\\frac{U-V}{2b} \\right)} + 1 \\right] \\nonumber\\\\ &\\qquad\\ +\\frac{G}{c^5} \\Bigg[ -\\frac{1}{5}\\overset{(1)}{I^s_{k}}\\overset{(3)}{I_{ik}} -\\frac{1}{5}\\overset{(2)}{I^s_{k}}\\overset{(2)}{I_{ik}} +\\frac{3}{5}\\overset{(3)}{I^s_{k}}\\overset{(1)}{I_{ik}} +\\frac{3}{5}\\overset{(4)}{I^s_{k}}I_{ik} - \\varepsilon_{iab}J_a \\overset{(3)}{I^s_b} - 4\\overset{(1)}{W}\\overset{(2)}{I^s_i} - 4 \\overset{(2)}{W}\\overset{(1)}{I^s_i} + 4 I^s \\overset{(2)}{Y_i} \\nonumber\\\\[-0.1cm] &\\qquad\\qquad\\quad\\ + \\Big( 1-\\frac{\\phi_0\\omega_0'}{3+2\\omega_0}\\Big)\\Bigg( -2 \\frac{\\overset{(1)}{E_s} }{\\phi_0}\\overset{(1)}{I^s_i} -2 \\frac{\\overset{(2)}{E_s} }{\\phi_0}I^s_i + \\frac{2}{5} \\overset{(3)}{I^s_k}\\overset{(1)}{I^s_{ik}} + \\frac{2}{5} \\overset{(4)}{I^s_k}I^s_{ik} \\Bigg)\\Bigg] + \\bigO7\\,, \\\\ \\mathcal{U}_{ij}^s &= \\overset{(2)}{I_{ij}^s}(U) + \\frac{2 G M}{\\phi_0 c^3} \\int_{-\\infty}^U \\dd V \\overset{(4)}{I^s_{ij}}(V)\\left[ \\ln{\\left(\\frac{U-V}{2b} \\right)} + \\frac{3}{2} \\right] - \\frac{G}{c^3} I^s \\overset{(3)}{I_{ij}} +\\bigO5 \\,. \\end{align} \\end{subequations} In these expressions we have conveniently posed, recalling the definition of the sensitivity parameters~\\eqref{sAk}, \\begin{subequations}\\label{Is} \\begin{align} & I^s(u) = \\frac{1}{\\phi_0}\\biggl[ m^s+\\frac{E^s(u)}{c^2} \\biggr]\\,,\\\\ \\text{with}\\qquad & m^s = -\\frac{1}{3+2\\omega_0}\\sum_A m_A\\bigl(1-2s_A\\bigr)\\,. \\end{align} \\end{subequations} The Newtonian value $m^s$ in the limit $c\\to+\\infty$ is constant and represents the total ``scalar charge'' of the system; $m^s$ is zero for binary black holes. We can already make a few observations on Eqs.~\\eqref{radUUiUijs}. First, these expressions are valid in the frame of the centre-of-mass (CM) of the system defined by $I_i=0$. Then, we notice the coupling between the tensorial moments and the scalar ones through some instantaneous terms in $\\mathcal{U}_{i}^s$ and $\\mathcal{U}_{ij}^s$. Finally, in $\\mathcal{U}_{i}^s$, the gauge moments $W$ and $Y_i$ coming from the tensorial sector, see Eq.~\\eqref{h1mult}, appear and are coupled to the scalar mass monopole and dipole. In GR the gauge moments do not contribute to the waveform before the 2.5PN order while in ST theory they already contribute to the flux at 1.5PN order and to the scalar waveform at 2PN order. Besides Eqs.~\\eqref{radUUiUijs}, all other radiative moments are linearly related to the source moments \\textit{via} the usual formul{\\ae}, \\textit{e.g.} $\\mathcal{U}_L^s = \\dd^\\ell I_L^s\/\\dd u^\\ell$. \\section{The scalar-tensor multipole moments and flux of compact binaries} \\label{sec:compactbin} Now that the general formalism has been laid out, we apply it to the case of a non-spinning compact binary system to compute the \\textit{source} multipole moments, and subsequently, the \\textit{radiative} ones. Consistently with the general formul{\\ae} presented in the previous section, we focus on the ST fluxes at 1.5PN order beyond the GR's quadrupole formula (\\textit{i.e.} 2.5PN beyond the leading dipolar order of ST theories). For two point-particles of masses $m_A(\\phi)$, the stress-energy tensor deriving from Eq.~\\eqref{matteract} reads \\begin{equation} T^{\\mu \\nu}(t,\\mathbf{x}) = \\sum _{A=1,2} \\frac{m_A(\\phi) \\,v_A^\\mu v_A^\\nu}{\\sqrt{-(g_{\\alpha \\beta})_A \\frac{v_A^\\alpha v_A^\\beta}{c^2} }}\\frac{\\delta_A}{\\sqrt{-g}}\\,. \\end{equation} Our notation for point-particle systems is given in Sec.~\\ref{sec:not}. From the explicit dependence of the stress-energy tensor on the scalar field through the masses we obtain \\begin{equation}\\label{dTdphi} T-2\\varphi\\frac{\\partial T}{\\partial \\varphi} = - c \\sum _{A=1,2} m_A\\bigl(1-2s_A\\bigr) \\sqrt{-(g_{\\alpha \\beta})_A \\,v_A^\\alpha v_A^\\beta } \\,\\frac{\\delta_A}{\\sqrt{-g}}\\,. \\end{equation} Next, we define the following compact support source densities\\footnote{Note a change of definition for $\\sigma_s$: in Ref.~\\cite{Bernard:2018hta}, the definition given in Eq.~(4.16) should not be used. Indeed, this definition was never used during the computation in~\\cite{Bernard:2018hta}; instead, only the 1PN expansion given in Eq.~(B4) was used, and is correct. Our definition~\\eqref{sigmas} for $\\sigma_s$ yields~(B4) in~\\cite{Bernard:2018hta} at the 1PN approximation.} \\begin{subequations} \\begin{align} & \\sigma = \\frac{1}{\\phi_0 \\varphi^3}\\frac{T^{00} + T^{ii}}{c^2}\\,,\\qquad \\sigma_i = \\frac{1}{\\phi_0 \\varphi^3}\\frac{T^{0i}}{c} \\,,\\qquad \\sigma_{ij} = \\frac{1}{\\phi_0 \\varphi^3}T^{ij} \\,,\\\\[5pt] & \\sigma_s = - \\frac{1}{c^2\\phi_0}\\frac{\\sqrt{-g}}{\\sqrt{\\left(3+2\\omega_0\\right)(3+2\\omega)}} \\left( T - 2\\varphi \\frac{\\partial T}{\\partial \\varphi} \\right) \\,.\\label{sigmas} \\end{align} \\end{subequations} At 1.5PN order, we parametrize the metric and scalar perturbation fields as \\begin{subequations} \\begin{align} h^{00} &= - \\frac{4}{c^2}V - \\frac{2}{c^4}\\Big(\\hat W + 4 V^2 \\Big) + \\bigO6 \\,,\\\\ h^{0i} &= - \\frac{4}{c^3} V_i + \\bigO{5} \\,,\\\\ h^{ij} &= -\\frac{4}{c^4}\\Big( \\hat W_{ij} - \\frac{1}{2}\\delta_{ij}\\hat W \\Big) + \\bigO{6} \\,,\\\\ \\psi &= - \\frac{2}{c^2} \\psip{0} + \\frac{2}{c^4} \\Big( 1 - \\frac{\\omega'_0 \\phi_0}{3+2\\omega_0} \\Big) \\psip{0}^2 + \\bigO6 \\,, \\end{align} \\end{subequations} where we have introduced (extending the usual practice in GR) the elementary potentials obeying the following wave equations \\begin{subequations} \\begin{align} \\Box V &= -4\\pi G \\,\\sigma\\,,\\\\ \\Box V_i &= -4\\pi G \\,\\sigma_i\\,,\\\\ \\Box \\hat W_{ij} &= -4\\pi G \\,\\bigl( \\sigma_{ij} - \\delta_{ij} \\sigma_{kk}\\bigr) - \\partial_i V \\partial_j V - \\left(3+2\\omega_0\\right) \\partial_i \\psip{0} \\partial_j \\psip{0}\\,,\\\\ \\Box \\psip{0} &= 4\\pi G \\,\\sigma_s\\,. \\end{align} \\end{subequations} Finally, inserting these decompositions into the tensor and scalar multipole moments as given by Eqs.~\\eqref{momentsIJ} and~\\eqref{psi1mult}, we can compute the multipole moments using a series of known techniques; see~\\cite{MHLMFB20} for a recent review. Fortunately, at the 1.5PN order, this is relatively easy as we do not need to worry about the subtleties associated with the different regularizations schemes (be it ultraviolet or infrared). The main difficulty is the long calculation of the scalar monopole and dipole moments $I^s$ and $I_i^s$ which are required at 2.5PN order. With the ST parameters defined at the beginning of the paper (Sec.~\\ref{sec:not}), we obtain the source ST multipole moments for compact binaries that are relevant for the final 1.5PN waveform and flux. For example, the tensor quadrupole moment $I_{ij}$ is accurate to order 1.5PN and we find, after reduction to the CM frame, \\begin{align}\\label{Iij} I_{ij} &= \\frac{m \\nu r^2}{\\phi_0} \\Bigg[n^{\\langle i} n^{j\\rangle}+ \\frac{1}{42 c^2} \\Bigg\\{n^{\\langle i} n^{j\\rangle} \\left(\\frac{\\tilde{G}\\alpha m}{r}\\right) (-30 + 48 \\nu) \\\\ &\\qquad\\qquad\\qquad\\qquad\\qquad\\quad+ n^{\\langle i} n^{j\\rangle}v^2 (29 - 87 \\nu) + n^{\\langle i} v^{j\\rangle} (nv) (-24 + 72 \\nu) + v^{\\langle i} v^{j\\rangle} (22 - 66 \\nu) \\Bigg\\}\\Bigg] + \\bigO4\\,.\\nonumber \\end{align} The other relevant tensor moments (including the two gauge moments $W$ and $Y_i$) are given in Eqs.~\\eqref{tensormoments} of Appendix~\\ref{app:moments}. As for the scalar moments, the full expressions at the highest necessary PN order are also given in Appendix~\\ref{app:moments}. Hereafter, we only give the source moments at a high enough PN order to compute the hereditary terms. Indeed, the radiative moment $\\mathcal{U}_{ij}$ given by Eq.~\\eqref{radUij} corrects the source moment by the relevant 1.5PN quadrupole tail effect which is the same as in GR, and by the non-linear memory effect associated with the dipole moment. We will include these effects, applied to binaries, into the final waveform. The necessary source moments to compute hereditary terms are then \\begin{subequations} \\begin{align} I^s_i =& \\ \\frac{\\alpha^{1\/2} \\zeta m \\nu r }{(1 - \\zeta) \\phi_0} \\Bigg[-2 \\mathcal{S}_{-} n^{i} + \\frac{n^{i}}{5 c^2} \\Bigg\\{ \\left(\\frac{\\tilde{G}\\alpha m}{r}\\right) \\Big(9 \\mathcal{S}_{-} - 20 \\bar{\\beta}_{+} \\bar{\\gamma}^{-1} \\mathcal{S}_{-} - 20 \\bar{\\beta}_{-} \\bar{\\gamma}^{-1} \\mathcal{S}_{+} - 13 \\mathcal{S}_{-} \\nu \\nonumber\\\\ &\\qquad\\qquad\\qquad\\quad + \\delta \\Big[ 20 \\bar{\\beta}_{-} \\bar{\\gamma}^{-1} \\mathcal{S}_{-} - 4 \\mathcal{S}_{+} + 20 \\bar{\\beta}_{+} \\bar{\\gamma}^{-1} \\mathcal{S}_{+}\\Big]\\Big) + v^2 \\bigl(- \\mathcal{S}_{-} + 7 \\mathcal{S}_{-} \\nu - 4 \\mathcal{S}_{+} \\delta \\bigr) \\Bigg\\} \\nonumber\\\\ &\\qquad\\qquad\\qquad\\quad + \\frac{v^{i} (nv) }{5 c^2} \\Bigg\\{ -2 \\mathcal{S}_{-} + 4 \\mathcal{S}_{-} \\nu + 2 \\mathcal{S}_{+} \\delta\\Bigg\\} \\Bigg] + \\bigO3\\,, \\\\ E^s =& \\frac{\\alpha^{1\/2} \\zeta m \\nu}{6 (1 - \\zeta)} \\Bigg[\\left(\\frac{\\tilde{G}\\alpha m}{r}\\right) \\Big(-48 \\bar{\\beta}_{-} \\bar{\\gamma}^{-1} \\mathcal{S}_{-} + 14 \\mathcal{S}_{+} - 48 \\bar{\\beta}_{+} \\bar{\\gamma}^{-1} \\mathcal{S}_{+} - 2 \\mathcal{S}_{-} \\delta \\Big) +v^2\\Big( \\mathcal{S}_{+} - \\mathcal{S}_{-} \\delta \\Big) \\Bigg] \\ + \\mathcal{O}\\left(\\frac{1}{c}\\right)\\,, \\\\ I^s_{ij} =&\\ \\frac{\\alpha^{1\/2} \\zeta m r^2 \\nu n^{i} n^{j}}{(1 - \\zeta) \\phi_0}\\Big(- \\mathcal{S}_{+} + \\mathcal{S}_{-} \\delta\\Big) + \\mathcal{O}\\left(\\frac{1}{c}\\right) \\,, \\end{align} \\end{subequations} together with the Newtonian limit of~\\eqref{Iij} and the Newtonian energy $E = \\frac{1}{2} m\\nu v^2-\\frac{\\tilde{G} \\alpha m^2\\nu}{r} + \\mathcal{O}(c^{-1})$. So far, only the ST equations of motion to 1.5PN order were required. However, in order to compute the ST fluxes, we have to differentiate the moments with respect to time, which then uses the ST equations of motion to 2.5PN order. All the conservative (PN-even) terms of the acceleration are available in Ref.~\\cite{Bernard:2018hta}, in which the ST equations of motion were obtained up to 3PN order. Concerning the dissipative (PN-odd) terms at 1.5PN and 2.5PN orders, they are given in Ref.~\\cite{Mirshekari:2013vb} as functions of the EW multipole moments in harmonic coordinates~\\cite{Epstein:1975}. In Appendix~\\ref{app:EOM}, we present for the first time the explicit expressions for these PN-odd terms in the equations of motion to 2.5PN order. Finally, we have checked that all our results concerning the moments (in this section and in Appendix~\\ref{app:moments}) are in agreement with the results of Refs.~\\cite{Lang:2013fna,Lang:2014osa}. For the comparison, we have to carefully take into account the link between the STF moments and the Epstein-Wagoner moments~\\cite{Epstein:1975} used in~\\cite{Lang:2013fna,Lang:2014osa}. The Sec.~\\ref{sec:EW} in Appendix~\\ref{app:moments} gives the required relations between these moments. The scalar and tensorial energy fluxes, respectively denoted $\\mathcal{F}^s$ and $\\mathcal{F}$, are given in terms of the STF radiative multipole moments $\\mathcal{U}_L$, $\\mathcal{V}_L$ and $\\mathcal{U}^s_L$ according to~\\eqref{fluxes}. We further split them into instantaneous and tail contributions, following the contributions of the tail integrals in~\\eqref{radUij}--\\eqref{radUUiUijs}, \\begin{subequations} \\begin{align} \\mathcal{F} &= \\mathcal{F}_\\text{inst} + \\mathcal{F}_\\text{tail}\\,,\\\\ \\mathcal{F}^s &= \\mathcal{F}^s_\\text{inst} + \\mathcal{F}^s_\\text{tail}\\,. \\end{align} \\end{subequations} Note that the dipolar memory contribution, given by the last integral in~\\eqref{radUij}, becomes instantaneous in the flux and as a consequence, its contribution is included into the instantaneous part. On the other hand, it is convenient to keep some instantaneous terms, such as the one related to the constant $11\/12$, into the definition of the tail terms. With this caveat in mind, we define \\begin{subequations}\\label{Ftail} \\begin{align} \\mathcal{F}_\\text{tail} &= \\frac{4G^2 M}{5c^8} \\overset{(3)}{I_{ij}} \\int_{-\\infty}^U \\!\\dd V \\overset{(5)}{I_{ij}}(V) \\left[ \\ln{\\left(\\frac{U-V}{2b} \\right)} + \\frac{11}{12} \\right] \\,,\\\\ \\mathcal{F}^s_\\text{tail} &= \\frac{4G^2 M \\left(3+2\\omega_0\\right)}{c^6} \\Biggl\\{ \\frac{1}{3}\\overset{(2)}{I^s_{i}} \\int_{-\\infty}^U \\!\\dd V \\overset{(4)}{I^s_{i}}(V) \\left[ \\ln{\\left(\\frac{U-V}{2b} \\right)} + 1 \\right] +\\frac{\\overset{(1)}{E^s}}{c^2 \\phi_0^2} \\int_{-\\infty}^U \\!\\dd V \\overset{(3)}{E^s}(V) \\ln{\\left(\\frac{U-V}{2b} \\right)}\\nonumber\\\\ & \\qquad\\qquad\\qquad\\qquad\\qquad + \\frac{1}{30 c^2}\\overset{(3)}{I^s_{ij}} \\int_{-\\infty}^U \\!\\dd V \\overset{(5)}{I^s_{ij}}(V) \\left[ \\ln{\\left(\\frac{U-V}{2b} \\right)} + \\frac{3}{2} \\right]\\Biggr\\}\\,. \\end{align} \\end{subequations} The complete expression of the instantaneous tensorial flux, valid for general orbits in the CM frame, reads \\begin{align}\\label{tensorflux}\\nonumber \\mathcal{F}_\\text{inst} &= \\frac{4 \\left(2 + \\bar{\\gamma}\\right)}{15c^5} \\left(\\frac{\\tilde{G}\\alpha m}{r}\\right)^3 \\frac{m \\nu^2}{r} \\Bigg\\{-11 (nv)^2 + 12 v^2\\\\ &+ \\frac{1}{28 c^2} \\Bigg[ \\Bigl(16 - 64 \\nu\\Bigr)\\left(\\frac{\\tilde{G}\\alpha m}{r}\\right)^2 + \\biggl (2936 + 1344 \\bar{\\beta}_{+}+ 1120 \\bar{\\gamma} - 1344 \\bar{\\beta}_{-} \\delta - 120 \\nu\\biggl)\\left(\\frac{\\tilde{G}\\alpha m}{r}\\right) (nv)^2 \\nonumber\\\\ &\\qquad\\qquad\\qquad+ \\Bigl(2061 + 840 \\bar{\\gamma} - 1860 \\nu\\Bigr) (nv)^4 + \\biggl (-2720 -1344 \\bar{\\beta}_{+} - 1008 \\bar{\\gamma} + 1344 \\bar{\\beta}_{-} \\delta + 160 \\nu\\biggl) \\left(\\frac{\\tilde{G}\\alpha m}{r}\\right) v^2 \\nonumber\\\\ &\\qquad\\qquad\\qquad+ \\Bigl(-2974 - 1232 \\bar{\\gamma} + 2784 \\nu\\Bigr) (nv)^2 v^2 + \\Bigl(785 + 336 \\bar{\\gamma} - 852 \\nu\\Bigr) v^{4}\\Bigg]\\nonumber\\\\ &+\\frac{1}{12c^3} \\Bigg[ \\Big(-2 \\bar{\\gamma} + 48 \\zeta \\mathcal{S}_{-}^2 \\nu\\Big) \\left(\\frac{\\tilde{G}\\alpha m}{r}\\right)^2 (nv) + 66 \\bar{\\gamma} \\left(\\frac{\\tilde{G}\\alpha m}{r}\\right) (nv)^3 - 70 \\bar{\\gamma} \\left(\\frac{\\tilde{G}\\alpha m}{r}\\right) (nv) v^2\\Bigg] \\Bigg\\} \\,. \\end{align} The tensorial energy flux $\\mathcal{F}_\\text{inst}$ is in complete agreement with the result of Refs.~\\cite{Lang:2013fna,Lang:2014osa}. We also compute the instantaneous scalar flux $\\mathcal{F}^s_\\text{inst}$ to 1.5PN order, complementing by a half post-Newtonian order the previous result by Lang~\\cite{Lang:2014osa}. As its full expression in the center of mass is very long, we have preferred to relegate it to Appendix~\\ref{app:fluxcoeffs}. However, when comparing our scalar flux with the one obtained by Ref.~\\cite{Lang:2014osa}, we have found a discrepancy at~1PN order that could not be resolved, despite the fact that we agree on all the ST multipole moments separately, notably the~2PN monopole and dipole scalar moments. In order to investigate this disagreement, we have computed the~1.5PN scalar waveform and have found that it is in perfect agreement with the scalar waveform presented in Eqs.~(5.2) of~Ref.~\\cite{Lang:2014osa}. We have then computed the flux: (i) by integrating the scalar waveform following Eq.~(6.6) of Ref.~\\cite{Lang:2014osa}; (ii) with the direct formula given by Eq.~\\eqref{FscalarEW} of Appendix~\\ref{app:moments}, where the EW moments were replaced by their center-of-mass expressions as given by Eqs.~(3.50) of Ref.~\\cite{Lang:2014osa} and Eqs.~(5.10) of Ref.~\\cite{Lang:2013fna}. In both cases, we recover the scalar flux as given in Appendix~\\ref{app:fluxcoeffs}, and not the scalar flux of Ref.~\\cite{Lang:2014osa}. The explicit difference between our scalar flux and the scalar flux of Ref.~\\cite{Lang:2014osa} is given explicitly in Eq.~\\eqref{DiffLang} of Appendix~\\ref{app:fluxcoeffs}, along with the full expression for the scalar flux. \\section{Reduction to quasi-circular orbits} \\label{sec:circular} For quasi-circular orbits, the expressions of the fluxes simplify considerably and one can work out explicitly the tail terms~\\eqref{Ftail} from standard methods. The usual frequency dependent PN variable which permits to obtain gauge invariant results in GR is easily generalized to ST theories as \\begin{equation}\\label{x} x \\equiv \\left(\\frac{\\tilde{G} \\alpha m \\omega}{c^3}\\right)^{2\/3}\\,, \\end{equation} where $\\omega = 2\\pi\/P$ is the orbital frequency of the quasi-circular orbit, with $P$ the period. It is related to the orbital separation $r$, and to the gauge dependent PN variable $\\gamma \\equiv \\frac{\\tilde{G} \\alpha m}{c^2 r}$, by the sum of Eqs.~(5.2)--(5.3) of~\\cite{Bernard:2018ivi} which includes all contributions up to relative 3PN order, including the dipolar tail term at 3PN order. For the present work, we only need this relation to relative 2PN order, which we reproduce here for convenience, % \\begin{align}\\label{omegaInst} \\omega^{2} &= \\frac{\\alpha \\tilde{G} m}{r^3} \\Biggl(1+ \\gamma \\bigg\\{-3- 2 \\bar\\beta_{+}+ \\nu- \\overline{\\gamma}+ 2 \\bar\\beta_{-} \\delta\\bigg\\} \\nonumber\\\\ &\\qquad\\quad\\quad + \\gamma^2 \\bigg\\{ 6 + 8 \\bar\\beta_{+} - 2 \\bar\\chi_{+} + \\bar\\delta_{+} + \\bigl(5 + 2 \\bar\\beta_{+}\\bigr) \\overline{\\gamma} + \\frac{5}{4} \\overline{\\gamma}^2 + \\delta \\Big[2 \\bar\\chi_{-} + \\bar\\delta_{-} - 2 \\bar\\beta_{-} \\bigl(4 + \\overline{\\gamma}\\bigr)\\Big] \\nonumber\\\\&\\qquad\\quad\\qquad\\ \\,\\qquad + \\nu \\Big[\\frac{41}{4} + \\bar\\beta_{+} + 4 \\bar\\chi_{+} - 2 \\bar\\delta_{+} + 24 \\bar\\beta_{-}^2 \\overline{\\gamma}^{-1} - 24 \\bar\\beta_{+}^2 \\overline{\\gamma}^{-1} + 5 \\overline{\\gamma}- \\frac{1}{2} \\overline{\\gamma}^2 \\Big] + 5 \\bar\\beta_{-} \\nu \\delta + \\nu^2 \\bigg\\} \\Biggr) \\,. \\end{align} The expression of $\\gamma$ in terms of $x$ at 2PN order is deduced by inversion of this expression, and is also given to 3PN order in~\\cite{Bernard:2018ivi}. Our final results for the tensorial and scalar fluxes at relative 2PN order expressed in terms of the gauge invariant variable~\\eqref{x} read \\begin{subequations}\\label{circular} \\begin{align} \\mathcal{F}_\\text{circ} &= \\frac{32 c^5 x^5 \\nu^2 (1+\\bar{\\gamma}\/2)}{5\\tilde{G} \\alpha}\\Bigg(1 + \\frac{x}{336}\\Bigg\\{ -1247 - 896 \\bar{\\beta}_{+} - 448 \\bar{\\gamma} + 896 \\bar{\\beta}_{-} \\delta - 980 \\nu \\Bigg\\} + 4\\pi \\left(1+\\frac{\\bar{\\gamma}}{2}\\right) x^{3\/2}\\Bigg)\\,,\\\\ \\mathcal{F}^s_\\text{circ} &= \\frac{c^5 x^5 \\nu^2 \\zeta }{3\\tilde{G} \\alpha} \\Bigg(4 \\mathcal{S}_{-}^2 x^{-1} \\nonumber \\\\ & \\qquad\\qquad\\qquad +\\frac{1}{15} \\Bigg\\{-24 \\zeta^{-1} \\bar{\\gamma} - 120 \\mathcal{S}_{-}^2 - 80 \\bar{\\beta}_{+} \\mathcal{S}_{-}^2 - 40 \\bar{\\gamma} \\mathcal{S}_{-}^2 + 240 \\bar{\\beta}_{+} \\bar{\\gamma}^{-1} \\mathcal{S}_{-}^2 + 240 \\bar{\\beta}_{-} \\bar{\\gamma}^{-1} \\mathcal{S}_{-} \\mathcal{S}_{+}\\nonumber\\\\ &\\qquad\\qquad\\qquad\\qquad\\quad + \\delta \\Big[80 \\bar{\\beta}_{-} \\mathcal{S}_{-}^2 - 240 \\bar{\\beta}_{-} \\bar{\\gamma}^{-1} \\mathcal{S}_{-}^2 - 240 \\bar{\\beta}_{+} \\bar{\\gamma}^{-1} \\mathcal{S}_{-} \\mathcal{S}_{+}\\Big] - 80 \\mathcal{S}_{-}^2 \\nu \\Bigg\\} \\nonumber\\\\ & \\qquad\\qquad\\qquad+ 4 \\pi(2 + \\bar{\\gamma}) \\mathcal{S}_{-}^2 x^{1\/2} \\nonumber\\\\ & \\qquad\\qquad\\qquad + \\frac{x}{420} \\Bigg\\{-2688 \\bar{\\beta}_{+} \\zeta^{-1} + 2910 \\zeta^{-1} \\bar{\\gamma} + 1792 \\bar{\\beta}_{+} \\zeta^{-1} \\bar{\\gamma} + 896 \\zeta^{-1} \\bar{\\gamma}^2 - 3360 \\bar{\\beta}_{-}^2 \\zeta^{-1} \\bar{\\gamma}^{-1} - 3360 \\bar{\\beta}_{+}^2 \\zeta^{-1} \\bar{\\gamma}^{-1}\\nonumber\\\\ & \\qquad\\qquad\\qquad\\qquad\\ \\ \\,\\quad - 7560 \\mathcal{S}_{-}^2 - 2240 \\bar{\\beta}_{-}^2 \\mathcal{S}_{-}^2 - 3360 \\bar{\\beta}_{+} \\mathcal{S}_{-}^2 - 2240 \\bar{\\beta}_{+}^2 \\mathcal{S}_{-}^2 - 1680 \\bar{\\gamma} \\mathcal{S}_{-}^2 + 560 \\bar{\\gamma}^2 \\mathcal{S}_{-}^2 - 4480 \\bar{\\beta}_{-}^2 \\bar{\\gamma}^{-1} \\mathcal{S}_{-}^2 \\nonumber\\\\ & \\qquad\\qquad\\qquad\\qquad\\ \\ \\,\\quad - 6720 \\bar{\\beta}_{+} \\bar{\\gamma}^{-1} \\mathcal{S}_{-}^2 - 4480 \\bar{\\beta}_{+}^2 \\bar{\\gamma}^{-1} \\mathcal{S}_{-}^2 + 13440 \\bar{\\beta}_{-}^2 \\bar{\\gamma}^{-2} \\mathcal{S}_{-}^2 + 13440 \\bar{\\beta}_{+}^2 \\bar{\\gamma}^{-2} \\mathcal{S}_{-}^2 - 2240 \\bar{\\chi}_{+} \\mathcal{S}_{-}^2 \\nonumber\\\\ & \\qquad\\qquad\\qquad\\qquad\\ \\ \\,\\quad + 6720 \\bar{\\gamma}^{-1} \\bar{\\chi}_{+} \\mathcal{S}_{-}^2 + 2240 \\zeta \\mathcal{S}_{-}^4 + 1120 \\zeta \\bar{\\gamma} \\mathcal{S}_{-}^4 - 2240 \\bar{\\beta}_{-} \\mathcal{S}_{-} \\mathcal{S}_{+} - 6720 \\bar{\\beta}_{-} \\bar{\\gamma}^{-1} \\mathcal{S}_{-} \\mathcal{S}_{+} \\nonumber\\\\ & \\qquad\\qquad\\qquad\\qquad\\ \\ \\,\\quad - 8960 \\bar{\\beta}_{-} \\bar{\\beta}_{+} \\bar{\\gamma}^{-1} \\mathcal{S}_{-} \\mathcal{S}_{+} + 26880 \\bar{\\beta}_{-} \\bar{\\beta}_{+} \\bar{\\gamma}^{-2} \\mathcal{S}_{-} \\mathcal{S}_{+} + 6720 \\bar{\\gamma}^{-1} \\bar{\\chi}_{-} \\mathcal{S}_{-} \\mathcal{S}_{+}\\nonumber\\\\ & \\qquad\\qquad\\qquad\\qquad\\ \\ \\,\\quad + \\delta \\Big[2688 \\bar{\\beta}_{-} \\zeta^{-1} - 1792 \\bar{\\beta}_{-} \\zeta^{-1} \\bar{\\gamma} + 6720 \\bar{\\beta}_{-} \\bar{\\beta}_{+} \\zeta^{-1} \\bar{\\gamma}^{-1} + 3360 \\bar{\\beta}_{-} \\mathcal{S}_{-}^2 + 4480 \\bar{\\beta}_{-} \\bar{\\beta}_{+} \\mathcal{S}_{-}^2 \\nonumber\\\\ & \\qquad\\qquad\\qquad\\qquad\\ \\ \\,\\quad\\qquad + 6720 \\bar{\\beta}_{-} \\bar{\\gamma}^{-1} \\mathcal{S}_{-}^2 + 8960 \\bar{\\beta}_{-} \\bar{\\beta}_{+} \\bar{\\gamma}^{-1} \\mathcal{S}_{-}^2 - 26880 \\bar{\\beta}_{-} \\bar{\\beta}_{+} \\bar{\\gamma}^{-2} \\mathcal{S}_{-}^2 + 2240 \\bar{\\chi}_{-} \\mathcal{S}_{-}^2\\nonumber\\\\ & \\qquad\\qquad\\qquad\\qquad\\ \\ \\,\\quad\\qquad - 6720 \\bar{\\gamma}^{-1} \\bar{\\chi}_{-} \\mathcal{S}_{-}^2 + 9240 \\mathcal{S}_{-} \\mathcal{S}_{+} + 2240 \\bar{\\beta}_{+} \\mathcal{S}_{-} \\mathcal{S}_{+} + 5040 \\bar{\\gamma} \\mathcal{S}_{-} \\mathcal{S}_{+} + 4480 \\bar{\\beta}_{-}^2 \\bar{\\gamma}^{-1} \\mathcal{S}_{-} \\mathcal{S}_{+} \\nonumber\\\\ & \\qquad\\qquad\\qquad\\qquad\\ \\ \\,\\quad\\qquad + 6720 \\bar{\\beta}_{+} \\bar{\\gamma}^{-1} \\mathcal{S}_{-} \\mathcal{S}_{+} + 4480 \\bar{\\beta}_{+}^2 \\bar{\\gamma}^{-1} \\mathcal{S}_{-} \\mathcal{S}_{+} - 13440 \\bar{\\beta}_{-}^2 \\bar{\\gamma}^{-2} \\mathcal{S}_{-} \\mathcal{S}_{+} - 13440 \\bar{\\beta}_{+}^2 \\bar{\\gamma}^{-2} \\mathcal{S}_{-} \\mathcal{S}_{+}\\nonumber\\\\ & \\qquad\\qquad\\qquad\\qquad\\ \\ \\,\\quad\\qquad - 6720 \\bar{\\gamma}^{-1} \\bar{\\chi}_{+} \\mathcal{S}_{-} \\mathcal{S}_{+} + 2240 \\zeta \\mathcal{S}_{-}^3 \\mathcal{S}_{+} + 1120 \\zeta \\bar{\\gamma} \\mathcal{S}_{-}^3 \\mathcal{S}_{+}\\Big] \\nonumber\\\\ & \\qquad\\qquad\\qquad\\qquad\\ \\ \\,\\quad + \\nu \\Big[1960 \\zeta^{-1} \\bar{\\gamma} + 13440 \\bar{\\beta}_{+}^2 \\zeta^{-1} \\bar{\\gamma}^{-1} + 11480 \\mathcal{S}_{-}^2 + 8960 \\bar{\\beta}_{-}^2 \\mathcal{S}_{-}^2 + 22400 \\bar{\\beta}_{+} \\mathcal{S}_{-}^2 - 1120 \\bar{\\gamma} \\mathcal{S}_{-}^2 \\nonumber\\\\ & \\qquad\\qquad\\qquad\\qquad\\ \\ \\,\\quad\\qquad+ 44800 \\bar{\\beta}_{-}^2 \\bar{\\gamma}^{-1} \\mathcal{S}_{-}^2 - 31360 \\bar{\\beta}_{+} \\bar{\\gamma}^{-1} \\mathcal{S}_{-}^2 - 26880 \\bar{\\beta}_{+}^2 \\bar{\\gamma}^{-1} \\mathcal{S}_{-}^2 - 80640 \\bar{\\beta}_{-}^2 \\bar{\\gamma}^{-2} \\mathcal{S}_{-}^2 \\nonumber\\\\ & \\qquad\\qquad\\qquad\\qquad\\ \\ \\,\\quad\\qquad + 26880 \\bar{\\beta}_{+}^2 \\bar{\\gamma}^{-2} \\mathcal{S}_{-}^2 + 4480 \\bar{\\chi}_{+} \\mathcal{S}_{-}^2 - 13440 \\bar{\\gamma}^{-1} \\bar{\\chi}_{+} \\mathcal{S}_{-}^2 - 4480 \\zeta \\mathcal{S}_{-}^4 - 2240 \\zeta \\bar{\\gamma} \\mathcal{S}_{-}^4 \\nonumber\\\\ & \\qquad\\qquad\\qquad\\qquad\\ \\ \\,\\quad\\qquad - 31360 \\bar{\\beta}_{-} \\bar{\\gamma}^{-1} \\mathcal{S}_{-} \\mathcal{S}_{+} + 17920 \\bar{\\beta}_{-} \\bar{\\beta}_{+} \\bar{\\gamma}^{-1} \\mathcal{S}_{-} \\mathcal{S}_{+} \\nonumber\\\\ & \\qquad\\qquad\\qquad\\qquad\\ \\ \\,\\quad\\qquad - 53760 \\bar{\\beta}_{-} \\bar{\\beta}_{+} \\bar{\\gamma}^{-2} \\mathcal{S}_{-} \\mathcal{S}_{+} - 13440 \\bar{\\gamma}^{-1} \\bar{\\chi}_{-} \\mathcal{S}_{-} \\mathcal{S}_{+} \\Big] \\nonumber\\\\& \\qquad\\qquad\\qquad\\qquad\\ \\ \\,\\quad + \\delta \\nu \\Big[ -8960 \\bar{\\beta}_{-} \\mathcal{S}_{-}^2 + 11200 \\bar{\\beta}_{-} \\bar{\\gamma}^{-1} \\mathcal{S}_{-}^2 + 11200 \\bar{\\beta}_{+} \\bar{\\gamma}^{-1} \\mathcal{S}_{-} \\mathcal{S}_{+}\\Big]+ 1120 \\mathcal{S}_{-}^2 \\nu^2 \\Bigg\\} \\nonumber\\\\ & \\qquad\\qquad\\qquad+ \\frac{\\pi x^{3\/2}}{30(1 - \\zeta)} \\Bigg\\{192 \\bar{\\gamma} - 192 \\zeta^{-1} \\bar{\\gamma} + 96 \\bar{\\gamma}^2 - 96 \\zeta^{-1} \\bar{\\gamma}^2 - 96 \\mathcal{S}_{-}^2 + 160 \\bar{\\beta}_{+} \\mathcal{S}_{-}^2 + 96 \\zeta \\mathcal{S}_{-}^2 - 160 \\bar{\\beta}_{+} \\zeta \\mathcal{S}_{-}^2 - 208 \\bar{\\gamma} \\mathcal{S}_{-}^2 \\nonumber \\\\ &\\qquad\\qquad\\qquad\\qquad\\qquad\\,\\,\\qquad - 160 \\bar{\\beta}_{+} \\bar{\\gamma} \\mathcal{S}_{-}^2 + 208 \\zeta \\bar{\\gamma} \\mathcal{S}_{-}^2 + 160 \\bar{\\beta}_{+} \\zeta \\bar{\\gamma} \\mathcal{S}_{-}^2 - 80 \\bar{\\gamma}^2 \\mathcal{S}_{-}^2 + 80 \\zeta \\bar{\\gamma}^2 \\mathcal{S}_{-}^2 + 960 \\bar{\\beta}_{+} \\bar{\\gamma}^{-1} \\mathcal{S}_{-}^2 \\nonumber \\\\ &\\qquad\\qquad\\qquad\\qquad\\qquad\\,\\,\\qquad - 960 \\bar{\\beta}_{+} \\zeta \\bar{\\gamma}^{-1} \\mathcal{S}_{-}^2 + 480 \\bar{\\beta}_{-} \\mathcal{S}_{-} \\mathcal{S}_{+} - 480 \\bar{\\beta}_{-} \\zeta \\mathcal{S}_{-} \\mathcal{S}_{+} + 960 \\bar{\\beta}_{-} \\bar{\\gamma}^{-1} \\mathcal{S}_{-} \\mathcal{S}_{+} - 960 \\bar{\\beta}_{-} \\zeta \\bar{\\gamma}^{-1} \\mathcal{S}_{-} \\mathcal{S}_{+} \\nonumber \\\\ &\\qquad\\qquad\\qquad\\qquad\\qquad\\,\\,\\qquad + \\delta \\Big[-160 \\bar{\\beta}_{-} \\mathcal{S}_{-}^2 + 160 \\bar{\\beta}_{-} \\zeta \\mathcal{S}_{-}^2 + 160 \\bar{\\beta}_{-} \\bar{\\gamma} \\mathcal{S}_{-}^2 - 160 \\bar{\\beta}_{-} \\zeta \\bar{\\gamma} \\mathcal{S}_{-}^2 - 960 \\bar{\\beta}_{-} \\bar{\\gamma}^{-1} \\mathcal{S}_{-}^2 \\nonumber \\\\ &\\qquad\\qquad\\qquad\\qquad\\qquad\\ \\,\\qquad\\qquad+ 960 \\bar{\\beta}_{-} \\zeta \\bar{\\gamma}^{-1} \\mathcal{S}_{-}^2 - 384 \\mathcal{S}_{-} \\mathcal{S}_{+} - 480 \\bar{\\beta}_{+} \\mathcal{S}_{-} \\mathcal{S}_{+} + 384 \\zeta \\mathcal{S}_{-} \\mathcal{S}_{+} + 480 \\bar{\\beta}_{+} \\zeta \\mathcal{S}_{-} \\mathcal{S}_{+} \\nonumber \\\\ &\\qquad\\qquad\\qquad\\qquad\\qquad\\ \\,\\qquad\\qquad- 192 \\bar{\\gamma} \\mathcal{S}_{-} \\mathcal{S}_{+} + 192 \\zeta \\bar{\\gamma} \\mathcal{S}_{-} \\mathcal{S}_{+} - 960 \\bar{\\beta}_{+} \\bar{\\gamma}^{-1} \\mathcal{S}_{-} \\mathcal{S}_{+} + 960 \\bar{\\beta}_{+} \\zeta \\bar{\\gamma}^{-1} \\mathcal{S}_{-} \\mathcal{S}_{+}\\Big] \\nonumber \\\\ &\\qquad\\qquad\\qquad\\qquad\\qquad\\,\\,\\qquad + \\nu \\Big[-1208 \\mathcal{S}_{-}^2 + 1208 \\zeta \\mathcal{S}_{-}^2 - 604 \\bar{\\gamma} \\mathcal{S}_{-}^2 + 604 \\zeta \\bar{\\gamma} \\mathcal{S}_{-}^2\\Big] \\Bigg\\} \\Bigg)\\,. \\end{align} \\end{subequations} Next, we apply the usual flux-balance argument for the total tensor $+$ scalar energy flux, \\begin{align} \\frac{\\dd E_\\text{circ}}{\\dd t} = -\\mathcal{F}^\\text{total}_\\text{circ}\\,,\\qquad \\mathcal{F}^\\text{total}_\\text{circ} \\equiv \\mathcal{F}_\\text{circ} + \\mathcal{F}^s_\\text{circ}\\,, \\end{align} where $E_\\text{circ}$ denotes the conservative energy of the system deduced from the"} +{"id":"RedPajamaArXiv.0001","text":"\\section{Introduction} The nature of dark matter (DM) is one of the open problems in cosmology, astrophysics and particle physics. Apart from its gravitational interaction, there is no evidence that it interacts with ordinary matter via the other existing forces in nature. Furthermore, the current understanding of our universe can be explained very well if one includes the existence of the cold DM in addition to the ordinary matter and dark energy. It has been assumed that the DM was in thermal equilibrium with the Standard Model (SM) particles in the early universe. As the reaction rate that keeps the DM in thermal equilibrium with other SM particles drops out and becomes comparable with the expansion rate of the universe, it froze-out. As a result, it remains with us today. One of the most popular and well studied DM candidates so far is the weakly interacting massive particle (WIMP). This candidate fits the observed DM abundance with the typical electroweak scale annihilation cross section. The need to extend the SM particle contents is necessary since it does not provide any suitable DM candidate. One of the most studied examples of the SM extension is the general two Higgs doublet model (2HDM). This model comes with many variations and each of them offers different phenomenological features, see for example~\\cite{Branco:2011iw,Logan:2014jla} for a review. As one of the 2HDM variants, the inert Higgs doublet model (IHDM)~\\cite{Deshpande:1977rw} provides a suitable DM candidate. This is done by imposing the discrete $\\mathcal Z_2$ symmetry in which the second Higgs doublet belongs to the $\\mathcal Z_2$-odd particle. This model has been studied in detail over the years~\\cite{LopezHonorez:2006gr, Arina:2009um, Nezri:2009jd, Miao:2010rg, Gustafsson:2012aj, Arhrib:2012ia, Arhrib:2014pva,Swiezewska:2012eh, Arhrib:2013ela, Goudelis:2013uca, Krawczyk:2013jta, Krawczyk:2013pea, Ilnicka:2015jba, Diaz:2015pyv, Modak:2015uda, Kephart:2015oaa,Queiroz:2015utg, Garcia-Cely:2015khw, Hashemi:2016wup, Poulose:2016lvz, Alves:2016bib, Datta:2016nfz, Belyaev:2016lok, Belyaev:2018ext}. Recently, this ${\\mathcal Z}_2$ symmetry appears as an accidental symmetry in a renormalizable gauged two Higgs doublet model (G2HDM) and it has been studied in detail in~\\cite{Huang:2015wts,Chen:2019pnt}. In this model, the two Higgs doublets are put together in a doublet representation of an additional $SU(2)_H$ gauge group. In addition to this, there is also a new $U(1)_X$ symmetry. As for the scalar sector, it is expanded by including a new $SU(2)_H$ triplet and doublet. These new scalars transform trivially under the SM gauge group. As in IHDM, there is a suitable scalar DM candidate in G2HDM. In this case, the stability of the DM is protected by the accidental $\\mathcal Z_2$ symmetry. The phenomenological study of this DM has been done in~\\cite{Chen:2019pnt}. This study has taken the previous results of the G2HDM studies~\\cite{Huang:2015rkj, Huang:2017bto, Chen:2018wjl, Arhrib:2018sbz, Huang:2019obt} into account, especially the results from~\\cite{Arhrib:2018sbz, Huang:2019obt}. These two studies put the constraints in the scalar sector and gauge sector of the G2HDM. These include vacuum stability of the scalar potential, perturbative unitarity, Higgs physics, Drell-Yan process, the $Z^{'}$ search, as well as electroweak precision test (EWPT). We dubbed these results as the scalar and gauge sector constraints ({\\bf SGSC}). However, the previous DM study in~\\cite{Chen:2019pnt} neglects the heavy $\\mathcal Z_2$-odd fermions in their calculation. In this paper, we focus on the effects of these new heavy fermions on complex scalar DM phenomenology. For consistency with the previous DM study, we take {\\bf SGSC} constraints as our starting points. This paper is organized as follows. In Sec.~\\ref{sec:model} we briefly mention the important aspects of the G2HDM model, especially the scalar potential, mass spectra, and suitable dark matter candidates. To compare our DM study against the existing experimental data, we discuss how relic density ({\\bf RD}) and direct detection ({\\bf DD}) constraint our complex scalar DM. This is discussed in Sec.~\\ref{sec:constraints}. In Sec.~\\ref{sec:result}, we briefly explain the methodology employed in our numerical computation. We further discuss in detail the results obtained in our analysis. In Sec.~\\ref{sec:SCBSF}, we discuss QCD Sommerfeld correction and QCD bound state effect relevant for the relic density calculation. The allowed parameter space after imposing DM physics constraints is discussed in Sec.~\\ref{sec:ps}. Finally, we summarize and conclude our study in Sec.~\\ref{sec:summary}. We list the most important Feynman rules used in the discussion of this work in Appendix~\\ref{sec:appendix}. \\vfill \\section{The G2HDM Model} \\label{sec:model} \\subsection{Matter Content} \\begin{table}[htbp!] \\begin{tabular}{|c|c|} \\hline Matter Fields & $SU(3)_C \\times SU(2)_L \\times SU(2)_H \\times U(1)_Y \\times U(1)_X$ \\\\ \\hline \\hline $H=\\left( H_1\\,, \\; H_2 \\right)^{\\rm T}$ & (1, 2, 2, 1\/2, 1) \\\\ $\\Delta_H$ & (1, 1, 3, 0, 0) \\\\ $\\Phi_H$ & (1, 1, 2, 0, $1$) \\\\ \\hline\\hline $Q_L=\\left( u_L\\,, \\; d_L \\right)^{\\rm T}$ & (3, 2, 1, 1\/6, 0)\\\\ $U_R=\\left( u_R\\,, \\; u^H_R \\right)^{\\rm T}$ & (3, 1, 2, 2\/3, 1) \\\\ $D_R=\\left( d^H_R\\,, \\; d_R \\right)^{\\rm T}$ & (3, 1, 2, $-1\/3$, $-1$) \\\\ \\hline $L_L=\\left( \\nu_L\\,, \\; e_L \\right)^{\\rm T}$ & (1, 2, 1, $-1\/2$, 0) \\\\ $N_R=\\left( \\nu_R\\,, \\; \\nu^H_R \\right)^{\\rm T}$ & (1, 1, 2, 0, $1$) \\\\ $E_R=\\left( e^H_R\\,, \\; e_R \\right)^{\\rm T}$ & (1, 1, 2, $-1$, $-1$) \\\\ \\hline $\\nu_L^H$ & (1, 1, 1, 0, 0) \\\\ $e_L^H$ & (1, 1, 1, $-1$, 0) \\\\ \\hline $u_L^H$ & (3, 1, 1, 2\/3, 0) \\\\ $d_L^H$ & (3, 1, 1, $-1\/3$, 0) \\\\ \\hline \\end{tabular} \\caption{Matter contents and their corresponding quantum numbers in G2HDM. New heavy fermions are denoted by the superscript $H$.} \\label{tab:quantumnos} \\end{table} The gauge group of G2HDM is realized by expanding the SM gauge symmetry with additional $SU(2)_H \\times U(1)_X$ dubbed as hidden gauge sector. The SM scalar sector $H_{1}$ is extended by adding one Higgs doublet $H_{2}$ in such a way that both of them transform under the fundamental representation of $SU(2)_L$ and $SU(2)_H$ gauge group. Furthermore, $\\Delta_H$ and $\\Phi_H$, which transform under the triplet and doublet representations of $SU(2)_H$, are present. Both of them are SM singlets. New right-handed heavy fermions are put together with the SM right-handed fermions into $SU(2)_H$ doublets while maintaining the trivial representation of $SU(2)_L$. Furthermore, anomaly cancellation dictates us to further include two pairs of left-handed heavy quarks and two pairs of left-handed heavy leptons for each generation, which are singlets under $SU(2)$ and $U(1)_X$. As a remark, one notes that the $SU(2)_H$ considered here is different from the $SU(2)_R$ in left-right symmetric models~\\cite{Mohapatra:1979ia,Keung:1983uu}. The $W^{\\prime (p,m)}$ in G2HDM is electrically neutral, while the $W^{\\prime \\pm}$ in left-right symmetric carry non-zero electric charges. This is the rationale behind the superscripts $p$ and $m$ in labelling $W^{\\prime}$. As another comparison, we also observe that non-sterile right-handed neutrinos $\\nu_{l R}$s, incorporated in the mirror fermion models of electroweak scale right-handed neutrinos~\\cite{Hung:2006ap,Hung:2017voe,Chang:2016ave,Hung:2015hra,Chang:2017vzi,Hung:2017tts}, are different from our setup. In the mirror fermion models, $\\nu_{l R}$s are paired together with mirror charged leptons $l^M_R$s to form $SU(2)_L$ doublets. In contrast, they are grouped with new heavy right-handed neutrinos $\\nu^H_{l R}$ to form $SU(2)_H$ doublets in G2HDM. There are several models that impose additional gauge symmetry on 2HDM to solve flavor problem, dark matter and neutrino masses, see for instance~\\cite{Ko:2012hd,Campos:2017dgc,Camargo:2018klg,Camargo:2018uzw,Camargo:2019ukv,Cogollo:2019mbd}. In table~\\ref{tab:quantumnos}, we list the matter contents of the G2HDM model and their associated quantum numbers. \\subsection{Scalar Potential and Mass Spectra} \\label{subsec:pottheorcons} \\subsubsection*{Scalar Potential} The most general renormalizable scalar potential that satisfies the G2HDM symmetries comprises 4 distinct terms ~\\cite{Arhrib:2018sbz} \\begin{equation} V_T = V (H) + V (\\Phi_H ) + V ( \\Delta_H ) + V_{\\rm mix} \\left( H, \\Delta_H, \\Phi_H \\right) \\; . \\label{eq:higgs_pots} \\end{equation} The first term $V(H)$ in Eq.~\\eqref{eq:higgs_pots} contains self-interaction of $SU(2)_L$ and $SU(2)_H$ scalar doublet $H$ reads as \\begin{align} \\label{VH1H2} V(H) = {}& \\mu^2_H \\left( H^{\\alpha i} H_{\\alpha i} \\right) + \\lambda_H \\left( H^{\\alpha i} H_{\\alpha i} \\right)^2 + \\frac{1}{2} \\lambda'_H \\epsilon_{\\alpha \\beta} \\epsilon^{\\gamma \\delta} \\left( H^{ \\alpha i} H_{\\gamma i} \\right) \\left( H^{ \\beta j} H_{\\delta j} \\right) \\nonumber \\\\ = {}& \\mu^2_H \\left( H^\\dag_1 H_1 + H^\\dag_2 H_2 \\right) + \\lambda_H \\left( H^\\dag_1 H_1 + H^\\dag_2 H_2 \\right)^2 \\nonumber \\\\ {}& \\;\\;\\;\\;\\;\\;\\;\\;\\;\\;\\;\\;\\;\\;\\;\\;\\;\\;\\;\\;\\;\\;\\;\\;\\;\\;\\;\\;\\;\\;\\; + \\lambda'_H \\left( - H^\\dag_1 H_1 H^\\dag_2 H_2 + H^\\dag_1 H_2 H^\\dag_2 H_1 \\right) \\; , \\end{align} where Greek and Latin letters indicate $SU(2)_H$ and $SU(2)_L$ indices respectively, both of which run from 1 to 2, and the upper and lower indices are related by complex conjugation, i.e., $H^{\\alpha i} = H^*_{\\alpha i}$. A close inspection shows that the second line of Eq.~\\eqref{VH1H2} exhibits the discrete $\\mathcal Z_2$ symmetry of $H_1 \\rightarrow H_1$ and $H_2 \\rightarrow - H_2$. The appearance of this discrete symmetry in G2HDM model is more natural unlike the discrete symmetry in general 2HDM model. In the latter case, one needs to put this symmetry by hand to forbid FCNC at tree level in the Yukawa sectors. The second term $V ( \\Phi_H )$ is the self interaction of $\\Phi_H$ \\begin{align} \\label{VPhi} V ( \\Phi_H ) = {}& \\mu^2_{\\Phi} \\Phi_H^\\dag \\Phi_H + \\lambda_\\Phi \\left( \\Phi_H^\\dag \\Phi_H \\right) ^2 \\nonumber \\\\ = {}& \\mu^2_{\\Phi} \\left( \\Phi^*_1\\Phi_1 + \\Phi^*_2\\Phi_2 \\right) + \\lambda_\\Phi \\left( \\Phi^*_1\\Phi_1 + \\Phi^*_2\\Phi_2 \\right) ^2 \\; , \\end{align} where $\\Phi_H = (\\Phi_1\\,, \\; \\Phi_2)^{\\rm T}$ belongs to the $SU(2)_H$ doublet. The self interaction of the $SU(2)_H$ scalar triplet $\\Delta_{H}$ reads \\begin{align} \\label{VDeltas} V ( \\Delta_H ) = {}& - \\mu^2_{\\Delta} {\\rm Tr} \\left( \\Delta^2_H \\right) \\; + \\lambda_\\Delta \\left( {\\rm Tr} \\left( \\Delta^2_H \\right) \\right) ^2 \\nonumber \\\\ = {}& - \\mu^2_{\\Delta} \\left( \\frac{1}{2} \\Delta^2_3 + \\Delta_p \\Delta_m \\right) + \\lambda_{\\Delta} \\left( \\frac{1}{2} \\Delta^2_3 + \\Delta_p \\Delta_m \\right) ^2 \\; , \\end{align} where the triplet field is expressed as \\begin{align} \\Delta_H= \\begin{pmatrix} \\Delta_3\/2 & \\Delta_p \/ \\sqrt{2} \\\\ \\Delta_m \/ \\sqrt{2} & - \\Delta_3\/2 \\\\ \\end{pmatrix} = \\Delta_H^\\dagger \\; {\\rm with} \\;\\; \\Delta_m = \\left( \\Delta_p \\right)^* \\; {\\rm and} \\; \\left( \\Delta_3 \\right)^* = \\Delta_3 \\; . \\end{align} Here, the off-diagonal components of the $SU(2)_H$ triplet, $\\Delta_{H}$, are electrically neutral. Following the same labelling as in $W^{\\prime (p,m)}$, we put the subscripts $p$ and $m$ on them. Finally, the last term $V_{\\rm{mix}}$ takes all possible mixing between $H$, $\\Phi_H$ as well as $\\Delta_H$ into account, and it is given by \\begin{align} \\label{VvMix} V_{\\rm{mix}} \\left( H , \\Delta_H, \\Phi_H \\right) = {}& + M_{H\\Delta} \\left( H^\\dag \\Delta_H H \\right) - M_{\\Phi\\Delta} \\left( \\Phi_H^\\dag \\Delta_H \\Phi_H \\right) \\nonumber \\\\ {}& + \\lambda_{H\\Phi} \\left( H^\\dag H \\right) \\left( \\Phi_H^\\dag \\Phi_H \\right) + \\lambda^\\prime_{H\\Phi} \\left( H^\\dag \\Phi_H \\right) \\left( \\Phi_H^\\dag H \\right) \\nonumber\\\\ {}& + \\lambda_{H\\Delta} \\left( H^\\dag H \\right) {\\rm Tr} \\left( \\Delta^2_H \\right) + \\lambda_{\\Phi\\Delta} \\left( \\Phi_H^\\dag \\Phi_H \\right) {\\rm Tr} \\left( \\Delta^2_H \\right) \\; . \\end{align} The explicit expression of Eq.~\\eqref{VvMix} in terms of its components is \\begin{align} V_{\\rm{mix}} \\left( H , \\Delta_H, \\Phi_H \\right) = {}& + M_{H\\Delta} \\left( \\frac{1}{\\sqrt{2}}H^\\dag_1 H_2 \\Delta_p + \\frac{1}{2} H^\\dag_1 H_1\\Delta_3 + \\frac{1}{\\sqrt{2}} H^\\dag_2 H_1 \\Delta_m - \\frac{1}{2} H^\\dag_2 H_2 \\Delta_3 \\right) \\nonumber \\\\ {}& - M_{\\Phi\\Delta} \\left( \\frac{1}{\\sqrt{2}} \\Phi^*_1 \\Phi_2 \\Delta_p + \\frac{1}{2} \\Phi^*_1 \\Phi_1\\Delta_3 + \\frac{1}{\\sqrt{2}} \\Phi^*_2 \\Phi_1 \\Delta_m - \\frac{1}{2} \\Phi^*_2 \\Phi_2 \\Delta_3 \\right) \\nonumber \\\\ {}& + \\lambda_{H\\Phi} \\left( H^\\dag_1 H_1 + H^\\dag_2 H_2 \\right) \\left( \\Phi^*_1\\Phi_1 + \\Phi^*_2\\Phi_2 \\right) \\nonumber\\\\ {}& + \\lambda^\\prime_{H\\Phi} \\left( H^\\dag_1 H_1 \\Phi^*_1\\Phi_1 + H^\\dag_2 H_2 \\Phi^*_2\\Phi_2 + H^\\dag_1 H_2 \\Phi_2^*\\Phi_1 + H^\\dag_2 H_1 \\Phi^*_1\\Phi_2 \\right) \\nonumber\\\\ {}& + \\lambda_{H\\Delta} \\left( H^\\dag_1 H_1 + H^\\dag_2 H_2 \\right) \\left( \\frac{1}{2} \\Delta^2_3 + \\Delta_p \\Delta_m \\right) \\nonumber\\\\ {}& + \\lambda_{\\Phi\\Delta} \\left( \\Phi^*_1\\Phi_1 + \\Phi^*_2\\Phi_2 \\right) \\left( \\frac{1}{2} \\Delta^2_3 + \\Delta_p \\Delta_m \\right) \\; . \\label{eq:vmix} \\end{align} As before, $V_{\\rm{mix}} \\left( H , \\Delta_H, \\Phi_H \\right)$ is also invariant under $H_1 \\rightarrow H_1$, $H_2 \\rightarrow - H_2$, $\\Phi_1 \\rightarrow - \\Phi_1$, $\\Phi_2 \\rightarrow \\Phi_2$, $\\Delta_3 \\rightarrow \\Delta_3$, and $\\Delta_{p,m} \\rightarrow - \\Delta_{p,m}$. It has been shown in~\\cite{Chen:2019pnt} that this discrete symmetry holds in all sector in G2HDM. \\subsection{Mass Spectra} \\label{sec:MassSpectrum} The gauge symmetry of G2HDM is broken spontaneously by the vacuum expectation values (VEVs) of $\\langle H_1 \\rangle = (0, v\/\\sqrt 2)^{\\rm T}$, $\\langle \\Phi_2 \\rangle = v_\\Phi\/\\sqrt 2$, and $\\langle \\Delta_3 \\rangle = - v_\\Delta$~\\cite{Huang:2015wts,Arhrib:2018sbz}. As a result of this spontaneous symmetry breaking (SSB), all fields in G2HDM acquire their mass from these VEVs. In this subsection, we discuss the mass spectra of G2HDM, focusing mainly on the scalar and gauge sector. \\subsubsection*{Higgs-like ($\\mathcal Z_2$-even) Scalars} The mass terms as well as the mixing terms of the scalar fields can be extracted by writing the scalar potential in terms of the existing VEVs and further taking the second derivatives with respect to the corresponding scalar fields. The SM Higgs can be obtained from the mixing of three real scalars $h$, $\\phi_2$ and $\\delta_3$~\\footnote{We parameterize the scalar fields as the notations of~\\cite{Huang:2015wts}: $H_1 = \\left( \\begin{array}{c} G^+ \\\\ \\frac{v + h}{\\sqrt 2} + i G^0 \\end{array} \\right)$, $H_2 = \\left( \\begin{array}{c} H^+ \\\\ H^0_2 \\end{array} \\right)$, $\\Phi_H = \\left( \\begin{array}{c} G^p_H \\\\ \\frac{v_\\Phi + \\phi_2}{\\sqrt 2} + i G^0_H \\end{array} \\right)$, and $\\Delta_H = \\left( \\begin{array}{cc} \\frac{-v_\\Delta + \\delta_3}{2} & \\frac{\\Delta_p}{\\sqrt 2} \\\\ \\frac{\\Delta_m}{\\sqrt2} & \\frac{v_\\Delta - \\delta_3}{2} \\end{array} \\right)$.}. In the basis of ${\\cal S}=\\{h, \\phi_2, \\delta_3\\}^{\\rm T}$, the corresponding mixing matrix of these ${\\cal Z}_2$-even neutral real scalars is \\begin{align} {\\mathcal M}_0^2 = \\begin{pmatrix} 2 \\lambda_H v^2 & \\lambda_{H\\Phi} v v_\\Phi & \\frac{v}{2} \\left( M_{H\\Delta} - 2 \\lambda_{H \\Delta} v_\\Delta \\right) \\\\ \\lambda_{H\\Phi} v v_\\Phi & 2 \\lambda_\\Phi v_\\Phi^2 & \\frac{ v_\\Phi}{2} \\left( M_{\\Phi\\Delta} - 2 \\lambda_{\\Phi \\Delta} v_\\Delta \\right) \\\\ \\frac{v}{2} \\left( M_{H\\Delta} - 2 \\lambda_{H \\Delta} v_\\Delta \\right) & \\frac{ v_\\Phi}{2} \\left( M_{\\Phi\\Delta} - 2 \\lambda_{\\Phi \\Delta} v_\\Delta \\right) & \\frac{1}{4 v_\\Delta} \\left( 8 \\lambda_\\Delta v_\\Delta^3 + M_{H\\Delta} v^2 + M_{\\Phi \\Delta} v_\\Phi^2 \\right) \\end{pmatrix} \\; . \\label{eq:scalarbosonmassmatrix} \\end{align} This matrix is diagonalized by using an orthogonal matrix ${\\cal O}$ to obtain the masses of the physical fields as \\begin{equation} {\\cal O}^{\\rm T}\\cdot {\\mathcal M}_0^2 \\cdot {\\cal O} = {\\rm Diag}(m^2_{h_1}, m^2_{h_2}, m^2_{h_3}) \\; , \\label{eq:OTM0sqO} \\end{equation} where the masses of the fields are ordered as $m_{h_1} \\leq m_{h_2} \\leq m_{h_3}$. The interaction basis ${\\cal S}$ and the mass eigenfields are linked to each other via ${\\cal O}$ as ${\\cal S} = {\\cal O}\\cdot\\{h_1, h_2, h_3\\}^{\\rm T}$. The 125 GeV SM Higgs is chosen to be the lightest mass eigenstate $h_{1}$. The remaining ${\\cal Z}_2$-even scalars $G^{\\pm,0}$ and $G^0_H$ do not mix with the existing scalar fields. These would be Goldstone bosons will be absorbed by the gauge bosons. \\subsubsection*{Dark ($\\mathcal Z_2$-odd) Scalars} The mass of the charged Higgs can be read directly from the scalar potential since it does not mix with other scalars in G2HDM. Since it interacts with $H_1$, $\\Phi_H$ as well as $\\Delta_H$, the charged Higgs receives its mass from the VEVs of these fields as \\begin{align} m^2_{H^\\pm} &= M_{H \\Delta} v_\\Delta - \\frac{1}{2}\\lambda^\\prime_H v^2 +\\frac{1}{2}\\lambda^\\prime_{H\\Phi}v_\\Phi^2 \\;. \\label{chargedHiggsmass} \\end{align} On the other hand, the three neutral complex fields $G^{p,m}_H$ , $H^{0(*)}_2$ and $\\Delta_{p,m}$~\\footnote{See the previous footnote for the definitions of these complex scalars.} mix with each other as \\begin{align} {\\mathcal M}_0^{\\prime 2} = \\begin{pmatrix} M_{\\Phi \\Delta} v_\\Delta +\\frac{1}{2}\\lambda^\\prime_{H\\Phi}v^2 & \\frac{1}{2}\\lambda^\\prime_{H\\Phi} v v_\\Phi & - \\frac{1}{2} M_{\\Phi \\Delta} v_\\Phi \\\\ \\frac{1}{2}\\lambda^\\prime_{H\\Phi} v v_\\Phi & M_{H \\Delta} v_\\Delta +\\frac{1}{2}\\lambda^\\prime_{H\\Phi} v_\\Phi^2 & \\frac{1}{2} M_{H \\Delta} v\\\\ - \\frac{1}{2} M_{\\Phi \\Delta} v_\\Phi & \\frac{1}{2} M_{H \\Delta} v & \\frac{1}{4 v_\\Delta} \\left( M_{H\\Delta} v^2 + M_{\\Phi \\Delta} v_\\Phi^2 \\right)\\end{pmatrix} \\, , \\label{eq:Z2oddmassmatrix} \\end{align} where this matrix is written in the basis of $\\mathcal{G}=\\{ G^p_H , H^{0*}_2, \\Delta_p \\}^T$. As one can easily check from its determinant, this mass matrix has at least one zero eigenvalue. Upon diagonalization, the interaction basis and mass basis are related via orthogonal matrix $\\mathcal{O}^D$ as $\\mathcal{G} = {\\cal O}^D\\cdot \\{ \\widetilde{G}^p, D, \\widetilde{\\Delta}\\}^{\\rm T}$ such that the orthogonal matrix $\\mathcal{O}^D$ brings the mixing matrix into the diagonal form \\begin{equation} ({\\cal O}^D)^{\\rm T}\\cdot {\\mathcal M}_0^{\\prime 2} \\cdot {\\cal O}^D = {\\rm Diag}(0, m^2_D, m^2_{\\widetilde\\Delta}) \\; . \\label{eq:OTM0sqO2} \\end{equation} The complex gauge bosons $SU(2)_H$, $W^{\\prime \\, (p,m)}$, become massive by absorbing the first zero eigenvalue in Eq.~\\eqref{eq:OTM0sqO2}, i.e., $\\widetilde{G}^{p,m}$, into their longitudinal component. Here, the hierarchy $m^2_D < m^2_{\\widetilde{\\Delta}}$ has been assumed. In order to facilitate the analysis in the case when $D$ is the dark matter candidate, we have excluded $m_{D}=m_{\\widetilde{\\Delta}}$ case. This degenerate in masses happens actually under the very special condition as can be inferred from the mass formula of the two physical states given below \\begin{equation} \\label{darkmattermass} M^2_{D, {\\widetilde \\Delta}} = \\frac{-B \\mp \\sqrt{B^2 - 4 A C}}{2A} \\; , \\end{equation} where \\begin{align} \\label{ABC} A &= 8 v_\\Delta \\; , \\nonumber \\\\ B & = - 2 \\left[ M_{H\\Delta} \\left( v^2 + 4 v_\\Delta^2 \\right) + M_{\\Phi \\Delta} \\left( 4 v_\\Delta^2 + v_\\Phi^2 \\right) + 2 \\lambda^\\prime_{H\\Phi} v_\\Delta \\left( v^2 + v_\\Phi^2 \\right) \\right] \\;, \\\\ C & = \\left( v^2 + v_\\Phi^2 + 4 v_\\Delta^2 \\right) \\left[ M_{H \\Delta} \\left( \\lambda^\\prime_{H\\Phi} v^2 + 2 M_{\\Phi \\Delta} v_\\Delta \\right) + \\lambda^\\prime_{H\\Phi} M_{\\Phi \\Delta} v_\\Phi^2 \\right] \\; .\\nonumber \\end{align} As can be seen from this formula, the degeneracy between $D$ and $\\widetilde{\\Delta}$ occurs when the argument under the square root vanishes. Furthermore, we require $m_{H^\\pm}>m_D$ to make $D$ a suitable DM candidate. \\subsubsection*{Gauge Bosons} Once the SSB takes place, all the gauge fields $W$, $W'$, $B$, and $X$ become massive. The charged SM gauge boson, $W^\\pm$, doesn't mix with other gauge bosons. Its mass is completely determined by the VEV of $H_{1}$ as $m_{W^{\\pm}} = gv\/2$. On the other hand, the neutral gauge boson coming from the off-diagonal component of $SU(2)_H$, $W^{\\prime (p,m)}$, receives its mass from all existing VEVs as \\begin{equation} m^2_{W^{\\prime (p,m)}} = \\frac{1}{4} g^2_H \\left( v^2 + v^2_\\Phi + 4 v^2_\\Delta \\right) . \\; \\label{eq:Wppmmass} \\end{equation} The neutral gauge bosons corresponding to the third generator of the $SU(2)_L$ and $SU(2)_H$, $W^3$ and $W^{\\prime 3}$, mix with $B$ as well as $X$. In the basis of ${\\mathcal V}^\\prime = \\{B,W^{3},W^{\\prime 3},X\\}^{\\rm T}$, their mixing matrix is given by the following 4$\\times$4 matrix \\begin{equation} \\label{M1sq2} {\\mathcal M}_1^2 = \\begin{pmatrix} \\frac{g^{\\prime 2} v^2 }{4} + M_Y^2 & - \\frac{g^{\\prime} g \\, v^2 }{4} & \\frac{g^{\\prime} g_H v^2 }{4} & \\frac{g^\\prime g_X v^2}{2} + M_X M_Y \\\\ - \\frac{g^{\\prime} g \\, v^2 }{4} & \\frac{ g^2 v^2 }{4} & - \\frac{g g_H v^2 }{4} & - \\frac{ g g_X v^2 }{2} \\\\ \\frac{g^{\\prime} g_H v^2 }{4} & - \\frac{g g_H v^2 }{4} & \\frac{g^2_H \\left( v^2 + v^2_\\Phi \\right) }{4} & \\frac{g_H g_X \\left( v^2 - v^2_\\Phi \\right) }{2} \\\\ \\frac{g^\\prime g_X v^2}{2} + M_X M_Y & - \\frac{ g g_X v^2 }{2} & \\frac{g_H g_X \\left( v^2 - v^2_\\Phi \\right) }{2} & g_X^2 \\left( v^2 + v^2_\\Phi \\right) + M_X^2 \\end{pmatrix} \\; , \\end{equation} where $M_X$ and $M_Y$ stand for two Stueckelberg mass parameters~\\cite{Stueckelberg:1938zz,Ruegg:2003ps,Kors:2005uz,Kors:2004iz,Kors:2004ri, Kors:2004dx,Feldman:2007nf,Feldman:2007wj,Feldman:2006wb} associated with $U(1)_X$ and $U(1)_Y$, respectively. The determinant of this matrix is zero. As a consequence, there is at least one massless eigenstate which can be associated with the photon. We set $M_Y = 0$ to avoid a non-zero electric charges of the neutrinos as discussed in~\\cite{Huang:2019obt}. Moreover, this particular choice allows us to bring the matrix in Eq.~\\eqref{M1sq2} into the following form \\begin{align} {\\cal M}^2_Z = \\begin{pmatrix} 0 & 0 & 0 & 0\\\\ 0 & M_{Z^\\text{SM}}^2 & - \\frac{g_H v }{2} M_{Z^\\text{SM}} & - g_X v M_{Z^\\text{SM}} \\\\ 0 & - \\frac{g_H v}{2} M_{Z^\\text{SM}} & \\frac{g_H^{2} \\left(v^{2} + v_\\Phi^{2}\\right)}{4} & \\frac{g_X g_H \\left(v^{2} - v_\\Phi^{2}\\right)}{2}\\\\ 0 & - g_X v M_{Z^\\text{SM}} & \\frac{g_X g_H \\left(v^{2} - v_\\Phi^{2}\\right)}{2} & g_X^{2} (v^{2} + v_\\Phi^{2}) + M_X^{2} \\end{pmatrix} \\, \\label{eq:MgaugeSMrot} \\end{align} where $M_{Z^{\\rm SM}} = \\sqrt{g^2 + g^{\\prime 2}}\\, v\/2$ is the SM gauge boson $Z^{\\rm SM}$ mass. This is done by applying Weinberg rotation using the following matrix to the Eq.~\\eqref{M1sq2} \\begin{equation} \\label{eq:rot4by4dec} {\\cal O}^{W} = \\begin{pmatrix} c_W & -s_W & 0 & 0 \\\\ s_W & c_W & 0 & 0 \\\\ 0 & 0 & 1 & 0 \\\\ 0 & 0 & 0 & 1 \\end{pmatrix}, \\end{equation} i.e., $({\\cal O}^{W})^{\\rm T}\\cdot \\mathcal{M}_1^2 (M_Y=0)\\cdot{\\cal O}^{W} $. As a result of this rotation, we get the massless photon associated with the first component of the basis of this matrix while the second component gives us the $Z^{\\rm SM}$. In this case, we have the intermediate basis $\\mathcal{V}'_Z=\\{A,Z^{SM}, W^{\\prime 3}, X\\}^{\\rm T}$. Thus, one can express the original rotation matrix as $\\mathcal{O}^{G}_{4 \\times 4}(M_Y=0) = \\mathcal{O}^W \\cdot \\mathcal{O}^Z$, where the matrix $\\mathcal{O}^Z$ brings $\\mathcal{M}^2_Z$ in Eq.~\\eqref{eq:MgaugeSMrot} into a diagonal form. Consequently, the relation between the mass eigenstates and the intermediates states is given by $\\mathcal{V}'_Z = \\mathcal{O}^Z\\cdot \\{A, Z, Z', Z''\\}^{\\rm T}$. For the rest of the paper, we assign $\\mathcal{O}^G$ to the non-diagonal $3\\times 3$ part of $\\mathcal{O}^Z$, such that $\\mathcal{O}^Z_{j+1,k+1} = \\mathcal{O}^G_{j,k}$ with $j$ and $k=1,2,3$, as explicitly given in Eq.~(6) of Ref.~\\cite{Huang:2019obt}. As a remark, the photon $A$ stays the same between the intermediate states $\\mathcal{V}'_Z$ and the mass eigenstates. This implies that the only non-vanishing component in the first row and column of $\\mathcal{O}^Z$ is $\\mathcal{O}^Z_{1,1} = 1$. \\subsection{Dark Matter Candidate} \\label{ssec:HiddenP} As we mentioned in the preceding sections, the stability of the DM in G2HDM is protected by accidental $\\mathcal Z_{2}$ symmetry. This symmetry, also known as the hidden parity ($h$-parity), is respected by all sector in G2HDM even after the SSB~\\cite{Huang:2015wts,Chen:2019pnt}. In addition, this parity also forbids FCNC~\\cite{Glashow:1976nt,Paschos:1976ay} to occur at tree level for the SM in this model. All particles in G2HDM can be classified according to this parity as shown in Table~\\ref{tab:Z2Eff}. \\begin{table}[htbp!] \\begin{tabular}{|c|c|c|} \\hline Fields & $h$-parity\\\\ \\hline $h$, $G^{\\pm,0}$, $\\phi_{2}$, $G^0_H$, $\\delta_{3}$, $f$, $W^{\\mu}_{1,2,3}$, $B_{\\mu}$, $X^{\\mu}$, $W^{\\mu\\prime}_{3}$, $G^{\\mu a}$ & 1 \\\\ \\hline $G^{p,m}_H$, $H_2^0$, $H_2^{0 *}$, $H^{\\pm}$, $\\Delta_{p,m}$, $f^{H}$, $W^{\\mu \\prime}_{1,2}$ & $-1$ \\\\ \\hline \\end{tabular} \\caption{Classification of all the fields in G2HDM under $h$-parity.} \\label{tab:Z2Eff} \\end{table} In principle, all particles with zero electric charge and have $h$-parity equal to -1 are suitable DM candidates. Accordingly, from Table~\\ref{tab:Z2Eff}, the heavy neutrinos $\\nu^H$, neutral gauge boson $W^{\\prime (p,m)}$, and the physical complex scalar $D$ satisfy these requirements. In this work, we focus on complex scalar $D$ as our DM candidate. The mass mixing matrix in Eq.~\\eqref{eq:Z2oddmassmatrix} shows that the DM candidate mass eigenstate, $D$, is linear combination of the interaction eigenstates $G^p_{H}$, $H^{0*}_{2}$, and $\\Delta_{p}$. Mathematically, this linear superposition is given by \\begin{equation} \\label{eq:Dcomposition} D = \\mathcal{O}^D_{12} G^p_H + \\mathcal{O}^D_{22} H^{0*}_2+ \\mathcal{O}^D_{32} \\Delta_p \\;, \\end{equation} where $\\mathcal{O}^D_{ij}$ is the $(i,j)$-th component of the rotation matrix $\\mathcal{O}^D$. The values of these components depend on the numerical values of the parameters in Eq.~\\eqref{eq:Z2oddmassmatrix}. Following Ref~\\cite{Chen:2019pnt}, we classify our complex scalar DM candidate into three distinct cases: inert doublet-like DM, triplet-like DM, and Goldstone boson-like DM. This classification depends on the dominant component of the gauge eigenstate which can be characterized by the magnitude of $\\mathcal{O}^D_{ij}$ in Eq.~\\eqref{eq:Dcomposition}. We have inert doublet-like DM if $f_{H_2} \\equiv (\\mathcal{O}^D_{22})^2 > 2\/3$. Triplet-like DM is achieved if $f_{\\Delta_p} \\equiv (\\mathcal{O}^D_{32})^2 > 2\/3$. Goldstone-like DM is characterized by $f_{G^p} \\equiv (\\mathcal{O}^D_{12})^2 > 2\/3$. The magnitude of the $\\mathcal{O}^D_{ij}$ elements in~Eq.\\eqref{eq:Dcomposition} satisfy the following relation $f_{G^p}+f_{H_2}+f_{\\Delta_p}=1$. In addition, there is another condition that holds for the Goldstone-like DM. In this case, the value of $f_{G^p}$ must satisfy $0.67 < f_{G^p} < 0.8$ which is derived from both EWPT constraint and non-tachyonic DM mass solution as discussed in~\\cite{Chen:2019pnt}. Here, we focus on triplet-like DM and Goldstone-like DM. The Inert doublet-like DM has been ruled out since it can not survive the relic density and direct detection constraints ~\\cite{Chen:2019pnt}. \\section{Dark Matter Experimental Constraints} \\label{sec:constraints} To understand the properties of DM, we evaluate the DM-SM interactions via the existing experimental results. These include the observed DM relic abundance and the limit set by the null result coming from DM direct search. In this paper, we focus only on these two constraints as they provide the most stringent limit on the complex scalar DM phenomenology based on the previous study in~\\cite{Chen:2019pnt}. Here, we discuss the general feature of these experimental limits used in this work. \\subsection{Relic Density} \\label{sec:relic} Since the interaction between DM and SM is very weak in most of the models, the observed relic abundance will be typically large. However, there exist some mechanisms other than DM self annihilations which enable us to reach the observed abundance. First, thanks to the common ${\\cal Z}_2$-odd quantum number, DM coannihilates with other ${\\cal Z}_2$-odd particles if their mass splitting is small (typically $\\lesssim 10\\% $) such that their number densities do not suffer the Boltzmann suppression. In this work, coannihilations occur mainly between $D$ and new heavy fermions $f^{H}$. This happens because of $5\\%$ mass splitting that we impose on heavy fermions. Furthermore, as we will see later, this coannihilation is dominated by heavy fermions annihilation, especially heavy quarks-anti quarks pair ($q^{H}\\bar{q}^{H}$) annihilate into $q\\bar{q}$ and $gg$. Here, $q\\bar{q}$ and $gg$ denote SM quarks and gluon, respectively. Second, the presence of SM Higgs and heavy Higgs $h_{2}$ resonances significantly increase the thermally-averaged DM annihilation cross section. In G2HDM, this mechanism allows us to reach the correct relic abundance. We use the most recent result provided by the PLANCK collaboration~\\cite{Aghanim:2018eyx} for the relic density, $\\Omega h^2 = 0.120\\pm 0.001$, to restrict our thermal relic calculation. Moreover, we set an additional condition on the parameter space of G2HDM to reproduce this result within $2\\sigma$ significance. \\subsection{Direct Detection} The most up to date limit for DM direct search is provided by the XENON1T collaboration~\\cite{Aprile:2018dbl}. The zero signal result from this experiment strongly restricts the DM nucleon cross section, in particular, in the mass regime between 10~GeV to 100~GeV. Furthermore, for DM mass around 25~GeV, they ruled out the DM-nucleon elastic cross sections which have the value larger than $10^{-46} \\text{~cm}^{2}$. In G2HDM, it has been shown that the interaction between DM and nucleon exhibits isospin violation (ISV)~\\cite{Chen:2019pnt}. In this case, the ratio between DM-neutron to DM-proton effective coupling, $f_n\/f_p$, is not equal to 1. This occurs due to the $Z_{i}$ bosons mediated interaction. As an example, for SM $Z$ exchange, the vectorial coupling between quark $q$ ($d$ or $u$-type) and $Z$ is given by~\\cite{Chen:2019pnt} \\begin{eqnarray} \\label{eq:qqsz} g^{V}_{\\bar{q} q Z} = \\frac{i}{2} \\left[ \\frac{g}{c_{W}} \\left(T_{3} - 2 Q_q s^{2}_{W} \\right) \\mathcal{O}^{G}_{11} + g_{H} T^{\\prime}_{3} \\mathcal{O}^{G}_{21} + g_{X} X \\mathcal{O}^{G}_{31} \\right] \\, . \\end{eqnarray} Here, $Q_q$, $T_3$, $T'_3$ and $X$ stand for the electric charge, the third generator of $SU(2)_{L}$, the third generator of $SU(2)_{L}$, and the generator of $U(1)_{X}$, respectively. Since the $u$ and $d$ quark have distinct quantum number assignments with respect to the underlying gauge group, they couple to the SM $Z$ differently. In order to accommodate the ISV, we need to calculate the DM-nucleus elastic scattering cross section $\\sigma_{D \\mathcal N}$ \\begin{equation} \\sigma_{D\\mathcal{N}}=\\frac{4\\mu^2_{\\mathcal{A}}}{\\pi} \\left[ f_p \\mathcal{Z} + f_n (\\mathcal{A} - \\mathcal{Z}) \\right]^2 \\, , \\label{eq:sigmaTH} \\end{equation} where $\\mathcal N$ denotes a nucleus with mass number $\\mathcal{A}$ and proton number $\\mathcal{Z}$ and $\\mu_{\\mathcal{A}}= m_D m_\\mathcal{A}\/(m_D +m_\\mathcal{A})$ is the reduced mass for DM-nucleus system. For definiteness, we neglect all the isotopes of xenon and fix $\\mathcal A$ and $\\mathcal{Z}$ to 131 and 54, respectively. To extract the DM-nucleon effective couplings $f_n$ and $f_p$, we employ \\texttt{micrOMEGAs}~\\cite{Belanger:2018mqt} in our computation. To compare against the limit given by XENON1T which assumes $f_n=f_p$ in their analysis, we need to reconstruct their result at the nucleus level. In order to do so, we follow the same procedure in~\\cite{Chen:2019pnt} and obtain the following expression for general value of $f_n\/f_p$ \\begin{equation} \\sigma^{\\rm X1T}_{D\\mathcal{N}}=\\ensuremath{\\sigma^{\\rm{SI}}_p}({\\rm X1T})\\times \\frac{\\mu^2_{\\mathcal{A}}}{\\mu^2_{p}} \\times \\left[ \\mathcal{Z} + \\frac{f_n}{f_p} \\left({\\mathcal{A} - \\mathcal{Z}} \\right) \\right]^2 \\, , \\label{eq:sigmaEXP} \\end{equation} where $\\mu^2_{p}$ is the DM-proton reduced mass. In this paper, we use Eq.~\\eqref{eq:sigmaEXP} to constrain our direct detection prediction. \\begin{figure}[!phtb] \\centering{\\includegraphics[height=10cm,width=12cm]{DMDD_hi,Zi,qH.pdf}} \\caption{The Feynman diagrams relevant for DM direct search. They consist of three t-channel diagrams with the $\\mathcal Z_2$-even Higgs bosons (top left), neutral gauge bosons (top right) and heavy quarks (bottom left) mediators. There is also s-channel heavy quarks exchange (bottom right). } \\label{fig:DDFeynman} \\end{figure} In general, the DM-nucleon interaction will be different from antiDM-nucleon interaction. The spin independent interaction for complex scalar DM can be obtained by using the effective operator language as~\\cite{Belanger:2008sj} \\begin{eqnarray} \\label{eq:scalar_si_lgrgn} \\mathcal{L}_{D} &=& 2 \\lambda_{N,e} M_D D D^* \\bar{\\psi}_N\\psi_N + i \\lambda_{N,o} \\left( D^* \\overset{\\longleftrightarrow}{\\partial_\\mu} D \\right) \\bar{\\psi}_N\\gamma^\\mu \\psi_N \\, , \\end{eqnarray} where the $\\psi_N$, $\\lambda_{N,e}$, and $\\lambda_{N,o}$ stand for the nucleon field operator, the coupling of even operator, and the coupling of odd operator, respectively. In this case, the effective coupling between DM (antiDM) and the nucleon is \\begin{eqnarray} \\lambda_N =\\frac{\\lambda_{N,e} \\pm \\lambda_{N,o}}{2} \\; , \\label{eq:odd-even} \\end{eqnarray} where the plus (minus) sign denotes DM-nucleon (antiDM-nucleon) interaction. Under the interchange between $D$ and $D^{*}$, the first (second) term in the right hand side of Eq.~\\eqref{eq:scalar_si_lgrgn} stays the same (flips sign). Because of this, the first term is called \\emph{even} operator while the second term describes \\emph{odd} operator. As a consequence, the strength of the interaction between DM-nucleon and antiDM-nucleon is different and it is given by Eq.~\\eqref{eq:odd-even}. Hence, the value of $\\sigma_{D^* \\cal N}$ is in general not equal to $\\sigma_{D \\cal N}$ given by Eq.~\\eqref{eq:sigmaTH} because the effective couplings $f_p$ and $f_n$ for $D$ are different from those for $D^*$. In this work, we average the contribution from both $\\sigma_{D \\cal N}$ and $\\sigma_{D^* \\cal N}$ when comparing our calculation with the XENON1T result given in Eq.~\\eqref{eq:sigmaEXP}. The Feynman diagrams relevant for describing DM-quark interactions in G2HDM are shown in Fig.~\\ref{fig:DDFeynman}. For the upper part, the left panel is the $t$-channel interaction mediated by three Higgs bosons while the right panel is the $t$-channel with three neutral gauge bosons exchange. In addition, heavy quarks exchange via s and t-channel are shown in the lower part of the same figure. There is a destructive interference between heavy quarks diagrams and the Higgs mediated diagrams in triplet-like DM ($\\Delta_{p}$). On the other hand, the diagrams with the neutral gauge bosons and heavy quarks mediators add up constructively in Goldstone boson-like DM ($G^{p}_{H}$). \\section{Numerical Analysis and Results} \\label{sec:result} \\subsection{Methodology} Taking into account the various constraints based on previous G2HDM studies, we collect a sample of points by doing random scans. These points pass the scalar sector constraints studied in~\\cite{Arhrib:2018sbz} as we mentioned in the preceding section. In addition, we also impose the limits from the gauge sector carried out in~\\cite{Huang:2019obt}. This study includes Drell-Yan constraint which restricts the $SU(2)_{H}$ gauge coupling, $g_{H}$, below 0.1. To prevent the decay of DM into $W^{\\prime}$, we impose the condition $m_{W^\\prime}$ $>$ $m_{D}$ which translates into the lower bound of $g_{H}$~\\cite{Chen:2019pnt} \\begin{equation} g_{H\\text{min}} = \\frac{2 m_D}{\\sqrt{v^2 + v_\\Phi^2 + 4v_\\Delta^2}} \\, , \\label{eq:ghmincondition} \\end{equation} where we have used Eq.~\\eqref{eq:Wppmmass}. The search of $Z'$ enforces us to scan $v_\\Phi$ in the mass range between 20 TeV to 100 TeV~\\cite{Huang:2019obt}. Moreover, we fix $M_{X} = 2$~TeV to satisfy heavy $M_{X}$ scenario while maintaining the SM-like $Z$ to $91.1876\\pm0.0021$~GeV within 3$\\sigma$ significance~\\cite{Huang:2019obt}. In this work, we set the lower limit of heavy fermions masses to be no less than 1.0~TeV based on the signal search of the G2HDM new gauge bosons performed in \\cite{Huang:2017bto}. In previous work~\\cite{Chen:2019pnt}, the lower limit is 1.5~TeV taking from the search of SUSY colored particles~\\cite{lipi:2017}. Also, we set the new Yukawa couplings, which are related to the new heavy fermion masses by~\\footnote{In this study, the identity matrix is used to account for the mixing between different flavors of SM and heavy fermions with the $\\mathcal Z_2$-odd scalars in the new Yukawa sectors.} $m_{f^H} = y_{f^H} v_\\Phi\/\\sqrt 2$, to be small enough in order to suppress their contributions on perturbative unitarity and renormalization group running effects. In addition, the $5\\%$ mass splitting between the DM $D$ and heavy fermions $f^{H}$ is imposed here. This allows us to study their effects on DM phenomenology which is the main focus of this paper. In contrast, the $20\\%$ mass splitting was imposed in~\\cite{Chen:2019pnt}. To accommodate all of these requirements, we adopt the Yukawa couplings for each point in our random scan as follows \\begin{equation} \\label{eq:HFYukawa} y_{f^H} = \\text{max}\\left[ \\frac{1.0\\text{ TeV}}{v_\\Phi \/ \\sqrt{2}}, \\text{min}\\left( \\frac{1.05\\,m_D}{v_\\Phi \/ \\sqrt{2}},\\; 1 \\right) \\right]\\;. \\end{equation} From this formula, it is easy to see that the value of $y_{f^H}$ is always less than 1 for all parameters space. Based on this setup, heavy fermions are expected to give dominant contribution to the DM coannihilation. Approximately, 3 million points are collected from our random scan. These points cover all numerical values for model parameters, gauge bosons and scalar masses, as well as all components of three mixing matrices $\\mathcal{O}$, $\\mathcal{O}^D$ and $\\mathcal{O}^G$. Furthermore, we input these numbers to \\texttt{MicrOMEGAs}~\\cite{Belanger:2018mqt} to compute DM relic density and DM-nucleon cross section. The scan range for our computation is tabulated in Table~\\ref{tab:scanranges}. Note that $M_{H\\Delta}$, $M_{\\Phi\\Delta}$, $v_\\Delta$ and $v_\\Phi$ have distinctive ranges for the associated DM composition. These differences are remarkable in the case of $v_\\Delta$ and $v_\\Phi$ in the Goldstone-like column which exhibits a fine-tuning. This happens because the Goldstone-like composition is achievable only when $0.8 \\leq v_\\Delta\/v_\\Phi < 0.9$ as discussed in~\\cite{Chen:2019pnt}. \\begin{table} \\begin{tabular}{|c|c|c|} \\hline Parameter & Triplet-like & Goldstone-like \\\\ \\hline \\hline $\\lambda_H$ & [0.12, 2.75] & [0.12, 2.75] \\\\ $\\lambda_\\Phi$ & [$10^{-4}$, 4.25] & [$10^{-4}$, 4.25] \\\\ $\\lambda_\\Delta$ & [$10^{-4}$, 5.2] & [$10^{-4}$, 5.2] \\\\ $\\lambda_{H \\Phi}$ & [$-$6.2, 4.3] & [$-$6.2, 4.3] \\\\ $\\lambda_{H \\Delta}$ & [$-$4.0, 10.5] & [$-$4.0, 10.5] \\\\ $\\lambda_{\\Phi \\Delta}$ & [$-$5.5, 15.0] & [$-$5.5, 15.0] \\\\ $\\lambda_{H \\Phi}^\\prime$ & [$-$1.0, 18.0] & [$-$1.0, 18.0] \\\\ $\\lambda_H^\\prime$ & [$-8\\sqrt{2}\\pi$, $8\\sqrt{2}\\pi$] & [$-8\\sqrt{2}\\pi$, $8\\sqrt{2}\\pi$] \\\\ \\hline $g_H$ & [See text, 0.1] & [See text, 0.1] \\\\ $g_X$ & [$10^{-8}$, 1.0] & [$10^{-8}$, 1.0] \\\\ \\hline $M_{H\\Delta}$\/GeV & [-3000, 5000] & [0.0, 5000] \\\\ $M_{\\Phi \\Delta}$\/GeV & [$-$50.0, 50.0] & [0.0, 700] \\\\ $v_{\\Delta}$\/TeV & [0.5, 20.0] & [14.0, 20.0] \\\\ $v_{\\Phi}$\/TeV & [20, 100] & [20, 28.0] \\\\ \\hline \\end{tabular} \\caption{Parameter ranges used in the numerical scans that pass \\textbf{SGSC} constraints. Here, $M_X$ is fixed at 2 TeV and $M_Y=0$. } \\label{tab:scanranges} \\end{table} \\subsection{Results} \\label{analysis} Here, we discuss the analysis of our numerical results. We evaluate the effects of heavy fermions on DM phenomenology for triplet-like DM and Goldstone-like DM separately. \\subsubsection*{$SU(2)_H$ Triplet-like DM} The scatter plots for the relic density versus DM mass $m_D$ in the triplet-like DM are presented in Fig.~\\ref{fig:triplet}. The red line represents the observed relic density provided by the PLANCK collaboration. The right panel takes heavy fermions contributions into account while the left is adopted from~\\cite{Chen:2019pnt}. Let us elaborate more by considering different DM mass regimes. \\begin{figure}[t] \\centering \\includegraphics[width=0.48\\textwidth]{TL_DMmass_RD} \\includegraphics[width=0.49\\textwidth]{DMmass_RD_bin_TL_HF} \\caption{The left panel describes triplet-like DM {\\bf SGSC} surviving regions projected on ($m_D$, $\\ensuremath{\\Omega_{D}h^2}$) adopted from\\cite{Chen:2019pnt}. This figure neglects heavy fermions contributions. The inclusion of heavy fermions (with $5\\%$ mass splittig) is depicted on the right panel. For both cases, the gray area is ruled out by PLANCK measurement at $2\\sigma$.} \\label{fig:triplet} \\end{figure} \\begin{itemize} \\item[(i)] We start with the lower DM mass regime ranging from $1\\ensuremath{\\text{~GeV}}$ to $62.5 \\ensuremath{\\text{~GeV}}$. In this region, the DM annihilation cross section is dominated by the following processes: $DD^*\\rightarrow\\ c \\bar{c}$, $\\tau^+ \\tau^-$ and $b \\bar{b}$, occuring mainly via the $s$-channel of the Higgs bosons exchange. This can be understood based on the $DD^*h_i$ coupling in Eq.~\\eqref{eq:g_T_ddh}. Thanks to the large value of $v_\\Phi$, the $h_2$ ($\\delta_3$-like) mediated diagram is equally as important as the $h_1$ (SM-like) exchange while the heaviest Higgs $h_{3}$ ($\\phi_2$-like) remains subdominant~\\cite{Chen:2019pnt}. The observed relic abundance can be achieved in this wide range ($12\\ensuremath{\\text{~GeV}} < m_{D} < 62 \\ensuremath{\\text{~GeV}}$) due to the various combinations for the $DD^*h_i$ coupling in Eq.~\\eqref{eq:g_T_ddh}. However, this picture is only valid when heavy fermions are neglected (the left panel of Fig.~\\ref{fig:triplet}). Once they are included (the right panel of Fig.~\\ref{fig:triplet}), the t-channel of heavy fermions exchange becomes relevant. There is a cancellation between the Higgs and new heavy fermions mediated diagrams which reduces the value of DM annihilation cross section. This enhances the relic density as shown in the right panel of Fig.~\\ref{fig:triplet} where the gray points are shifted above the horizontal red line. The observed relic density is achieved in the mass range between $54\\ensuremath{\\text{~GeV}}$ to $62\\ensuremath{\\text{~GeV}}$. \\item[(ii)] When DM mass approaches half of the SM Higgs mass ($m_{D} \\approx 62.5 \\ensuremath{\\text{~GeV}}$), the interactions involving the s-channel of $h_{1}$ exchange become dominant. This enhances the annihilation cross section resulting in the suppression of the relic density. However, due to the wide variation of the $DD^*h_1$ coupling in Eq.~\\eqref{eq:g_T_ddh}, the observed relic abundance can still be achieved. This is also true for $h_{2}$ resonance. In this case, the resonance appears in a broad range of DM mass thanks to the arbitrary values of $m_{h_{2}}$ ($m_{h_{2}} > m_{h_{1}}$). Note that there is no SM $Z$ resonance because its coupling is suppressed by $(\\mathcal{O}^{D}_{32})^{2} \\mathcal{O}^{G}_{21}$ as can be seen from Eq.~\\eqref{eq:g_T_ddz}. \\item[(iii)] Above the SM Higgs resonance, $m_{h_1}\/2<m_D<500\\ensuremath{\\text{~GeV}}$, the major contributions to the DM annihilation cross section are given by $W^{+}W^{-}$ (more than $\\sim 50 \\%$), $h_{1}h_{1}$ ($\\sim 25\\%$), and $ZZ$ ($\\sim 20\\%$) final states~\\cite{Chen:2019pnt}. In all of these final states, the main contributions come from the $h_{1}$ and $h_{2}$ exchanges which lead to the $S-$wave cross section. On the other hand, the $Z_{i}$ mediated diagrams relevant for $W^{+}W^{-}$ final states are $P-$ wave suppressed. \\item[(iv)] Next, for heavy DM mass regime ($m_D>500\\ensuremath{\\text{~GeV}}$), the dominant final states are given by the longitudinal parts of the SM gauge bosons, $W^{+}_{L}W^{-}_{L}$ and $Z_{L}Z_{L}$. However, this is only valid if one neglects heavy fermions contribution. This picture changes in the mass regime larger than 1 TeV in the presence of heavy fermions. \\item[(v)] Finally, in the TeV region ($m_{D} > 1 \\,\\text{TeV}$), heavy fermions coannihilations start to dominate. This can be seen from the right panel of Fig.~\\ref{fig:triplet}. The main coannihilation channels in this regime are given by heavy quarks annihilations into a pair of SM quark-anti quark and gluons: $q^{H}\\bar{q}^{H} \\rightarrow q\\bar{q},gg$. Based on the points that we collect from our scan, these processes contribute around 87$\\%$ in this regime. This is expected since these are the QCD interactions controlled by the strong coupling $\\alpha_{S}$. The main diagrams associated with these interactions are given by the s-channel of gluon exchange for $q\\bar{q}$ final states and the s-channel of gluon exchange, t- and u-channel of $q^{H}$ exchange for $gg$ final states. \\end{itemize} In Ref.~\\cite{Chen:2019pnt}, the relevant diagrams for the spin independent DM-nucleon interactions are given by the t-channel of $h_{i}$ and $Z_{i}$ exchange as displayed in the upper part of Fig.~\\ref{fig:DDFeynman}. The leading contribution comes from $h_{1}$ mediator while $h_{2}, Z$, and $Z'$ mediators give non-negligible effects. This is summarized in the left panel of Fig.~\\ref{fig:TLDD}, adopted from~\\cite{Chen:2019pnt}. The XENON1T limit is described by the solid red curve which assumes $f_{n}\/f_{p} = 1$. The orange points in this figure are allowed by the relic density and direct detection constraints. As one can see, for DM mass larger than $300\\ensuremath{\\text{~GeV}}$, both constraints can be evaded. As a result of ISV originating from $Z$ and $Z'$ exchange, there are some orange points which are located slightly above the XENON1T exclusion limit. As a comparison, the corresponding XENON1T limit for $f_{n}\/f_{p} = -0.5$ is also shown. On the other hand, when heavy fermions contribution is considered, one needs to include all diagrams in Fig.~\\ref{fig:DDFeynman}. There is a destructive interference between heavy quarks and the Higgs mediated diagrams. This cancellation can be extracted from the sum of these diagrams as \\begin{align} \\label{eq:cancelHHF} \\mathcal{A}_{(q^{H} + h_{i})} \\propto \\left[ \\frac{m_{q^{H}}\\, (\\mathcal{O}^{D}_{12})^{2}}{v^{2}_{\\Phi}} + \\frac{m_{q}\\, \\mathcal{O}_{1i}\\,\\lambda_{DD^{*}h_{i}}}{v\\, m^{2}_{h_{i}}} \\right] \\, , \\end{align} where $m_{q}$ stands for the mass of the SM quarks. The index $i$ runs from 1 to 2 denoting the contributions from the Higgs $h_{1}$ and $h_{2}$ while the coupling $\\lambda_{DD^{*}h_{i}}$ is given by Eq.~\\eqref{eq:g_T_ddh}. The first term on the right hand side of Eq.~\\eqref{eq:cancelHHF} is always positive while the second two terms, for both $h_{1}$ and $h_{2}$, are mostly negative. \\begin{figure}[!htb] \\includegraphics[width=0.48\\textwidth]{TL_DMmass_DD} \\includegraphics[width=0.48\\textwidth]{DMmass_DDn_Xe_bin_TL_HF} \\caption{In the right panel, adopted from~\\cite{Chen:2019pnt} (without heavy fermions), the red solid curve is the official XENON1T exclusion limit without ISV, while the green solid curve describes the same limit with ISV value $f_n\/f_p=-0.5$. Heavy fermions contribution is shown in the right panel. Here, the green solid line is XENON1T limit with $f_n\/f_p=-0.6$. For both figures, the orange filled squares pass both \\textbf{RD} and \\textbf{DD} constraints. \\label{fig:TLDD} } \\end{figure} This effect can be seen from the right panel of Fig.~\\ref{fig:TLDD} where most of the gray points are located below $10^{-42} \\text{cm}^{2}$. Interestingly, this cancellation shifts the allowed DM mass (orange squares area) towards the lighter region, reaching up to $54\\ensuremath{\\text{~GeV}}$. There are some gaps between $60\\ensuremath{\\text{~GeV}}$ and $100\\ensuremath{\\text{~GeV}}$ as well as $140\\ensuremath{\\text{~GeV}}$ and $200\\ensuremath{\\text{~GeV}}$ where none of the points survive both relic density and direct detection constraints. This is because the cancellation given by Eq.~\\eqref{eq:cancelHHF} does not work effectively in this regime. In addition, the existence of the orange points significantly above the XENON1T limit shows the importance of the $Z$ and $Z'$ exchange when this cancellation happens efficiently. We see that for triplet-like DM, the inclusion of heavy fermions put a stronger constraint on the observed relic abundance, especially in the TeV regime. In contrast, they reduce the DM-nucleon spin independent cross section alleviating the current limit from XENON1T experiment. \\subsubsection*{$SU(2)_H$ Goldstone boson-like DM} \\label{sec:Goldstone} \\begin{figure}[htb] \\centering \\includegraphics[width=0.48\\textwidth]{GL_DMmass_relicDens} \\includegraphics[width=0.49\\textwidth]{DMmass_RD_bin_GL_HF} \\caption{The left panel shows Goldstone-like DM {\\bf SGSC} allowed regions projected on ($m_D$, $\\ensuremath{\\Omega_{D}h^2}$). This figure, adopted from Ref.~\\cite{Chen:2019pnt}, neglects heavy fermions contributions. In contrast, the figure in the right panel takes heavy fermions into account which reduce the relic density in the TeV regime.} \\label{fig:goldstone} \\end{figure} As we mentioned before, the Goldstone-like DM is dominated by $G^p_H$. However, in this particular case, the allowed composition lies in a very narrow regime between $0.67 < f_{G^{p}} < 0.8$. As a result, this DM lives in a tiny region in the parameter space of G2HDM model. In the left panel of Fig.~\\ref{fig:goldstone}, we show the scatter plot of the DM relic abundance with respect to its mass. The underlying physics in each mass regime (regions (i)-(iv)) is mostly similar to the triplet case~\\cite{Chen:2019pnt}. Moreover, when heavy fermions are included, as shown in the right panel of Fig.~\\ref{fig:goldstone}, they strongly dominate the coannihilation channels in TeV regime as in triplet-like DM case (region (v)). Furthermore, there is no cancellation between Higgs and heavy fermions exchange thanks to the limited parameter space. \\begin{figure}[tb] \\includegraphics[width=0.48\\textwidth]{GL_DMmass_DD} \\includegraphics[width=0.48\\textwidth]{DMmass_DDn_Xe_bin_GL_HF} \\caption{The left panel is taken from~\\cite{Chen:2019pnt} which omits heavy fermions. They are included in the figure on the right panel. The red solid curve, in both figures, is the XENON1T limit without ISV. The green solid line in the left (right) describes the XENON1T exclusion line with ISV value $f_n\/f_p=-1.5$ ($f_n\/f_p=-0.55$). The small region of orange squares shows the fine-tuned region with $f_n\/f_p=-1.86$ for the left panel and $f_n\/f_p=-2.00$ for the right panel. These areas are allowed by \\textbf{RD} and \\textbf{DD} constraints. \\label{fig:GLDD} } \\end{figure} The scatter plot for DM-neutron cross section versus DM mass in the absence of heavy fermions is presented in the left panel of Fig.~\\ref{fig:GLDD}. The leading diagram is given by the t-channel of $h_{1}$ exchange which is significant in the mass range between $3\\ensuremath{\\text{~GeV}}$ and $100\\ensuremath{\\text{~GeV}}$. The next important diagrams come from $Z'$ and $Z$ exchange~\\cite{Chen:2019pnt}. These ISV diagrams are relevant for DM mass larger than $100\\ensuremath{\\text{~GeV}}$. As a result of the interference between these three dominant diagrams, the spin independent cross section varies in a wide range. However, only the orange points in the mass range $200 \\text{~GeV} \\leq m_{D} \\leq 600 \\text{~GeV}$ satisfy both constraints from the observed relic density and the published XENON1T limit. These points have $f_n\/f_p = -1.86$ thanks to the fine-tuned parameter space. As shown in the right panel of Fig.~\\ref{fig:GLDD}, the inclusion of heavy fermions does not significantly change this result. They enhance the $Z'$ and $Z$ mediated diagrams shifting the ISV value of the orange region to have $f_n\/f_p = -2.0$. This enhancement can also be seen in the TeV regime where the gray points are shifted upward. \\section{QCD Sommerfeld Correction and Bound State Formation} \\label{sec:SCBSF} Based on the previous section, we see that the contributions of heavy fermions are quite significant, especially in the TeV regime of the DM mass. In this case, for both triplet-like and Goldstone-like DM, heavy quarks annihilations ($q^{H} \\bar{q}^{H} \\rightarrow q\\bar{q}, gg$) strongly reduce the relic abundance due to the QCD interactions. Since these processes occur in the early universe, at energy scale much higher than the quark-hadron phase transition era, heavy quarks experience a long range interaction via gluon exchange. This interaction can be described by Coulomb-like potential as~\\cite{ElHedri:2017nny} \\begin{align} \\label{eq:GCoulomb} V(r) = -\\frac{\\zeta^{'}}{r} , \\; \\;\\;\\;\\; \\; \\zeta^{'} = (C_{q^{H}}-\\frac{3}{2})\\alpha_{s} \\, , \\end{align} where $\\zeta^{'}$ describes the modified coupling between $q^{H}$ and $\\bar{q}^{H}$ free pair which depends on the quadratic Casimir coefficient of the color representation of the heavy quark $C_{q^{H}}$. The presence of the Coulomb-like potential modifies the perturbative calculation. This effect is known as the Sommerfeld correction~\\cite{Sommerfeld:1931}. For heavy quarks, the value of $C_{q^{H}}$ is equal to $4\/3$ since they belong to the color triplet representation of $SU(3)_{C}$. Furthermore, the presence of this potential may induce the bound state formation of $q^{H} \\bar{q}^{H}$ pairs in the early universe\\cite{Feng:2009mn, vonHarling:2014kha, Petraki:2015hla, Kim:2016zyy, Kim:2016kxt, Petraki:2016cnz, Petraki:2014uza, Detmold:2014qqa, An:2016gad, Kouvaris:2016ltf, Ellis:2015vaa, Ellis:2015vna, Nagata:2015hha, Feng:2010zp, Iminniyaz:2010hy, Hryczuk:2010zi, deSimone:2014pda, Keung:2017kot, Liew:2016hqo}. Therefore, one needs to consider these two effects when calculating the DM abundance. In this work, we follow the method introduced in~\\cite{Liew:2016hqo} for our QCD Sommerfeld correction and QCD bound state effect calculation. \\subsection{QCD Sommerfeld Correction} The thermally averaged $S-$ and $P-$wave annihilation cross sections of $q^{H} \\bar{q}^{H}$ into pair of SM quark and gluons can be expanded as \\begin{align} \\label{eq:spwave} \\left\\langle \\sigma v_{rel} \\right\\rangle = a + b \\, (T\/m_{q^{H}}) + \\mathcal{O}((T\/m_{q^{H}})^{2}) , \\end{align} where $a$ and $b$ denote the $S-$ and $P-$wave term, respectively. For $q\\bar{q}$ final state, the corresponding expression is given by\\cite{Srednicki:1988ce, Ellis:1999mm, Liew:2016hqo} \\begin{align} \\label{eq:spwaveqq} \\left\\langle \\sigma v_{rel} \\right\\rangle_{q\\bar{q}} = \\frac{\\pi\\,\\alpha^{2}_{s}}{m^{2}_{q^{H}}} \\, \\left[\\frac{4}{3} - \\frac{14}{3} \\, (T\/m_{q^{H}}) \\right] , \\end{align} while for gluon pair final state, the associated cross section is \\begin{align} \\label{eq:spwavegg} \\left\\langle \\sigma v_{rel} \\right\\rangle_{gg} = \\frac{\\pi\\,\\alpha^{2}_{s}}{m^{2}_{q^{H}}} \\,\\left[\\frac{7}{27} + \\frac{1}{6} \\, (T\/m_{q^{H}}) \\right]. \\end{align} In general, the presence of the Coulomb potential of the form $V(r)=-\\alpha\/r$ will affect both $S-$ and $P-$wave terms. For the $S-$wave term, it becomes $a \\, S(\\alpha\/v_{rel})$ where \\begin{align} \\label{eq:Ssommerfeld} S(\\alpha\/v_{rel}) = \\frac{2\\pi\\, \\alpha \/ v_{rel}}{1-e^{-2\\pi \\alpha \/ v_{rel}}} , \\end{align} where $v_{rel}$ stands for the relative velocity between $q^{H}$ and $\\bar{q}^{H}$. The Sommerfeld correction enhances the annihilation cross section if the potential is attractive ($\\alpha > 0$) while the suppression occurs when the potential is repulsive ($\\alpha < 0$). Taking this correction into account in the early universe, we need to evaluate the thermally-averaged Sommerfeld $S-$wave cross section as \\begin{align} \\label{eq:STsommerfeld} a\\, \\left\\langle S(\\alpha\/v_{rel}) \\right\\rangle = a\\,\\int^{\\infty}_{0} S(\\alpha\/v_{rel})\\, f(v_{rel})\\, dv_{rel} \\, , \\end{align} where the velocity distribution $f(v_{rel})$ is given by the Maxwell-Boltzmann distribution \\begin{align} \\label{eq:MB} f(v_{rel}) = \\left( \\frac{\\mu}{2\\pi T}\\right)^{3\/2} 4\\pi v^{2}_{rel}\\, e^{-\\frac{\\mu v^{2}_{rel}}{2T}}\\, , \\end{align} where $\\mu = m_{q^{H}}\/2$ and $T$ are the reduced mass of the $q^{H}\\bar{q}^{H}$ system and the temperature, respectively. In this work, we only consider the Sommerfeld correction in the $S-$wave term. Following two body color decomposition for the $S-$wave cross section, the thermally averaged Sommerfeld corrections are~\\cite{deSimone:2014pda} \\begin{eqnarray} \\label{eq:Sommqg} \\left\\langle \\sigma \\, v_{rel}(q^{H}\\bar{q}^{H} \\rightarrow gg) \\right\\rangle_{s,Somm} &=& \\left\\langle \\sigma v_{rel} \\right\\rangle_{s,gg} \\left( \\frac{2}{7}\\,\\left\\langle S(\\frac{4\\alpha_{s}\/3}{v_{rel}})\\right\\rangle + \\frac{5}{7} \\left\\langle S(\\frac{-\\alpha_{s}\/6}{v_{rel}})\\right\\rangle \\right) \\nonumber \\\\ \\left\\langle \\sigma \\, v_{rel}(q^{H}\\bar{q}^{H} \\rightarrow q\\bar{q}) \\right\\rangle_{s,Somm} &=& \\left\\langle \\sigma v_{rel} \\right\\rangle_{s,q\\bar{q}} \\left\\langle S(\\frac{-\\alpha_{s}\/6}{v_{rel}})\\right\\rangle \\, , \\end{eqnarray} where $\\left\\langle \\sigma v_{rel} \\right\\rangle_{s,q\\bar{q}}$ and $\\left\\langle \\sigma v_{rel} \\right\\rangle_{s,gg}$ denote the $S-$ wave part of Eq.~\\eqref{eq:spwaveqq} and Eq.~\\eqref{eq:spwavegg}, respectively. \\subsection{QCD Bound State Formation} When $q^{H}$ and $\\bar{q}^{H}$ form a bound state $\\eta$, the Coulomb-like potential due to gluon exchange becomes \\begin{eqnarray} \\label{eq:BSFCoulomb} V(r) &=& -\\frac{\\zeta}{r} ,\\\\ \\zeta &=& \\frac{1}{2}(C_{q^{H}}+C_{\\bar{q}^{H}}-C_{\\eta})\\alpha_{s} \\, , \\end{eqnarray} where $C_{\\eta}$ is the quadratic Casimir operator of the $q^{H}$ $\\bar{q}^{H}$ bound state in a particular color state. Here, we focus on the color singlet bound state where $C_{\\eta} = C_{\\textbf{1}} = 0$. Furthermore, we only consider bound states with total angular momentum $L=0$ and spin $S=0$. The corresponding binding energy of the bound state $E_{B}$ and its Bohr radius $a$ are \\begin{eqnarray} \\label{eq:EBa} E_{B} &=& \\frac{\\zeta^{2}\\, \\mu}{2} ,\\\\ a &=& (\\zeta\\, \\mu)^{-1} \\, , \\end{eqnarray} where $\\mu = m_{q^{H}}\/2$ is the reduced mass of the $q^{H}$ and $\\bar{q}^{H}$ system. To calculate the bound state formation cross section, one needs to know the integrated dissociation cross section first. A $q^{H}$ and $\\bar{q}^{H}$ bound state can be destroyed by absorbing a gluon. The dissociation cross section averaged over the incoming gluon color is \\begin{eqnarray} \\label{eq:BSD} \\sigma_{dis} &=& \\frac{1}{8} \\times \\frac{4}{3} \\times\\frac{2^{9}\\, \\pi^{2}}{3} \\alpha_{s} a^{2} \\left(\\frac{E_{B}}{\\omega}\\right)^{4} \\frac{1+\\nu^{2}}{1+(\\kappa\\,\\nu)^{2}} \\frac{e^{-4\\nu \\text{arccot}(\\kappa \\nu) -2\\pi \\nu}}{1-e^{-2\\pi \\nu}} \\kappa^{-1}. \\end{eqnarray} In this expression we define $\\nu$, $\\kappa$, and $\\omega$ as \\begin{align} \\label{eq:nu} \\nu \\equiv \\frac{|\\zeta^{'}|}{v_{rel}} \\; \\; \\; \\kappa \\equiv \\frac{\\zeta}{|\\zeta^{'}|} \\; \\; \\; \\omega \\approx E_{B} + \\frac{1}{2} \\mu v^{2}_{rel} \\, . \\end{align} Eq.~\\eqref{eq:BSD} describes the dissociation cross section of a bound state after absorbing a gluon with energy $\\omega$. The first factor in this equation is the averaged over incoming gluon color while the second number denotes the color factor of the bound state wave function. The bound state formation cross section can be obtained by using the Milne relation as \\begin{align} \\label{eq:BSF} \\sigma_{bsf} = \\frac{g_{\\eta} \\, g_{g}\\,\\omega^{2}}{g_{q^{H}}\\,g_{\\bar{q}^{H}}\\,(\\mu v_{rel})^{2}} \\, \\sigma_{dis} \\, , \\end{align} where $g_{g}=16$, $g_{q^{H}}= g_{\\bar{q}^{H}}=6$, and $g_{\\eta}=1$ are the degree of freedom of gluon, $q^{H}$, $\\bar{q}^{H}$, and color singlet bound state, respectively. In addition, a $q^{H}$ and $\\bar{q}^{H}$ bound state can experience annihilation decay and individual decay of each $q^{H}$ ($\\bar{q}^{H}$). In the former case, the $q^{H}$ and $\\bar{q}^{H}$ annihilate into the SM particles while in the latter case, each $q^{H}$ ($\\bar{q}^{H}$) decays into DM and SM particle. Thanks to the $5\\%$ mass splitting between the DM and heavy quarks, the latter process is suppressed. Additionally, this decay channel is further suppressed by $(\\mathcal{O}^{D}_{12})^{2}$. Therefore,"} +{"id":"RedPajamaArXiv.0002","text":"\\section{Introduction}\\label{sec:introduction}} \\IEEEPARstart{T}{he} COVID-19 pandemic has spread rapidly and infected millions of people worldwide. A critical step to fight against the spreading of COVID-19 is effective diagnosis of the infected cases~\\cite{tang2020laboratory,udugama2020diagnosing}. The commonly used approach for COVID-19 diagnosis is reverse transcription polymerase chain reaction (RT-PCR). It usually takes hours for results and test kits are in great shortage in some counties and areas~\\cite{xie2020chest,zhou2020clinical}. Computed tomography (CT)-aided diagnosis has become a weighty alternative due to its nature of wide availability and easy accessibility~\\cite{bernheim2020chest,xie2020chest,li2020coronavirus}. To accelerate the reading of CT images, machine learning approaches have been employed to learn patterns from labeled images and then automatically make prediction for any newly obtained CT image~\\cite{wang2020covid,gozes2020rapid,alimadadi2020artificial,wynants2020prediction}. A major challenge of CT-aided automatic diagnosis is the lack of labeled data~\\cite{wang2020covid,wang2020deep,he2020sample}. To date, the largest labeled CT dataset~\\cite{he2020sample} that is publicly available only contains several hundred images. Models trained on such small-scale datasets may generate unsatisfactory prediction results for newly obtained CT images. It is natural to leverage transfer learning to train more powerful models for accurate COVID-19 diagnosis. Transfer learning is a popular machine learning technique that learns a model from a source task where the labeled data is sufficient and transfers the learned knowledge to a target task~\\cite{pan2009survey,weiss2016survey,yosinski2014transferable}. Existing work~\\cite{he2020sample,wang2020covid} mainly focuses on using pretrained deep neural networks (DNNs) to improve the prediction performance for the target task of COVID-19 prediction. However, there is no work examining which network component, such as a convolutional layer or an attention layer, can induce larger performance improvement through transfer learning. In addition, there is little work presenting a unified transfer learning framework for medical image analysis, especially for COVID-19 CT image prediction. In this work, we propose a multi-stage attentive transfer learning framework for improving CT-based COVID-19 diagnosis. Our proposed framework is composed of three stages based on the machine learning approaches and data used in source tasks. First, we perform supervised transfer learning from natural images (STL-N) and supervised transfer learning from medical images (STL-M) to learn knowledge from large-scale labeled natural images and medical images, respectively. After that, we design a novel self-supervised task and perform self-supervised transfer learning from medical images (SSTL-M) to extract complex patterns from the used medical CT images. For the networks used in the transfer learning framework, we integrate self-attention layers (ATTNs) into convolutional neural networks (CNNs) such as ResNets to compare transferability of convlotional layers and ATTNs. Specifically, We categorize networks into two groups, one of which contains ResNets and the other contains the same ResNets with ATTNs inserted in. Then both groups are pretrained on the same source tasks and data to compare transferability of the two groups. We perform self-supervised transfer learning in the last stage of the proposed transfer learning framework. Existing self-supervised methods~\\cite{doersch2015unsupervised,gidaris2018unsupervised,lee2019rethinking,kolesnikov2019revisiting,zhai2019s4l} achieve superior results on natural images but usually generate poor predictions on medical images. By referring to biological domain knowledge of substructures of the human lung, we design a novel self-supervised method to learn multi-scale representations for lung CT images. Our method is capable of learning representations at both the image level and the region level. By doing this, sufficient semantic information from the whole lung is captured and the functionality of each lung region is highlighted for better representation learning. Then self-supervised transfer learning is performed to reuse the complex inherent patterns learned from the same CT images to improve the performance of the target task. We conduct extensive experiments to evaluate our proposed approach. Experimental results show that after pretrained with our proposed multi-stage transfer learning framework, networks with ATTNs achieve much better performance for CT-aided COVID-19 prediction compared with the baseline ResNets. This indicates the effectiveness of integrating ATTNs into our transfer learning framework. More importantly, it is shown that networks with ATTNs result in much larger performance improvement through transfer learning compared with convolutional layers. This points out that compared with convolution, attention can transfer knowledge from source tasks to target tasks more easily, which essentially reveals that attention exhibits higher transferability than convolution. In addition, we show that our proposed self-supervised learning method achieves best performance compared with several SOTA baselines. This demonstrates the effectiveness of our method of learning multi-scale representations of lung CT images and highlighting the functionality of each lung region. Our qualitative results demonstrate that using attention for transfer learning can successfully detect important regions for prediction. Overall, our major contributions are summarized as follows: \\begin{itemize} \\item We propose a multi-stage attentive transfer learning framework for improving CT-aided COVID-19 diagnosis. The proposed framework successfully learns and transfers knowledge from multiple source tasks and data of different domains for accurate COVID-19 diagnosis. \\item We propose a novel self-supervised learning method for medical images. Our method enables multi-scale representation learning for lung CT images and outperforms existing self-supervised learning methods. \\item We not only show that networks with attention layers are more powerful through transfer learning, but also demonstrate that attention has higher transferability than convolution. To our best knowledge, this is the first work to compare transferability of attention and convolution. \\end{itemize} \\section{Related Work} In this section, we introduce related work of transfer learning and attention mechanism. \\subsection{Transfer Learning} Transfer learning aims at transferring knowledge across different tasks~\\cite{pan2009survey,yosinski2014transferable}. Generally, it learns knowledge from a source task and transfers the knowledge to a target task. In practice, it is usually difficult to collect sufficient training data for a target task. Training a model on insufficient data may result in unsatisfactory prediction results. Transfer learning is used to first train a model on a source task where the training data is sufficient. Then the pretrained model serves as the starting point and is finetuned on the target task. For instance, in visual recognition, a model is usually trained on ImageNet that contains millions of labeled training samples. After that, the trained weights are used as initial weights for downstream tasks such as semantic segmentation and objective detection. Transfer learning has achieved success across various artificial intelligence domains, including natural language processing~\\cite{devlin2018bert} computer vision~\\cite{ren2015faster}, and biomedical image analysis~\\cite{raghu2019transfusion,esteva2017dermatologist}. There exist several categorization criteria of transfer learning~\\cite{pan2009survey,weiss2016survey}. Based on the machine learning approaches used in the source task, transfer learning could be categorized into supervised transfer learning, unsupervised transfer learning, and semi-supervised transfer learning, etc. Generally, supervised and semi-supervised learning have been studied intensively, and unsupervised learning is a promising research area as labeling is usually expensive. Self-supervised learning is a type of unsupervised learning strategy that has gained more and more popularity recently~\\cite{dosovitskiy2015discriminative,doersch2015unsupervised,gidaris2018unsupervised}. It aims at supervised feature learning where the supervision is provided by the data. The supervised tasks are the key for self-supervised learning. Earlier work for supervised tasks on images basically predicts positions or context for a local patch~\\cite{doersch2015unsupervised,gidaris2018unsupervised}. Recent work~\\cite{he2020momentum,chen2020improved,chen2020simple} mainly performs two random sets of data augmentations on a pair of images and predicts whether the two images are the same or not. The contrastive loss is commonly used for these methods. The input for the contrastive loss contains a query vector $\\bm{x}_q$ from an image $\\bm{X}$, a key vector $\\bm{x}_{k_+}$ from the same image $\\bm{X}$, and another $n$ key vectors from $n$ images that are different from $\\bm{X}$. Then the contrastive loss is essentially a log-loss of a $(n + 1)$-way softmax classifier that tries to classify $\\bm{x}_q$ to $\\bm{x}_{k_+}$ rather than the other $n$ key vectors. \\begin{figure*}[!th] \\centering \\includegraphics[width=0.8\\textwidth]{framework.pdf} \\caption{\\textbf{The proposed multi-stage transfer learning framework and network settings.} \\textbf{a}. Our proposed multi-stage transfer learning framework that contains three source tasks, these are, supervised transfer learning from natural images (STL-N), supervised transfer learning from medical images (STL-M), and self-supervised transfer learning from medical images(SSTL-M). Then the learned knowledge is transferred to the target task of COVID-19 diagnosis based on CT images. There exist a large amount of labeled data in the STL-N and STL-M. In the SSTL-M, we carefully design a task based on the data to extract complex inherent patterns from medical images. \\textbf{b}. Two groups of network settings. The top one represents a standard ResNet architecture. The bottom one illustrates a ResNet with self-attention layers (ATTNs) inserted in the $\\mbox{res}_3$, $\\mbox{res}_4$ and $\\mbox{res}_5$ blocks. } \\label{fig:framework} \\end{figure*} \\subsection{Attention Mechanism} In this section, we describe the attention mechanism, which captures long-range dependencies from input~\\cite{wang2018non,vaswani2017attention}. Given the input tensor $\\mathcal{X}\\in\\mathbb{R}^{h\\times w\\times c}$, the attention mechanism first performs $1\\times 1$ convolution three times and achieves three tensors; those are, the query $\\mathcal{Q}\\in\\mathbb{R}^{h\\times w\\times d_k}$, the key $\\mathcal{K}\\in\\mathbb{R}^{h\\times w\\times d_k}$ and the value $\\mathcal{V}\\in\\mathbb{R}^{h\\times w\\times d_v}$. These tensors are unfolded into three matrices along mode-3~\\cite{kolda2009tensor}, resulting in $Q\\in\\mathbb{R}^{d_k\\times hw}$, $K\\in\\mathbb{R}^{d_k\\times hw}$ and $V\\in\\mathbb{R}^{d_v\\times hw}$, respectively. Then the intermediate output is computed as \\begin{equation}\\label{eq:total_o} O = V\\times\\mbox{Softmax}(K^TQ)\\in\\mathbb{R}^{d_v\\times hw}, \\end{equation} where $\\mbox{Softmax}(\\cdot)$ is performed on columns such that every column sums to 1. Finally, the obtained matrix $O$ is converted back to a tensor $\\mathcal{O}\\in\\mathbb{R}^{h\\times w\\times d_v}$, as the final output of the attention mechanism. Essentially, $(K^TQ)$ generates a matrix of sizes $hw \\times hw$, which can be treated as $hw$ attention heatmaps. Each heatmap contains $hw$ attention weights, and $O$ is computed as a weighted sum of all vectors in $V$. To this end, the response at each position of the output $\\mathcal{O}$ is dependent on all positions of $\\mathcal{V}$, which is just achieved by performing a linear transformation on the input $\\mathcal{X}$. As a result. long-range dependencies from the input are captured by attention. Notably, the output of attention is input dependent. Different from convolution where weights are learnable parameters, attention weights are computed from the input. \\section{Multi-Stage Attentive Transfer Learning Framework} In this section, we introduce our proposed multi-stage attentive transfer learning framework and network settings. \\subsection{Framework Overview} \\label{sec:stl} Given a new CT image, our objective is to predict whether it's COVID-19 positive or negative based on the trained model. However, existing COVID-19 CT data is small-scale and insufficient to train a powerful model, which usually leads to poor prediction performance. It's natural to leverage transfer learning to achieve more powerful models and boost the performance of COVID-19 prediction. An illustration of our proposed multi-stage transfer learning framework is provided in Figure~\\ref{fig:framework}a. Specifically, we first conduct two supervised source tasks, namely supervised transfer learning from natural images (STL-N) and supervised transfer learning from medical images (STL-M), to learn models from large-scale labeled data for the target task. After that, we perform self-supervised transfer learning from medical images (SSTL-M) to learn complex inherent patterns from the used CT images. \\subsection{Network Settings} \\label{sec:network} For the networks used in our transfer learning framework, we categorize them into two groups to compare transferability between self-attention layers (ATTNs) and convolutional layers. The first group contains standard CNNs such as ResNet-50 and ResNet-101. For the other group, we follow the settings in the work~\\cite{wang2018non} and insert ATTNs in these backbone ResNets. An illustration of the network settings is provided in Figure~\\ref{fig:framework}b. Generally, there exist four residual blocks in the family of ResNets, namely $\\mbox{res}_2$, $\\mbox{res}_3$, $\\mbox{res}_4$ and $\\mbox{res}_5$, respectively~\\cite{he2016deep}. It is shown that networks with ATTNs inserted in the $\\mbox{res}_3$ and $\\mbox{res}_4$ obtain the best performance~\\cite{wang2018non}. We use similar strategies and insert most ATTNs in the $\\mbox{res}_3$ and $\\mbox{res}_4$. In addition, we propose to insert another ATTN in the $\\mbox{res}_5$ before the global average pooling to qualitatively demonstrate the effectiveness of ATTNs in transfer learning. Then both the groups of networks are applied to our multi-stage transfer learning framework to compare transferability of the two groups. Essentially, networks with and without ATTNs are pretrained on the same source tasks to compare which of ATTNs and convolutional layers can transfer knowledge from these source tasks more easily. \\section{Supervised Transfer Learning} The labeled CT data for COVID-19 diagnosis is limited. Training networks directly on these CT images may result in poor performance for COVID-19 detection. There exist large-scale labeled datasets from other domains or diseases. We use supervised transfer learning to learn and transfer knowledge from these labeled data to facilitate the CT-aided COVID-19 diagnosis. We first perform STL-N on ImageNet, a large-scale collection of natural images and the most popular labeled dataset for model pretraining. Both the groups of networks introduced in Section~\\ref{sec:network} are pretrained on ImageNet to learn knowledge from natural images. When applied to new tasks such as COVID-19 CT image prediction, the transferability of two different categories can be estimated by the performance improvement induced by transfer learning. Notably, networks with and without ATTNs are pretrained on ImageNet to compare the transferability of ATTNs and convolution layers from natural images. It is obvious that nature images and medical images (such as CT images) follow different distributions. Pretraining on natural images enables models to learn common patterns shared by natural and medical images, but fails to learn distinguishing patterns for medical images. Hence, we conduct STL-M to pretrain models on existing large-scale labeled medical images. Even though labeled CT images for COVID-19 diagnosis are scarce, there exist redundant sources for annotated medical images from other domains, such as chest X-ray (CXR) images for COVID-19, or CT images for regular pneumonia. Pretraining on these medical images enables models to learn inherent patterns in medical images and extract strong features for accurate COVID-19 diagnosis. Similar to STL-N, the two groups of networks that with and without ATTNs are both pretrained on the labled medical images to compare transferability of these two groups. Notably, by performing the two stages of supervised transfer learning STL-N and STL-M, we compare transferability of ATTNs and convolutional layers on two scenarios, where the source data follows different or similar distributions with the target data. \\section{Self-supervised Transfer Learning} \\label{sec:sstl} We proposed to transfer knowledge from labeled natural and medical images by performing supervised transfer learning STL-N and STL-M. However, there still exists divergence in distributions between the labeled source data and the target data. Notably, medical images from other modalities or diseases still have a domain shift from the lung CT images for COVID-19. Hence, we perform self-supervised transfer learning as the last stage in our framework to obtain knowledge from the same CT images. Existing self-supervised learning methods achieve good performance on natural images but usually result in poor performance on medical images (like CT images). In this section, we introduce a novel self-supervised learning method for medical images and transfer the learned knowledge to COVID-19 detection. We denote this stage as self-supervised transfer learning from medical images (SSTL-M), as illustrated in Figure~\\ref{fig:framework}a. The objective of SSTL-M is to learn complex and inherent patterns from CT images by performing a carefully-designed self-supervised task. \\subsection{Method Overview} It is vital to design an appropriate source task to obtain redundant information from the CT images. Currently, self-supervised learning methods, including MoCo (v1~\\cite{he2020momentum} and v2~\\cite{chen2020improved}) and simCLR~\\cite{chen2020simple}, have achieved the SOTA performance on tasks for natural images, but usually result in poor performance on tasks related to medical images~\\cite{chen2019self}. Essentially, these methods apply two sets of random data augmentations on the same image then force the network make a positive prediction. A positive pair contains two same images (one image actually). Negative pairs are added where a negative pair contains two different images. By doing this, inherent patterns from input images are learned and can be transferred to other target tasks. However, the data augmentation methods used in these tasks are commonly used techniques (such as rotation, flipping) and may not be strong enough to extract semantic patterns from medical images. In addition, medical images such as lung CT images are usually symmetric in structure. Applying data augmentation on the whole image may fail to extract distinguishing features from a specific region. In this work, we propose a novel self-supervised learning method to learn multi-scale representations for lung CT images, as illustrated in Figure~\\ref{fig:ssl}. Our proposed method is composed of two branches, these are, image-scale representation learning for the whole lung structure, and region-scale learning for different substructures of a lung. We use a contrastive self-supervised pipeline~\\cite{he2020momentum} for the former. For the latter, we design a task referring to prior domain knowledge based upon biological structures of the human lung. Specifically, humans have two lungs, a right lung, and a left lung. The right lung has three lobes, the upper lobe, the middle lobe, and the lower lobe. The left lung is a little smaller and composed of two lobes, the upper lobe and the lower lobe~\\cite{drake2009gray}. These lobes play different roles in biological processes. For some diseases, infection of a specific lobe can serve as an important indicator for medical diagnosis~\\cite{drake2009gray,bernheim2020chest}. Hence, it's important to learn inherent patterns for each specific lobe and highlight structural divergence among all lobes. \\begin{figure*}[!th] \\centering \\includegraphics[width=\\textwidth]{ssl.pdf} \\caption{\\textbf{The proposed self-supervised transfer learning method.} The method is composed of the image-scale learning branch and the region-scale learning branch. For the purpose of simplicity, we only illustrate the scenario for a positive pair based on an input lung CT image $\\bm{X}$ but omit the scenario for negative pairs. For image-scale learning, two sets of random data augmentations are applied on $\\bm{X}$, denoted as data aug. 1 and data aug. 2. This results in two augmented images. For the region-scale learning, five regions, including $\\bm{X}_{ru}$, $\\bm{X}_{rm}$, $\\bm{X}_{rl}$, $\\bm{X}_{lu}$ and $\\bm{X}_{ll}$ and generated from the image $\\bm{X}$ by the Generator operator as defined in Equation~\\ref{eq:rsl_input}. Generator is composed of three operators, these are, the locate operator, the crop operator and the resize operator. All of the intermediate outputs of the two branches are passed to the same network. We have two groups of networks as introduced in Section~\\ref{sec:network} and Figure~\\ref{fig:framework}b. The switch OR means that we choose either of the two groups for one experiment. And we conduct experiments on both the group to compare the transferability of ATTNs and convolutional layers. In image-scale learning, the networks input two augmented images and output two reprsenantions $\\bm{x}_q$ and $\\bm{x}_{k_+}$, based on which the contrastive loss $\\mathcal{L}_{cons}$ (defined in Equation~\\ref{eq:contra1}) could be computed. Region-scale learning is a multi-task learning task to predict the predefined class of each region. The region-aware loss $\\mathcal{L}_{ra}$ (defined in Equation~\\ref{eq:ra_loss}) for the image $\\bm{X}$ is simply the sum of the cross-entropy losses of the five regions. The final loss $\\mathcal{L}$ is the weighted sum of the contrastive loss $\\mathcal{L}_{cons}$ of the image-scale learning and $\\mathcal{L}_{ra}$ of the region-scale learning. Note again that we neglect negative pairs for clear illustration, and the version for $\\mathcal{L}$ considering negative pairs is defined in Equation~\\ref{eq:final}. } \\label{fig:ssl} \\end{figure*} \\subsection{Image-scale Learning} \\label{sec:imagesl} We first perform image-scale learning based on the whole CT image. A contrastive self-supervised learning framework is used, an input sample of which contains a CT image $\\bm{X}$ to form a positive pair, and a set of different CT images $\\{\\bm{X}^i|i=1,...,n\\}$ to form negative pairs. Specifically, two sets of random augmentations are applied on the same image $\\bm{X}$, which results in two images $\\bm{X}_q$ and $\\bm{X}_k$. $\\bm{X}_q$ is passed to the query encoder to generate a query vector $\\bm{x}_q$, and $\\bm{X}_k$ is passed to the key encoder to generate a key vector $\\bm{x}_{k_+}$. In addition, images $\\{\\bm{X}^i|i=1,...,n\\}$ are also taken by the same key encoder to obtain a set of key vectors $\\{\\bm{x}^i_{k_-}|i=1,...,n\\}$. As a result, $(\\bm{x}_q, \\bm{x}_{k_+})$ forms a positive pair and $(\\bm{x}_q, \\bm{x}^i_{k_-})$ form $n$ negative pairs for the contrastive loss, which is expressed as \\begin{equation}\\label{eq:contra1} \\mathcal{L}_{cons} = -\\mbox{log}\\frac{\\mbox{exp}(\\bm{x}_q \\cdot \\bm{x}_{k_+}\/\\tau)}{\\mbox{exp}(\\bm{x}_q \\cdot \\bm{x}_{k_+}\/\\tau)+\\sum^n_{i=1}\\mbox{exp}(\\bm{x}_q \\cdot \\bm{x}^i_{k_-})}, \\end{equation} where $\\tau$ is a temperature parameter. Intuitively, $\\mathcal{L}_{cons}$ is the log-loss of a $(n+1)$-way softmax classifier whose input is $\\bm{x}_q$ and the correct label is $\\bm{x}_{k_+}$. Generally, the query encoder and the key encoder share the same network architecture, but differ in weight update. The weights of the query encode are updated by back-propagation. Different from the query encoder, the key encoder takes as input a large set of images $\\{\\bm{X}^i|i=1,...,n\\}$, which usually makes it intractable to update the weights by back-propagation. The MoCo~\\cite{he2020momentum,chen2020improved} adopts a momentum update strategy for the key encoder as \\begin{equation}\\label{eq:momentum} m\\theta_k+(1-m)\\theta_q\\rightarrow\\theta_k, \\end{equation} where $m$ is the momentum parameter that usually takes a large number such as 0.999, $\\theta_k$ and $\\theta_q$ denote the weights of the key encoder and the query encoder, respectively. Notably, we also use two groups of networks for the query and key encoders to compare the transferability of ATTNs and convolutional layers. \\subsection{Region-scale Learning} We propose to learn distinguishing patterns in five lobes in region-scale learning. From this perspective, we carefully design a task to predict the positions of all the five lobes. Given an input lung CT image $\\bm{X}$, we first generate five regions that cover the five lobes as \\begin{equation}\\label{eq:rsl_input} \\bm{X}_{ru},\\bm{X}_{rm},\\bm{X}_{rl},\\bm{X}_{lu},\\bm{X}_{ll} = \\mbox{Generator}(\\bm{X}), \\end{equation} where $\\bm{X}_{ru},\\bm{X}_{rm},\\bm{X}_{rl},\\bm{X}_{lu},\\bm{X}_{ll}$ denote the regions cover the right lung upper lobe, the right lung middle lobe, the right lung lower lobe, the left lung upper lobe, the left lung lower lobe, respectively, Generator denotes a composition of operators to generate the above five region from an input lung CT image. Generator is composed of three operators, including the locate, crop and resize operators. The locate operator contains three steps. First, we compute a location tuple $(x_i, y_i, w_i, h_i)$ for each region $i\\in\\{ru, rm, rl, lu, ll\\}$ from Figure~\\ref{fig:ssl}, where $x_i$ and $y_i$ denote the coordinates of the center point of the region $i$, $w_i$ and $h_i$ denote the width and height of the region $i$, respectively. After that, for a given lung CT image, we generate a boundary map that separates the lung and its peripheral tissue, then an image that only contains the lung can be achieved based on the boundary map. To generate a boundary map, we slide a 2D kernel with sizes $3\\times3$ pixel by pixel on the input lung image. If a window contains more than one distinct pixel value, the center pixel of this window is marked as a boundary pixel. At last, we compute the five location tuples for the achieved lung image based on the location tuples $(x_i, y_i, w_i, h_i)$, where $i\\in\\{ru, rm, rl, lu, ll\\}$. This is because the position and spatial sizes of each region for the human lung are roughly fixed. We then use the crop operator to crop out five regions based on the location tuples. Finally, the resize operator is performed such that each region is resized to the original lung CT image's sizes. We employ either of the above two groups of networks to generate a region representation for each region. In this way, the networks are forced to understand and learn inherent knowledge for each lobe of a lung. After that, classifiers are used to predict the positions of all the five lobes. It's essentially a multi-task learning problem. The input is the five regions, each of which covers a lobe. For a region, the right class is the predefined index for it. Formally, given an input lung CT image $\\bm{X}$, the region-aware loss $\\mathcal{L}_{ra}$ for region-scale learning is computed by \\begin{equation}\\label{eq:ra_loss} \\mathcal{L}_{ra} = \\sum_{i\\in\\{ru, rm, rl, lu, ll\\}}\\mbox{CE}(\\bm{x}_i, \\bm{y}_i), \\end{equation} where $\\mbox{CE}(\\bm{x}_i, \\bm{y}_i)$ is the cross-entropy loss for the region $i\\in\\{ru, rm, rl, lu, ll\\}$, $\\bm{x}_i\\in\\mathbb{R}^5$ is the output of the classifier, and $\\bm{y}_i\\in\\mathbb{R}^5$ is a one-hot vector indicating the right class for the region $i$. Notably, the parameters are shared across all the five input regions. The proposed region-scale learning task has two advantages. Firstly, it learns specific patterns for each lobe, thereby extracting subtle information at the lobe-level. Secondly, by treating each lobe as a center lobe, the other four lobes can be viewed as the context for the center lobe. Thus the center lobe is highlighted and doing well on this task requires distinguishing representation of each lobe. \\subsection{Final Loss} As introduced in Section~\\ref{sec:imagesl}, an input sample for our self-supervised learning framework contains a CT image $\\bm{X}$ to form a positive pair, and a set of different CT images $\\{\\bm{X}^i|i=1,...,n\\}$ to form negative pairs. Formally, the final loss $\\mathcal{L}$ for this input sample is computed by performing the weighted sum on the contrastive loss of the image-scale learning and the proposed region-aware loss of the region-scale learning as \\begin{equation}\\label{eq:final} \\mathcal{L} = \\alpha_1\\mathcal{L}_{cons}+\\alpha_2(\\mathcal{L}_{ra}+\\sum^n_{i=1}\\mathcal{L}_{ra}^i), \\end{equation} where $\\alpha_1$ and $\\alpha_2$ are hyper-parameters, $\\mathcal{L}_{cons}$ is defined in Equation~\\ref{eq:contra1}, $\\mathcal{L}_{ra}^i$ is the region-aware loss for the image $\\bm{X}$, and $\\mathcal{L}_{ra}^i$ is the region-aware loss for an image $\\bm{X}^i$ from the image set $\\{\\bm{X}^i|i=1,...,n\\}$. During back-propagation, the network is forced to learn representations at both the lung-level and lobe-level, distinguishing the functionality of each lobe and capturing sufficient semantic information to achieve better representations for lung CT images. Note that we use the same network in two branches. That is to say, the weights are shared for the feature extractors used in both branches. Similar to supervised transfer learning, we apply each of the two groups of networks as the backbone network in the self-supervised learning framework and then transfer the knowledge to the target task. The transferability of ATTNs and convolution layers on the self-supervised learning is then explored. \\subsection{Transferability Estimation} \\label{sec:transferability} We use two approaches to estimate the transferability of learned representations. We denote a network that is not pretrained on a source task as $N_n$, and the same network that is pretrained on a source task as $N_p$. First, we directly finetune the pretrained $N_n$ and $N_p$ on the target task and record the prediction performance. The metrics include accuracy, F1-score and AUC. For any metric, the performance of $N_n$ and $N_p$ is denoted as $P_n$ and $P_p$, respectively. Then the divergence of each metric between $P_n$ and $P_p$ can be used to estimate the transferability of representations learned by the employed network on the source task. In addition to evaluating transferability through running experiments on the target task, we employ LEEP~\\cite{nguyen2020leep} to directly estimate transferability based on the pretrained model and statistics of the target dataset. LEEP can only be applied to supervised transfer learning where the source data has labels. Assume labels of the source data are in a label set $\\mathcal{Z}$, input instances of the target data are in the domain set $\\mathcal{X}\\in\\mathbb{R}^N$, and labels of the target data are in a label set $\\mathcal{Y}$. Given a pretrained network $N$ and target dataset $\\mathcal{D}=\\{(x_1, y_1),(x_2, y_2),...,(x_n, y_n)\\}$, where $n$ is the number of data samples in the target set, $x_i\\in\\mathcal{X}$ is achieved by flatting an image to a vector. Formally, the LEEP score $L$ can computed as \\begin{equation}\\label{eq:leep} L = \\frac{1}{n}\\sum_{i=1}^n\\mbox{log}(\\sum_{z\\in\\mathcal{Z}} P(y_i|z)N(x_i)_z), \\end{equation} where $P(y_i|z)$ is the conditional distribution of the target label $y_i$ given the source label $z$, and $N(x_i)_z$ is the probability that the output of the network that takes $x_i$ as the input is the label $z$. Similarly, the LEEP score based on $N_n$ and $N_p$ with the same target dataset can be denoted as $L_n$ and $L_p$, respectively. The divergence between $L_n$ and $L_p$ can be used to estimate transferability for $N_n$ and $N_p$ from the same source task. \\section{Experimental Studies} \\subsection{Dataset} We use two datasets to pretrain models and perform supervised transfer learning. First, We use ImageNet that contains millions of natural images to pretrain the models. Even though nature images follow different distributions with CT images, pretraining on ImageNet enables models to learn redundant patterns that are shared by natural and medical images. After that, we use COVIDx~\\cite{wang2020covid}, a collection of images from medical domain, to extract similar patterns that are shared by medical images. We use COVID19-CT to perform self-supervised transfer learning and CT-based diagnosis of COVID-19. To our best knowledge, the dataset is the largest public-available CT dataset for COVID-19. \\noindent \\textbf{COVIDx} The COVIDx dataset is a public-available labeled dataset containing chest X-ray (CXR) images for COVID-19 detection. The dataset contains 16898 images in total, among which 573 images are for COVID-19 cases, 5559 images are for regular pneumonia (non COVID-19) cases and the rest 8066 are normal cases. The dataset is generated from 5 sources; those are, COVID-19 Image Data Collection~\\cite{cohen2020covid}, COVID-19 Chest X-ray Dataset Initiative~\\cite{bworld}, ActualMed COVID-19 Chest X-ray Dataset Initiative~\\cite{actualmed}, RSNA Pneumonia Detection Challenge dataset~\\cite{kaggle} and COVID-19 radiography database~\\cite{xxxyyy}. Generally, CXR imaging is a low-cost, first-look technique compared with CT scanning. CXR images usually have lower quality than CT images but can be obtained much faster. Due to their easy-obtaining nature, the existing CXR datasets are much larger than the CT datasets for COVID-19 diagnosis. However, the CXR imaging and CT scanning techniques have something in common. The CXR imaging uses a small amount of radiation to go through and take an image of the chest. CT scanning is essentially a more detailed type of CXR that makes more comprehensive views of the chest. In this sense, the achieved CXR and CT images follow similar distributions and may share common patterns for image representation learning. It is a vital step to learn and transfer knowledge to the target dataset from a source dataset that is larger but follows similar distributions with the target dataset. \\noindent \\textbf{COVID19-CT} The COVID19-CT dataset is the largest public-available CT dataset for COVID-19 diagnosis. It contains 349 images as COVID-19 positive and 397 images as COVID-19 negative. The dataset is originally split into training, validation and test sets. Specifically, there are 191 positive and 234 negative images in the training set; 60 positive and 58 negative images in the validation set; 98 positive and 105 negative images in the test set. The images are of different spatial sizes, which vary from 153 to 1853. \\subsection{Experimental Setup} We employ two backbone networks ResNet-50 and ResNet-101, where purely convolutional layers are used to extract features from images. We then investigate two scenarios that adding 1 ATTN and 5 ATTNs for each backbone network. The ATTN is inserted in the $\\mbox{res}_3$ block for the former. For the latter, 2 ATTNs are inserted in both the $\\mbox{res}_3$ and $\\mbox{res}_4$, and another ATTN is inserted in the $\\mbox{res}_5$ block. This results in a total of six networks. Each of the ResNet-50 and ResNet-101 has three variants, including the baseline, the baseline with 1 ATTN and the baseline with 5 ATTNs. Notably, all ATTNs are added at the end of the corresponding residual blocks. We first perform STL-N and pretrain all the six networks on ImageNet ILSVRC 2012 image classification dataset~\\cite{imagenet_cvpr09}, which contains 1.2 million natural images for training, 50 thousand for validation and another 50 thousand for testing. There are 1000 classes in total. We adopt the same data augmentation pipeline as in~\\cite{he2016deep}. Specifically, each image is scaled to $256\\times 256$ and a patch of size $224\\times 224$ is randomly cropped as a training sample. Horizontal flip is randomly performed for each cropped patch with a probability of 0.5. We employ the dropout~\\cite{srivastava2014dropout} with a rate of 0.8 and the weight decay of 1e-4 to avoid over-fitting. To optimize the models, we employ the stochastic gradient descent (SGD) optimizer with a momentum of 0.9 to train models for 90 epochs. The initial learning rate is set to 0.1 and decays by 0.1 every 30 epochs. We use 8 TITAN Xp GPUs and the batch size is set to 512 for training. We then perform STL-M to pretrain the models on the COVIDx dataset. The used data augmentation scheme is composed of several techniques including translation, rotation, horizontal flip, intensity shift. All the techniques are randomly performed with a probability of 0.5. SGD is used with a learning rate equal to 2e-4. A dropout with a keep rate of 0.5 is adopted to avoid over-fitting. The number of epochs is set to 30 and the batch size is 64 during the pretraining procedure. During the SSTL-M, we follow the same data augmentation scheme as in~\\cite{he2020momentum}. Specifically, all images as well as cropped regions are scaled to $256\\time 256$ and a patch with spatial sizes $224\\time 224$ is randomly cropped from each image. Then color jittering, horizontal flip, and grayscale conversion are performed randomly with a probability of 0.5. The temperature parameter $\\tau$ in Equation~\\ref{eq:contra1} is set to 0.07. The weights in Equation~\\ref{eq:final} are set to $\\alpha_1 = 0.8$, and $\\alpha_2 = 0.8$. The SGD is employed as our optimizer with weight decay equal to 1e-4 and SGD momentum equal to 0.9. The training is performed for 200 epochs. The initial learning rate is 0.3 and decays by 0.1 at the 120th and the 160th epochs. The batch size is set to 256 with 8 TITAN Xp GPUs. When comparing our method with the MoCo and SimCLR, we use the same hyperparameters as used in their papers~\\cite{he2020momentum,chen2020simple} for the MoCo and SimCLR. After finishing the pretraining procedures, we use each pretrained model as a starting point and finetune it on the target dataset COVID19-CT for COVID-19 prediction. We use the same optimizer and hyperparameters as in the SSTL-M. The data augmentation scheme is also the same during training. During inference, the center-cropped patch with size $224\\time 224$ for each image is used, and other augmentation techniques are the same. \\begin{table} \\begin{center} \\caption{Top-1 and Top-5 accuracies (\\%) and performance improvements of all the six networks on ImageNet. There are two columns for each metric. The value column provides the original results, and the improv. column shows the improvements based on the baselines.} \\label{tb:imagenet} \\begin{tabular}{lcccccccccccc cc} \\hline \\hhline {--------------} \\multicolumn{2}{c}{\\multirow{2}*{Model}} & \\multicolumn{2}{c}{Top-1} & \\multicolumn{2}{c}{Top-5} \\\\ & &Value & Improv. &Value & Improv. \\\\ \\hhline {--------------} \\multirow{3}*{R-50} & Baseline & 77.2 & 0& 93.3 &0 \\\\ & 1 ATTN & 77.9 & 0.7& 93.9 & 0.6\\\\ & 5 ATTNs & 78.3 & 1.1& 94.1 & 0.8\\\\ \\hhline {--------------} \\multirow{3}*{R-101} & Baseline & 78.3 & 0 & 94.0 & 0 \\\\ & 1 ATTN & 79.2 & 0.9 & 94.4 & 0.4\\\\ & 5 ATTNs & 79.5 & 1.2 &94.6 & 0.6\\\\ \\hhline {--------------} \\end{tabular} \\end{center} \\end{table} \\begin{table*} \\begin{center} \\caption{Overall performance for COVID-19 CT image prediction of all the six models pretrained with STL-N, STL-M and SSTL-M in terms of accuracy(\\%), F1-score(\\%) and AUC(\\%). There are two columns for each metric. The value column provides the original results, and the improv. column shows the improvements based on the baselines. } \\label{tb:finalperf} \\begin{tabular}{lcccccccccccc cc} \\hline \\hhline{--------------} \\multicolumn{2}{c}{\\multirow{2}*{Model}} & &\\multicolumn{2}{c}{Accuracy} & &\\multicolumn{2}{c}{F1-Score} & &\\multicolumn{2}{c}{AUC} \\\\ & &&Value & Improv.& &Value & Improv. & &Value & Improv. \\\\ \\hhline {--------------} \\multirow{3}*{R-50} & Baseline && 88.2 & 0& &88.7 &0 & &90.3 & 0\\\\ & 1 ATTN & &93.1 & 4.9 & & 92.9 & 4.2& & 92.9& 2.6\\\\ & 5 ATTNs & &93.9 & 5.7 & & 94.7 & 6.0& &96.8& 6.5\\\\ \\hhline {--------------} \\multirow{3}*{R-101} & Baseline & &89.3 & 0& &88.8 & 0& &90.7 &0\\\\ & 1 ATTN & &93.4 & 4.1& &93.2 & 4.4& &93.7 & 3.0\\\\ & 5 ATTNs & &94.2 & 4.9& &95.3 & 6.5& &97.8 & 7.1\\\\ \\hhline {--------------} \\end{tabular} \\end{center} \\end{table*} \\subsection{Power of the Networks with Attention} We first investigate how powerful the networks with ATTNs are on ImageNet. We denote ResNet-50 as R-50 and ResNet-101 as R-101 for convenience. Each of the R-50 and R-101 has three variants including the baseline CNN, the baseline with 1 ATTN, and the baseline with 5 ATTNs. We denote them as baseline, 1 ATTN and 5 ATTNs for convenience. We conduct experiments to predict the top-1 and top-5 accuracies on the validation set of the ImageNet as the test data has no labels. In addition, we also compute performance improvements compared with the baselines. The results are reported in Table~\\ref{tb:imagenet}. We can observe from the table that by adding ATTNs, the performance improvement is less than or around 1\\% on the validation set of the ImageNet. We then conduct experiments to examine the overall performance of all the models on the target dataset. These models are all pretrained on the three source tasks STL-N, STL-M and SSTL-M in order. The metrics include accuracy, F1-score and AUC. For each metric, we also compute performance improvements compared with the baselines. The results are reported in Table~\\ref{tb:finalperf}. We can find from the table that adding ATTNs to the networks and then performing transfer learning can significantly improve prediction performance. In terms of accuracy, adding 1 ATTN for transfer learning leads to an average improvement of 4.5\\%, and adding 5 ATTNs leads to an average improvement of 5.3\\% compared with the baseline ResNets. Similar results can be found on the metrics F1-score and AUC. These results indicate the effectiveness of integrating ATTNs into our proposed multi-stage transfer learning framework. \\begin{table} \\begin{center} \\caption{Comparison among different self-supervised learning methods in terms of accuracy(\\%), F1-score(\\%) and AUC(\\%). All the networks are first pretrained on the same supervised source tasks STL-N and STL-M, then pretrained with different SSTL-M methods on the same CT data. } \\label{tb:ssl} \\begin{tabular}{lcccccccccccc cc} \\hline \\hhline{--------------} \\multicolumn{2}{c}{Model} & Accuracy & F1-Score & AUC \\\\ \\hline\\hline \\multirow{9}*{R-50} & Baseline w MoCo & 87.3 & 88.6 &90.0 \\\\ & Baseline w SimCLR & 87.7 & 87.9 &90.1 \\\\ & Baseline w Ours & 88.2 & 88.7 &90.3 \\\\ \\cline{2-10}& 1 ATTN w MoCo & 92.5 & 92.3 & 92.6\\\\ & 1 ATTN w SimCLR& 92.6 & 91.7 & 92.1\\\\ & 1 ATTN w Ours& 93.1 & 92.9 & 92.9\\\\ \\cline{2-10}& 5 ATTNs w MoCo& 93.6 & 94.3 &96.1\\\\ & 5 ATTNs w SimCLR& 93.5 & 94.0 &95.9\\\\ & 5 ATTNs w Ours& 93.9 & 94.7 &96.8\\\\ \\hline\\hline \\multirow{9}*{R-101} & Baseline w MoCo& 88.6 &88.3 &90.6\\\\ & Baseline w SimCLR& 89.1 &88.3 &90.5\\\\ & Baseline w Ours& 89.3 &88.8 &90.7\\\\ \\cline{2-10}& 1 ATTN w MoCo& 92.5 &93.0 &93.7\\\\ & 1 ATTN w SimCLR& 92.6 &92.7 &93.0\\\\ & 1 ATTN w Ours& 93.4 &93.2 &93.7\\\\ \\cline{2-10}& 5 ATTNs w MoCo& 93.7 &95.0 &96.6 \\\\ & 5 ATTNs w SimCLR& 93.1 &94.5 &96.6 \\\\ & 5 ATTNs w Ours& 94.2 &95.3 &97.8 \\\\ \\hline\\hline \\end{tabular} \\end{center} \\end{table} \\subsection{Comparison of Different Self-supervised Learning Methods} We investigate the effectiveness of our proposed self-supervised learning method. For both the R-50 and R-101 groups, we first conduct the same supervised transfer learning tasks STL-N and STL-M. After that, we applied the trained models to two state-of-the-art self-supervised learning frameworks, the MoCo~\\cite{he2020momentum} and the SimCLR~\\cite{chen2020simple}, and our method, which we denote as X w MoCo, X w SimCLR and X w Ours, respectively. X denotes either baseline, adding 1 ATTN or adding 5 ATTNs. The experimental results are reported in Table~\\ref{tb:ssl}. We can observe from the table that models with our method consistently outperform models with the MoCo or SimCLR on all the three metrics. Specifically, considering all the three networks together, our method outperforms the MoCo and SimCLR by an average margin of 0.6\\% and 0.5\\% in terms of accuracy for the R-50 Group, and an average margin of 0.7\\% and 0.6\\% in terms of accuracy for the R-101 Group. Similar results can also be achieved for the F1-score and AUC. This indicates by using a multi-scale learning framework and considering distinguishing patterns from local lobes, our method can successfully extract useful inherent patterns from the CT data, thereby leading to performance improvement for COVID-19 diagnosis based on CT images. \\begin{table*} \\begin{center} \\caption{Results for COVID-19 CT image prediction of all the six networks with and without transfer learning in terms of accuracy(\\%), F1-score(\\%) and AUC(\\%). There are two columns for each metric. The value column provides the original results, and the improv. column shows the performance improvements of networks with transfer learning compared with networks without transfer learning.} \\label{tb:comptl} \\begin{tabular}{lcccccccccccc cc} \\hline \\hhline{--------------} \\multicolumn{2}{c}{\\multirow{2}*{Model}} && \\multicolumn{2}{c}{Accuracy} & &\\multicolumn{2}{c}{F1-Score} & &\\multicolumn{2}{c}{AUC} \\\\ & & &Value & Improv.& &Value & Improv. & &Value & Improv. \\\\ \\hline\\hline \\multirow{6}*{R-50} & Baseline w\/o TL & & 83.7 & 0 & &84.1 & 0 && 84.6 & 0\\\\ & Baseline w TL& & 88.2 & 4.5& &88.7 & 4.6& &90.3 &5.7 \\\\ \\cline{2-11}& 1 ATTN w\/o TL & & 84.9 & 0&& 82.4 &0 && 85.7 & 0\\\\ & 1 ATTN w TL & & 93.1 &8.2 && 92.9 &10.5 && 92.9 &7.2 \\\\ \\cline{2-11}& 5 ATTNs w\/o TL & & 84.7 & 0& &83.1 &0 && 86.9 &0 \\\\ & 5 ATTNs w TL & & 93.9 &9.2 && 94.7 &11.6 && 96.8 &9.9 \\\\ \\hline\\hline \\multirow{6}*{R-101} & Baseline w\/o TL && 83.8 & 0&& 83.9 & 0& &86.2 &0 \\\\ & Baseline w TL & & 89.3 & 5.5& &88.8 & 4.9& &90.7 & 4.5\\\\ \\cline{2-11}& 1 ATTN w\/o TL & & 85.4 & 0&& 83.6 &0 && 86.1 & 0\\\\ & 1 ATTN w TL & & 93.4 & 8.0&& 93.2 & 9.6&& 93.7 & 7.6\\\\ \\cline{2-11}& 5 ATTNs w\/o TL & & 86.1 &0 && 84.5 & 0&& 87.6 &0 \\\\ & 5 ATTNs w TL& & 94.2 & 8.1& &95.3 & 10.8&&97.8 & 10.2\\\\ \\hline\\hline \\end{tabular} \\end{center} \\end{table*} \\begin{table*} \\begin{center} \\caption{Results for COVID-19 CT image prediction of all the six networks without transfer learning, with STL-N and with STL-M in terms of accuracy(\\%), F1-score(\\%) and AUC(\\%). There are two columns for each metric. The value column provides the original results, and the improv. column shows the performance improvements of networks with each of the STL-N and STL-M compared with networks without transfer learning.} \\label{tb:ablat} \\begin{tabular}{lcccccccccccc cc} \\hline \\hhline{--------------} \\multicolumn{2}{c}{\\multirow{2}*{Model}} & &\\multicolumn{2}{c}{Accuracy} & &\\multicolumn{2}{c}{F1-Score} & &\\multicolumn{2}{c}{AUC} \\\\ & &&Value & Improv.& &Value & Improv. & &Value & Improv. \\\\ \\hline\\hline \\multirow{9}*{R-50} & Baseline w\/o TL& &83.7 & 0 && 84.1 & 0 && 84.6 & 0 \\\\ & Baseline w STL-N & &85.4 & 1.7 && 85.9 &1.8 && 86.4 &1.8 \\\\ & Baseline w STL-M & &86.0 & 2.3 & &86.8 & 2.7& &87.7 & 3.1\\\\ \\cline{2-11}& 1 ATTN w\/o TL & &84.9 & 0& &82.4 & 0& &85.7 &0 \\\\ & 1 ATTN w STL-N & &88.4& 3.5& &88.8 &6.4 & &89.2 & 3.5\\\\ & 1 ATTN w STL-M & &89.2 & 4.3& &89.8 &7.4 && 92.1 &6.6 \\\\ \\cline{2-11}& 5 ATTNs w\/o TL & &84.7 & 0&& 83.1 & 0&& 86.9 & 0\\\\ & 5 ATTNs w STL-N & &89.2 &4.5 && 89.6 & 6.5&& 90.2 & 3.3\\\\ & 5 ATTNs w STL-M &&88.7 &4.0 && 88.8 & 5.7& &91.2 & 4.3\\\\ \\hline\\hline \\multirow{9}*{R-101} & Baseline w\/o TL & &83.8 & 0&& 83.9 & 0&& 86.2 &0 \\\\ & Baseline + STL-N & &85.8 & 2.0&& 86.9 & 3.0&& 88.1 &1.9 \\\\ & Baseline + STL-M & &86.1 & 2.3&& 86.8 & 2.9&& 88.5 & 2.3\\\\ \\cline{2-11}& 1 ATTN w\/o TL & &85.4 & 0&& 83.6 &0 && 86.1 & 0\\\\ & 1 ATTN w STL-N & &88.3 & 2.9&& 89.2 &5.6 && 90.1 &4.0\\\\ & 1 ATTN w STL-M & &89.5 & 3.1& &89.7 &6.1 && 91.8 & 5.7\\\\ \\cline{2-11}& 5 ATTNs w\/o TL& &86.1 & 0& &84.5 & 0& &87.6 & 0\\\\ & 5 ATTNs w STL-N & &89.4 & 3.3&& 89.6 & 5.1&& 92.2 &4.6 \\\\ & 5 ATTNs w STL-M & &90.0 & 3.9& &90.2 & 5.7& &92.4 & 4.8\\\\ \\hline\\hline \\end{tabular} \\end{center} \\end{table*} \\subsection{Attention Benefits Transfer Learning} We design experiments to explore whether ATTNs bring benefits for transfer learning. For both the R-50 and R-101 groups we conduct two sets of experiments. First, we directly optimize the networks on the target dataset COVID19-CT without transfer learning, namely X w\/o TL, where X denotes either baseline, adding 1 ATTN or adding 5 ATTNs. Second, we apply all the networks to our multi-stage transfer learning framework that we perform all the three stages of pretraining for all the networks and then finetune the pretrained models on the target dataset. We name such models as X w TL, where X has the same meaning as above. The performance is evaluated on the test set of the COVID19-CT dataset. We then compute the improvements by using transfer learning for the two groups of networks and the results are reported in Table~\\ref{tb:comptl}. We can observe from the table that models with the proposed transfer learning framework consistently improve the prediction performance on the target dataset. This indicates that by using our multi-stage transfer learning framework, it successfully extracts important patterns between the source images and the target images. More importantly, the table shows that networks with ATTNs achieve much larger performance improvements through transfer learning than the baseline ResNets. In terms of accuracy on ResNet-50, the improvement for the baseline is 4.5\\%, while and improvements for adding 1 ATTN and adding 5 ATTNs are 8.2\\% and 9.2\\%, respectively. The benefits induced by attention are 2.7\\% and 3.7\\%. Similar results can be observed for the ResNet-101 and the benefits induced by attention are 2.5\\% and 2.6\\%. Consistent conclusions can be obtained on the metrics F1-score and AUC that attention helps transfer learning. For the two settings with ATTNs, the benefits brought by attention are 5.9\\% and 7.0\\% in terms of F1-score for ResNet-50, and 4.7\\% and 5.9\\% for ResNet-101. In terms of AUC, attention helps with margins of 2.5\\% and 4.2\\% for ResNet-50, and margins of 3.1\\% and 5.7\\% for ResNet-101. These results indicate that compared with convolution, attention helps transfer more useful knowledge from the source tasks to the target task in transfer learning. By adding ATTNs, the network is capable of learning important common pattens of images in the pretraining stage, thereby leading to significant performance improvement for the target task. \\begin{table}[!bh] \\begin{center} \\caption{LEEP scores for all the six networks without transfer learning, with STL-N, with both the STL-N and STL-M.} \\label{tb:leep} \\begin{tabular}{lc ccccccccccc cc} \\hline \\hhline{--------------} Model& R-50 & R-101 \\\\ \\hhline{--------------} Baseline w\/o TL & -0.918 & -0.913 \\\\ Baseline w STL-N & -0.908 & 0.-909 \\\\ Baseline w STL-N w STL-M & -0.894 & -0.899 \\\\ \\hhline{--------------} 1 ATTN w\/o TL & -0.917 & -0.904 \\\\ 1 ATTN w STL-N & -0.902 & -0.887 \\\\ 1 ATTN w STL-N w STL-M & -0.882 & -0.872 \\\\ \\hhline{--------------} 5 ATTNs w\/o TL & -0.915 & -0.907 \\\\ 5 ATTNs w STL-N & -0.897 & -0.880 \\\\ 5 ATTNs w STL-N w STL-M & -0.875 & -0.865 \\\\ \\hline \\end{tabular} \\end{center} \\end{table} \\begin{figure*}[!th] \\centering \\includegraphics[width=0.9\\textwidth]{leep.pdf} \\caption{LEEP scores for both the R-50 and R-101 groups without transfer learning, with STL-N, with both the STL-N and STL-M.} \\label{fig:leep} \\end{figure*} \\begin{figure*}[!th] \\centering \\includegraphics[width=0.9\\textwidth]{vis.pdf} \\caption{Comparison of visualization results between a convolutional layer and a ATTN. The lowest pixel values are shown in blue while the highest pixel values are shown in red. Column 1 are the original CT images with COVID-19 positive. Columns 2 and 3 are visualization results for the last convolutional layer in ResNet-50, where column 2 are the generated heatmaps and column 3 are the original images integrated with heatmaps. Columns 4 and 5 are visualization results for the last ATTN in ResNet-50 with 5 ATTNs, where column 4 are the generated attention heatmaps and column 5 are the original images integrated with attention heatmaps. } \\label{fig:vis} \\end{figure*} \\subsection{Ablation Study} \\label{sec:ablation} In this section, we conduct ablation study to examine the benefits of attention brought to the two supervised transfer learning tasks STL-N and STL-M. Instead of performing two tasks sequentially, we conduct pretraining on natural images and medical images separately to explore how attention benefits transfer learning from different domains. Specifically, we name the models as X w\/o TL, X w STL-N and X w STL-M, respectively. X denotes either baseline, adding 1 ATTN or adding 5 ATTNs. We compute the improvements for each stage of transfer learning for both the R-10 and R-101 groups and the results are reported in Table~\\ref{tb:ablat}. We can observe from the table that attention consistently benefits both the STL-N and STL-M. Specifically, on the ResNet-50, adding 1 ATTN benefits the STL-N by a margin of 1.8\\% in terms of accuracy, 4.6\\% in terms of F1-score, and 1.7\\% in terms of AUC. Adding 1 ATTNs benefits the STL-M by a margin of 2.0\\% in terms of accuracy, 4.7\\% in terms of F1-score, and 3.5\\% in terms of AUC. On the ResNet-50, adding 5 ATTNs benefits the STL-N by a margin of 2.8\\% in terms of accuracy, 4.7\\% in terms of F1-score, and 1.5\\% in terms of AUC. Adding 5 ATTNs benefits the STL-M by a margin of 1.7\\% in terms of accuracy, 3.0\\% in terms of F1-score, and 1.3\\% in terms of AUC. Similar results can be computed on ResNet-101 that attention consistently benefits both the STL-N and STL-M on all three metrics. These results indicate that attention helps transfer much more useful knowledge than convolution in supervised transfer learning, no matter the source data follows totally different or similar distributions with the target data. \\subsection{Comparison on LEEP Scores} In this section, we compute LEEP scores to examine the functionality of attention in transfer learning. Instead of optimizing parameters and making predictions on the target dataset, we directly compute LEEP scores based on the source models and statistics of the target data. As LEEP scores can only be computed for supervised transfer learning, we conduct experiments on STL-N and STL-M to achieve LEEP scores. we add STL-N and STL-M in order, which results in models X w\/o TL, X w STL-N and X w STL-N w STL-M, respectively. X denotes either baseline, adding 1 ATTN or adding 5 ATTNs. The results are reported in Table~\\ref{tb:leep} and shown in Figure~\\ref{fig:leep}. The curve for each network setting in Figure~\\ref{fig:leep} is composed of two line segments, each of which indicates improvement by adding a stage of pretraining procedure. The slope of each line segment can reflect the improvement in the LEEP score by adding the corresponding stage of transfer learning. We can observe from the figure that both adding 1 ATTN and adding 5 ATTNs achieve larger improvement than the baseline ResNets for all the two stages. This again demonstrates attention helps transfer learning regardless of divergences between the distributions"} +{"id":"RedPajamaArXiv.0003","text":"\\section{Introduction}\\label{sec:introduction} Multivariate residues appear in many different contexts in theoretical physics and algebraic geometry. In theoretical physics, they for example give the proper definition of generalized-unitarity cuts% ~\\cite{Cachazo:2008dx,Cachazo:2008vp,Kosower:2011ty,CaronHuot:2012ab,Sogaard:2013fpa,Johansson:2015ava}, and they play a central role in the Grassmannian formulation of the S-matrix by Arkani-Hamed et al.~% \\cite{ArkaniHamed:2009dn,ArkaniHamed:2009dg,ArkaniHamed:2010gh,ArkaniHamed:2012nw,Arkani-Hamed:2013kca,Arkani-Hamed:2014bca,Arkani-Hamed:2014dca,Bern:2015ple,Herrmann:2016qea}. % A recent paper \\cite{Chen:2017bug} uses multivariate residues to construct Bern-Carrasco-Johansson numerators \\cite{Bern:2008qj,Bern:2010ue} for gauge theory loop integrands. In algebraic geometry, multivariate residues play an important role in elimination theory in the context of solving systems of multivariate polynomial equations \\cite{CattaniDickenstein}. In practice, the evaluation of multivariate residues can be non-trivial. Nevertheless, implementations of their evaluation have not been made publically available. In this paper we provide the Mathematica package \\textsc{MultivariateResidues} for efficient evaluation of multivariate residues based on methods from computational algebraic geometry. Related work has recently appeared in the package \\textsc{Rings} \\cite{Poslavsky:2017sne} which provides a library for computing factorization, GCDs etc.~of multivariate polynomials over arbitrary coefficient rings. This paper is organized as follows. In section~\\ref{sec:General_theory} we give the definition of the multivariate residue along with some of its basic properties, in particular the transformation formula. We explain an algorithm for how the latter can be utilized to compute multivariate residues in general. In section~\\ref{sec:quotient_ring_duality} we explain an alternative approach which makes use of powerful methods from modern commutative algebra. Both of these methods are implemented in \\textsc{MultivariateResidues}. In section~\\ref{sec:example} we apply the formalism of section~\\ref{sec:quotient_ring_duality} to a specific example to illustrate how residues are computed in practice. In section~\\ref{sec:applications} we discuss the application of multivariate residues to the calculation of generalized-unitarity cuts in the context of computations of scattering amplitudes in perturbative quantum field theory. Section~\\ref{sec:manual} provides a manual for \\textsc{MultivariateResidues} along with benchmarks of the performance, comparisons between the various options and tips for the user to improve performance. In section~\\ref{sec:Conclusions} we give our conclusions. \\ref{sec:topology_of_multivariate_residues} provides a topological explanation of why multivariate residues, in contrast to the univariate case, are not uniquely determined by the location of a pole, but have some dependence on the integration cycle. \\section{General theory}\\label{sec:General_theory} In this section we give the definition of multivariate complex residues and discuss the transformation formula and how this may be utilized to compute residues in practice. Our setup is as follows. Let $f(z) = \\big(f_1(z), \\ldots, f_n(z) \\big) : \\mathbb{C}^n \\to \\mathbb{C}^n$ and $h : \\mathbb{C}^n \\to \\mathbb{C}$ be holomorphic functions, and consider the meromorphic $n$-form,% \\footnote{If one adds a boundary at infinity as needed to apply global residue theorems, we can define the functions on $\\mathbb{CP}^n$ rather than $\\mathbb{C}^n$.} \\begin{align} \\omega = \\frac{h(z) \\hspace{0.4mm} {\\rm d} z_1\\wedge\\cdots\\wedge {\\rm d} z_n}{f_1(z)\\cdots f_n(z)}\\,. \\label{eq:diff_form_generic} \\end{align} The case where the form has $m$ denominator factors with $m>n$ can be treated as a special case of the above by grouping the $m$ factors into precisely $n$ factors. We will elaborate on the ambiguity of this process and its underlying topological explanation further below. Likewise, the case of $m < n$ denominator factors will be discussed below. In the multivariate setting, we define a pole as a point $p \\in \\mathbb{C}^n$ where $f$ has an isolated zero---that is, $f(p) = 0$ and $f^{-1}(0)\\cap U = \\{p\\}$ for a sufficiently small neighborhood $U$ of $p$. We are interested in computing the residue of $\\omega$ at its poles. The multivariate residue is defined as a multidimensional generalization of a contour integral: an integral taken over a product of $n$ circles, that is an $n$-torus, \\begin{align} \\mathop{\\mathrm{Res}}_{\\{f_1,\\dots,f_n\\}, \\hspace{0.6mm} p}(\\omega) = \\frac{1}{(2\\pi i)^n} \\oint_{\\Gamma_\\epsilon} \\frac{h(z) \\hspace{0.6mm} {\\rm d} z_1\\wedge\\cdots\\wedge {\\rm d} z_n}{f_1(z)\\cdots f_n(z)}\\,, \\label{eq:residue_def} \\end{align} where $\\Gamma_\\epsilon = \\{z\\in \\mathbb{C}^n:|f_i(z)| = \\epsilon_i\\}$ and the $\\epsilon_i$ have infinitesimal positive values. Furthermore, the integration cycle is oriented by the condition, \\begin{equation} {\\rm d} (\\mathrm{arg} \\hspace{0.6mm} f_1) \\wedge \\cdots \\wedge {\\rm d} (\\mathrm{arg} \\hspace{0.6mm} f_n) \\geq 0 \\,. \\label{eq:orientation_of_cycle} \\end{equation} We note that the definition of the integration cycle differs from the univariate case: rather than being defined directly in terms of the variables $z$, $\\Gamma_\\epsilon$ is defined in terms of the denominator factors $f_i(z)$. The Jacobian determinant evaluated at the pole \\begin{align} J(p)\\equiv \\det_{i,j}\\left( \\frac{\\partial f_i}{\\partial z_j} \\right)\\bigg|_{z = p}\\,, \\label{eq:Jacobian_determinant} \\end{align} plays an important role, since if $J(p) \\neq 0$, we can evaluate the residue directly by the coordinate transformation $w = f(z)$, \\begin{align} \\mathop{\\mathrm{Res}}_{\\langle f_1,\\dots,f_n \\rangle,p}(\\omega) = \\frac{1}{(2\\pi i)^n} \\oint_{|w_i| \\leq \\epsilon_i} \\hspace{-1.5mm} \\frac{h\\big(f^{-1}(w)\\big) \\hspace{0.6mm} {\\rm d} w_1\\wedge\\cdots\\wedge {\\rm d} w_n}{J(p) \\hspace{0.6mm} w_1 \\cdots w_n} = \\frac{h(p)}{J(p)} \\,. \\label{eq:residue_from_Jacobian} \\end{align} In this case, the residue is termed nondegenerate. In general, however, a residue may be degenerate, such as is the case for higher-order poles. In this situation, the above coordinate transformation does not suffice to compute it. A central and completely general property of residues is the transformation formula (cf.~section 5.1 of ref.~\\cite{GriffithsHarris}). As we will shortly see, this property can be utilized to compute any residue, degenerate or nondegenerate. \\begin{theorem} (Transformation formula). Let $I = \\langle f_1 (z), \\ldots, f_n (z) \\rangle$ be a zero-dimensional ideal% \\footnote{The ideal $I$ is said to be \\emph{zero-dimensional} if and only if the solution to the equation system $f_1 (z) = \\cdots = f_n (z) = 0$ consists of a finite number of points $z \\in \\mathbb{CP}^n$.} generated by a finite set of holomorphic functions $f_i (z) : \\mathbb{CP}^n \\to \\mathbb{C}$ with $f_i (p) = 0$. Furthermore, let $J = \\langle g_1 (z), \\ldots, g_n (z) \\rangle$ be a zero-dimensional ideal such that $J \\subseteq I$; that is, whose generators are related to those of $I$ by $g_i (z) = \\sum_{j=1}^n a_{ij} (z) f_j(z)$ with the $a_{ij} (z)$ being holomorphic functions. Letting $A(z) = \\big(a_{ij} (z) \\big)_{i,j=1,\\ldots,n}$ denote the transformation matrix, the residue at $p$ satisfies, \\end{theorem} \\vspace{-5mm} \\begin{equation} \\mathop{\\mathrm{Res}}_{\\langle f_1, \\ldots, f_n \\rangle, \\hspace{0.3mm} p} \\hspace{-0.2mm}\\left( \\frac{h(z) \\hspace{0.4mm} {\\rm d} z_1 \\wedge \\cdots \\wedge {\\rm d} z_n}{f_1 (z) \\cdots f_n (z)} \\right) \\hspace{1mm}=\\hspace{1mm} \\mathop{\\mathrm{Res}}_{\\langle g_1, \\ldots, g_n \\rangle, \\hspace{0.3mm} p} \\hspace{-0.2mm}\\left( \\frac{h(z) \\hspace{0.1mm} \\det A(z) \\hspace{0.4mm} {\\rm d} z_1 \\wedge \\cdots \\wedge {\\rm d} z_n} {g_1 (z) \\cdots g_n (z)} \\right) \\,. \\label{eq:transformation_law} \\end{equation} In cases where the form $\\omega$ has fewer denominator factors than variables, the notion of residue defined in eq.~\\eqref{eq:residue_def} does not apply, and this case is therefore outside the scope of this paper. Nevertheless, we mention that a notion of residue which does apply in this situation is that of \\emph{residual forms}. To illustrate the idea, let us consider the following example, taken from section 7.2 of ref.~\\cite{ArkaniHamed:2009dn}, \\begin{equation} \\omega = \\frac{{\\rm d} z_1 \\wedge {\\rm d} z_2 \\wedge {\\rm d} z_3}{z_1 (z_1 + z_2 z_3)} \\,. \\end{equation} As $\\omega$ has three variables, but only two denominator factors, the residue in eq.~\\eqref{eq:residue_def} is not well-defined. However, we observe that we can define the 2-form \\begin{equation} \\widetilde{\\omega} \\hspace{0.8mm}=\\hspace{0.8mm} \\mathop{\\mathrm{Res}}_{z_1=0} \\hspace{0.4mm} \\omega \\hspace{0.8mm}=\\hspace{0.8mm} \\frac{{\\rm d} z_2 \\wedge {\\rm d} z_3}{z_2 z_3} \\,. \\end{equation} This form has two variables and two denominator factors, and hence the notion of residue in eq.~\\eqref{eq:residue_def} applies to $\\widetilde{\\omega}$. \\subsection{Computation of residues via the transformation formula}% \\label{sec:residues_from_transformation_formula} To apply the transformation formula \\eqref{eq:transformation_law} to the computation of residues, we must first find a useful transformation of the set of ideal generators. Here we restrict attention to the case where the generators $f_i(z)$ are polynomials and follow the approach explained in section~1.5.4 of ref.~\\cite{CattaniDickenstein}. The idea is to choose the $g_i$ to be \\emph{univariate}---that is, $g_i (z_1, \\ldots, z_n) = g_i(z_i)$. Then the residue can simply be evaluated as a product of univariate residues. A set of univariate polynomials $g_i$ can be obtained by generating a Gr{\\\"o}bner basis of $\\{ f_1(z), \\ldots, f_n(z) \\}$ with lexicographic monomial order. Specifying the variable ordering $z_{i+1} \\succ z_{i+2} \\succ \\cdots \\succ z_n \\succ z_1 \\succ z_2 \\cdots \\succ z_i$ will produce a Gr{\\\"o}bner basis whose first element is a polynomial which depends only on $z_i$. We let $g_i (z_i)$ denote this polynomial. Now, by considering all $n$ cyclic permutations of the variable ordering $z_1 \\succ z_2 \\succ \\cdots \\succ z_n$ in this way we generate a set of $n$ univariate polynomials $\\{ g_1(z_1), \\ldots, g_n(z_n) \\}$. To illustrate the above method, we consider as an example the following differential form, \\begin{align} \\omega = \\frac{z_1 \\hspace{0.6mm} {\\rm d} z_1\\wedge {\\rm d} z_2}{z_2 (a_1 z_1 + a_2 z_2)(b_1 z_1 + b_2 z_2)} \\,, \\label{eq:degenerate_diff_form} \\end{align} which at the same time will serve to explain how to compute residues in cases with more distinct denominator factors than variables. As eq.~\\eqref{eq:degenerate_diff_form} depends on two variables and has three distinct denominator factors, we must consider all possible ways of partitioning the denominator into two factors. Denoting the denominator factors of eq.~(\\ref{eq:degenerate_diff_form}) as follows, \\begin{equation} \\begin{aligned} \\varphi_1 (z_1,z_2) &= z_2 \\\\ \\varphi_2 (z_1,z_2) &= a_1 z_1 + a_2 z_2 \\\\ \\varphi_3 (z_1,z_2) &= b_1 z_1 + b_2 z_2 \\,, \\end{aligned} \\label{eq:denominator_factors_example} \\end{equation} we observe that this can be done in three distinct ways, namely \\begin{equation} \\{ \\varphi_1, \\varphi_2 \\varphi_3 \\}\\,, \\hspace{5mm} \\{ \\varphi_2, \\varphi_3 \\varphi_1 \\} \\hspace{5mm} \\mathrm{and} \\hspace{5mm} \\{ \\varphi_3, \\varphi_1 \\varphi_2 \\} \\,. \\label{eq:denominator_partitionings_example} \\end{equation} We are interested in computing the residues of $\\omega$ at the pole $p = (0,0)$ corresponding to each of these partitionings. We note that all of these residues are degenerate. Let us evaluate the residue for the denominator partitioning $\\{ \\varphi_1, \\varphi_2 \\varphi_3 \\}$. The lexicographically-ordered Gr{\\\"o}bner basis of $\\{ \\varphi_1, \\varphi_2 \\varphi_3 \\}$ in the variable ordering $z_2 \\succ z_1$ is $\\{ a_1 b_1 z_1^2, z_2 \\}$; in the variable ordering $z_1 \\succ z_2$ it is $\\{ z_2, a_1 b_1 z_1^2 \\}$. Choosing the first element of each Gr{\\\"o}bner basis we obtain, \\begin{align} g_1(z_1,z_2) &= a_1 b_1 z_1^2 \\\\ g_2(z_1,z_2) &= z_2 \\,. \\end{align} We can obtain the transformation matrix $A$ as a byproduct of finding the Gr{\\\"o}bner basis (or using the approach implemented in ref.~\\cite{Lichtblau}). In the simple case considered here, ordinary multivariate polynomial division produces the same result, \\begin{equation} A \\hspace{0.7mm}=\\hspace{0.7mm} \\begin{pmatrix} -(a_1 b_2 + a_2 b_1) z_1 - a_2 b_2 z_2 & \\hspace{1.5mm} 1 \\\\[1mm] 1 & \\hspace{1.5mm} 0 \\end{pmatrix}\\,, \\end{equation} that relates the two sets of ideal generators, \\begin{equation} A \\cdot \\hspace{0.4mm} \\begin{pmatrix} \\varphi_1(z_1, z_2) \\\\[1mm] \\varphi_2(z_1, z_2) \\varphi_3(z_1, z_2) \\end{pmatrix} \\hspace{1mm}=\\hspace{1mm} \\begin{pmatrix} g_1(z_1, z_2) \\\\[1mm] g_2(z_1, z_2) \\end{pmatrix} \\,. \\end{equation} From the transformation law (\\ref{eq:transformation_law}) we then find that the residue of $\\omega$ at $p = (0,0)$ with respect to the ideal generators $\\{ \\varphi_1, \\varphi_2 \\varphi_3 \\}$ is \\begin{equation} \\mathop{\\mathrm{Res}}_{\\{ \\varphi_1, \\varphi_2 \\varphi_3 \\}, \\hspace{0.8mm} p} \\omega \\hspace{1.5mm}=\\hspace{1.5mm} \\mathop{\\mathrm{Res}}_p \\frac{z_1 \\hspace{0.5mm} \\det A \\hspace{1.6mm} {\\rm d} z_1 \\wedge {\\rm d} z_2}{g_1(z_1, z_2) \\hspace{0.5mm} g_2 (z_1, z_2)} \\hspace{1.5mm}=\\hspace{1.5mm} - \\mathop{\\mathrm{Res}}_p \\frac{{\\rm d} z_1 \\wedge {\\rm d} z_2} {a_1 b_1 z_1 z_2} \\,. \\label{eq:residue_omega_{phi1_phi2phi3}} \\end{equation} As desired, the denominator on the right-hand side of eq.~(\\ref{eq:residue_omega_{phi1_phi2phi3}}) is a product of univariate polynomials. Hence the residue can be computed as a product of univariate residues and yields, \\begin{align} R_1 \\hspace{0.8mm}\\equiv\\hspace{0.8mm} \\mathop{\\mathrm{Res}}_{\\{ \\varphi_1, \\varphi_2 \\varphi_3 \\}, \\hspace{0.5mm} p} \\omega \\hspace{1mm}&=\\hspace{1mm} -\\frac{1}{a_1 b_1} \\label{eq:R_1_def} \\\\ R_2 \\hspace{0.8mm}\\equiv\\hspace{0.8mm} \\mathop{\\mathrm{Res}}_{\\{ \\varphi_2, \\varphi_3 \\varphi_1 \\}, \\hspace{0.5mm} p} \\omega \\hspace{1mm}&=\\hspace{1mm} -\\frac{a_2}{a_1 (a_1 b_2 - a_2 b_1)} \\label{eq:R_2_def} \\\\ R_3 \\hspace{0.8mm}\\equiv\\hspace{0.8mm} \\mathop{\\mathrm{Res}}_{\\{ \\varphi_3, \\varphi_1 \\varphi_2 \\}, \\hspace{0.5mm} p} \\omega \\hspace{1mm}&=\\hspace{1mm} \\frac{b_2}{b_1 (a_1 b_2 - a_2 b_1)} \\,, \\label{eq:R_3_def} \\end{align} where the residues for the two other denominator partitionings $\\{ \\varphi_2, \\varphi_3 \\varphi_1\\}$ and $\\{ \\varphi_3, \\varphi_1 \\varphi_2\\}$ were computed analogously. We remark that in general one must keep in mind that the residue is antisymmetric under interchanges of the denominator factors of $\\omega$. This follows from the dependence of the residue on the orientation of the integration cycle, cf.~eq.~\\eqref{eq:orientation_of_cycle}. We observe that only two out of the three residues $R_1, R_2, R_3$ in eqs.~(\\ref{eq:R_1_def})--(\\ref{eq:R_3_def}) are independent, as the residues satisfy the identity, \\begin{equation} R_1 + R_2 + R_3 = 0 \\,. \\label{eq:residue_relation} \\end{equation} Identities of this kind are common for multivariate residues. In \\ref{sec:topology_of_multivariate_residues} we give a topological explanation of why the multivariate residues in eqs.~\\eqref{eq:R_1_def}--\\eqref{eq:R_3_def} are not uniquely determined by the pole $p$, but rather also depend on the choice of partitionings in eq.~\\eqref{eq:denominator_partitionings_example}. \\section{Evaluation of residues by use of dual structure of quotient ring}\\label{sec:quotient_ring_duality} The evaluation of residues by use of the transformation formula explained in section~\\ref{sec:residues_from_transformation_formula} is completely general. However, in realistic cases the computation of the transformation matrix $A$ can be intensive, and as a result this method is not optimal in all situations. In this section we explain a more efficient method for residue computations, which we have implemented in \\textsc{MultivariateResidues}. Our setup is as follows. As in section~\\ref{sec:General_theory}, we restrict ourselves to the case where the denominator factors of $\\omega$ in eq.~\\eqref{eq:diff_form_generic} are polynomials. We denote these polynomials by $P_1(z), \\ldots, P_n(z)$ and assume that the ideal $I=\\langle P_1(z), \\ldots, P_n(z) \\rangle$ is zero-dimensional; i.e., that the associated variety $V = \\{ z \\in \\mathbb{C}^n : \\hspace{0.7mm} P_1(z) = \\cdots = P_n(z) = 0 \\}$ consists of a finite number of points, \\begin{equation} V = \\{ p_1, \\ldots, p_m \\} \\,. \\end{equation} This method exploits that the residue map defines a non-degenerate inner product $\\langle \\cdot, \\cdot \\rangle$ on the quotient ring \\begin{equation} Q \\equiv \\mathbb{C}[z_1, \\ldots, z_n]\/I \\end{equation} of the ring $\\mathbb{C}[z_1, \\ldots, z_n]$ of all polynomials in the variables $z_1, \\ldots, z_n$ with coefficients in $\\mathbb{C}$ modulo the ideal $I$. As $I$ is zero-dimensional, $Q$ has a finite dimension (cf.~section 2.2 of ref.~\\cite{UsingAlgebraicGeometry}) which we denote by $D$. By decomposing the numerator of $\\omega$ in a canonical (linear) basis of the quotient ring, and the constant 1 in the dual basis wrt.~$\\langle \\cdot, \\cdot \\rangle$, the \\emph{global residue} \\begin{equation} \\mathop{\\mathrm{Res}}_I \\hspace{0.5mm} \\omega \\hspace{1.2mm}=\\hspace{1.8mm} \\sum_{i=1}^m \\hspace{0.6mm} \\mathop{\\mathrm{Res}}_{I, \\hspace{0.6mm} p_i} \\hspace{0.5mm} \\omega \\label{eq:global_residue_def} \\end{equation} can be computed as the dot product of the corresponding coefficient vectors. The corresponding local residue at each pole $p_i$ can then be computed by multiplying the integrand by appropriate polynomials which are unity in the vicinity of $p_i$ and vanish in the vicinity of the remaining poles. In the following we explain how the canonical and dual (linear) bases are computed and how the above-mentioned polynomials are constructed. \\subsection{Computing the canonical basis of the quotient ring} Our first aim is to determine a canonical (linear) basis of the quotient ring $Q$. To this end we compute a Gr{\\\"o}bner basis $G$ of $I$ and consider the ideal $\\langle LT(I) \\rangle$ generated by the leading term of each element of $G$. The monomials in the complement of $\\langle LT(I) \\rangle$ then form a basis of $Q$. (Cf.~proposition 1 of section 5.3 of ref.~\\cite{IdealsVarietiesAlgorithms}.) We can rephrase this statement as the following algorithm. \\begin{enumerate} \\item Decide on a monomial order $\\prec$ and compute a Gr{\\\"o}bner basis $G = \\{ g_1, \\ldots, g_s\\}$ of $I$ wrt. $\\prec$.\\\\[1mm] \\item Obtain the leading term of each Gr{\\\"o}bner basis element, \\begin{equation} h_i = \\mathrm{LT}(g_i) \\,. \\end{equation} \\vspace{-5mm} \\item Extract the exponent vectors of the leading terms \\begin{equation} h_i = z_1^{\\alpha_{i,1}} \\cdots z_n^{\\alpha_{i,n}} \\hspace{6mm} \\longmapsto \\hspace{6mm} (\\alpha_{i,1}, \\ldots, \\alpha_{i,n}) \\,. \\end{equation} \\vspace{-5mm} \\item The elements of \\begin{equation} E \\hspace{1mm}=\\hspace{1mm} \\mathbb{Z}_{\\geq 0}^n \\Big\\backslash \\hspace{1.2mm} \\bigcup_{i=1}^s \\big( (\\alpha_{i,1}, \\ldots, \\alpha_{i,n}) + \\mathbb{Z}_{\\geq 0}^n \\big) \\label{eq:exponent_vectors_of_can_basis} \\end{equation} then define exponent vectors of the canonical basis elements. That is, \\begin{equation} \\mathcal{C} = \\big\\{ z_1^{\\beta_{1,1}} \\hspace{-0.5mm} \\cdots \\hspace{-0.5mm} z_n^{\\beta_{1,n}}, \\hspace{2mm} \\ldots, \\hspace{2mm} z_1^{\\beta_{D,1}} \\hspace{-0.5mm} \\cdots \\hspace{-0.5mm} z_n^{\\beta_{D,n}} \\big\\} \\hspace{5mm} \\mathrm{where} \\hspace{4mm} (\\beta_{j,1}, \\ldots, \\beta_{j,n}) \\in E \\,, \\end{equation} is the desired canonical basis of the quotient ring $Q$ wrt. $\\prec$. \\end{enumerate} \\subsection{Computing the dual basis of the quotient ring} Our next aim is to determine the dual (wrt.~$\\mathcal{C}$) basis of $Q$. This basis can be extracted from the determinant of the Bezoutian matrix of the polynomials $P_1 (z), \\ldots, P_n (z)$. Accordingly, we proceed with the following steps. \\begin{enumerate} \\item Compute the Bezoutian matrix of the polynomials $P_1 (z), \\ldots, P_n (z)$, \\begin{equation} \\mathrm{Bez}_{ij} (z,y) \\hspace{1mm}=\\hspace{1mm} \\frac{P_i (y_1, \\ldots, y_{j-1}, z_j, \\ldots, z_n) - P_i (y_1, \\ldots, y_j, z_{j+1}, \\ldots, z_n)}{z_j - y_j} \\,. \\label{eq:Bezoutian_matrix_definition} \\end{equation} The entries of the Bezoutian matrix are elements of the direct product $Q \\otimes Q$. \\item Take the determinant of the Bezoutian matrix \\begin{equation} \\mathcal{B} (z, y) \\hspace{0.5mm}\\equiv\\hspace{0.5mm} \\det (\\mathrm{Bez}) \\,. \\label{eq:Bezoutian_determinant_definition} \\end{equation} \\item Compute the remainder of $\\mathcal{B} (z, y)$ in $Q \\otimes Q$. This is carried out in practice by first performing polynomial division of $\\mathcal{B} (z, y)$ wrt.~the Gr{\\\"o}bner basis $G = \\{ g_1(z), \\ldots, g_s(z)\\}$ where the elements are taken as polynomials in $z_1, \\ldots, z_n$, and then performing polynomial division of the result wrt. $G$ whose elements are now taken as polynomials in $y_1, \\ldots, y_n$, \\begin{align} \\mathcal{B} (z, y) \\hspace{1mm} \\label{eq:pol_div_of_Bez_wrt_z} &=\\hspace{1mm} q_1 (z,y) g_1 (z) + \\cdots + q_s (z,y) g_s (z) + \\mathcal{B}_Q (z, y) \\,, \\\\ \\mathcal{B}_Q (z, y) \\hspace{1mm}&=\\hspace{1mm} \\widehat{q}_1 (z,y) g_1 (y) + \\cdots + \\widehat{q}_s (z,y) g_s (y) + \\mathcal{B}_{Q \\otimes Q} (z, y) \\,. \\label{eq:pol_div_of_Bez_wrt_y} \\end{align} \\item Label the elements of the canonical basis as $\\mathcal{C} = \\{ c_1 (z), \\ldots, c_D (z)\\}$ and decompose the Bezoutian determinant as, \\begin{equation} \\mathcal{B}_{Q \\otimes Q} (z, y) = c_1 (z) d_1 (y) + \\cdots + c_D (z) d_D (y) \\,. \\end{equation} $\\mathcal{B}_{Q \\otimes Q}$ has a unique such decomposition, and the dual basis of $Q$ (wrt. the canonical basis $\\mathcal{C}$) can now be read off (cf.~section 1.5.4 of ref.~\\cite{CattaniDickenstein}), \\begin{equation} \\mathcal{D} = \\{ d_1 (z), \\ldots, d_D (z) \\} \\,, \\end{equation} where the variables were relabeled into $z_1, \\ldots, z_n$. We remark that the elements $d_i (z)$ are in general polynomials rather than monomials (in contrast to the canonical basis elements). \\end{enumerate} \\subsection{Constructing partition-of-unity polynomials} One more ingredient is needed to compute residues at all the poles in the variety $V = \\{ p_1, \\ldots, p_m \\}$ associated with $I$, namely a set of polynomials $e_1(z), \\ldots, e_m(z)$ which are unity in the vicinity of a given pole and vanishing in the vicinity of the remaining poles. To this end, we construct a linear form $\\ell (z) = a_1 z_1 + \\cdots + a_n z_n$ (with $a_i \\in \\mathbb{C}$) such that $\\ell(p_1), \\ldots, \\ell(p_m)$ are all distinct. (In practice, this is done in \\textsc{MultivariateResidues}\\- by scanning over a set of coefficient vectors $(a_1, \\ldots, a_n)$ with integer entries.) The following set of Lagrange polynomials \\begin{equation} L_i (z) = \\prod_{\\substack{j=1, \\\\ j \\neq i}}^m \\frac{\\ell(z - p_j)}{\\ell(p_i - p_j)} \\label{eq:Lagrangian_polynomials_generic_formula} \\end{equation} then have the desired property of ``projecting onto each pole'', \\begin{equation} L_i (p_k) = \\delta_{ik} \\,. \\label{eq:partition-of-unity_property_1} \\end{equation} However, this set of polynomials will not quite have the desired property of defining a partition of unity, \\begin{equation} \\sum_{i=1}^m e_i = 1 \\hspace{3mm} \\mbox{(mod $I$) \\hspace{4mm} and} \\hspace{6mm} e_i e_j = e_i \\delta_{ij} \\hspace{3mm} \\mbox{(mod $I$)} \\,. \\label{eq:partition-of-unity_property_2} \\end{equation} Rather (cf.~lemma 2.3 of section 4.2 of ref.~\\cite{UsingAlgebraicGeometry}), a set of polynomials with these additional properties can be obtained as \\begin{equation} e_i(z) = 1 - (1 - L_i(z)^\\delta)^\\delta \\,, \\label{eq:partition-of-unity_polynomials} \\end{equation} where $\\delta$ is a positive integer such that for the intersection of the ideals generated by each pole $J\\langle\\{ p_i \\} \\rangle = \\langle z_1 - p_{i,1}, \\ldots, z_n - p_{i,n} \\rangle$ \\begin{equation} M \\equiv \\bigcap_{i=1}^m \\langle z_1 - p_{i,1}, \\ldots, z_n - p_{i,n} \\rangle \\,, \\label{eq:ideal_of_variety} \\end{equation} we have that \\begin{equation} M^\\delta \\subseteq I \\,. \\label{eq:delta_definition} \\end{equation} To find an appropriate $\\delta$ thus requires algorithms to determine the intersection and the product of two ideals and moreover to check if one ideal is contained in another ideal. To this end, we consider any two ideals in $\\mathbb{C}[z_1, \\ldots, z_n]$, \\begin{equation} J_1 = \\langle h_1, \\ldots, h_r \\rangle \\hspace{5mm} \\mathrm{and} \\hspace{5mm} J_2 = \\langle k_1, \\ldots, k_s \\rangle \\,. \\end{equation} To compute the intersection $J_1 \\cap J_2$, we introduce a parameter $t$ and consider the ideal \\begin{equation} \\langle t h_1, \\ldots, t h_r, \\hspace{1mm} (1-t) k_1, \\ldots, (1-t) k_s \\rangle \\,. \\end{equation} Now compute a Gr{\\\"o}bner basis $G$ of the latter ideal wrt.~lexicographic order in which $t$ is greater than the $z_i$. The elements of $G$ which do not contain the parameter $t$ will then form a basis\\footnote{In fact, the basis will be a Gr{\\\"o}bner basis of $J_1 \\cap J_2$.} of $J_1 \\cap J_2$ (cf.~section 4.3 of ref.~\\cite{IdealsVarietiesAlgorithms}). The product of $J_1$ and $J_2$ is generated by the product of the generators, \\begin{equation} J_1 J_2 \\hspace{1mm}=\\hspace{1mm} \\langle h_i k_j \\hspace{0.5mm} : \\hspace{0.5mm} 1 \\leq i \\leq r \\,, \\hspace{2mm} 1 \\leq j \\leq s \\rangle \\,, \\end{equation} cf.~proposition 6 of section 4.3 of ref.~\\cite{IdealsVarietiesAlgorithms}. Finally, to check the inclusion of ideals, for example whether $J_1 \\subseteq J_2$, compute a Gr{\\\"o}bner basis $H$ of $J_2$. Then \\begin{equation} J_1 \\subseteq J_2 \\hspace{4mm} \\Longleftrightarrow \\hspace{4mm} \\forall \\hspace{0.4mm} i = 1,\\ldots, r \\hspace{0.7mm} : \\hspace{0.7mm} h_i \\equiv 0 \\hspace{3mm} \\mbox{(mod $J_2$)} \\,. \\end{equation} That is, the inclusion $J_1 \\subseteq J_2$ holds if and only if all the generators of $J_1$ have a vanishing remainder upon polynomial division wrt.~$H$ (cf.~exercise 2 of section 1.4 of ref.~\\cite{IdealsVarietiesAlgorithms}). The computation of $\\delta$ in eq.~\\eqref{eq:partition-of-unity_polynomials} following the above steps can in some cases be computationally intensive. This is especially true in cases where $\\delta$ is large and $M$ has many generators, so that a large number of polynomial divisions must be carried out in order to compute the generators of $M^j$ (where $j = 2, \\ldots, \\delta$) in the intermediate stages. Alternatively, to compute partition-of-unity polynomials, we may compute the maximum pole multiplicity $d_\\mathrm{max}$, and use $\\delta = d_\\mathrm{max}$ in eq.~\\eqref{eq:partition-of-unity_polynomials}. Thus, we turn to explaining how to compute the multiplicities of the poles $p_i$. To this end we consider a linear form $\\ell$ of the type discussed above eq.~\\eqref{eq:Lagrangian_polynomials_generic_formula} with the property of mapping all poles $p_i \\in V$ to distinct values. We aim to find the matrix of the map $P(z) \\mapsto \\ell(z) P(z)$ acting on polynomials in $Q$ and compute the dimensions of the eigenspaces of the matrix, as these are the desired pole multiplicities (cf.~the discussion below Proposition (2.7) of Chapter 4 of ref.~\\cite{UsingAlgebraicGeometry}). Let $\\mathcal{C} = \\big( c_1 (z), \\ldots, c_D (z) \\big)$ denote the canonical basis of $Q$. To find the matrix $M_\\ell$ of $P(z) \\mapsto \\ell(z) P(z)$, for a fixed $1 \\leq i \\leq D$ decompose (the polynomial remainder of) $\\ell(z) c_i (z)$ in the basis $\\mathcal{C}$, producing a vector $v_i$ with $D$ entries. Then, cf.~section 2.4 of ref.~\\cite{UsingAlgebraicGeometry}, $(M_\\ell)_{ij} = (v_i)_j$. The eigenvalues of $M_\\ell$ are $(\\lambda_1, \\ldots, \\lambda_m) = \\big( \\ell(p_1), \\ldots, \\ell(p_m) \\big)$, and the multiplicity of the pole $p_i$ is the (algebraic) multiplicity $d_i$ of the eigenvalue $\\ell(p_i)$, \\begin{equation} \\det (\\lambda I - M_\\ell) \\hspace{0.8mm}=\\hspace{0.8mm} \\big(\\lambda - \\ell(p_1)\\big)^{d_1} \\cdots \\big(\\lambda - \\ell(p_m)\\big)^{d_m} \\,. \\end{equation} In practice, the largest pole multiplicity $d_\\mathrm{max} = \\mathrm{max} \\{d_1, \\ldots, d_m\\}$ is strictly greater than the smallest $\\delta$ satisfying eq.~\\eqref{eq:delta_definition}. As a result, in cases where the dimension of the quotient ring is large, the subsequent computation of the partition-of-unity polynomials in eq.~\\eqref{eq:partition-of-unity_polynomials} may prove time-consuming, even though the computation of $\\delta = d_\\mathrm{max}$ itself is typically faster. \\subsection{Evaluation of residues} With the construction of the canonical basis $\\mathcal{C} = \\{ c_1(z), \\ldots, c_D (z) \\}$ and of the corresponding dual basis $\\mathcal{D} = \\{ d_1(z), \\ldots, d_D (z) \\}$ of the quotient ring $Q$, along with the partition-of-unity polynomials $e_i (z)$, all ingredients are now in place to compute the residues of any given rational $n$-form, \\begin{equation} \\omega = \\frac{h(z) \\hspace{0.4mm} {\\rm d} z_1 \\wedge \\cdots \\wedge {\\rm d} z_n}{P_1 (z) \\cdots P_n (z)} \\,. \\label{eq:diff_form} \\end{equation} The key point is that the residue $\\mathop{\\mathrm{Res}}_I : Q \\to \\mathbb{C}$ defines a symmetric non-degenerate inner product on $Q$, \\begin{equation} \\langle h_1 \\,, h_2 \\rangle \\hspace{0.5mm}\\equiv\\hspace{0.5mm} \\mathop{\\mathrm{Res}}_I (h_1 h_2) \\,, \\end{equation} and that $\\mathcal{D}$ is dual to $\\mathcal{C}$ with respect to this inner product, \\begin{equation} \\mathop{\\mathrm{Res}}_I (c_a d_b) \\hspace{1mm}=\\hspace{1mm} \\delta_{a b} \\,, \\end{equation} cf.~ref.~\\cite{CattaniDickenstein}. Thus, if we decompose the numerator $h(z)$ of eq.~\\eqref{eq:diff_form} in the canonical basis, \\begin{equation} h(z) = \\lambda_1 c_1 (z) + \\cdots + \\lambda_D c_D (z) \\,, \\end{equation} and decompose the constant 1 in the dual basis, \\begin{equation} 1 = \\mu_1 d_1 (z) + \\cdots + \\mu_D d_D (z) \\,, \\end{equation} then we can compute the global residue (cf.~eq.~\\eqref{eq:global_residue_def}) of $\\omega$ wrt.~$I$ as the dot product of the coefficient vectors, \\begin{align} \\mathop{\\mathrm{Res}}_I \\omega \\hspace{0.7mm} &\\equiv \\hspace{0.7mm} \\mathop{\\mathrm{Res}}_I h(z) = \\mathop{\\mathrm{Res}}_I \\big( h(z) \\cdot 1 \\big) = \\mathop{\\mathrm{Res}}_I \\Big(\\sum_{a=1}^D \\lambda_a c_a \\sum_{b=1}^D \\mu_b d_b \\Big) \\\\ &= \\hspace{0.7mm} \\sum_{a,b=1}^D \\lambda_a \\mu_b \\hspace{0.6mm} \\mathop{\\mathrm{Res}}_I (c_a d_b) \\hspace{0.7mm}=\\hspace{0.7mm} \\sum_{a=1}^D \\lambda_a \\mu_a \\,. \\end{align} This prescription allows us to compute the global residue of $\\omega$ wrt.~$I$, i.e.~the sum of the residues at all poles in the associated variety $V = \\{ p_1, \\ldots, p_m\\}$. To compute the residue at any given pole $p_i$, we utilize the corresponding partition-of-unity polynomial $e_i$, \\begin{equation} \\mathop{\\mathrm{Res}}_{I, \\hspace{0.6mm} z=p_i} \\omega \\hspace{0.6mm}=\\hspace{0.6mm} \\mathop{\\mathrm{Res}}_I (\\omega e_i) \\,. \\end{equation} \\section{Example of residue computation}\\label{sec:example} In this section we aim to apply the theory explained in section~\\ref{sec:quotient_ring_duality} to an example. Thus, let us consider the differential form \\begin{equation} \\omega = \\frac{(z_1 - z_2) \\hspace{0.6mm} {\\rm d} z_1 \\wedge {\\rm d} z_2}{z_1^2 (\\chi z_1 + 1)^2 z_2^3 (z_2-1)} \\,, \\label{eq:diff_form_example} \\end{equation} where $\\chi$ is considered as a parameter. As $\\omega$ depends on $n=2$ variables, we must partition the denominator into two distinct factors, cf.~the discussion in section~\\ref{sec:General_theory}. We will consider the ideal \\begin{equation} I \\hspace{0.2mm}=\\hspace{0.2mm} \\langle P_1(z), P_2(z)\\rangle \\hspace{0.4mm}=\\hspace{0.4mm} \\big\\langle z_1^2 (z_2-1), \\hspace{1mm} (\\chi z_1 + 1)^2 z_2^3 \\big\\rangle \\,. \\label{eq:ideal_example} \\end{equation} This has the associated variety \\begin{equation} V = \\{ p_1, p_2 \\} = \\left\\{ (0,0), \\big({-}\\textstyle{\\frac{1}{\\chi}},1 \\big) \\right\\} \\,. \\label{eq:variety_example} \\end{equation} As $V$ is finite, $I$ is zero-dimensional, so that $\\omega$ has well-defined residues at the poles in $V$. \\subsection{Computation of canonical basis of $Q$} We choose as the monomial order $\\prec$ degree lexicographic order. The Gr{\\\"o}bner basis is found to be,\\footnote{As $I$ has parameters, the Gr{\\\"o}bner basis must be computed with the \\texttt{CoefficientDomain->RationalFunctions} option.} \\begin{equation} G = \\big\\{ z_1^2 z_2 - z_1^2, \\hspace{1.2mm} -2 \\chi^3 z_1^3 -3\\chi^2 z_1^2 + z_2^3, \\hspace{1.2mm} z_2^4 - z_2^3, \\hspace{1.2mm} 2\\chi z_1 z_2^3 + \\chi^2 z_1^2 + z_2^3 \\big\\} \\,. \\label{eq:Groebner_basis_example} \\end{equation} The leading terms of these elements are, \\begin{equation} \\mathrm{LT}(G) = \\big\\{ z_1^2 z_2, \\hspace{1.2mm} -2 \\chi ^3 z_1^3, \\hspace{1.2mm} z_2^4, \\hspace{1.2mm} 2\\chi z_1 z_2^3 \\big\\} \\,, \\end{equation} whose corresponding exponent vectors are \\begin{equation} \\big\\{ (2, 1), (3, 0), (0, 4), (1, 3) \\big\\} \\,. \\end{equation} From these exponent vectors we can now proceed to construct the set $E$ defined in eq.~\\eqref{eq:exponent_vectors_of_can_basis}. In the case at hand, the construction is made more transparent with the lattice illustration in fig.~\\ref{fig:canonical_basis}. \\begin{figure}[!h] \\begin{center} \\includegraphics[width=0.55\\textwidth]{CanonicalBasis.pdf} \\caption{The labeled lattice points are the exponent vectors of the leading term of each element of the Gr{\\\"o}bner basis $G$ in eq.~\\eqref{eq:Groebner_basis_example}. The lattice points indicated with white circles are the elements of the set $E$ defined in eq.~\\eqref{eq:exponent_vectors_of_can_basis}. These elements define exponent vectors of the canonical basis elements.} \\label{fig:canonical_basis} \\end{center} \\end{figure} Hence we find the following exponent vectors of the canonical basis elements, \\begin{equation} E = \\big\\{ (1,2), (0,3), (2,0), (1,1), (0,2), (1,0), (0,1), (0,0) \\big\\} \\,. \\end{equation} Thus, the canonical basis takes the following form, \\begin{equation} \\mathcal{C} = \\big( z_1 z_2^2, z_2^3, z_1^2, z_1 z_2, z_2^2, z_1, z_2, 1 \\big) \\,. \\label{eq:canonical_basis_example} \\end{equation} We remark that different choices of monomial order lead to different canonical bases (but of course with the same number of elements). For example, if we choose lexicographic monomial order, we find the following canonical basis, \\begin{equation} \\mathcal{C}_\\mathrm{lex} = \\big( z_1 z_2^3, z_1 z_2^2, z_1 z_2, z_1, z_2^3, z_2^2, z_2, 1 \\big) \\,. \\end{equation} \\subsection{Computation of dual basis of $Q$} To construct the dual basis of $Q$ wrt.~$\\mathcal{C}$, we start by computing the Bezoutian matrix of the ideal generators $P_i(z)$ in eq.~\\eqref{eq:ideal_example}. We find, cf.~eq.~\\eqref{eq:Bezoutian_matrix_definition}, \\begin{equation} \\mathrm{Bez} (z,y) =\\left( \\hspace{-1mm} \\begin{array}{cc} (y_1+z_1) (z_2-1) & y_1^2 \\\\[3mm] \\chi (\\chi (y_1+z_1)+2) z_2^3 & (\\chi y_1+1)^2 \\left(y_2^2+z_2 y_2+z_2^2\\right) \\end{array} \\hspace{-1mm} \\right) \\,. \\end{equation} The Bezoutian determinant is thus, \\begin{align} \\mathcal{B}(z,y) &= \\chi^2 y_1^3 \\left(y_2^2 (z_2-1)+y_2 (z_2-1) z_2-z_2^2\\right) \\nonumber \\\\ &\\hspace{4mm} +y_1 (z_2{-}1) \\left(y_2 z_2+y_2^2+z_2^2\\right) (2 \\chi z_1{+}1)+z_1 (z_2{-}1) \\left(y_2 z_2+y_2^2+z_2^2\\right) \\nonumber \\\\ &\\hspace{4mm} +\\chi y_1^2 \\left(y_2^2 (z_2-1)+y_2 (z_2-1) z_2-z_2^2\\right) (\\chi z_1+2) \\,. \\end{align} We now perform polynomial division of $\\mathcal{B}(z,y)$ with respect to the Gr{\\\"o}bner basis $G$, where the elements are taken as polynomials in the $z_i$ variables. This produces the following decomposition, cf.~eq.~\\eqref{eq:pol_div_of_Bez_wrt_z}, \\begin{align} (q_1, q_2, q_3, q_4) &= \\big( 0,0,0, \\textstyle{\\frac{1}{2\\chi}} + y_1 \\big) \\\\ \\mathcal{B}_Q(z,y) &= (2 \\chi +\\chi^2 y_1) \\Big[y_1^2 \\left(y_2^2 (z_2-1)+y_2 (z_2-1) z_2-z_2^2\\right) \\nonumber \\\\[-2mm] & \\hspace{28mm} +y_1 z_1 \\left(y_2^2 (z_2-1)+y_2 (z_2-1) z_2-z_2^2\\right)-z_1^2\\Big] \\nonumber \\\\ & \\hspace{4mm} +(y_1+z_1) \\left(y_2^2 (z_2-1)+y_2 (z_2-1) z_2-z_2^2\\right)-\\textstyle{\\frac{z_2^3}{2 \\chi}} +\\textstyle{\\frac{3}{2}} \\chi z_1^2 \\,. \\end{align} Next we perform polynomial division of the remainder $\\mathcal{B}_Q(z,y)$ with respect to $G$, where the elements are now taken as polynomials in the $y_i$ variables, $P_i(z) \\to P_i(y)$. This produces the decomposition in eq.~\\eqref{eq:pol_div_of_Bez_wrt_y} with \\begin{equation} (\\widehat{q}_1, \\widehat{q}_2, \\widehat{q}_3, \\widehat{q}_4) = \\Big( \\chi (z_2-1) (y_2+z_2+1) \\big(\\chi (y_1+z_1)+2 \\big), \\hspace{1.2mm} \\textstyle{\\frac{1}{2\\chi}}, \\hspace{0.6mm} 0, \\hspace{0.6mm} 0 \\Big) \\,, \\end{equation} where the remainder is $\\mathcal{B}_{Q \\otimes Q} (z,y) = c_1 (z) d_1 (y) + \\cdots + c_D (z) d_D (y)$, with the dual basis elements taking the following form, \\begin{align} \\mathcal{D} &= \\Big( (z_2{-}1) (2 \\chi z_1{+}1), \\hspace{1.5mm} -\\textstyle{\\frac{1}{2 \\chi}}, \\hspace{1.5mm} - \\chi^2 z_1{-}\\textstyle{\\frac{\\chi}{2}}, \\hspace{1.5mm} z_2 (z_2{-}1) (2 \\chi z_1 {+} 1), \\nonumber \\\\ & \\hspace{8mm} z_1 (z_2{-}1), \\hspace{1.5mm} -\\chi^2 z_1^2{-}2\\chi z_1 z_2^2{-}z_2^2, \\hspace{1.5mm} z_1 z_2 (z_2{-}1), \\hspace{1.5mm} - z_1 z_2^2 {-} \\textstyle{\\frac{1}{2 \\chi}} z_2^3 {-}\\textstyle{\\frac{\\chi}{2}} z_1^2 \\Big) \\,, \\label{eq:dual_basis_example} \\end{align} where we have expressed the elements as functions of the $z_i$ variables. \\subsection{Constructing partition-of-unity polynomials} To construct the partition-of-unity polynomials in eq.~\\eqref{eq:partition-of-unity_polynomials}, our first aim is to find a linear form which maps the elements $p_i$ of the variety \\eqref{eq:variety_example} to distinct values. We observe that the linear form \\begin{equation} \\ell (z_1, z_2) = z_1 + z_2 \\,, \\label{eq:linear_form_example} \\end{equation} has this property. From eq.~\\eqref{eq:Lagrangian_polynomials_generic_formula} we then obtain the following Lagrange polynomials, \\begin{equation} (L_1 (z), L_2 (z)) \\hspace{1mm}=\\hspace{1mm} \\left( \\frac{\\chi (z_1+z_2-1)+1}{1-\\chi}, \\hspace{1.5mm} \\frac{\\chi (z_1+z_2)}{\\chi-1} \\right) \\,, \\label{eq:Lagrange_polynomials_example} \\end{equation} and we observe that $L_i (p_j) = \\delta_{ij}$, as desired. Our next aim is to compute $\\delta$ as defined in eq.~\\eqref{eq:delta_definition}. To this end, we first compute $M$, defined in eq.~\\eqref{eq:ideal_of_variety} as the intersection of the ideals associated with each pole of the variety. In the case at hand, the ideals associated with each pole of the variety \\eqref{eq:variety_example} are \\begin{align} J\\langle \\{p_1\\}\\rangle &= \\langle z_1, z_2 \\rangle \\\\ J\\langle \\{p_2\\}\\rangle &= \\left\\langle z_1 + \\textstyle{\\frac{1}{\\chi}}, z_2 -1 \\right\\rangle \\,. \\end{align} Accordingly, we introduce the parameter $t$ and compute the Gr{\\\"o}bner basis of \\begin{equation} \\big\\langle t z_1, t z_2, (1-t) \\big(z_1 + \\textstyle{\\frac{1}{\\chi}} \\big), (1-t)(z_2 -1) \\big\\rangle \\end{equation} wrt.~lexicographic monomial order and the variable order $(t, z_1, z_2)$. We find $\\{ z_1+\\frac{z_2}{\\chi}, z_2^2-z_2, z_2 + t - 1 \\}$. The elements which do not contain the parameter $t$ then form a basis of $J\\langle \\{p_1\\}\\rangle \\cap J\\langle \\{p_2\\}\\rangle$, \\begin{equation} M = \\big\\langle z_1 + \\textstyle{\\frac{z_2}{\\chi}}, z_2^2-z_2 \\big\\rangle \\,. \\label{eq:ideal_of_M_example} \\end{equation} Now, to determine $\\delta$, we start by checking whether $M \\subseteq I$. Polynomial division of the elements of eq.~\\eqref{eq:ideal_of_M_example} wrt.~the Gr{\\\"o}bner basis of $I$ in eq.~\\eqref{eq:Groebner_basis_example} leaves remainders identical to the original elements. Thus, we proceed to consider $M^2$. Taking the products of the generators in eq.~\\eqref{eq:ideal_of_M_example} and performing polynomial division we find \\begin{equation} M^2 = \\big\\langle \\big( z_1 +\\textstyle{\\frac{z_2}{\\chi}} \\big)^2, \\hspace{1mm} (z_2^2-z_2) \\big(z_1 +\\textstyle{\\frac{z_2}{\\chi}} \\big), \\hspace{1mm} z_2^2-z_2^3 \\big\\rangle \\,. \\label{eq:ideal_of_M2_example} \\end{equation} As the remainders are non-zero, we proceed to consider $M^3$. Taking the products of the generators in eqs.~\\eqref{eq:ideal_of_M_example} and \\eqref{eq:ideal_of_M2_example} and performing polynomial division we find \\begin{align} M^3 &= \\Big\\langle \\textstyle{\\frac{3}{2}} \\left( \\textstyle{\\frac{z_2^3}{\\chi^3}}+\\textstyle{\\frac{2 z_1 z_2^2}{\\chi^2}}+\\textstyle{\\frac{z_1^2}{\\chi}}\\right), \\hspace{1.5mm} -\\textstyle{\\frac{z_2^3}{\\chi^2}}-\\textstyle{\\frac{2 z_1 z_2^2}{\\chi}}-z_1^2, \\hspace{1.5mm} -\\textstyle{\\frac{z_2^3}{\\chi^2}}-\\textstyle{\\frac{2 z_1 z_2^2}{\\chi}}-z_1^2, \\hspace{1.5mm} \\nonumber \\\\ & \\hspace{8.5mm} \\textstyle{\\frac{1}{2}} \\left(\\textstyle{\\frac{z_2^3}{\\chi}}+\\chi z_1^2+2 z_1 z_2^2\\right), \\hspace{1.5mm} \\textstyle{\\frac{1}{2}} \\left(\\textstyle{\\frac{z_2^3}{\\chi}}+\\chi z_1^2+2 z_1 z_2^2\\right), \\hspace{1.5mm} 0 \\Big\\rangle \\,. \\label{eq:ideal_of_M3_example} \\end{align} As the remainders are non-zero, we proceed to consider $M^4$. Taking the products of the generators in eqs.~\\eqref{eq:ideal_of_M_example} and \\eqref{eq:ideal_of_M3_example} and performing polynomial division we find \\begin{equation} M^4 = \\langle 0 \\rangle \\,. \\label{eq:ideal_of_M4_example} \\end{equation} Hence we conclude that $\\delta = 4$. Alternatively, we may use the maximum pole multiplicity as a value for $\\delta$. To this end we compute the matrix $M_\\ell$ of $P(z) \\mapsto \\ell(z) P(z)$ for the linear form in eq.~\\eqref{eq:linear_form_example}. Using the canonical basis $\\mathcal{C} = (c_1(z), \\ldots, c_8(z))$ in eq.~\\eqref{eq:canonical_basis_example}, we find \\begin{equation} M_\\ell \\hspace{0.8mm}=\\hspace{0.8mm} \\left( \\begin{array}{cccccccc} 0 & -\\frac{1}{2\\chi} & 1{-}\\frac{\\chi}{2} & 0 & 0 & 0 & 0 & 0 \\\\[1mm] 0 & 1{-}\\frac{1}{2\\chi} & -\\frac{\\chi}{2} & 0 & 0 & 0 & 0 & 0 \\\\[1mm] 0 & \\frac{1}{2\\chi^3} & 1{-}\\frac{3}{2\\chi} & 0 & 0 & 0 & 0 & 0 \\\\[1mm] 1 & 0 & 1 & 0 & 0 & 0 & 0 & 0 \\\\ 1 & 1 & 0 & 0 & 0 & 0 & 0 & 0 \\\\ 0 & 0 & 1 & 1 & 0 & 0 & 0 & 0 \\\\ 0 & 0 & 0 & 1 & 1 & 0 & 0 & 0 \\\\ 0 & 0 & 0 & 0 & 0 & 1 & 1 & 0 \\\\ \\end{array} \\right) \\,, \\end{equation} i.e., so that $\\ell(z) c_i (z) \\equiv \\sum_{j=1}^8 (M_\\ell)_{ij} c_j (z) \\mbox{ (mod $I$)}$. From this we find \\begin{equation} \\det (\\lambda I - M_\\ell) \\hspace{0.8mm}=\\hspace{0.8mm} \\big(\\lambda - \\ell(p_1)\\big)^6 \\big(\\lambda - \\ell(p_2)\\big)^2 \\,. \\label{eq:eigenvalues_of_M_l_example} \\end{equation} We conclude that the poles $p_1$ and $p_2$ have the multiplicities 6 and 2, respectively. In particular, $d_\\mathrm{max} = 6$. Plugging the value $\\delta=4$ from eq.~\\eqref{eq:ideal_of_M4_example} into eq.~\\eqref{eq:partition-of-unity_polynomials} with the Lagrange polynomials given in eq.~\\eqref{eq:Lagrange_polynomials_example} and performing polynomial division wrt.~$G$,% \\footnote{To calculate a desired power of a polynomial $L_i(z)^\\delta$ in the quotient ring $Q$, \\textsc{MultivariateResidues} performs polynomial division wrt.~$G$ after taking each product $L_i^k = L_i^{k-1} L_i$. This guarantees that each power computed in the intermediate stages has $D = \\mathrm{dim} \\hspace{0.7mm} Q$ terms rather than $D^k$ terms, thereby minimizing intermediate expression swell.} we find% \\footnote{The value $\\delta=d_\\mathrm{max}=6$ obtained from eq.~\\eqref{eq:eigenvalues_of_M_l_example} produces identical results for $e_1(z)$ and $e_2(z)$.} \\begin{equation} e_1(z) = 1 - z_2^3 \\hspace{6mm} \\mathrm{and} \\hspace{6mm} e_2(z) = z_2^3 \\,. \\label{eq:partition-of-unity_polynomials_example} \\end{equation} It is straightforward to check that these polynomials indeed have the properties stated in eqs.~\\eqref{eq:partition-of-unity_property_1}--\\eqref{eq:partition-of-unity_property_2}. Now, to compute the residues at each pole $p_i$ in the variety \\eqref{eq:variety_example}, we utilize the partition-of-unity polynomials computed in eq.~\\eqref{eq:partition-of-unity_polynomials_example} and consider the numerator of eq.~\\eqref{eq:diff_form_example}, i.e.~$h(z) = z_1 - z_2$, multiplied by these polynomials, \\begin{equation} \\begin{alignedat}{4} & h(z) e_1 (z) && = (z_1 - z_2) (1 - z_2^3) && \\hspace{1mm} \\equiv \\textstyle{\\frac{(2\\chi+1)}{2\\chi}} z_2^3 + \\textstyle{\\frac{\\chi}{2}} z_1^2 + z_1 - z_2 && \\hspace{6mm} \\mbox{(mod $I$)} \\,, \\\\ & h(z) e_2 (z) && = (z_1 - z_2) z_2^3 && \\hspace{1mm} \\equiv -\\textstyle{\\frac{2\\chi+1}{2\\chi}} z_2^3 -\\textstyle{\\frac{\\chi}{2}} z_1^2 && \\hspace{6mm} \\mbox{(mod $I$)} \\,. \\end{alignedat} \\end{equation} We proceed to decompose these in the canonical basis $\\mathcal{C}$ given in eq.~\\eqref{eq:canonical_basis_example}, finding the following coefficient vectors, \\begin{align} \\Lambda_1 &= \\big( 0, \\textstyle{\\frac{2\\chi+1}{2\\chi}}, \\frac{\\chi}{2},0,0,1,-1,0 \\big) \\,,\\\\ \\Lambda_2 &= \\big( 0, -\\textstyle{\\frac{2\\chi+1}{2\\chi}}, -\\frac{\\chi}{2},0,0,0,0,0 \\big) \\,, \\end{align} i.e., where $h(z) e_i (z) \\equiv \\Lambda_i \\cdot \\mathcal{C}$ (mod $I$). Moreover, the constant 1 may be composed in the dual basis $\\mathcal{D}$ in eq.~\\eqref{eq:dual_basis_example} as $1 = \\mu \\cdot \\mathcal{D}$ where, \\begin{equation} \\mu = (0, -2\\chi,0,0,0,0,0,0) \\,. \\end{equation} Thus we find for the residues, \\begin{equation} \\begin{alignedat}{4} & \\mathop{\\mathrm{Res}}_{I, \\hspace{0.6mm} z=p_1} \\omega && \\hspace{1mm}=\\hspace{1mm} \\Lambda_1 \\cdot \\mu && \\hspace{1mm}=\\hspace{1mm} -2 \\chi -1 \\,, \\\\ & \\mathop{\\mathrm{Res}}_{I, \\hspace{0.6mm} z=p_2} \\omega && \\hspace{1mm}=\\hspace{1mm} \\Lambda_2 \\cdot \\mu && \\hspace{1mm}=\\hspace{1mm} 2 \\chi +1 \\,. \\end{alignedat} \\end{equation} \\section{Global residue theorems}\\label{sec:global_residue_thm} In this section we discuss global residue theorems for multivariate meromorphic forms. In the univariate case it is well known that the sum of all residues, including that at infinity, equals zero, \\begin{equation} \\sum_{i=1}^m \\mathop{\\mathrm{Res}}_{z=p_i} \\varpi \\hspace{1mm}=\\hspace{1mm} 0 \\,, \\end{equation} where $\\{p_1, \\ldots, p_m\\} \\subset \\mathbb{CP}^1$ denote the poles of $\\varpi$. This property generalizes to the multivariate case, \\begin{align} \\omega = \\frac{h(z) \\hspace{0.4mm} {\\rm d} z_1\\wedge\\cdots\\wedge {\\rm d} z_n}{f_1(z)\\cdots f_n(z)}\\,, \\label{eq:diff_form_on_open_cover} \\end{align} where, however, one typically has several linear relations which relate the residues at finite locations to residues at infinity. The existence of these relations follows from the following theorem. \\clearpage \\begin{theorem}\\label{thm:global_residue_thm} (Global residue theorem). Let $\\omega$ denote a meromorphic $n$-form defined on a compact manifold $M$. Given an open covering $\\{ U_i \\}$, let $\\omega$ take the local form given in eq.~\\textup{(\\ref{eq:diff_form_on_open_cover})}. Furthermore, let $D_j = \\{ z \\in M : f_j (z) = 0\\}$ with $j=1,\\ldots, n$ denote the divisors of $\\omega$, and assume that $V = D_1 \\cap \\cdots \\cap D_n$ is a finite set. Then \\begin{equation} \\sum_{p \\in V} \\mathop{\\mathrm{Res}}_{p} \\omega \\hspace{1mm}=\\hspace{1mm} 0 \\,, \\label{eq:global_residue_thm} \\end{equation} where each $\\mathop{\\mathrm{Res}}_{p} \\omega$ is evaluated locally on a patch $U_i$ which contains $p$. \\end{theorem} For a proof we refer to section 5.1 of ref.~\\cite{GriffithsHarris}. As the global residue theorem applies to forms defined on compact manifolds, in order to apply it to an $n$-form defined on $\\mathbb{C}^n$, one must add a boundary at infinity. One convenient way to do so is to embed $\\mathbb{C}^n$ in complex projective space $\\mathbb{CP}^n$, which is compact. In the following we will show how to apply the global residue theorem for this choice of compactification. However, we emphasize that other compactifications exist, corresponding to alternative ways of adding a boundary at infinity, and will lead to different residue relations produced by the global residue theorem. We recall that $\\mathbb{CP}^n$ can be defined as the space of $(n+1)$-tuples of complex numbers $W = (w_0, \\ldots, w_n) \\in \\mathbb{C}^{n+1}\\setminus\\{0\\}$ where two elements are identified if they lie along the same line passing through the origin, $tW \\sim W$ for $t\\in \\mathbb{C}\\setminus\\{ 0 \\}$. That is, \\begin{equation} \\mathbb{CP}^n = \\{ (w_0,\\ldots,w_n) \\neq 0 \\} \\Big\/ \\{ tW \\sim W \\hspace{2mm} \\mathrm{where} \\hspace{2mm} t \\neq 0\\} \\,. \\end{equation} A covering of $\\mathbb{CP}^n$ is provided by the patches \\begin{equation} U_i = \\{ (w_0,\\ldots,w_n) \\hspace{0.8mm} : \\hspace{0.8mm} w_i = 1 \\} \\hspace{4mm} \\mathrm{where} \\hspace{4mm} i = 0, \\ldots, n \\,. \\label{eq:patches_on_CPn} \\end{equation} Here $\\mathbb{C}^n = \\{ (z_1,\\ldots,z_n) \\}$ can be identified with the patch $U_0$ by using the homogeneous coordinates, \\begin{equation} z_1 = \\frac{w_1}{w_0}\\,, \\hspace{3mm} \\ldots, \\hspace{3mm} z_n = \\frac{w_n}{w_0}\\,, \\label{eq:homogeneous_coords} \\end{equation} since on patch $U_0$ we have $w_0 = 1$. Thus, $\\mathbb{C}^n \\subset \\mathbb{CP}^n$. Points with $w_0 = 0$ are referred to as \\emph{points at infinity}. For the Riemann sphere $\\mathbb{CP}^1$, the patches $U_0$ and $U_1$ are the Riemann sphere with respectively the point at infinity $(0,1)$, and the origin $(1,0)$, removed. To define the differential form in eq.~(\\ref{eq:diff_form_on_open_cover}) on each of the patches $U_k$ in eq.~(\\ref{eq:patches_on_CPn}) we must find the Jacobian from the coordinates $(z_1, \\ldots, z_n)$ to $(w_0, \\ldots, w_{k-1}, w_{k+1}, \\ldots, w_n)$. Using the homogeneous coordinates in eq.~(\\ref{eq:homogeneous_coords}), it is straightforward to show that \\begin{equation} \\mathop{\\mathrm{det}}_{\\substack{i\\in \\{1,\\ldots,n\\} \\phantom{\\setminus\\{ k \\}} \\\\ j \\in \\{ 0, \\ldots, n\\}\\setminus\\{ k \\} }} \\frac{\\partial z_i}{\\partial w_j} \\hspace{2mm}=\\hspace{2mm} \\frac{(-1)^k}{w_0^{n+1}} \\,. \\end{equation} Letting $\\widehat{{\\rm d} w_k}$ denote that the respective differential has been dropped, we therefore find that $\\omega$ evaluated on the patch $U_k$ takes the form, \\begin{align} \\omega \\big|_{U_k} \\hspace{1mm}=\\hspace{1mm} \\frac{(-1)^k \\hspace{0.3mm} h\\big(\\textstyle{\\frac{w}{w_0}}\\big) \\hspace{0.4mm} {\\rm d} w_0\\wedge\\cdots\\wedge \\widehat{{\\rm d} w_k} \\wedge\\cdots\\wedge {\\rm d} w_n} {w_0^{n+1} f_1\\big(\\textstyle{\\frac{w}{w_0}}\\big)\\cdots f_n\\big(\\textstyle{\\frac{w}{w_0}}\\big)}\\,. \\end{align} To apply the global residue theorem, we must then consider each partition of the factors contained in the set $\\{w_0^{n+1}, f_1\\big(\\textstyle{\\frac{w}{w_0}}\\big),$ $\\ldots, f_n\\big(\\textstyle{\\frac{w}{w_0}}\\big)\\}$ into $n$ divisors. Each partition gives rise to a linear relation, as we will see in the following example. \\subsection{Example: application of the global residue theorem}\\label{sec:GRT_example} To illustrate how the global residue theorem (theorem~\\ref{thm:global_residue_thm}) yields linear relations between the residues of a meromorphic form, we consider as an example the form $\\omega$ given in eq.~(\\ref{eq:degenerate_diff_form}). Expressed in terms of the homogeneous coordinates (\\ref{eq:homogeneous_coords}), $\\omega$ takes the following form on patch $U_k$, \\begin{align} \\omega \\big|_{U_k} \\hspace{1mm}=\\hspace{1mm} \\frac{(-1)^k \\hspace{0.4mm} w_1 \\hspace{0.6mm} {\\rm d} w_0 \\wedge \\cdots \\wedge \\widehat{{\\rm d} w_k} \\wedge \\cdots \\wedge {\\rm d} w_2} {w_0 w_2 (a_1 w_1 + a_2 w_2)(b_1 w_1 + b_2 w_2)} \\,. \\end{align} In this case there are seven distinct partitions of the four denominator factors. Let us consider the following partition, \\begin{equation} f_1(w) = w_0 w_2 \\,, \\hspace{4mm} f_2(w) = (a_1 w_1 + a_2 w_2)(b_1 w_1 + b_2 w_2) \\,, \\end{equation} giving rise to the divisors $D_i = \\{(w_0, w_1, w_2) \\hspace{0.3mm} : \\hspace{0.3mm} f_i(w) = 0\\}$. We find that the intersection of the divisors is a finite set, \\begin{equation} V = D_1 \\cap D_2 = (p_1, p_2, p_3) = \\Big( (1,0,0), \\big(0,1,-\\textstyle{\\frac{a_1}{a_2}}\\big), \\big(0,1,-\\textstyle{\\frac{b_1}{b_2}}\\big)\\Big) \\,, \\end{equation} and hence the global residue theorem applies. Noting that $p_1 \\in U_0$ and $p_{2,3} \\in U_1$, we can evaluate the residues on these respective patches, dropping the constant $w_0$ and $w_1$ entries, respectively. For the left-hand side of eq.~(\\ref{eq:global_residue_thm}) we then find, \\begin{align} \\sum_{p \\in V} \\mathop{\\mathrm{Res}}_{p} \\omega &= \\mathop{\\mathrm{Res}}_{I_0; \\hspace{0.3mm} p_1} \\frac{w_1 \\hspace{0.6mm} {\\rm d} w_1\\wedge {\\rm d} w_2} {w_2 (a_1 w_1 {+} a_2 w_2)(b_1 w_1 {+} b_2 w_2)} + \\mathop{\\mathrm{Res}}_{I_1; \\hspace{0.3mm} p_2} \\frac{(-1) \\hspace{0.6mm} {\\rm d} w_0\\wedge {\\rm d} w_2}{w_0 w_2 (a_1 {+} a_2 w_2)(b_1 {+} b_2 w_2)} \\nonumber \\\\ & \\hspace{5mm} + \\mathop{\\mathrm{Res}}_{I_1; \\hspace{0.3mm} p_3} \\frac{(-1) \\hspace{0.6mm} {\\rm d} w_0\\wedge {\\rm d} w_2}{w_0 w_2 (a_1 {+} a_2 w_2)(b_1 {+} b_2 w_2)} \\,, \\end{align} where the residues are computed with respect to the ideals $I_j \\equiv \\big\\langle f_1(w), f_2(w) \\big\\rangle\\big|_{w_j = 1}$ for $j = 0,1$. Explicitly, we find \\begin{align} \\sum_{p \\in V} \\mathop{\\mathrm{Res}}_{p} \\omega \\hspace{1mm}=\\hspace{1mm} -\\frac{1}{a_1 b_1} - \\frac{a_2}{a_1 (a_1 b_2 - a_2 b_1)} - \\frac{b_2}{b_1 (a_2 b_1 - a_1 b_2)} \\hspace{1mm}=\\hspace{1mm} 0 \\,, \\end{align} in agreement with eq.~(\\ref{eq:global_residue_thm}). Analogously, for the partition \\begin{equation} f_1(w) = w_0 (a_1 w_1 + a_2 w_2) \\,, \\hspace{4mm} f_2(w) = w_2 (b_1 w_1 + b_2 w_2) \\,, \\end{equation} we have \\begin{equation} V = \\Big( (1,0,0), \\big(0,1,0\\big), \\big(0,1,-\\textstyle{\\frac{b_1}{b_2}}\\big)\\Big) \\,, \\end{equation} and obtain the residue relation, \\begin{align} \\sum_{p \\in V} \\mathop{\\mathrm{Res}}_{p} \\omega \\hspace{1mm}=\\hspace{1mm} - \\frac{a_2}{a_1 (a_1 b_2 - a_2 b_1)} -\\frac{1}{a_1 b_1} - \\frac{b_2}{b_1 (a_2 b_1 - a_1 b_2)} \\hspace{1mm}=\\hspace{1mm} 0 \\,, \\end{align} again in agreement with eq.~(\\ref{eq:global_residue_thm}). The global residue theorems associated with the remaining five partitions of the denominator factors of $\\omega$ are computed analogously. \\section{Applications of multivariate residues}\\label{sec:applications} In this section we give one application of multivariate residues, namely the computation of generalized-unitarity cuts. These are important in several contexts, for example unitarity calculations of loop amplitudes and the Grassmannian formulation of the S-matrix by Arkani-Hamed et al. First we focus on unitarity calculations. To provide some context, let us consider a one-loop scattering amplitude in a generic gauge theory. From standard reduction techniques it can be shown that there is a finite basis of one-loop integrals in which the amplitude can be expanded, \\begin{equation} A^{(1)}_n = \\sum_{\\mathrm{boxes}} c_\\Box I_\\Box + \\sum_{\\mathrm{triangles}} c_\\triangle I_\\triangle + \\sum_{\\mathrm{bubbles}} c_\\circ I_\\circ + \\sum_{\\mathrm{tadpoles}} c_\\multimap I_\\multimap + \\mbox{rational terms}\\,, \\label{eq:one-loop_basis_decomposition} \\end{equation} where $I_\\Box, I_\\triangle, I_\\circ$ and $I_\\multimap$ represent box, triangle, bubble and tadpole integrals, respectively. As all these integrals are known \\cite{Bern:1994cg}, this decomposition reduces the computation of $A^{(1)}_n$ to the computation of the expansion coefficients. The coefficient $c_\\Box$ of the box integral \\begin{equation} I_\\Box = \\int_{\\mathbb{R}^D} \\frac{{\\rm d}^D \\ell}{(2\\pi)^D} \\frac{1}{\\prod_{i=1}^4 p_i^2 (\\ell)} \\,, \\end{equation} can now be computed by replacing the integration contour $\\mathbb{R}^D$ in eq.~\\eqref{eq:one-loop_basis_decomposition} by the contour \\begin{equation} T^4_\\epsilon = \\{ \\ell \\in \\mathbb{C}^4 : |p^2_i(\\ell)|=\\epsilon_i, \\hspace{2.5mm} i=1,\\ldots, 4 \\} \\, . \\label{eq:quad_cut_torus_formal} \\end{equation} The replacement of contour $\\mathbb{R}^D \\to T^4_\\epsilon$ has the effect of computing the residue at the poles where all four propagators $p_i^2(\\ell)$ of $I_\\Box$ go on shell. All terms missing any one of the propagators therefore vanish, and eq.~\\eqref{eq:one-loop_basis_decomposition} becomes~\\cite{Britto:2004nc} \\begin{equation} c_\\Box = \\frac{1}{2} \\sum_{a\\in \\{ L,L^\\bullet\\}} \\sum_{{\\mathrm{helicities,}\\atop \\mathrm{species}}} \\prod_{i=1}^4 \\hspace{0.4mm} A^\\mathrm{tree}_i \\big(p_i (a), p_{i+1} (a) \\big) \\,, \\label{eq:BCF_box_formula} \\end{equation} where $L,L^\\bullet$ denote the solutions to $p_i^2(\\ell)=0$ for $i=1,\\ldots,4$, and $A^\\mathrm{tree}_i$ are the tree amplitudes arising from literally cutting the propagators of the box graph. More to the point, though the integral $\\int_{T^4_\\epsilon} \\frac{{\\rm d}^D \\ell}{(2\\pi)^D} \\frac{1}{\\prod_{i=1}^4 p_i^2 (\\ell)}$ is a multivariate residue, it is non-degenerate and can thus be computed directly from eq.~\\eqref{eq:residue_from_Jacobian}. However, starting at two loops, degenerate residues are generic, and the algorithms explained in sections~\\ref{sec:residues_from_transformation_formula}~and~\\ref{sec:quotient_ring_duality} become necessary to evaluate them. To give an explicit example, we consider the generalized-unitarity cut shown in figure~\\ref{fig:cut_slashed_box}. \\begin{figure}[!h] \\begin{center} \\includegraphics[width=0.4\\textwidth]{CutSlashedBox.pdf} \\caption{(Color online.) A generalized-unitarity cut where the propagators with superimposed red lines have been put on shell. The gray blobs represent tree amplitudes.} \\label{fig:cut_slashed_box} \\end{center} \\end{figure} It turns out that the five on-shell constraints can be integrated out as a non-degenerate residue. However, the residues of the resulting integrand in the remaining $2 \\times 4 - 5 = 3$ variables will generically be degenerate: for example, the residue with respect to the ideal $I$ (where $\\chi$ denotes the ratio $t\/s$ of Mandelstam invariants), \\begin{equation} I = \\langle z_1^2, \\hspace{0.7mm} z_2, \\hspace{0.7mm} -\\chi z_1+\\chi z_3 z_1+z_3 z_1+z_2 z_3-z_3 \\rangle \\,, \\end{equation} at $(z_1,z_2,z_3)= (0,0,0)$ is degenerate, and the algorithms explained in sections~\\ref{sec:residues_from_transformation_formula}~and~\\ref{sec:quotient_ring_duality} are required to compute the residue. We remark that multivariate residues also play an important role in elimination theory in the context of solving systems of multivariate polynomial equations \\cite{CattaniDickenstein}. \\section{Manual}\\label{sec:manual} The package MultivariateResidues.m can be obtained from ref.~\\cite{webpage}. At the beginning of a Mathematica session, the package can be loaded with \\begin{CodeSample} SetDirectory[NotebookDirectory[]]; << \"MultivariateResidues`\" \\end{CodeSample} where it is assumed that the package and the notebook are located in the same directory. The newly available definitions can be shown by running \\begin{CodeSample} ?MultivariateResidues`* \\end{CodeSample} The package defines one new function, called \\Math{MultivariateResidue}. Below we give a brief introduction to this function and its options. \\subsection{New functions} \\label{sec:newfunction} The function \\Math{MultivariateResidue} computes a multivariate residue, based on the algorithms described in this paper. It has the following syntax: \\begin{CodeSample} MultivariateResidue[Num, {d[1],..., d[n]}, {z[1] -> z[1,1], ..., z[n] -> z[n,1]}] \\end{CodeSample} which returns the multivariate residue of $\\mathrm{Num} \/ (d_1\\,d_2 \\dotsm d_n)$ at the location given by $(z_1,\\dotsc,z_n) = (z_1^{(1)},\\dotsc,z_n^{(1)})$. Alternatively, \\begin{CodeSample} MultivariateResidue[Num, {d[1],..., d[n]}, {z[1],...,z[n]}, {{z[1,1], ..., z[n,1]}, {z[1,2], ..., z[n,2]}, ...}] \\end{CodeSample} returns a list of multivariate residues of $\\mathrm{Num} \/ (d_1\\,d_2 \\dotsm d_n)$ at the collection of points $(z_1,\\dotsc,z_n) \\in \\{ (z_1^{(1)},\\dotsc,z_n^{(1)}), (z_1^{(2)},\\dotsc,z_n^{(2)}), \\dotsc \\}$. This second syntax is better suited for the computation of several residues, because it exploits the fact that part of the computation is common to all poles. In the univariate case, \\Math{MultivariateResidue} is equivalent to the native Mathematica function \\Math{Residue}. For instance, \\begin{CodeSample} MultivariateResidue[f[z], {z}, {z -> 0}] Residue[f[z]\/z, {z, 0}] Out: f[0] Out: f[0] \\end{CodeSample} As a multivariate example, let us compute the residues considered in section \\ref{sec:residues_from_transformation_formula}. Taking $\\varphi_1, \\varphi_2, \\varphi_3$ from eq.~\\eqref{eq:denominator_factors_example}, we can straightforwardly compute the residues with respect to the ideals given in eq.~\\eqref{eq:denominator_partitionings_example} as follows: \\begin{CodeSample} f[1] = z[2]; f[2] = a[1] z[1] + a[2] z[2]; f[3] = b[1] z[1] + b[2] z[2]; MultivariateResidue[z[1], {f[1], f[2]*f[3]}, {z[1] -> 0, z[2] -> 0}] MultivariateResidue[z[1], {f[2], f[3]*f[1]}, {z[1] -> 0, z[2] -> 0}] MultivariateResidue[z[1], {f[3], f[1]*f[2]}, {z[1] -> 0, z[2] -> 0}] Out: -(1\/(a[1] b[1])) Out: -(a[2]\/(a[1] (-a[2] b[1] + a[1] b[2]))) Out: -(b[2]\/(b[1] (a[2] b[1] - a[1] b[2]))) \\end{CodeSample} When using the second syntax, the input list of poles does not have to contain all points in the variety defined by the ideal (i.e., the set of points where all denominator factors vanish). Moreover, it may contain additional points (although the corresponding residues will be zero). As an example, consider the following ideal, \\begin{CodeSample} Ideal = {z[1]^2 (1 + z[1] - z[2]), z[3]^3, z[2]^3 (-1 - z[1] - a z[1] + z[2] + a z[1] z[3])}; Parameters = {a}; Vars = {z[1], z[2], z[3]}; \\end{CodeSample} The resulting variety contains three points, \\begin{CodeSample} Variety = Map[Last, Sort[Solve[Ideal == 0, Vars]], {2}] Out: {{-1, 0, 0}, {0, 0, 0}, {0, 1, 0}} \\end{CodeSample} We may ask for the residue computed at precisely the poles contained in the variety, or alternatively a subset, or alternatively a subset with an added random point, \\begin{CodeSample} MultivariateResidue[1, Ideal, Vars, Variety] MultivariateResidue[1, Ideal, Vars, Variety[[1 ;; 2]]] MultivariateResidue[1, Ideal, Vars, Join[Variety[[1 ;; 2]], {{0, 0, 1}}]] Out: {-(6\/a), 0, 6\/a} Out: {-(6\/a), 0} Out: {-(6\/a), 0, 0} \\end{CodeSample} In fact, the algorithm based on the dual structure of the quotient ring requires the computation of the residues of all poles in the variety. This particular algorithm will therefore internally compute the variety itself and return the residues at the (sub)set of poles that are specified by the user. When using the method \\Math{\"QuotientRingDuality\"} one may also specify \\Math{Variety = \\{GlobalResidue\\}}. In this case the program returns the global residue (\\ref{eq:global_residue_def}), which equals the sum of all local residues. The benefit is that the global residue can be calculated directly without determining the partition-of-unity polynomials $e_i$ in eq.~(\\ref{eq:partition-of-unity_property_2}) required to compute the local residues. \\textsc{MultivariateResidues} contains an implementation of the global residue theorem discussed in section~\\ref{sec:global_residue_thm}, choosing to extend the input differential form $\\omega$ to complex projective space $\\mathbb{CP}^n$. The syntax is \\begin{CodeSample} GlobalResidueTheoremCPn[Num, Ideal, Vars] \\end{CodeSample} where \\Math{Num} denotes the numerator of $\\omega$, \\Math{Ideal} the denominator factors and \\Math{Vars} the variables. As an example, let us consider the differential form in section~\\ref{sec:GRT_example}, \\begin{CodeSample} Num=z[1]; Ideal={z[2] (a[1] z[1] + a[2] z[2]), (b[1] z[1] + b[2] z[2])}; Vars={z[1], z[2]}; GRTs=GlobalResidueTheoremCPn[Num, Ideal, Vars]; \\end{CodeSample} There are seven linear relations that arise from the global residue theorem, \\begin{CodeSample} Length[GRTs] Out: 7 \\end{CodeSample} The relations are recorded in the form $\\{ P, \\{ V, R \\} \\}$, where $P$ denotes the denominator partition, $V$ the set of poles involved in the relation and $R$ their respective residues. For the denominator partition computed in detail in section~\\ref{sec:GRT_example} we have \\begin{CodeSample} GRTs[[2]] Out: {{w[0] w[2], (a[1] w[1] + a[2] w[2]) (b[1] w[1] + b[2] w[2])}, {{{1, 0, 0}, {0, 1, -(a[1]\/a[2])}, {0, 1, -(b[1]\/b[2])}}, {-(1\/(a[1] b[1])), -(a[2]\/(a[1] (-a[2] b[1] + a[1] b[2]))), -(b[2]\/(b[1] (a[2] b[1] - a[1] b[2])))}}} \\end{CodeSample} It is easy to check that the residues indeed sum to zero, \\begin{CodeSample} Simplify[Total[GRTs[[2, -1, -1]]]] Out: 0 \\end{CodeSample} \\Math{GlobalResidueTheoremCPn} only records non-vanishing residues and their respective poles. In cases where all"} +{"id":"RedPajamaArXiv.0004","text":"\\section{Introduction} Complex networks is a new emerging branch of random graph theory. For a long time random graphs have been mainly studied by pure mathematics but recently due to the availability of empirical data on real-world networks they have attracted the attention of physics and natural sciences (see for review \\cite{ref:ab,ref:dm,ref:n1}). Methods of statistical physics, both empirical and theoretical, have thus begun to play an important role in this research area. The empirical observations of real-networks has had a feedback on theoretical development which now concentrated on the understanding of the observed features. For example fat tails in node degree distribution, small world effect, degree-degree correlations, or high clustering. Two complementary approaches have been developed: diachronic, known as growing networks \\cite{ref:ab,ref:dm,ref:n1}, and synchronic being a sort of statistical mechanics of networks \\cite{ref:bck,ref:bl1,ref:dms, ref:bjk1,ref:fdpv,ref:pn1}. We will discuss here the latter. This approach is a natural extension of Erd\\\"os and R\\'enyi ideas \\cite{ref:er,ref:bb}. It is well suited both for growing (causal) networks for which nodes' labels reflect the causal order of nodes' attachment to the network \\cite{ref:kr,ref:bbjk} and for homogeneous networks for which nodes' labels can be permuted freely in an arbitrary way. Here we shall discuss mainly homogeneous networks. We shall shortly comment on causal networks towards the end of the paper. The main aim of the paper is to present a consistent picture of statistical mechanics of networks. Some ideas have already been introduced earlier. They are scattered in many papers and discussed in many different contexts. We put them together, add some new material and introduce a guideline to obtain a self-contained introduction to statistical mechanics of complex networks. The basic concept in the statistical formulation is statistical ensemble. Statistical ensemble of networks is defined by ascribing a statistical weight to every graph in the given set \\cite{ref:bck,ref:bjk1}. Physical quantities are measured as weighted averages over all graphs in the ensemble. The probability of the occurrence of a graph in random sampling is proportional to its statistical weight. If the statistical weight changes then also the probability of occurrence of randomly sampled graphs will change and in effect different random graphs will be observed. The concept of statistical weight is crucial, since it defines randomness in the system. Statistical weight is built out of two ingredients: configuration space weight and functional weight. The configuration space weight is proportional to the uniform probability measure on the configuration space which tells us how to uniformly choose graphs in the configuration space. To illustrate the meaning of the uniform measure consider an ensemble of Erd\\\"os-R\\'enyi graphs with $N$ nodes and $L$ links \\cite{ref:er,ref:bb}. The configuration space consists of $\\binom{\\binom{N}{2}}{L}$ graphs with labeled nodes. All those graphs are equiprobable, and therefore the configuration space weight is the same for each graph. It is convenient to choose this weight to be $1\/N!$ since then it can be interpreted as a factor which takes care of $N!$ possible permutations of nodes' labels. This factor has the same origin as the corresponding factor in quantum mechanics for indistinguishable particles and it is constant for all graphs in a finite $N$-ensemble. We can calculate the entropy of random graphs as \\begin{equation} S = \\ln \\frac{1}{N!} \\binom{\\binom{N}{2}}{L} . \\label{S0} \\end{equation} In the limit of large sparse graphs: $N \\rightarrow \\infty$ and $\\frac{2L}{N} = \\alpha = \\mbox{const}>2$, the entropy is an over-extensive function of the system size: \\begin{equation} S = \\frac{\\alpha - 2}{2} N \\ln N + \\dots , \\label{S1} \\end{equation} unlike in standard thermodynamics. Let us move to weighted graphs. The idea is to modify the Erd\\\"os-R\\'enyi ensemble by introducing a functional weight which explicitly depends on graph's topology. For example, if we choose the functional weight to be a function of the number of loops on the graph, we can suppress of favor loops of typical graphs in the ensemble. In a similar way we can choose statistical weights to control the node degree distribution to produce homogeneous scale-free graphs \\cite{ref:bk} or to introduce correlations between degrees of neighboring nodes \\cite{ref:b,ref:n3,ref:bp,ref:d2}. Classical thermodynamics describes systems in equilibrium for which the functional weight is given by the Gibbs measure: $\\sim \\exp (-\\beta E)$, where $E$ is the energy of the system. When discussing complex networks it is convenient to abandon the concept of energy and Gibbs measure and consider a more general form of statistical weights because many networks are not in equilibrium. Indeed, many networks emerging as a result of a dynamical process like growth are far from equilibrium \\cite{ref:ab,ref:dm,ref:n1}. It does not mean though that one cannot introduce a statistical ensemble of growing networks. On the contrary, one can for example consider an ensemble of networks which result of many independent repetitions of the growth process terminated when the network reaches a certain size. Such a collection of networks does not describe a thermodynamic equilibrium. The functional weight can be deduced from the parameters of the growth process but of course it has nothing to do with the Gibbs measure. In fact, many real-world networks result from a combination of a growth process and some thermalization processes. For example, the Internet grows but at the same time it continuously rearranges. The latter process introduces a sort of thermalization. Today the growth has probably still larger influence on the topology of the underlying network but in the future the growth may slow down due to saturation and then equilibration processes resulting from continuous rewirings will take over. Similarly all evolutionary networks emerge from a growth mixed with a sort of thermalization related to the continuous network rearrangement. Therefore it is convenient to have a formalism which can extrapolate between the two regimes in a flexible way. The approach which we propose here is capable of modeling functional properties of networks by choosing an appropriate functional weight. Let us return to the configuration space weight. As we mentioned this weight is equivalent to the uniform probability measure on the configuration space for which all graphs are equiprobable. It is a very crucial part of the construction of the ensemble to carefully specify what one means by equiprobable graphs. Consider first graphs with $N$ nodes. There are at least two natural candidates for the uniform measure in such a set of graphs. Since one is interested in shape (topology) of graphs one can define all shapes to be equiprobable. Alternatively one can introduce labels for nodes of each graph to obtain a set of labeled graphs and then one can define all labeled graphs to be equiprobable. The two definitions give two different probability measures since the number of ways in which one can label graph nodes depends on graph's topology and thus the probability of occurrence of a given graph will depend on its topology too. It turns out that the latter definition is more natural. As we have seen above this definition leads to Erd\\\"os-R\\'enyi graphs. So we stick to this definition and from here on we shall ascribe to each labeled graph the configuration space weight $1\/N!$ which is constant in the set of graphs of size $N$. The situation is more complex if one considers pseudographs that is graphs which have multiple connections (more than one link between two nodes) or self-connections (a link having the same node at its endpoints). In this case one can also label links and ascribe the same statistical weight to each fully labeled graph. For this choice the statistical weight of each graph is equal to the symmetry factor of Feynman diagrams generated in the Gaussian perturbation field theory \\cite{ref:bck}. The paper is organized as follows. In the next section we will recall some basic definitions. Then we will discuss Erd\\\"os-R\\'enyi graphs in the context of constructing statistical ensemble and later we will generalize the construction to weighted homogeneous graphs. After this we will describe Monte-Carlo algorithms to generate graphs for canonical, grand-canonical and micro-canonical ensembles and discuss their representation in terms of adjacency matrices. A section will be devoted to pseudographs. In the last section we will shorty summarize the paper. \\section{Definitions} Let us first introduce some terminology. Graph is a set of $N$ nodes (vertices) connected by $L$ edges (links). A graph need not be connected. It may have many disconnected components including empty nodes (without any link). If a graph has no multiple or self-connected links we shall call it simple graph or graph. An example is illustrated in Fig. \\ref{fig:ex0}. Later we shall also discuss graphs with multiple- and self-connections. To distinguish them from simple graphs we shall call them degenerate graphs or pseudographs. \\begin{figure}[ht] \\psfrag{1}{$1$} \\psfrag{2}{$2$} \\psfrag{3}{$3$} \\psfrag{4}{$4$} \\psfrag{5}{$5$}\\psfrag{6}{$6$} \\includegraphics[width=2.5cm]{mayer_ex.eps} \\caption{An example of simple graph with $N=6,L=5$. Vertices without links (like no. 2) are allowed. Each vertex can have at most $N\\!-\\!1$ links. Positions of vertices in the picture are meaningless. The only information which matters is connectivity.} \\label{fig:ex0} \\end{figure} One can consider directed or undirected graphs. Directed graphs are built of directed links while undirected of undirected ones. In this paper we shall discuss undirected graphs but the discussion can easily be generalized to directed ones as well. Sometimes we will find it convenient to represent an undirected link as two oriented links going in opposite directions. A simple graph can be represented by its adjacency matrix which is an $N\\times N$ matrix whose entries $A_{ij}$ are equal one if there is a link between vertices $i,j$ or zero otherwise. Since self-connections are forbidden we have $A_{ii}=0$ on the diagonal. The adjacency matrix of an undirected graph is also symmetric because if there is a link $i\\rightarrow j$ ($A_{ij}=1$), there must be also the opposite one $j\\rightarrow i$ ($A_{ji}=1$). In this paper we want to construct statistical ensembles of homogeneous graphs having desired properties. We discuss three types of ensembles: ensemble of graphs with a fixed number of nodes $N$ and varying number of links, ensemble with a fixed number of nodes $N$ and a fixed number of links $L$, and finally ensemble of graphs with a given node degree sequence $\\{q_1,q_2,\\dots, q_N\\}$, which we shall call grand-canonical, canonical and micro-canonical ensembles, respectively. There are of course many other possibilities like for instance ensembles with varying number of nodes, or with a fixed number of loops etc, but the three mentioned above are encountered most frequently. To construct a statistical ensemble, for the chosen set of graphs, we have to specify statistical weight for each graph in the considered set. In the next section using the Erd\\\"os-R\\'{e}nyi graphs and binomial graphs we will deduce a general logical structure standing behind the construction of ensembles of homogeneous graphs and then we will use this structure to introduce ensembles with an arbitrary functional weight which explicitly depends on the node degrees. \\section{Statistical ensemble for Erd\\\"os-R\\'{e}nyi random graphs} For simplicity, we start from a well-known model of Erd\\\"os-R\\'{e}nyi's graphs \\cite{ref:er,ref:bb}. In this classical model one considers simple graphs with $N$ labeled nodes and $L$ links \\footnote{For simple graphs it is immaterial to label links since each link is uniquely determined by its end points.} chosen at random out of all $\\binom{N}{2}$ possibilities. All possibilities are equiprobable and so are the corresponding graphs -- understood as graphs whose vertices are labeled. Usually one is interested in unlabeled graphs that is in their shape or topology and not in their labeled version. To explain what is meant by graph's shape or topology, let us consider a simple graph shown in the upper part of Fig. \\ref{fig:shape}. Unlabeled graph (topology) on the left hand side of the figure is represented as labeled graphs on the right hand side. \\begin{figure}[h] \\includegraphics[width=10cm]{shape.eps} \\caption{Top: the graph on the left can be realized as three different labeled graphs. A is equivalent to B, C to D and E to F. They are equivalent because they have the same adjacency matrix. Bottom: triangle-shaped graph has only one realization as labeled graph.} \\label{fig:shape} \\end{figure} There are six possible realizations, but only three of them: A, C, E are distinct. B is the same as A since it can be obtained from A by a continuous deformation: one can continuously move the vertex $2$, together with the link attached to it, to the position of the vertex $3$, and at the same time the vertex $3$ to the position of the vertex $2$. Such a continuous deformation does not change graph's connectivity. The same holds for pairs: C, D and E, F. This can also be seen if we take into account the adjacency matrix $\\mathbf{A}$. Both A and B have identical adjacency matrices which are different from those for C, D and E, F: \\begin{equation} \\mathbf{A}_{\\mbox{\\scriptsize A}} = \\mathbf{A}_{\\mbox{\\scriptsize B}} = \\left( \\begin{array}{ccc} 0 & 1 & 1 \\\\ 1 & 0 & 0 \\\\ 1 & 0 & 0 \\end{array} \\right), \\quad \\mathbf{A}_{\\mbox{\\scriptsize C}} = \\mathbf{A}_{\\mbox{\\scriptsize D}} = \\left( \\begin{array}{ccc} 0 & 1 & 0 \\\\ 1 & 0 & 1 \\\\ 0 & 1 & 0 \\end{array} \\right), \\quad \\mathbf{A}_{\\mbox{\\scriptsize E}} = \\mathbf{A}_{\\mbox{\\scriptsize F}} = \\left( \\begin{array}{ccc} 0 & 0 & 1 \\\\ 0 & 0 & 1 \\\\ 1 & 1 & 0 \\end{array} \\right) \\ . \\end{equation} Now we remove labels from all graphs in Fig. \\ref{fig:shape} to obtain two unlabeled graphs depicted on the left hand side. Although there are three distinct adjacency matrices for the upper shape, all of them lead to the same connections between vertices (unlabeled graph). The graph in the lower line in Fig. \\ref{fig:shape}. can be labeled only in one way \\footnote{ At first glance one can think that there are six ways because one can put labels in six different ways on a drawing of the triangle. After a while one can see that they all are identical since they can be transformed one into another by a transformation which does not change connectivity. For example, if it is a drawing of equilateral triangle one can change labels 123 into 231 by rotating it by 120$^\\circ$.} which is represented by the following adjacency matrix: \\begin{equation} \\mathbf{A}_{\\mbox{\\scriptsize G}} = \\left( \\begin{array}{ccc} 0 & 1 & 1 \\\\ 1 & 0 & 1 \\\\ 1 & 1 & 0 \\end{array} \\right) \\ . \\end{equation} Thus the triangular shape has only one realization as labeled graph. Furthermore, the upper and lower graphs are obviously distinct because none of the corresponding labeled graphs (adjacency matrices) representing the upper graph is equal to that for the lower graph. In this trivial case the difference is in the number of links. More generally, any two graphs are distinct if the underlying labeled graphs (adjacency matrices) cannot be converted one into another by a permutation of nodes' labels. It is clear that for the graphs in Fig. \\ref{fig:shape} there is no such a permutation but in general case the comparison of graphs may be a complex problem. Let us now apply the ideas sketched above to define an ensemble of graphs. As an example we shall consider Erd\\\"os-R\\'{e}nyi graphs with $N=4$, $L=3$. It consists of three distinct graphs A, B, C shown in Fig. \\ref{fig:shape2}. Now we want to determine the statistical weight for those graphs. Adjacency matrices of the underlying labeled graphs are essentially different for A, B, C since they cannot be converted one into another by a permutation of node's labels. \\begin{figure} \\includegraphics[width=7cm]{shape2.eps} \\caption{Three possible graphs for $N=4,L=3$. The number of ways of labeling these graphs is: $n_A=12$, $n_B=4$, $n_C=4$.} \\label{fig:shape2} \\end{figure} Each graph in Fig. \\ref{fig:shape2} has a few possible realizations as labeled graph. One can label four vertices in $4!=24$ ways corresponding to permutations of $1-2-3-4$. For the graph A, twelve of them give distinct labeled graphs. For example, the permutation $1-2-3-4$ gives an identical labeled graph (adjacency matrix) as $4-3-2-1$. The same kind of symmetry applies for remaining pairs of permutations. Therefore there are $n_A=12$ labeled graphs for $A$. Similarly one can find that there are $n_B=4$ labeled graphs for $B$ and $n_C=4$ for $C$. Altogether, there are $n_A+n_B+n_C=20$ labeled graphs in accordance with $n=\\binom{\\binom{N}{2}}{L}=20$. In the Erd\\\"os-R\\'{e}nyi ensemble labeled graphs are equiprobable, so the shapes A, B, C have the following probabilities: \\begin{equation} p_A=\\frac{n_A}{n} = \\frac{3}{5}, \\quad p_B=\\frac{n_B}{n} = \\frac{1}{5}, \\quad p_C=\\frac{n_C}{n} = \\frac{1}{5}. \\label{pABC} \\end{equation} These probabilities give frequencies of the occurrence of the shapes A, B, C in random sampling. We see that graphs (unlabeled graphs) are not equiprobable in Erd\\\"os-Renyi's ensembles. Let us denote the statistical weights for A, B, C by $w_A,w_B,w_C$ which are proportional to probabilities of configurations in the ensemble. In our case $w_A:w_B:w_C = p_A:p_B:p_C$. There is a common proportionality constant in the weights. It is convenient to choose this constant in such a way that the weight of each labeled graph be $1\/N!$ \\footnote{One should however remember that this constant is an irrelevant proportionality factor as long as the number of nodes is fixed.}. For this choice we have \\begin{equation} w_A=1\/2, \\quad w_B=1\/6, \\quad w_C=1\/6 , \\end{equation} for the graphs in Fig. \\ref{fig:shape2}. This choice compensates for the increasing factor of permutations $N!$, when one considers ensembles with varying $N$, and intuitively removes overcounting coming from summing over permutations of indistinguishable node's labels. However, one should remember that in general the number of distinct labeled graphs of a graph is less than $N!$ and therefore the weight of graph is smaller than $1$. The larger is the symmetry of a graph topology the smaller is the number of underlying labeled graphs and thus the smaller is the statistical weight (see for instance Fig. \\ref{fig:shape}). The partition function $Z(N,L)$ for the Erd\\\"os-R\\'enyi ensemble can be written in the form: \\begin{equation} Z(N,L) = \\sum_{\\alpha'\\in lg(N,L)} \\frac{1}{N!} \\;\\;= \\sum_{\\alpha\\in g(N,L)} w(\\alpha) , \\label{eq:er} \\end{equation} where $lg(N,L)$ is the set of all labeled graphs with given $N,L$ and $g(N,L)$ is the corresponding set of (unlabeled) graphs. The weight $w(\\alpha) = n(\\alpha)\/N!$, where $n(\\alpha)$ is the number of labeled graphs of graph $\\alpha$. We are interested in quantities averaged over the ensemble. More precisely, we are interested in quantities which depend on topology of graph and not on node's labels. This means that if $O(\\alpha)$ is such an observable then for any two labeled graphs $\\alpha'_1$ and $\\alpha'_2$ of graph $\\alpha$ we have $O(\\alpha'_1)=O(\\alpha'_2)\\equiv O(\\alpha)$. The average is defined by \\begin{equation} \\left\\langle O\\right\\rangle \\equiv \\frac{1}{Z(N,L)} \\sum_{\\alpha'\\in lg(N,L)} O(\\alpha') \\frac{1}{N!} \\;\\;= \\frac{1}{Z(N,L)} \\sum_{\\alpha\\in g(N,L)} w(\\alpha) O(\\alpha) . \\end{equation} We shall refer to an ensemble with fixed $N,L$ as to a \\emph{canonical ensemble}. The word ''canonical'' is used here to emphasize that the number of links $L$ is conserved like the total number of particles in a container with ideal gas remaining in thermal balance with a source of heat. The partition function $Z(N,L)$ can be calculated by pure combinatorics as we have seen in the introduction. Now for completeness we derive it using the adjacency matrix representation of graphs. The adjacency matrices $\\mathbf{A}$ are symmetric, they have zeros on the diagonal and $L$ unities above the diagonal. Thus we have \\begin{equation} Z(N,L) = \\sum_{A_{12}} \\sum_{A_{13}} \\dots \\sum_{A_{1N}} \\sum_{A_{23}} \\sum_{A_{24}} \\dots \\sum_{A_{N-1,N}} \\delta\\left[L-\\sum_{p<r} A_{pr}\\right] \\; 1\/N! , \\end{equation} where $\\delta\\left[x\\right]=1$ if $x=0$ and zero elsewhere. The sums are done over all $A_{ij}=0,1$ for all pairs $i,j: \\, 1\\leq i<j\\leq N$. Using an integral representation of $\\delta\\left[ x \\right]$ and exchanging the order of summation and integration we obtain the expected result: \\begin{eqnarray} Z(N,L) & = & (1\/N!) \\frac{1}{2\\pi} \\int_{-\\pi}^{-\\pi} dk \\; e^{ikL} \\left( 1+e^{-i k} \\right)^{\\binom{N}{2}} = (1\/N!) \\frac{1}{2\\pi} \\int_{-\\pi}^{-\\pi} dk \\; e^{ikL} \\sum_{m=0}^{\\binom{N}{2}} \\binom{\\binom{N}{2}}{m} e^{-ikm} \\nonumber \\\\ & = & (1\/N!) \\binom{\\binom{N}{2}}{L} . \\end{eqnarray} This method can be applied to calculate averages of various quantities. As an example consider the node degree distribution $\\pi(q)$ which tells us what is the probability that a randomly chosen vertex on random graph has degree $q$: \\begin{equation} \\pi(q) = \\left\\langle \\frac{1}{N} \\sum_i \\delta \\left[q-q_i\\right] \\right\\rangle . \\label{piq} \\end{equation} By random graph we mean that we average over graphs from the given ensemble. We know that for Erd\\\"os-R\\'enyi graphs $\\pi(q)$ is a Poissonian distribution in the limit of $N\\rightarrow\\infty$: \\begin{equation} \\pi(q) = \\frac{\\bar{q}^q}{q!} \\exp(-\\bar{q}) , \\label{eq:piq} \\end{equation} where $\\bar{q}=2L\/N$ is the average vertex degree. This result can be rederived using the method described above. Let us look at the degree of a vertex labeled by one. The result does not depend on the vertex label for homogeneous graphs since labels have no physical meaning. One can find that \\begin{eqnarray} \\pi(q) & = & \\frac{1}{Z(N,L)} \\frac{1}{N!} \\sum_{A_{12}} \\sum_{A_{13}} \\dots \\sum_{A_{23}} \\sum_{A_{24}} \\dots \\sum_{A_{N-1,N}} \\delta\\left[L-\\sum_{p<r} A_{pr}\\right] \\; \\delta\\left[ q - \\sum_{r=2}^N A_{1r} \\right] \\nonumber \\\\ & = & \\binom{\\binom{N}{2}}{L-q} \\binom{N-1}{q} \/ \\binom{\\binom{N}{2}}{L} . \\label{eq:exact_p} \\end{eqnarray} which in the limit $\\bar{q}=\\mbox{const},\\,N\\rightarrow\\infty$ gives Eq. (\\ref{eq:piq}) as expected. So far we have discussed the canonical ensemble of Erd\\\"os-R\\'{e}nyi graphs with $N,L$ fixed. Erd\\\"{o}s and R\\'{e}nyi introduced also a related model called {\\it binomial model} where the number of nodes $N$ is fixed but the number of links $L$ is not fixed {\\em a priori}. One starts from $N$ empty vertices and connects every pair of vertices with a probability $p$. In this statistical ensemble the probability of obtaining a labeled graph with given $L$ is $P(L)=p^L (1-p)^{\\binom{N}{2}-L}$. Thus the partition function is \\begin{eqnarray} Z(N,\\mu) & = & \\sum_L \\sum_{\\alpha\\in lg(N,L)} \\frac{1}{N!} P(L(\\alpha)) = (1-p)^{\\binom{N}{2}} \\sum_L \\left(\\frac{p}{1-p}\\right)^L \\sum_{\\alpha\\in lg(N,L)} \\frac{1}{N!} \\nonumber \\\\ & \\propto & \\sum_L \\exp (-\\mu L) \\; Z(N,L) \\propto \\sum_L \\exp (-\\mu L + S(N,L)) , \\label{grand} \\end{eqnarray} where $\\frac{p}{1-p}\\equiv \\exp(-\\mu)$ or $\\mu = \\ln \\frac{1-p}{p}$, and the entropy $S(N,L)$ is given by Eq. (\\ref{S0}). We skipped an $L$-independent factor in front of the sum in the second line substituting equality by proportionality sign. The weight of labeled graphs is $w(\\alpha)=1\/N! \\; \\exp(-\\mu L(\\alpha))$, where $\\mu$ is a constant which can be interpreted as chemical potential for links in the \\emph{grand-canonical} ensemble (\\ref{grand}). One can calculate the average number of links or its variance as derivatives of the grand-canonical partition function with respect to $\\mu$: $\\langle L \\rangle = -\\partial_\\mu \\ln Z(N,\\mu)$ and $\\langle L^2 \\rangle -\\langle L \\rangle^2 = \\partial^2_\\mu \\ln Z(N,\\mu)$. The sum of states can be done exactly: \\begin{equation} Z(N,\\mu) = \\sum_{L=0}^{\\binom{N}{2}} e^{-\\mu L} \\frac{1}{N!} \\binom{\\binom{N}{2}}{L} = \\frac{1}{N!} (1+e^{-\\mu})^{\\binom{N}{2}} . \\end{equation} It is easy to see that for fixed finite $\\mu$ the average number of links behaves as $N^2$ or more precisely as \\begin{equation} \\langle L \\rangle = p \\frac{N(N-1)}{2} = \\frac{1}{1 + e^\\mu} \\frac{N(N-1)}{2} . \\label{Lp} \\end{equation} Thus for $N\\rightarrow\\infty$ the graphs become dense. The mean value of node degree $\\langle \\bar{q} \\rangle =2\\langle L \\rangle \/N$ increases to infinity. The situation changes when $\\mu$ goes to infinity with increasing $N$. This happens in particular if the probability $p$ scales as $p \\sim 1\/N$ since then $\\mu$ behaves as $\\mu \\sim \\ln N$. In this case $L$ is proportional to $N$ (\\ref{Lp}) and both the terms $\\mu L$ and $S$ in the exponent of Eq. (\\ref{grand}) behave as $N\\ln N$ and compensate each other. The corresponding graphs become sparse and the mean node degree $\\langle \\bar{q} \\rangle =2\\langle L \\rangle \/N$ is now finite. The situation in which $\\mu$ scales as $\\ln N$ is very different from the situation known from classical statistical physics, where such quantities like chemical potential $\\mu$ are intensive and do not depend on system size $N$ in the thermodynamic limit $N\\rightarrow\\infty$. The difference between canonical and grand-canonical ensembles gradually disappears in the large $N$ limit \\cite{ref:bck,ref:dms}. For canonical ensemble or sparse graphs the node degree $\\bar{q} = 2L\/N = \\alpha$ is kept constant when $N\\rightarrow \\infty$ while in grand-canonical one it may fluctuate around the average $\\langle \\bar{q} \\rangle = 2\\langle L\\rangle \/N = \\alpha$. However, the magnitude of fluctuations around the average disappears in the large $N$ limit since \\begin{equation} \\langle L^2 \\rangle - \\langle L\\rangle^2 = \\binom{N}{2} \\frac{e^{-\\mu}}{(1+e^{-\\mu})^2} , \\end{equation} and $\\Delta q = \\sqrt{\\langle L^2 \\rangle - \\langle L\\rangle^2} \/ \\langle L \\rangle \\sim 1\/N \\rightarrow 0$, so effectively the system selects graphs with $\\bar{q} = \\alpha$. Sometimes one also considers an ensemble of graphs with a predefined node degree sequence $\\{q_1,q_2,\\dots,q_N\\}$. We shall call it \\emph{micro-canonical}. Again, in the simplest case one assumes that all labeled graphs are equiprobable in this ensemble. Properties of random graphs in such an ensemble strongly depend on the degree sequence. \\section{Weighted homogeneous graphs} In the previous section we described ensembles for which all labeled graphs had the same statistical weight. Random graphs in such ensembles have well known properties. It turns out, however, that most of these properties do not correspond to those observed for real world networks. One needs a more general set-up to define an ensemble of complex random networks. Such a set-up can be introduced as follows. One considers the same set of graphs as in Erd\\\"os-R\\'enyi model but one ascribes to each graph a different statistical weight. In other words, one chooses a probability measure on the set of graphs which differs from the uniform measure. In the generalized ensemble, each graph in addition to the configuration space weight $1\/N!$ has a functional weight $W(\\alpha)$. For homogeneous random graphs this weight is assumed to depend only on graph topology. This means that the weight does not depend on nodes' labels: if $\\alpha'_1$ and $\\alpha'_2$ are labeled graphs of $\\alpha$ then $W(\\alpha'_1)=W(\\alpha'_2)\\equiv W(\\alpha)$. The partition function for a weighted canonical ensemble reads \\begin{equation} Z(N,L) = \\sum_{\\alpha'\\in lg(N,L)} (1\/N!)\\, W(\\alpha') \\;\\;= \\sum_{\\alpha\\in g(N,L)} w(\\alpha) W(\\alpha) , \\label{eq:can_g} \\end{equation} where $w(\\alpha)$ is the same factor $w(\\alpha) = n(\\alpha)\/N!$ as before (\\ref{eq:er}), being just the ratio of the number of labeled graphs $\\alpha'$ of $\\alpha$ (obtained by permutations of nodes' labels giving distinct adjacency matrices) and the number of all nodes' labels permutations $N!$. For Erd\\\"os-R\\'enyi graphs the functional weight is $W(\\alpha)=1$. The simplest non-trivial example is a family of product weights $W$: \\begin{equation} W(\\alpha) = \\prod_{i=1}^N p(q_i) , \\label{eq:prod} \\end{equation} where $p(q)$ is a positive function depending on one node degree $q$. This functional weight does not introduce correlations between node degrees. We shall refer to random graphs generated by this partition function as \\emph{uncorrelated networks}. One should however remember that the total weight does not entirely factorize because the configuration space weight $w(\\alpha) = n(\\alpha)\/N!$ written as a function of node degrees $w(q_1,q_2,\\dots,q_N)$ does not factorize. There is also another factor which prevents the model from the full factorization and independence of node degrees, namely this is the total number of links $2L = q_1+q_2+\\dots + q_N$ which for given $L$ and $N$ introduces correlations between $q_i$'s. For example, if one of $q_i$'s is large, say of order $2L$, then the remaining ones have to be small in order not to violate the constraint on the sum. For a wide class of weights $p(q)$ one can however show that in the large $N$ limit the probability that a randomly chosen graph has degrees $q_1,\\dots,q_N$ approximately factorizes: \\begin{equation} \\pi(q_1,\\dots,q_N) \\sim \\prod_{i=1}^N \\pi(q_i) . \\label{fact} \\end{equation} For large $N$, the node degree distribution $\\pi(q)$ (\\ref{piq}), that is the probability that a random node on random graph has degree $q$ \\cite{ref:bck,ref:bjk1,ref:bl1}, can be approximated by \\begin{equation} \\pi(q) = \\frac{p(q)}{q!} \\exp(-Aq-B) , \\label{piqAB} \\end{equation} where parameters $A,B$ are determined from the conditions for the normalization $\\sum_q \\pi(q)=1$ and for the average $\\sum_q q \\pi(q) = \\bar{q} \\equiv 2L\/N$. For example, for $p(q)=1$ which corresponds to Erd\\\"os-R\\'{e}nyi graphs one finds $A = -\\ln \\bar{q} = \\ln 2L\/N$ and $B = \\bar{q} = 2L\/N$, therefore $\\pi(q)$ is given by the Poissonian from Eq. (\\ref{eq:piq}). Since the node degree distribution $\\pi(q)$ for weighted graphs (\\ref{eq:prod}) depends on $p(q)$, one can choose the latter to obtain a desired form of the node degree distribution $\\pi(q)$. Let $\\pi(q)$ be a desired node degree distribution such that \\begin{equation} \\sum_q \\pi(q)=1 \\ , \\quad \\bar{q} = \\sum q \\pi(q) . \\end{equation} If we choose the weight (\\ref{eq:prod}) with \\begin{equation} p(q) = q! \\pi(q) \\end{equation} in canonical ensemble with $N$ nodes and $L$ links, in the limit of $N\\rightarrow \\infty$ and $2L\/N = \\bar{q}$ we obtain homogeneous random graphs with this node degree distribution. In this case the constants $A$, $B$ from Eq. (\\ref{piqAB}) vanish automatically: $A=B=0$. In particular by an appropriate choice of $p(q)$ we can generate scale free graphs with the node degree Barab\\'{a}si - Albert distribution \\cite{ref:bamodel}: $\\pi(q) = \\frac{4}{q(q+1)(q+2)}$ for $q=1,2,\\dots$ and $\\pi(0)=0$ as an ensemble of graphs $L=N$, $\\bar{q} = 2$ with $p(q) = q! \\frac{4}{q(q+1)(q+2)}$ for $q=1,2,\\dots$ and $p(0)=0$. However, for finite $N$ the node degree distribution $\\pi(q)$ deviates from the limiting shape due to finite size corrections, which are particularly strong for fat tailed distributions $\\pi(q) \\sim q^{-\\gamma}$. The maximal node degree scales as $q_{max}\\sim N^{1\/(\\gamma-1)}$ for $\\gamma\\ge 3$ and as $q_{max} \\sim N^{1\/2}$ for very fat tails: $2 < \\gamma < 3$ \\cite{ref:bk,ref:bpv} as a result of structural constraints which also lead to the occurrence of correlations between node degrees. One can define more complicated weights than those given by Eq. (\\ref{eq:prod}). A natural candidate for networks with degree-degree correlations is the following weight \\cite{ref:bl1,ref:b}: \\begin{equation} W(\\alpha) = \\prod_{l=1}^L p(q_{a_l},q_{b_l}) , \\end{equation} where the product runs over all links of the graph, and the weight $p(q_a,q_b)$ is a symmetric function of degrees of nodes at the end points of the link. One can choose this function to favor assertive or disassertive behavior \\cite{ref:bl1,ref:b,ref:n3,ref:bp,ref:d2}. In a similar way one can introduce probability measures on the set of graphs which mimic some other functional properties of real networks, like for example higher clustering \\cite{ref:n2,ref:bjk2,ref:bjk3,ref:d1,ref:pn2}. One can do this in micro-canonical, canonical, grand-canonical or any other ensemble. This is just the most general set-up to handle homogeneous networks. \\section{Monte-Carlo generator of homogeneous networks} Erd\\\"os-R\\'enyi graphs are exceptional in the sense that one can calculate for them almost all quantities of interest analytically. This is not the case for weighted networks. Various methods have been proposed for generating random graphs \\cite{ref:k}. In this section we will describe a Monte-Carlo method which allows one to study a wide class of random weighted graphs experimentally by a sort of numerical experiments. The basic idea behind this type of experiments is to sample the configuration space of graphs with the probability proportional to the statistical weight or in other words to generate graphs with a desired probability. Again, the Erd\\\"os-R\\'enyi graphs are exceptional because one can generate them one by one independently of each other. This is just because they are equiprobable. For weighted graphs the situation is not that easy since there are no efficient algorithms to pick up an element from a large set with the given probability. The naive algorithm which relies on picking up an element uniformly and then accepting it with the given probability has a very low acceptance rate. Therefore one has to use another idea. We will describe below how to generate graphs using dynamical Monte-Carlo technique. The idea is to run a random walk process in the set of graphs which visits configurations with a frequency proportional to their statistical weight. Mathematically, this means that one has to invent a stationary Markov chain (process) for which the stationary distribution is proportional to the statistical weights of graphs: $\\sim W(\\alpha)\/Z$. The Markov chain is defined by transition probabilities $P(\\alpha\\rightarrow \\beta)$ that the random walker will go in one step from a configuration (graph) $\\alpha$ to $\\beta$. The probabilities are stored in a transition matrix $\\mathbf{P}$: $P_{\\alpha\\beta} \\equiv P(\\alpha\\rightarrow \\beta)$ which is also called Markov's matrix. For a stationary process, the transition matrix $\\mathbf{P}$ is constant during the random walk. Random walk is initiated from a certain graph $\\alpha_0$ and then elementary steps are repeated producing a sequence (chain) of graphs $\\alpha_0 \\rightarrow \\alpha_1 \\rightarrow \\alpha_2 \\rightarrow \\dots \\ $. The probability $p_\\beta(t+1)$ that a graph $\\beta$ will be generated in the $(t+1)$-th step of the Markov process can be calculated as \\begin{equation} p_\\beta(t+1) = \\sum_\\alpha p_\\alpha(t) P_{\\alpha \\beta} . \\end{equation} The last equation can be written as \\begin{equation} \\mathbf{p} (t+1) = \\mathbf{P}^{\\tau} \\mathbf{p} (t) , \\label{interp} \\end{equation} where $\\tau$ denotes transposition, and $\\mathbf{p}$ is a vector of elements $p_\\alpha$. One should note that the stationary state: $\\mathbf{p}(t+1) = \\mathbf{p}(t)$ corresponds to a left eigenvector of $\\mathbf{P}$ to the eigenvalue \\footnote{One can show that all eigenvalues of a Markov transition matrix lie inside or on the unit circle $|\\lambda| \\le 1$.} $\\lambda=1$. If the process is ergodic, which means that any configuration can be reached by a sequence of transitions starting from any initial configuration, and if the transition matrix fulfills the detailed balance condition: \\begin{equation} W_\\alpha P_{\\alpha \\beta} = W_\\beta P_{\\beta \\alpha} \\quad \\forall \\alpha,\\beta , \\label{eq:db} \\end{equation} then the stationary state can be shown to approach the desired distribution: $p_\\alpha(t) \\rightarrow W_\\alpha\/Z$ for $t \\rightarrow \\infty$. We used a short-hand notation $W_\\alpha$ for $W(\\alpha)$. In other words, when the length of the Markov chain becomes infinite the probability of occurrence of graphs in the Markov chain becomes proportional to their statistical weights and becomes independent of the initial configuration. Therefore the average over graphs generated in this Markovian random walk is a good estimator of the average over the weighted ensemble. The price to pay for generating graphs in this way is that the consecutive graphs in the Markov chain may be correlated with each other. Therefore one has to find a minimal number of steps for which one can treat measurements on such graphs as independent. One should note that the only characteristics of the Markov process which has a physical meaning from the point of view of the simulated ensemble is the stationary distribution. All other dynamical properties of the random walk which are encoded in the form of transition matrix $P(\\alpha\\rightarrow\\beta)$ are irrelevant. Many different transition matrices $\\mathbf{P}$ may have the same stationary distribution. Indeed, many of them fulfill the detailed balance condition for given weights $W_\\alpha$ (\\ref{eq:db}). The best known choice of $\\mathbf{P}$ is \\begin{equation} P_{\\alpha\\beta} = \\min\\left\\{1,\\frac{W_\\beta}{W_\\alpha}\\right\\} . \\label{metrop} \\end{equation} This choice is quite general and can be used in many different contexts. It is called Metropolis algorithm. For the current configuration $\\alpha$ one proposes a change to a new configuration $\\beta$ which differs slightly from $\\alpha$ and then one accepts it with the Metropolis probability (\\ref{metrop}). One repeats this many times producing a chain of configurations. The proposed modifications should not be too large since then the acceptance rate would be small. Therefore the algorithm makes only small steps (moves) in the configuration space which form a sort of weighted random walk. \\section{Monte-Carlo generator of canonical ensemble} Now, we want to apply this method to generate Erd\\\"os-R\\'{e}nyi graphs. Let us begin with the canonical ensemble with $N,L$ fixed. A good candidate for elementary transformation of graph is rewiring of a link as shown in Fig. \\ref{fig:tmove}, because it does not change $N$ and $L$. As mentioned before it is convenient to introduce a representation in which each undirected link is represented by two directed links. The rewiring is done in two steps \\cite{ref:bck}. First we choose a directed link $ij$ and a vertex $k$ at random. Then we rewire the link $ij$ to $ik$. If there is already a link between $i$ and $k$ or if the vertex $k$ coincides with $i$, we reject the rewiring since it would otherwise lead to a multiple- or self-connection. One should note that the result of rewiring $ij$ is not the same as of rewiring $ji$. \\begin{figure}[h] \\psfrag{i}{$i$} \\psfrag{j}{$j$} \\psfrag{k}{$k$} \\includegraphics[width=13cm]{tmove.eps} \\caption{The idea of rewiring: a random link (dotted line) is rewired from vertex $j$ to a random vertex $k$ (left hand side). Alternatively (right hand side) a random, oriented link (dotted line) is rewired from vertex of its end $j$ to a random vertex $k$. The opposite link $j\\rightarrow i$ is simultaneously rewired.} \\label{fig:tmove} \\end{figure} The move is accepted with the Metropolis probability. For the canonical ensemble of Erd\\\"os-R\\'enyi graph this probability is equal to one since functional weights are $W_\\alpha=W_\\beta=1$ in Eq. (\\ref{metrop}). Let us see how rewiring transformations work in practice. Consider as an example the set of graphs shown in Fig. \\ref{fig:shape2}. If we pick up the link $3-2$ in the graph A and rewire it to $3-1$, we will obtain the graph B. If we rewire the link $2-3$ to $2-4$, we will get the graph C. So using the procedure of rewiring showed in Fig. \\ref{fig:tmove} we can obtain every graph in the ensemble. The rewiring transformation is ergodic in this set of graphs. To summarize, our procedure of generating graphs in this training ensemble looks as follows. We construct an arbitrary graph having $N=4$ nodes and $L=3$ links to initiate the procedure and then we repeat iteratively rewirings for randomly chosen links and vertices. The only restriction is that the rewirings do not produce self- or multiple-connected links. We keep on repeating until we obtain ''thermalized graphs''. Then we can begin measuring quantities on the generated sequence of random graphs. Let us check that the described Monte-Carlo procedure indeed generates graphs with the expected probabilities (\\ref{pABC}). Let us calculate the Markovian matrix $\\mathbf{P}$ for the rewiring procedure in this ensemble. First we calculate the transition probability from A to B. The graph A can be converted into B in one step if we rewire the link ''b'' in Fig. \\ref{fig:tmove_ex} to the vertex 2, or alternatively the link ''e'' to the vertex 1. We see that for this change we can choose two out of six links and one of four vertices to obtain the desired change. Thus the probability of choosing links is $2\/6$ and of choosing correct vertex is $1\/4$, so the total probability is $P(A\\rightarrow B)=2\/6 \\cdot 1\/4 = 2\/24$. Let us now calculate $P(A\\rightarrow C)$. To obtain $C$ from $A$ we have to rewire ''a'' to 3 or ''f'' to 4. Thus $P(A\\rightarrow C)=2\/6 \\cdot 1\/4 = 2\/24$. We can find $P(A\\rightarrow A)$ from the condition: $P(A\\rightarrow A)+P(A\\rightarrow B)+P(A\\rightarrow C)=1$. This yields $P(A\\rightarrow A)=20\/24$. \\begin{figure}[ht] \\includegraphics[width=3cm]{tmove_ex.eps} \\caption{The representation of graph A in Fig. \\ref{fig:shape2} as directed graph. } \\label{fig:tmove_ex} \\end{figure} Repeating the calculations for the remaining cases we find: $P(B\\rightarrow A)=6\/24$, $P(B\\rightarrow B)=18\/24$, $P(B\\rightarrow C)=0$ and $P(C\\rightarrow A)=6\/24$, $P(C\\rightarrow B)=0$, $P(C\\rightarrow C)=18\/24$. The results can be collected in a transition matrix: \\begin{equation} \\mathbf{P} = \\frac{1}{24} \\left[\\begin{array}{ccc} 20 & 2 & 2 \\\\ 6 & 18 & 0 \\\\ 6 & 0 & 18 \\end{array}\\right]. \\end{equation} We can now determine the stationary probability distribution of the Markov process as a left eigenvector to the eigenvalue one of the transition matrix $\\mathbf{P}$. We obtain $p_A:p_B:p_C = 3:1:1$ in agreement with Eq. (\\ref{pABC}). This is not surprising since $\\mathbf{P}$ satisfies the detailed balance condition (\\ref{eq:db}) and the corresponding changes are ergodic. We have checked above by explicit calculation that the algorithm gives correct weights of Erd\\\"os-R\\'enyi graphs for $N=3,L=4$. One can give a general argument that for any $N,L$ the algorithm generates labeled graphs which are equiprobable. Suppose that we have a certain labeled graph $\\alpha$ and want to get $\\beta$ by rewiring $ij$ to $ik$. (see Fig. \\ref{fig:tmove}). The total probability $P(\\alpha\\rightarrow\\beta)$ can be written as a product of two factors: the probability $P_c$ of choosing a particular candidate for a new configuration and the probability $P_a$ of accepting it. Because we choose a link $i\\rightarrow j$ from $2L$ possible directed links and a vertex $k$ from $N$ vertices we have $P_c = 1\/(2LN)$. Inserting $P(\\alpha'\\rightarrow\\beta') = 1\/(2LN) \\, P_a(\\alpha'\\rightarrow\\beta')$ in the Eq. (\\ref{eq:db}) and similarly for $\\alpha'\\leftrightarrow \\beta'$ we get \\begin{equation} w_{\\alpha'} P_a(\\alpha'\\rightarrow\\beta') = w_{\\beta'} P_a(\\beta'\\rightarrow\\alpha') . \\label{eq:can1} \\end{equation} But $w_{\\alpha'}=1\/N!$ for all labeled graphs, thus $P_a(\\alpha'\\rightarrow\\beta')=P_a(\\beta'\\rightarrow\\alpha')$. This means that every move should be accepted unless it violates the multiple- or self-connections constraints. The rejection does not change the frequency of the occurrence of simple graphs but only restricts the space of sampled graphs to what we need. The weights of (unlabeled) graphs $\\alpha$ are in this case $w(\\alpha)= n(\\alpha)\/N!$ where $n(\\alpha)$ is the number of distinct graphs of $\\alpha$. \\begin{table}[h] \\begin{center} \\begin{tabular}{|c|c|c|c|c|c|c|} \\hline Graphs & \\multicolumn{6}{|c|}{\\includegraphics[width=7cm]{pent_ex.eps}} \\\\ \\hline $w_\\alpha$ & 1\/2 & 1\/2 & 1\/12 & 1\/2 & 1\/8 & 1\/24 \\\\ $p_\\alpha$ & 0.286 & 0.286 & 0.048 & 0.286 & 0.071 & 0.024 \\\\ \\hline \\multicolumn{7}{|c|}{Simulations} \\\\ \\hline R & \\multicolumn{6}{|c|}{} \\\\ \\hline 10 & 0.285(1) & 0.286(1) & 0.048(1) & 0.286(1) & 0.071(1) & 0.024(1) \\\\ 5 & 0.286(1) & 0.285(1) & 0.047(1) & 0.286(1) & 0.071(1) & 0.024(1) \\\\ 2 & 0.285(1) & 0.285(1) & 0.047(1) & 0.286(1) & 0.072(1) & 0.024(1) \\\\ 1 & 0.284(1) & 0.286(1) & 0.048(1) & 0.284(1) & 0.072(1) & 0.025(1) \\\\ \\hline \\end{tabular} \\caption{Theoretically calculated weights $w_\\alpha$ of graphs in the canonical ensemble $N=5,L=4$ are normalized to ensure probabilistic interpretation: $p_\\alpha = w_\\alpha\/\\sum_\\beta w_\\beta$, and compared with the experimental frequencies in the Markov chain using algorithm of rewiring. The results differ by the number $R$ of rewirings between consecutive measurements. } \\label{tab1} \\end{center} \\end{table} Let us numerically test the algorithm. In table \\ref{tab1} we compare the weights calculated analytically and computed from Monte-Carlo generated graphs for $N=5,L=4$. There are six different graphs in this ensemble. We generated $10^6$ graphs. Each of them was obtained from the previous one by $R$ rewirings, or more precisely by $R$ attempts of rewiring \\footnote{ Even if a rewiring is rejected we count it in since it corresponds to the transition $P(\\alpha \\rightarrow \\alpha)$ from graph to the same graph.}. As we can see in table \\ref{tab1}, the frequency of occurrence of each graph is in an excellent agreement with the expected weights. The results do not depend on the separation $R$ between the measurements. In the chain of $10^6$ graphs, each graph in this ensemble is produced many times. For larger ensembles the algorithm would not be able to visit all graphs since the number of graphs is very large (\\ref{S1}). In this case the algorithm would choose only those graphs which are most representative. To make sure that the algorithm has reached the stationary distribution one should start a couple of random walks from different corners of the configuration space and run the algorithm so long as the statistical properties of graphs generated in all the random walks become identical. Generalization of the algorithm to a weighted ensemble is straightforward. We insert the statistical weights $W_\\alpha$ of this ensemble into the Metropolis formula (\\ref{metrop}). Consider in particular a product weight (\\ref{eq:prod}). We choose a link $ij$ and a vertex $k$ on the current configuration $\\alpha$ at random and attempt to rewire the link to $ik$ to obtain a new configuration $\\beta$. The change is accepted with the probability \\begin{equation} P_a(\\alpha\\rightarrow\\beta) = \\min\\left\\{1,\\frac{W_\\beta}{W_\\alpha}\\right\\} = \\min\\left\\{1,\\frac{p(q_j-1)p(q_k+1)}{p(q_j)p(q_k)}\\right\\} . \\end{equation} The degrees $q_j,q_k$ are taken from $\\alpha$. Clearly the rewiring changes the degrees $q_j\\rightarrow q_j-1$, $q_k\\rightarrow q_k+1$, and leaves the degrees of remaining nodes intact. The ratio $W_\\beta\/W_\\alpha$ can be calculated for any form of statistical weights, so the algorithm is general. \\section{Monte-Carlo generator of grand-canonical ensemble} The rewiring procedure described in the previous section does not change $N$ and $L$. If we want to simulate graphs from a grand-canonical ensemble for which $L$ is variable, we have to supplement the set of elementary transformations in the algorithm by transformations which change the number of links. We can introduce two mutually reciprocal transformations: adding and deleting a link. Both they preserve the number of nodes $N$ but change the number of links: $L \\rightarrow L\\pm 1$. The two transformations must be carefully balanced. On a given graph $\\alpha$ we have to choose one of them. Let the link addition be selected with the probability $p_+$ and the removal with $p_-$. Once the move is selected we have to choose a link-candidate for which the move is to be applied. It is convenient to split the total transition probability into three factors: \\begin{equation} P(\\alpha\\rightarrow \\beta) = p_\\pm P_c(\\alpha\\rightarrow \\beta) P_a(\\alpha\\rightarrow\\beta) , \\end{equation} where $p_\\pm$ stands for one of $\\{p_-,p_+\\}$, $P_c(\\alpha\\rightarrow \\beta)$ for the probability of choosing a candidate configuration for the change and $P_a(\\alpha\\rightarrow \\beta)$ for the probability of accepting the move. Let $\\alpha$ and $\\beta$ be two graphs which differ by a link which is present on $\\beta$ but absent on $\\alpha$: $L(\\alpha)=L(\\beta)-1$. The transition probability for adding a link to $\\alpha$ has to be balanced with the probability of removing the link from $\\beta$. In order to add a link to $\\alpha$ we have to choose two vertices to which the addition of a link is attempted. The probability of choosing a given pair of vertices, if we choose two vertices independently, is $P_c(\\alpha\\rightarrow\\beta)=2\/N^2$. Thus the total probability of this move is \\begin{equation} P_{\\alpha\\beta}= P(\\alpha\\rightarrow\\beta) = p_+ \\, \\frac{2}{N^2} \\, P_a(\\alpha\\rightarrow\\beta) . \\end{equation} In the reciprocal transformation we have to choose this link among all links. The probability of choosing one among $L$ links is $P_c(\\beta\\rightarrow\\alpha)=1\/L_\\beta=1\/(L_\\alpha+1)$. Thus the total probability of this move is \\begin{equation} P_{\\beta\\alpha}= P(\\beta\\rightarrow\\alpha) = p_- \\, \\frac{1}{L_\\beta} \\, P_a(\\beta\\rightarrow\\alpha) . \\end{equation} Now we have to insert the last two equations to the detailed balance condition which for the grand-canonical ensemble additionally includes the factor $e^{-\\mu L}$: \\begin{equation} W_\\alpha e^{-\\mu L_\\alpha} P_{\\alpha \\beta} = W_\\beta e^{-\\mu L_\\beta} P_{\\beta \\alpha} \\ . \\label{eq:db_gc} \\end{equation} Using this we can calculate the ratio \\begin{equation} \\frac{P_a(\\alpha\\rightarrow\\beta)}{P_a(\\beta\\rightarrow\\alpha)} = \\exp(-\\mu) \\, \\frac{p_-}{p_+} \\, \\frac{N^2}{2L_\\beta} \\, \\frac{W_\\beta}{W_\\alpha} . \\end{equation} If one chooses the same number of attempts for adding and removing a link: $p_+=p_-$, then the ratio $p_+\/p_-=1$ will disappear from the last equation and the acceptance probabilities for adding or removing a link in the Metropolis algorithm will read \\begin{equation} P_a(\\alpha\\rightarrow\\beta) = \\min\\left\\{1, \\exp(-\\mu) \\, \\frac{N^2}{2(L_\\alpha+1)} \\, \\frac{W_\\beta}{W_\\alpha} \\right\\} , \\label{eq:gcan_rown} \\end{equation} and \\begin{equation} P_a(\\beta\\rightarrow\\alpha) = \\min\\left\\{1, \\exp(+\\mu) \\, \\frac{2L_\\beta}{N^2} \\, \\frac{W_\\alpha}{W_\\beta}\\right\\} , \\label{eq:gcan_rown2} \\end{equation} respectively. As before if we want to produce only simple graphs we must have an additional condition which eliminates moves leading to self- or multiple connections. The algorithm is complete. One should note that there is no reason to do additional rewirings because a rewiring of a link $ij$ to a link $ik$ is equivalent to removing the link $ij$ and adding $ik$. In principle one could propose other algorithms. For example, one could consider a modified algorithm in which the move removing a link is done in a different way. Instead of picking up a link as a candidate, one could pick up two vertices at random, and then remove a link if there is any between them. The probability of choosing a pair of vertices would be $2\/N^2$ and it would cancel with the identical factor for the probability of choosing candidates in the move adding a link. The fractions $N^2\/2L$ and $2L\/N^2$ would in this case disappear from equations (\\ref{eq:gcan_rown}) and (\\ref{eq:gcan_rown2}). The two algorithms of course generate the same ensemble. However, the modified algorithm would have much worse acceptance rate for sparse networks since the chance that there is a link between two randomly chosen vertices on a sparse graph is very small. Most of the chosen pairs of vertices are not connected by a link and therefore the algorithm will do nothing since there is no link to remove. This problem is absent for the algorithm which we described previously since in that case only existing links are chosen as candidates for removal. One can easily estimate that the probability of accepting a link removal (\\ref{eq:gcan_rown2}) is not very small. Indeed, even for sparse graph the factor $e^{\\mu} 2L\/N^2$ in Eq. (\\ref{eq:gcan_rown2}) is of order unity. In this case both $\\exp(\\mu)$ and $L$ for large $N$ grow proportionally to $N$ and their product balances the factor $N^2$ in the denominator. The algorithm has a finite acceptance rate which does not vanish when the system size grows. As an exercise, let us consider an example of unweighted ($W_\\alpha=1$) graphs with $N=3$. This ensemble consists of four graphs shown in table \\ref{tab2}. Their statistical weights can be easily found to be $1\/3!, \\, 3e^{-\\mu}\/3!, \\, 3e^{-2\\mu}\/3!, \\, e^{-3\\mu}\/3!$, so we expect that the frequency of occurrence in random sampling should be $1:3e^{-\\mu}:3e^{-2\\mu}:e^{-3\\mu}$. As we see in table \\ref{tab2}, the results of Monte-Carlo simulations are in perfect agreement with this expectation. \\begin{table}[h] \\begin{center} \\begin{tabular}{|c|c|c|c|c|c|} \\hline & Graphs & \\multicolumn{4}{|c|}{\\includegraphics[width=5cm]{gr_3.eps}} \\\\ \\hline $\\mu = 0$ & Theor. & \\ \\ 0.125 \\ \\ & \\ \\ 0.375 \\ \\ & \\ \\ 0.375 \\ \\ & \\ \\ 0.125 \\ \\ \\\\ & Exp. & 0.125(1) & 0.374(1) & 0.374(1) & 0.126(1) \\\\ \\hline $\\mu = 0.2$ & Theor. & 0.166 & 0.408 & 0.334 & 0.091 \\\\ & Exp. & 0.166(1) & 0.408(1) & 0.334(1) & 0.091(1) \\\\ \\hline $\\mu = 0.5$ & Theor. & 0.241 & 0.439 & 0.266 & 0.054 \\\\ & Exp. & 0.241(1) & 0.439(1) & 0.266(1) & 0.054(1) \\\\ \\hline \\end{tabular} \\caption{Comparison of the probability distribution of graphs in a grand-canonical ensemble with $N=3$ nodes: calculated theoretically and computed in a run of Monte-Carlo simulation in which $10^6$ graphs were generated.} \\label{tab2} \\end{center} \\end{table} One can easily apply this technique to any form of statistical weights. In particular we can consider the product weights (\\ref{eq:prod}). The probability of accepting a new configuration by adding or removing a link between $ij$ reads \\begin{eqnarray} \\mbox{min} \\left\\{ 1, \\frac{N^2}{2(L+1)} \\exp(-\\mu) \\frac{p(q_i+1)p(q_j+1)}{p(q_i)p(q_j)} \\right\\} & \\mbox{for adding a link,} \\nonumber \\\\ \\mbox{min} \\left\\{ 1, \\frac{2L}{N^2} \\exp(+\\mu) \\frac{p(q_i-1)p(q_j-1)}{p(q_i)p(q_j)} \\right\\} & \\mbox{for deleting a link,} \\nonumber \\end{eqnarray} where $L$ and $q_i,q_j$ refer to the current configuration. \\section{Monte-Carlo generator of micro-canonical ensemble} Another frequently encountered ensemble is an ensemble of graphs which have a given node degree sequence $\\{q_1,q_2,\\dots,q_N\\}$. The partition function $Z$ has the"} +{"id":"RedPajamaWikipedia.0000","text":"Jusqu'\u00e0 la r\u00e9volution, la ville de Machecoul (Loire-Atlantique) \u00e9tait une ch\u00e2tellenie et une seigneurie du Pays de Retz. Les premiers seigneurs de Retz \u00e9taient \u00e0 l'origine des seigneurs de Sainte-Croix (ancien nom de Machecoul). Au , la seigneurie de Machecoul fut d\u00e9tach\u00e9e du Pays de Retz, avant que les seigneurs de Retz n'en reprissent possession. Machecoul est un lieu charg\u00e9 d'histoire. Elle a \u00e9t\u00e9 le fief de diff\u00e9rentes familles de seigneurs qui se sont succ\u00e9d\u00e9 depuis le . Ce sont les familles : de Retz, dont une branche prend le nom de Machecoul, de Thouars (et consorts : de Maill\u00e9 et de Belleville), de Montaigu, de Dreux, dont une branche reprend le nom de Machecoul, Chabot (et consort : de Parthenay), de Montmorency-Laval, qui reprend le nom de Retz (et consorts : de Co\u00ebtivy et de Montfort-Laval), de Chauvigny, Sauvage (pr\u00e9tendant), de Tournemine (pr\u00e9tendants), d'Annebault, de Clermont, de Gondi (et consort : de Cr\u00e9quy), de Neufville-Villeroy, de Brie-Serrant. \u00c0 part celles de Retz, Chabot, Montmorency-Laval et Gondi, ces familles ont \u00e9t\u00e9 tr\u00e8s \u00e9ph\u00e9m\u00e8res \u00e0 la t\u00eate de Machecoul (d'o\u00f9 leur nombre \u00e9lev\u00e9), et se sont souvent succ\u00e9d\u00e9 par les femmes. Maison de Retz (dont une branche de la descendance prend le nom \u00ab de Machecoul \u00bb) L'origine des tout premiers seigneurs de Sainte-Croix (et de Retz) reste inconnue. On dit traditionnellement qu'ils seraient venus de Bretagne : ceci serait prouv\u00e9 par le pr\u00e9nom du seigneur Harsco\u00ebt, \u00e0 consonance bretonne. Pourtant, on trouve des pr\u00e9noms germaniques au sein de la m\u00eame famille : l'\u00e9pouse de Harsco\u00ebt I de Retz est pr\u00e9nomm\u00e9e Ulgarde, ses fils s'appellent Gestin, Urwoit, Hilaire et Aldroin, et Harsco\u00ebt serait une d\u00e9formation de Harsco\u00efde, pr\u00e9nom \u00e9galement germanique, ce qui laisse penser que les premiers seigneurs de Retz sont en r\u00e9alit\u00e9, au moins au d\u00e9part, des Francs, et probablement de noblesse carolingienne. Apr\u00e8s les invasions normandes, un chevalier, dit d'origine bretonne, qui prend le nom de seigneur de Retz, s'\u00e9tablit au Pays de Retz (\u00e0 Machecoul ?) en prenant la place vacante des anciens viguiers. Puis un certain Gestin, vicomte, apparent\u00e9 au pr\u00e9c\u00e9dent, lui succ\u00e8de. Vient ensuite Gestin I de Retz, apparent\u00e9 aux pr\u00e9c\u00e9dents, qui suit. ???? - ???? : Gestin I de Retz (vers 985-????), seigneur de Sainte-Croix, apparent\u00e9 aux pr\u00e9c\u00e9dents. Gestin I de Retz (vers 985-????), seigneur de Sainte-Croix x ? \u2502 \u2514\u2500\u2500> Harsco\u00ebt I de Retz (vers 1010-vers 1070), seigneur de Sainte-Croix, qui suit ???? - vers 1070 : Harsco\u00ebt I de Retz (vers 1010-vers 1070), seigneur de Sainte-Croix, fils du pr\u00e9c\u00e9dent. Harsco\u00ebt I de Retz (vers 1010-vers 1070), seigneur de Sainte-Croix, fils du pr\u00e9c\u00e9dent x Ulgarde (vers 1015-????) \u2502 \u251c\u2500\u2500> Gestin II de Retz (vers 1040-apr\u00e8s 1083), seigneur de Machecoul, qui suit \u2502 \u251c\u2500\u2500> Urwoit de Retz \u2502 \u251c\u2500\u2500> Hilaire de Retz \u2502 \u2514\u2500\u2500> Aldroin de Retz vers 1070 - apr\u00e8s 1083 : Gestin II de Retz (vers 1040-apr\u00e8s 1083), seigneur de Machecoul, fils du pr\u00e9c\u00e9dent. Gestin II de Retz (vers 1040-apr\u00e8s 1083), seigneur de Machecoul, fils du pr\u00e9c\u00e9dent x ? \u2502 \u2514\u2500\u2500> Garsire I de Retz (vers 1070-vers 1141), seigneur de Machecoul, seigneur de Retz, qui suit apr\u00e8s 1083 - avant 1137 : Garsire I de Retz (vers 1070-vers 1141), seigneur de Machecoul, seigneur de Retz, fils du pr\u00e9c\u00e9dent. Garsire I de Retz (vers 1070-vers 1141), seigneur de Machecoul, seigneur de Retz, fils du pr\u00e9c\u00e9dent x B\u00e9atrix (vers 1080-????) \u2502 \u251c\u2500\u2500> Harsco\u00ebt II de Retz, seigneur de Machecoul, seigneur de Retz, qui suit \u2502 \u251c\u2500\u2500> Garsire II de Retz (vers 1105-vers 1160), seigneur de Machecoul, seigneur de Retz, qui suit \u2502 \u251c\u2500\u2500> Agn\u00e8s de Retz \u2502 \u2514\u2500\u2500> Raoul I de Retz dit \u00ab Raoul I de Machecoul \u00bb (vers 1106-vers 1162), seigneur de Machecoul, qui suit ???? - ???? : Harsco\u00ebt II de Retz, seigneur de Machecoul, seigneur de Retz, fils du pr\u00e9c\u00e9dent. avant 1137 - vers 1160 : Garsire II de Retz (vers 1105-vers 1160), seigneur de Machecoul, seigneur de Retz, fr\u00e8re du pr\u00e9c\u00e9dent. Garsire II de Retz (vers 1105-vers 1160), seigneur de Machecoul, seigneur de Retz, fr\u00e8re du pr\u00e9c\u00e9dent x ? \u2502 \u2514\u2500\u2500> Harsco\u00ebt III de Retz (vers 1135-1207), seigneur de Retz x St\u00e9phanie (vers 1140-vers 1210) \u2502 \u251c\u2500\u2500> Garsire III de Retz (vers 1165-apr\u00e8s 1225), seigneur de Retz \u2502 x Eustachie (vers 1180-1212) \u2502 \u2502 \u2502 \u2514\u2500\u2500> Raoul III de Retz (vers 1200-20\/03\/1252), seigneur de Retz \u2502 x Salvagie (ou Sauvage) de La Mothe-Achard (vers 1205-vers 1250) \u2502 \u2502 \u2502 \u251c\u2500\u2500> Jeanne de Retz (vers 1225-????) \u2502 \u2502 x vers 1230 \u00e0 Maurice II de Belleville (vers 1215-1297), seigneur de Machecoul (du chef de sa seconde femme), seigneur de Lu\u00e7on \u2502 \u2502 \u2502 \u2514\u2500\u2500> Eustachie \u00ab Aliette \u00bb de Retz (vers 1228-vers 1265), dame de Machecoul, de Retz, de Falleron et de Froidfond, qui suit \u2502 \u2514\u2500\u2500> Eustachie de Retz (1170-????) x (05\/03\/1180 \u00e0 Nantes) Andr\u00e9 de Vitr\u00e9, seigneur d'Aubign\u00e9 (1154-1211) Garsire II de Retz (1105-1160) et son fr\u00e8re Raoul I de Retz (1106-1162) partage alors la seigneurie de Retz : tandis que Garsire et sa descendance continuent de r\u00e9gner sur la seigneurie de Retz, Raoul (et ses descendants ci-apr\u00e8s) h\u00e9rite de la seigneurie de Machecoul en 1160 et prend alors le nom du domaine pour devenir Raoul I de Machecoul. 1160 - 1162 : Raoul I de Retz dit \u00ab Raoul I de Machecoul \u00bb (vers 1106-vers 1162), seigneur de Machecoul, fr\u00e8re du pr\u00e9c\u00e9dent. Raoul I de Retz dit \u00ab Raoul I de Machecoul \u00bb (vers 1106-vers 1162), seigneur de Machecoul, fr\u00e8re du pr\u00e9c\u00e9dent x Marie Talvas \u00ab de Montgomery \u00bb (vers 1101-????), dame de Montgomery et de Bell\u00eame \u2502 \u251c\u2500\u2500> B\u00e9atrice de Machecoul (vers 1140-????), dame de Bell\u00eame \u2502 x Renaud de La Jaille (vers 1142-1190), seigneur de Ch\u00e2teau-Gontier \u2502 \u2514\u2500\u2500> Bernard de Machecoul (vers 1140-vers 1212), seigneur de Machecoul et de La B\u00e9nate, qui suit 1162 - 1212 : Bernard de Machecoul (vers 1140-vers 1212), seigneur de Machecoul et de La B\u00e9nate, fils du pr\u00e9c\u00e9dent. Bernard de Machecoul (vers 1140-vers 1212), seigneur de Machecoul et de La B\u00e9nate, fils du pr\u00e9c\u00e9dent x (vers 1180) A\u00e9nor (ou \u00c9l\u00e9onore) de Tonnay (vers 1165-????), dame de Lu\u00e7on \u2502 \u251c\u2500\u2500> Raoul II de Machecoul (vers 1183-1214), seigneur de Machecoul et de Lu\u00e7on, qui suit \u2502 \u2514\u2500\u2500> B\u00e9atrice II de Machecoul (vers 1185-1235, inhum\u00e9e \u00e0 l'abbaye des Fontenelles), dame de Machecoul, de Lu\u00e7on et de La Roche-sur-Yon, qui suit 1212 - 1214 : Raoul II de Machecoul (vers 1183-1214), seigneur de Machecoul et de Lu\u00e7on, fils du pr\u00e9c\u00e9dent. Raoul II de Machecoul (vers 1183-1214), seigneur de Machecoul et de Lu\u00e7on, fils du pr\u00e9c\u00e9dent \u2502 \u2514\u2500\u2500> Sans post\u00e9rit\u00e9 1214 - 1235 : B\u00e9atrice II de Machecoul (vers 1185-1235, inhum\u00e9e \u00e0 l'abbaye des Fontenelles), dame de Machecoul, de Lu\u00e7on et de La Roche-sur-Yon, s\u0153ur du pr\u00e9c\u00e9dent. B\u00e9atrice II de Machecoul (vers 1185-1235, inhum\u00e9e \u00e0 l'abbaye des Fontenelles), dame de Machecoul, de Lu\u00e7on et de La Roche-sur-Yon, s\u0153ur du pr\u00e9c\u00e9dent x Guillaume de Maul\u00e9on (vers 1150-1214), seigneur de Talmont \u2502 \u251c\u2500\u2500> Sans post\u00e9rit\u00e9 \u2502 x (avant 1214) Aimery VIII de Thouars (vers 1187-1246), seigneur de Machecoul (du chef de sa femme), vicomte de La Chaize, qui suit Maison de Thouars 1214 - 1235: Aimery VIII de Thouars (vers 1187-1246), seigneur de Machecoul (du chef de sa femme), second mari de la pr\u00e9c\u00e9dente. Aimery VIII de Thouars (vers 1187-1246), seigneur de Machecoul (du chef de sa femme), vicomte de La Chaize, second mari de la pr\u00e9c\u00e9dente x (avant 1214) B\u00e9atrice II de Machecoul (vers 1185-1235, inhum\u00e9e \u00e0 l'abbaye des Fontenelles), dame de Machecoul, de Lu\u00e7on et de La Roche-sur-Yon, qui pr\u00e9c\u00e8de \u2502 \u251c\u2500\u2500> Jeanne de Thouars (vers 1217-apr\u00e8s 1258), dame de Machecoul, de Lu\u00e7on et de La Roche-sur-Yon, qui suit \u2502 \u2514\u2500\u2500> Aimery de Thouars (????-1218), seigneur de Machecoul et de La Roche-sur-Yon 1235 - ? : Jeanne de Thouars (vers 1217-apr\u00e8s 1258), dame de Machecoul, de Lu\u00e7on et de La Roche-sur-Yon, fille des deux pr\u00e9c\u00e9dents. Jeanne de Thouars (vers 1217-apr\u00e8s 1258), dame de Machecoul, de Lu\u00e7on et de La Roche-sur-Yon, fille des deux pr\u00e9c\u00e9dents x (vers 1235) Hardouin V de Maill\u00e9 (1223-1243), baron de Maill\u00e9, seigneur de Machecoul (du chef de sa femme), s\u00e9n\u00e9chal de Poitou, qui suit \u2502 \u251c\u2500\u2500> Sans post\u00e9rit\u00e9 \u2502 x Maurice II de Belleville (vers 1215-1297), seigneur de Machecoul (du chef de sa femme), seigneur de Lu\u00e7on, qui suit \u2502 \u2514\u2500\u2500> Sans post\u00e9rit\u00e9 Maison de Maill\u00e9 1235 - ? : Hardouin V de Maill\u00e9 (1223-1243), baron de Maill\u00e9, seigneur de Machecoul (du chef de sa femme), s\u00e9n\u00e9chal de Poitou, premier mari de la pr\u00e9c\u00e9dente. Hardouin V de Maill\u00e9 (1223-1243), baron de Maill\u00e9, seigneur de Machecoul (du chef de sa femme), s\u00e9n\u00e9chal de Poitou, premier mari de la pr\u00e9c\u00e9dente x (vers 1235) Jeanne de Thouars (vers 1217-apr\u00e8s 1258), dame de Machecoul, de Lu\u00e7on et de La Roche-sur-Yon, qui pr\u00e9c\u00e8de \u2502 \u2514\u2500\u2500> Sans post\u00e9rit\u00e9 Maison de Montaigu Jeanne de Thouars et son mari Hardouin V de Maill\u00e9 se voient enlever la seigneurie de Machecoul, qui passe alors \u00e0 une grand-tante par alliance de Jeanne de Thouars : Marguerite de Montaigu (vers 1189-apr\u00e8s 1241), dame de La Garnache, de Montaigu, de Vihiers et de Commequiers, veuve du vicomte Hugues I de Thouars (1146-1229), grand-oncle de Jeanne de Thouars. Marguerite de Montaigu et son nouveau mari, le comte cap\u00e9tien Pierre de Dreux (1190-1250), dit Pierre \u00ab Mauclerc \u00bb \u00ab de Braine \u00bb, ancien duc de Bretagne et arri\u00e8re-petit-fils du roi de France Louis VI \u00ab le Gros \u00bb (1081-1137), deviennent ainsi les nouveaux seigneurs de Machecoul. ???? - ???? : Marguerite de Montaigu (vers 1189-apr\u00e8s 1241), dame de Machecoul, de La Garnache, de Montaigu, de Vihiers et de Commequiers, grand-tante par alliance de Jeanne de Thouars. Marguerite de Montaigu (vers 1189-apr\u00e8s 1241), dame de Machecoul, de La Garnache, de Montaigu, de Vihiers et de Commequiers, grand-tante par alliance de Jeanne de Thouars x (avant 1203) Hugues I de Thouars (1146-1229), vicomte de Thouars \u2502 x (vers 1236) Pierre I de Dreux dit \u00ab Pierre Mauclerc \u00bb ou \u00ab Pierre de Braine \u00bb (1190-06\/07\/1250), duc de Bretagne, comte de Dreux, seigneur de Machecoul (du chef de sa 3\u00e8me femme), qui suit Maison (cap\u00e9tienne) de Dreux de Bretagne (dont une branche de la descendance prend le nom \u00ab de Machecoul \u00bb) ???? \u2013 1250 : Pierre I de Dreux dit \u00ab Pierre Mauclerc \u00bb ou \u00ab Pierre de Braine \u00bb (1190-06\/07\/1250), duc de Bretagne, comte de Dreux, seigneur de Machecoul (du chef de sa femme), second mari de la pr\u00e9c\u00e9dente. Pierre I de Dreux dit \u00ab Pierre Mauclerc \u00bb ou \u00ab Pierre de Braine \u00bb (1190-06\/07\/1250), duc de Bretagne, comte de Dreux, seigneur de Machecoul (du chef de sa femme), second mari de la pr\u00e9c\u00e9dente x (mars 1213) Alix de Thouars dite \u00ab Alix de Bretagne \u00bb (1201-21\/10\/1221), duchesse de Bretagne \u2502 \u251c\u2500\u2500> Jean de Dreux dit \u00ab Jean I de Bretagne \u00bb, \u00ab Jean I le Roux \u00bb (1217-08\/10\/1286), duc de Bretagne \u2502 \u251c\u2500\u2500> Yolande de Dreux dite \u00ab Yolande de Bretagne \u00bb, \u00ab Yolande de Penthi\u00e8vre \u00bb (1218-10\/10\/1272), comtesse de Penthi\u00e8vre et de Porhoet \u2502 \u251c\u2500\u2500> Arthur de Dreux dit \u00ab Arthur de Bretagne \u00bb (1220-1224) \u2502 x (vers 1230) Nicole (????-06\/02\/1232) \u2502 \u251c\u2500\u2500> Olivier de Dreux dit \u00ab Olivier de Braine \u00bb puis \u00ab Olivier I de Machecoul \u00bb (vers 1231-18\/12\/1279), seigneur de Machecoul, Montaigu et La Garnache, qui suit \u2502 x Marguerite de Montaigu (vers 1189-apr\u00e8s 1241), dame de Machecoul, de La Garnache, de Montaigu, de Vihiers et de Commequiers, veuve de Hugues de Thouars, qui pr\u00e9c\u00e8de 1250 \u2013 1258 : Olivier de Dreux dit \u00ab Olivier de Braine \u00bb puis \u00ab Olivier I de Machecoul \u00bb (vers 1231-18\/12\/1279), seigneur de Machecoul, Montaigu et La Garnache, fils du pr\u00e9c\u00e9dent. Olivier de Dreux dit \u00ab Olivier de Braine \u00bb puis \u00ab Olivier I de Machecoul \u00bb (vers 1231-18\/12\/1279), seigneur de Machecoul, Montaigu et La Garnache, fils du pr\u00e9c\u00e9dent x (vers 1250) Amicie de Coch\u00e9 (1235-28\/11\/1268), marquise de Souch\u00e9, dame de Coch\u00e9, La B\u00e9nate et Le Coutumier \u2502 \u251c\u2500\u2500> Nicole de Machecoul (apr\u00e8s 1250-????), dame de Boisrouault \u2502 \u251c\u2500\u2500> Jean I de Machecoul (vers 1255-28\/11\/1308), seigneur de Machecoul, Coch\u00e9 et La B\u00e9nate \u2502 x (en 1268) Eustachie de Vitr\u00e9 (vers 1240-apr\u00e8s 1288), dame de Hugeti\u00e8res \u2502 \u251c\u2500\u2500> Thomasse de Machecoul (1270-apr\u00e8s 1333) \u2502 \u251c\u2500\u2500> Isabeau (ou Jeanne ?) de Machecoul (1272-23\/09\/1316 \u00e0 Rennes), dame des Hugueti\u00e8res \u2502 \u251c\u2500\u2500> Olivier II de Machecoul (1273-mars 1310), seigneur de Saint-Philbert-de-Grand-Lieu \u2502 \u2514\u2500\u2500> Louise de Machecoul (1276-1307) La descendance d'Olivier I de Machecoul ne r\u00e9gnera pas sur la seigneurie de Machecoul, m\u00eame si elle va continuer \u00e0 se nommer \u00ab de Machecoul \u00bb. Elle va n\u00e9anmoins se perp\u00e9tuer dans les seigneuries voisines de La B\u00e9nate, Saint-Philbert-de-Grand-Lieu, Vieillevigne, et d'autres. Le patronyme \u00ab de Machecoul \u00bb s'\u00e9teindra au d\u00e9but du , mais une branche cadette par les femmes se perp\u00e9tuera jusqu'au sous le nom \u00ab de La Lande-Machecoul \u00bb. Ces La Lande de Machecoul avait relev\u00e9 le nom et les armes de Machecoul. Pour la suite de cette descendance d'Olivier I de Machecoul, lire : Maison de Thouars En 1258, Olivier I de Machecoul doit renoncer \u00e0 la ville, oblig\u00e9 de la restituer \u00e0 Jeanne de Thouars, qui en avait \u00e9t\u00e9 pr\u00e9c\u00e9demment d\u00e9poss\u00e9d\u00e9e, et \u00e0 son second mari, Maurice II de Belleville (1215-1297). 1258 - 1258 : Jeanne de Thouars (vers 1217-apr\u00e8s 1258), dame de Machecoul, de Lu\u00e7on et de La Roche-sur-Yon, qui pr\u00e9c\u00e8de, restaur\u00e9e. Jeanne de Thouars (vers 1217-apr\u00e8s 1258), dame de Machecoul, de Lu\u00e7on et de La Roche-sur-Yon, qui pr\u00e9c\u00e8de, restaur\u00e9e x (vers 1235) Hardouin V de Maill\u00e9 (1223-1243), baron de Maill\u00e9, seigneur de Machecoul (du chef de sa femme), s\u00e9n\u00e9chal de Poitou, qui pr\u00e9c\u00e8de \u2502 \u251c\u2500\u2500> Sans post\u00e9rit\u00e9 \u2502 x Maurice II de Belleville (vers 1215-1297), seigneur de Machecoul (du chef de sa femme), seigneur de Lu\u00e7on, qui suit \u2502 \u2514\u2500\u2500> Sans post\u00e9rit\u00e9 Maison de Belleville 1258 - 1258 : Maurice II de Belleville (vers 1215-1297), seigneur de Machecoul (du chef de sa femme), seigneur de Lu\u00e7on, second mari de la pr\u00e9c\u00e9dente. Maurice II de Belleville (vers 1215-1297), seigneur de Machecoul (du chef de sa femme), seigneur de Lu\u00e7on, second mari de la pr\u00e9c\u00e9dente x vers 1230 \u00e0 Jeanne de Retz (vers 1225-????) \u2502 \u251c\u2500\u2500> Sans post\u00e9rit\u00e9 \u2502 x Jeanne de Thouars (vers 1217-apr\u00e8s 1258), dame de Machecoul, de Lu\u00e7on et de La Roche-sur-Yon, qui pr\u00e9c\u00e8de \u2502 \u2514\u2500\u2500> Sans post\u00e9rit\u00e9 Maison de Retz Jeanne de Thouars meurt en 1258 sans h\u00e9ritier. Machecoul est alors r\u00e9clam\u00e9e par Eustachie de Retz (1228-1265), dite \u00ab Aliette \u00bb, sa cousine \u00e9loign\u00e9e, arri\u00e8re-arri\u00e8re-petite-fille de Garsire II de retz. Eustachie obtient donc que Machecoul, la ville la plus importante de sa seigneurie de Retz, et qui en \u00e9tait s\u00e9par\u00e9e depuis un si\u00e8cle, soit \u00e0 nouveau pleinement r\u00e9int\u00e9gr\u00e9e au Pays de Retz. D\u00e8s lors, les seigneurs de Retz redeviennent seigneurs de Machecoul. 1258 - vers 1265 : Eustachie \u00ab Aliette \u00bb de Retz (vers 1228-vers 1265), dame de Machecoul, de Retz, de Falleron et de Froidfond, cousine \u00e9loign\u00e9e de Jeanne de Thouars et arri\u00e8re-arri\u00e8re-petite-fille de Garsire II de Retz. Eustachie \u00ab Aliette \u00bb de Retz (vers 1228-vers 1265), dame de Machecoul, de Retz, de Falleron et de Froidfond, cousine \u00e9loign\u00e9e de Jeanne de Thouars et arri\u00e8re-arri\u00e8re-petite-fille de Garsire II de Retz x (vers 1244) G\u00e9rard I Chabot dit \u00ab G\u00e9rard I de Retz \u00bb (vers 1197-vers 1264), seigneur de Machecoul et de Retz (du chef de sa femme), seigneur de La Mothe-Achard et de La Mauri\u00e8re, qui suit Maison Chabot vers 1244 - vers 1264 : G\u00e9rard I Chabot dit \u00ab G\u00e9rard I de Retz \u00bb (vers 1197-vers 1264), seigneur de Machecoul et de Retz (du chef de sa femme), seigneur de La Mothe-Achard et de La Mauri\u00e8re, mari de la pr\u00e9c\u00e9dente. G\u00e9rard I Chabot dit \u00ab G\u00e9rard I de Retz \u00bb (vers 1197-vers 1264), seigneur de Machecoul et de Retz (du chef de sa femme), seigneur de La Mothe-Achard et de La Mauri\u00e8re, mari de la pr\u00e9c\u00e9dente x Tiphaine (ou Th\u00e9ophanie) de Montfort x (vers 1244) Eustachie \u00ab Aliette \u00bb de Retz (vers 1228-vers 1265), dame de Machecoul, de Retz, de Falleron et de Froidfond, qui pr\u00e9c\u00e8de \u2502 \u251c\u2500\u2500> Belle-Assez Chabot (vers 1244-????) \u2502 x Brient II Le B\u0153uf \u2502 \u251c\u2500\u2500> G\u00e9rard II Chabot dit \u00ab G\u00e9rard II de Retz \u00bb (vers 1245-1298), seigneur de Machecoul, de Retz, de La Mothe-Achard, de La Mauri\u00e8re, de Falleron et de Froidfond, qui suit \u2502 \u251c\u2500\u2500> Agn\u00e8s Chabot (vers 1245-????) \u2502 x (vers 1270) Thibaut de Beaumont-Bressuire (vers 1230-avant 1290), chevalier de Beaumont-Bressuire \u2502 \u251c\u2500\u2500> Guillaume Chabot (vers 1248-avant 1288), seigneur de La Mothe-Achard, de La Mauri\u00e8re, de Saint-Hilaire-le-Vouhis, de Falleron et de La Saussaye \u2502 x Marguerite de Bourgneuf \u2502 \u2502 \u2502 \u251c\u2500\u2500> Simon Chabot \u2502 \u2502 \u2502 x Guillemette de Pressay \u2502 \u251c\u2500\u2500> Raoul Chabot (????-1288) \u2502 \u2514\u2500\u2500> Eustachie Chabot x B\u00e9raud de Maill\u00e9 vers 1264 - 1298 : G\u00e9rard II Chabot dit \u00ab G\u00e9rard II de Retz \u00bb (vers 1245-1298), seigneur de Machecoul, de Retz, de La Mothe-Achard, de La Mauri\u00e8re, de Falleron et de Froidfond, fils des deux pr\u00e9c\u00e9dents. G\u00e9rard II Chabot dit \u00ab G\u00e9rard II de Retz \u00bb (vers 1245-1298), seigneur de Machecoul, de Retz, de La Mothe-Achard, de La Mauri\u00e8re, de Falleron et de Froidfond, fils des deux pr\u00e9c\u00e9dents x (en 1264) Emma de La Jaille (vers 1245-avant 1269), dame de Ch\u00e2teau-Gontier \u2502 \u251c\u2500\u2500> Eustachie Chabot (vers 1256-vers 1285) \u2502 x (10\/10\/1271) Jean I de Machecoul (vers 1255-28\/11\/1308), seigneur de Machecoul, de Coch\u00e9 et de La B\u00e9nate \u2502 \u251c\u2500\u2500> Isabeau Chabot (1269-1289) \u2502 x (juin 1284) Olivier II de Machecoul (1273-mars 1310), seigneur de Saint-Philbert-de-Grand-Lieu \u2502 \u251c\u2500\u2500> Thibaut Chabot \u2502 x (vers 1274) Jeanne de Craon (vers 1260-avant 1289), dame de Chaloch\u00e9 \u2502 \u251c\u2500\u2500> G\u00e9rard III Chabot dit \u00ab G\u00e9rard III de Retz \u00bb \u00ab le Benoist \u00bb (vers 1280-avant le 22\/01\/1338), seigneur de Machecoul et de Retz, qui suit \u2502 x (avant 1289) Marguerite des Barres (vers 1265-????) 1298 - 1338 : G\u00e9rard III Chabot dit \u00ab G\u00e9rard III de Retz \u00bb \u00ab le Benoist \u00bb (vers 1280-avant le 22\/01\/1338), seigneur de Machecoul et de Retz, fils du pr\u00e9c\u00e9dent. G\u00e9rard III Chabot dit \u00ab G\u00e9rard III de Retz \u00bb \u00ab le Benoist \u00bb (vers 1280-avant le 22\/01\/1338), seigneur de Machecoul et de Retz, fils du pr\u00e9c\u00e9dent x (14\/07\/1299) Marie Cl\u00e9mence de Parthenay (vers 1280-apr\u00e8s le 08\/10\/1359), demoiselle de Parthenay, dame de Saint-\u00c9tienne-de-Mer-Morte et de La Mothe-Achard \u2502 \u251c\u2500\u2500> Jeanne Chabot dite \u00ab Jeanne de Retz \u00bb \u00ab la Folle \u00bb (vers 1300-1341) \u2502 x Foulques I de Montmorency-Laval (????- 1358), seigneur de Challouyau \u2502 \u2502 \u2502 \u251c\u2500\u2500> Guy I \u00ab Brunnor \u00bb de Montmorency-Laval (????-1383), seigneur de Challouyau, Chemill\u00e9, Falleron et Froidfond \u2502 \u2502 x (1358) Jeanne de Montmorency (????-1365), dame de Blaison \u2502 \u2502 \u2502 \u2502 \u2502 \u251c\u2500\u2500> Sans post\u00e9rit\u00e9 \u2502 \u2502 \u2502 \u2502 \u2502 x Tiphaine \u00ab \u00c9tiennette \u00bb de Husson, dame de Ducey \u2502 \u2502 \u2502 \u2502 \u2502 \u251c\u2500\u2500> Foulques II de Montmorency-Laval (????-1395), seigneur de Challouyau, Chemill\u00e9, Falleron et Froidfond \u2502 \u2502 \u2502 \u2502 \u2502 \u251c\u2500\u2500> Guy II de Montmorency-Laval, dit \u00ab Guy de Laval-Blaison \u00bb puis \u00ab Guy de Laval-Retz \u00bb (????-avant 1416, inhum\u00e9 \u00e0 l'\u00e9glise abbatiale de Buzay), baron de Retz, seigneur de Machecoul, seigneur de Challouyau, de Blaison, de Chemill\u00e9, de Falleron et de Froidfond, qui suit \u2502 \u2502 \u2502 \u2502 \u2502 x Cl\u00e9mence du Guesclin \u2502 \u2502 \u2502 \u251c\u2500\u2500> Marie \u00ab Jeanne \u00bb de Montmorency-Laval (vers 1325-????) \u2502 \u2502 x mari\u00e9e \u00e0 \u00c9on \u00ab Guillaume \u00bb Sauvage, seigneur du Plessis-Guerrif \u2502 \u2502 \u2502 \u2502 \u2502 \u251c\u2500\u2500> Jeanne Sauvage \u2502 \u2502 \u2502 x Gilles de Cl\u00e9rembault \u2502 \u2502 \u2502 \u2502 \u2502 \u2514\u2500\u2500> \u2026 Sauvage \u2502 \u2502 x ? \u2502 \u2502 \u2502 \u2502 \u2502 \u2514\u2500\u2500> \u2026 Sauvage \u2502 \u2502 x ? \u2502 \u2502 \u2502 \u2502 \u2502 \u2514\u2500\u2500> Tanneguy Sauvage (1430-1503), sire du Plessix-Guerrif, pr\u00e9tendant \u00e0 la succession de la baronnie de Retz, qui suit \u2502 \u2502 \u2502 \u251c\u2500\u2500> Philippa de Montmorency-Laval (????-vers 1403) \u2502 \u2502 x \u00ab Alain \u00bb Andr\u00e9 de Saffr\u00e9 (????-01\/09\/1407), chevalier, seigneur de Saffr\u00e9 et de Sion \u2502 \u2502 \u2502 \u2502 \u2502 \u251c\u2500\u2500> Alain de Saffr\u00e9 (????-avant 01\/09\/1407) \u2502 \u2502 \u2502 \u2502 \u2502 \u2514\u2500\u2500> Jeanne de Saffr\u00e9 (????-28\/11\/1459), dame de Frossay \u2502 \u2502 x (1416) Jean II de Tournemine (????-1427 au Mont-Saint-Michel), baron de La Hunaudaye \u2502 \u2502 \u2502 \u2502 \u2502 \u251c\u2500\u2500> Gilles de Tournemine (????-1475), seigneur de Frossay \u2502 \u2502 \u2502 x B\u00e9atrix de La Porte de Vezins \u2502 \u2502 \u2502 x Marie de Villiers \u2502 \u2502 \u2502 \u2502 \u2502 \u2502 \u2502 \u251c\u2500\u2500> Jean de Tournemine \u2502 \u2502 \u2502 \u2502 \u2502 \u2502 \u2502 \u251c\u2500\u2500> Fran\u00e7ois de Tournemine (????-03\/02\/1500), baron de La Hunaudaye, seigneur de Saffr\u00e9, baron du Hommet, conn\u00e9table de Normandie \u2502 \u2502 \u2502 \u2502 x Marguerite de Pont-l'Abb\u00e9, dame de Ploesquellec, Callac, Trogoff et Coetanfao \u2502 \u2502 \u2502 \u2502 x Jacqueline de Tr\u00e9al \u2502 \u2502 \u2502 \u2502 \u2502 \u2502 \u2502 \u2514\u2500\u2500> Georges de Tournemine (????-14\/05\/1524), baron de La Hunaudaye et du Hommet, conn\u00e9table h\u00e9r\u00e9ditaire de Normandie, pr\u00e9tendant \u00e0 la succession de la baronnie de Retz, qui suit \u2502 \u2502 \u2502 \u2502 \u2502 \u251c\u2500\u2500> Pierre de Tournemine, seigneur de Barac'h \u2502 \u2502 \u2502 \u2502 \u2502 \u251c\u2500\u2500> Jean de Tournemine (????-1477), grand-veneur de Bretagne \u2502 \u2502 \u2502 x Mathurine du Perrier (????-1506) \u2502 \u2502 \u2502 \u2502 \u2502 \u2502 \u2502 \u251c\u2500\u2500> Fran\u00e7ois de Tournemine (1457-29\/10\/1529), baron de La Hunaudaye, seigneur de La Guerche et de La Poterie, ambassadeur en Hongrie \u2502 \u2502 \u2502 \u2502 \u2502 \u2502 \u2502 \u251c\u2500\u2500> Alain de Tournemine, homme d'armes \u2502 \u2502 \u2502 \u2502 \u2502 \u2502 \u2502 \u251c\u2500\u2500> Raoul de Tournemine (vers 1460-????), chevalier, ambassadeur \u00e0 Rome et en Angleterre \u2502 \u2502 \u2502 \u2502 x Marguerite Caillon \u2502 \u2502 \u2502 \u2502 \u2502 \u2502 \u2502 \u2514\u2500\u2500> Olivier de Tournemine \u2502 \u2502 \u2502 \u2502 \u2502 \u251c\u2500\u2500> Geoffroy de Tournemine \u2502 \u2502 \u2502 \u2502 \u2502 \u251c\u2500\u2500> \u00ab Jacquemine \u00bb Jacqueline de Tournemine (????-1471) \u2502 \u2502 \u2502 x (19\/11\/1438) Jean de Co\u00ebtquen (????-16\/12\/1491), chambellan du roi de France, grand ma\u00eetre de Bretagne \u2502 \u2502 \u2502 \u2502 \u2502 \u2514\u2500\u2500> Amice de Tournemine \u2502 \u2502 \u2502 x Jean de La Musse-Ponthus, seigneur de Challouyau \u2502 \u251c\u2500\u2500> G\u00e9rard IV Chabot dit \u00ab G\u00e9rard IV de Retz \u00bb (vers 1300-15\/09\/1344), baron de Retz, seigneur de Machecoul et de La Mothe-Achard, qui suit \u2502 \u2514\u2500\u2500> Marguerite Chabot (????-1333) x (1323) Herv\u00e9 de L\u00e9on, seigneur de Noyans 1338 - 1344 : G\u00e9rard IV Chabot dit \u00ab G\u00e9rard IV de Retz \u00bb (vers 1300-15\/09\/1344), baron de Retz, seigneur de Machecoul et de La Mothe-Achard, fils du pr\u00e9c\u00e9dent. G\u00e9rard IV Chabot dit \u00ab G\u00e9rard IV de Retz \u00bb (vers 1300-15\/09\/1344), baron de Retz, seigneur de Machecoul et de La Mothe-Achard, fils du pr\u00e9c\u00e9dent x Catherine de Montmorency-Laval (vers 1300-????), dame d'Avrilly \u2502 \u2514\u2500\u2500> G\u00e9rard V Chabot dit \u00ab G\u00e9rard V de Retz \u00bb (vers 1320-vers 1399), baron de Retz, seigneur de Machecoul, La Mothe-Achard et Avrilly, qui suit 1344 - vers 1399 : G\u00e9rard V Chabot dit \u00ab G\u00e9rard V de Retz \u00bb (vers 1320-vers 1399), baron de Retz, seigneur de Machecoul, La Mothe-Achard et Avrilly, fils du pr\u00e9c\u00e9dent. G\u00e9rard V Chabot dit \u00ab G\u00e9rard V de Retz \u00bb (vers 1320-vers 1399), baron de Retz, seigneur de Machecoul, La Mothe-Achard et Avrilly, fils du pr\u00e9c\u00e9dent x Philippa (ou Philippette) Bertrand (vers 1320-apr\u00e8s le 05\/02\/1398), dame de Roncheville \u2502 \u251c\u2500\u2500> Jeanne Chabot dite \u00ab Jeanne de Retz \u00bb \u00ab la Sage \u00bb (1331-16\/01\/1406), dame de Retz, Machecoul, La Mothe-Achard et Avrilly, qui suit \u2502 \u2514\u2500\u2500> G\u00e9rard VI Chabot dit \u00ab G\u00e9rard VI de Retz \u00bb (1344-1364), baron h\u00e9ritier de Retz seigneur h\u00e9ritier de Machecoul, La Mothe-Achard et Avrilly x (avant 1364) Marguerite de Sancerre (vers 1358-1419), comtesse de Sancerre, dame de Sagonne, de Marmande, de Charenton-du-Cher, de Meillant et de Faye-la-Vineuse \u2502 \u2514\u2500\u2500> Sans post\u00e9rit\u00e9 vers 1399 - 1406 : Jeanne Chabot dite \u00ab Jeanne de Retz \u00bb \u00ab la Sage \u00bb (1331-16\/01\/1406), dame de Retz, Machecoul, La Mothe-Achard et Avrilly, fille du pr\u00e9c\u00e9dent. Jeanne Chabot dite \u00ab Jeanne de Retz \u00bb \u00ab la Sage \u00bb (1331-16\/01\/1406), dame de Retz, Machecoul, La Mothe-Achard et Avrilly, fille du pr\u00e9c\u00e9dent x Roger de Beaufort \u2502 \u251c\u2500\u2500> Sans post\u00e9rit\u00e9 \u2502 x Fran\u00e7ois de Chauvign\u00e9 \u2502 \u251c\u2500\u2500> Sans post\u00e9rit\u00e9 \u2502 x (08\/06\/1379) Jean de Parthenay (????-1427), baron de Retz et seigneur de Machecoul (du chef de sa femme), s\u00e9n\u00e9chal du Poitou, seigneur de Parthenay, de Mathefelon, de Secondigny, de Coudray-Salbart, de Mervent et de Ch\u00e2telaillon, qui suit \u2502 \u2514\u2500\u2500> Sans post\u00e9rit\u00e9 Maison de Parthenay 1379 - 1406 : Jean de Parthenay (????-1427), baron de Retz et seigneur de Machecoul (du chef de sa femme), s\u00e9n\u00e9chal du Poitou, seigneur de Parthenay, de Mathefelon, de Secondigny, de Coudray-Salbart, de Mervent et de Ch\u00e2telaillon, troisi\u00e8me mari de la pr\u00e9c\u00e9dente. Jean de Parthenay (????-1427), baron de Retz et seigneur de Machecoul (du chef de sa femme), s\u00e9n\u00e9chal du Poitou, seigneur de Parthenay, de Mathefelon, de Secondigny, de Coudray-Salbart, de Mervent et de Ch\u00e2telaillon, troisi\u00e8me mari de la pr\u00e9c\u00e9dente x (08\/06\/1379) Jeanne Chabot dite \u00ab Jeanne de Retz \u00bb \u00ab la Sage \u00bb (1331-16\/01\/1406), dame de Retz, Machecoul, La Mothe-Achard et Avrilly, qui pr\u00e9c\u00e8de \u2502 \u251c\u2500\u2500> Sans post\u00e9rit\u00e9 \u2502 x Brunissende de P\u00e9rigord (????-13\/05\/1416) \u2502 \u2514\u2500\u2500> Sans post\u00e9rit\u00e9 Maison de Montmorency-Laval En 1400, Jeanne Chabot dite \u00ab Jeanne de Retz \u00bb \u00ab la Sage \u00bb, derni\u00e8re h\u00e9riti\u00e8re de la baronnie de Retz et de la seigneurie de Machecoul, n'ayant ni enfant ni h\u00e9ritier direct, d\u00e9signe comme son seul h\u00e9ritier Guy II de Montmorency-Laval, dit \u00ab Guy de Laval-Blaison \u00bb, son cousin issu de germain, arri\u00e8re-petit-fils de G\u00e9rard III Chabot dit \u00ab G\u00e9rard III de Retz \u00bb \u00ab le Benoist \u00bb, \u00e0 l'unique condition qu'il abandonne pour lui et ses descendants le nom et les armes de Laval, pour prendre les armes et le nom de Retz. Il h\u00e9rite de ce fait des seigneuries de Machecoul, Saint-\u00c9tienne-de-Mer-Morte, Pornic, Princ\u00e9, Vue, Bouin, qui forment la baronnie de Retz, correspondant peu ou prou \u00e0 l'actuel Pays de Retz. Pourtant, par acte du , Jeanne Chabot \u00ab la Sage \u00bb se d\u00e9dit, et adopte pour h\u00e9riti\u00e8re Catherine de Machecoul (1344-21\/07\/1410), sa cousine \u00e9loign\u00e9e, descendante d'Olivier I de Machecoul et arri\u00e8re-arri\u00e8re-petite-fille de G\u00e9rard II Chabot dit \u00ab G\u00e9rard II de Retz \u00bb, ce qui d\u00e9clenche un grand proc\u00e8s entre Guy II de Montmorency-Laval et le fils de Catherine de Machecoul, Jean de Craon (????-25\/12\/1432). La querelle se termine par le mariage en 1404 de Guy II de Montmorency-Laval avec la fille de Jean de Craon, Marie de Craon (1387-28\/10\/1415), laquelle lui c\u00e8de ainsi les pr\u00e9tentions qu'elle avait sur la baronnie de Retz. Guy II de Montmorency-Laval quitte donc le nom et les armes de sa branche, et prend celles de Retz. En 1406, il devient ainsi le nouveau baron de Retz et seigneur de Machecoul, ce qui fait de lui le doyen des barons de Bretagne, titre dont son fils a\u00een\u00e9 Gilles h\u00e9ritera ensuite. 1406 - avant 1416 : Guy II de Montmorency-Laval, dit \u00ab Guy de Laval-Blaison \u00bb puis \u00ab Guy de Laval-Retz \u00bb (????-avant 1416, inhum\u00e9 \u00e0 l'\u00e9glise abbatiale de Buzay), baron de Retz, seigneur de Machecoul, seigneur de Challouyau, de Blaison, de Chemill\u00e9, de Falleron et de Froidfond, arri\u00e8re-petit-fils de G\u00e9rard III Chabot dit \u00ab G\u00e9rard III de Retz \u00bb \u00ab le Benoist \u00bb. Guy II de Montmorency-Laval, dit \u00ab Guy de Laval-Blaison \u00bb puis \u00ab Guy de Laval-Retz \u00bb (????-avant 1416, inhum\u00e9 \u00e0 l'\u00e9glise abbatiale de Buzay), baron de Retz, seigneur de Machecoul, seigneur de Challouyau, de Blaison, de Chemill\u00e9, de Falleron et de Froidfond, arri\u00e8re-petit-fils de G\u00e9rard III Chabot dit \u00ab G\u00e9rard III de Retz \u00bb \u00ab le Benoist \u00bb x (f\u00e9vrier 1404) Marie de Craon (1387-28\/10\/1415), dame de Champtoc\u00e9-sur-Loire et d'Ingrandes \u2502 \u251c\u2500\u2500> Gilles de Retz (vers 1405 au ch\u00e2teau de Champtoc\u00e9 - 26\/10\/1440 pendu et br\u00fbl\u00e9 \u00e0 Nantes), baron de Retz, seigneur de Machecoul, Tiffauges, Pouzauges, Champtoc\u00e9-sur-Loire, Ingrandes, La B\u00e9nate, Le Coutumier, Bourgneuf-en-Retz et Bouin, comte de Brienne, mar\u00e9chal de France, compagnon d'armes de Jeanne d'Arc, qui suit \u2502 \u2514\u2500\u2500> Ren\u00e9 de Retz (1407-30\/10\/1473), baron de Retz, seigneur de Machecoul, La Suze-sur-Sarthe, Challouyau, Chemill\u00e9, Falleron et Froidfond, qui suit avant 1416 - 1440 : Gilles de Retz (vers 1405 au ch\u00e2teau de Champtoc\u00e9 - 26\/10\/1440 pendu et br\u00fbl\u00e9 \u00e0 Nantes), baron de Retz, seigneur de Machecoul, Tiffauges, Pouzauges, Champtoc\u00e9-sur-Loire, Ingrandes, La B\u00e9nate, Le Coutumier, Bourgneuf-en-Retz et Bouin, comte de Brienne, mar\u00e9chal de France, compagnon d'armes de Jeanne d'Arc, fils du pr\u00e9c\u00e9dent, Gilles de Retz (vers 1405 au ch\u00e2teau de Champtoc\u00e9 - 26\/10\/1440 pendu et br\u00fbl\u00e9 \u00e0 Nantes), baron de Retz, seigneur de Machecoul, Tiffauges, Pouzauges, Champtoc\u00e9-sur-Loire, Ingrandes, La B\u00e9nate, Le Coutumier, Bourgneuf-en-Retz et Bouin, comte de Brienne, mar\u00e9chal de France, compagnon d'armes de Jeanne d'Arc, fils du pr\u00e9c\u00e9dent x (30\/11\/1420 \u00e0 Chalonnes-sur-Loire) Catherine de Thouars (1405-02\/12\/1462), dame de Tiffauges et de Pouzauges \u2502 \u2514\u2500\u2500> Marie de Retz (1429-01\/11\/1457), baronne de Retz, dame de Machecoul, qui suit 1440 - 1457 : Marie de Retz (vers 1433 ou 1434-01\/11\/1457), baronne de Retz, dame de Machecoul, fille du pr\u00e9c\u00e9dent. Marie de Retz (vers 1433 ou 1434-01\/11\/1457), baronne de Retz, dame de Machecoul, fille du pr\u00e9c\u00e9dent x (1441 \u00e0 Tiffauges) Prigent VII de Co\u00ebtivy (1399-01\/11\/1450 au si\u00e8ge de Cherbourg), baron de Retz et seigneur de Machecoul (du chef de sa femme), amiral de France, gouverneur de La Rochelle, qui suit \u2502 \u251c\u2500\u2500> Sans post\u00e9rit\u00e9 \u2502 x (1451) Andr\u00e9 de Montfort-Laval dit \u00ab Andr\u00e9 de Loh\u00e9ac \u00bb (1408 au ch\u00e2teau de Monts\u00fbrs - 29\/12\/1486 \u00e0 Laval), baron de Retz et seigneur de Machecoul (du chef de sa femme), seigneur de Loh\u00e9ac, Montjean, amiral puis mar\u00e9chal de France, qui suit \u2502 \u2514\u2500\u2500> Sans post\u00e9rit\u00e9 Maison de Co\u00ebtivy 1441 - 1450 : Prigent VII de Co\u00ebtivy (1399-01\/11\/1450 au si\u00e8ge de Cherbourg), baron de Retz et seigneur de Machecoul (du chef de sa femme), amiral de France, gouverneur de La Rochelle, premier mari de la pr\u00e9c\u00e9dente. Prigent VII de Co\u00ebtivy (1399-01\/11\/1450 au si\u00e8ge de Cherbourg), baron de Retz et seigneur de Machecoul (du chef de sa femme), amiral de France, gouverneur de La Rochelle, premier mari de la pr\u00e9c\u00e9dente x (1441) Marie de Retz (1429-01\/11\/1457), baronne de Retz, dame de Machecoul, qui pr\u00e9c\u00e8de \u2502 \u2514\u2500\u2500> Sans post\u00e9rit\u00e9 Maison de Montfort-Laval 1451 - 1457 : Andr\u00e9 de Montfort-Laval dit \u00ab Andr\u00e9 de Loh\u00e9ac \u00bb (1408 au ch\u00e2teau de Monts\u00fbrs - 29\/12\/1486 \u00e0 Laval), baron de Retz et seigneur de Machecoul (du chef de sa femme), seigneur de Loh\u00e9ac, Montjean, amiral puis mar\u00e9chal de France, second mari de Marie de Retz. Andr\u00e9 de Montfort-Laval dit \u00ab Andr\u00e9 de Loh\u00e9ac \u00bb (1408 au ch\u00e2teau de Monts\u00fbrs - 29\/12\/1486 \u00e0 Laval), baron de Retz et seigneur de Machecoul (du chef de sa femme), seigneur de Loh\u00e9ac, Montjean, amiral puis mar\u00e9chal de France, second mari de Marie de Retz x (1451) Marie de Retz (1429-01\/11\/1457), baronne de Retz, dame de Machecoul, qui pr\u00e9c\u00e8de \u2502 \u2514\u2500\u2500> Sans post\u00e9rit\u00e9 Maison de Montmorency-Laval 1457 - 1473 : Ren\u00e9 de Retz (1407-30\/10\/1473), baron de Retz, seigneur de Machecoul, La Suze-sur-Sarthe, Challouyau, Chemill\u00e9, Falleron et Froidfond, oncle paternel de Marie de Retz. Ren\u00e9 de Retz (1407-30\/10\/1473), baron de Retz, seigneur de Machecoul, La Suze-sur-Sarthe, Challouyau, Chemill\u00e9, Falleron et Froidfond, oncle paternel de Marie de Retz x Anne de Champagne (????-1501) \u2502 \u2514\u2500\u2500> Jeanne de Retz (avant 1456-apr\u00e8s 1473), baronne de Retz, dame de Machecoul, Challouyau, Chemill\u00e9, Falleron, Froidfond et La Suze-sur-Sarthe, qui suit 1473- 1481 : Jeanne de Retz (avant 1456-apr\u00e8s 1473), baronne de Retz, dame de Machecoul, Challouyau, Chemill\u00e9, Falleron, Froidfond et La Suze-sur-Sarthe, fille du pr\u00e9c\u00e9dent. Jeanne de Retz (avant 1456-apr\u00e8s 1473), baronne de Retz, dame de Machecoul, Challouyau, Chemill\u00e9, Falleron, Froidfond et La Suze-sur-Sarthe, fille du pr\u00e9c\u00e9dent x (13\/04\/1457) Fran\u00e7ois de Chauvigny (vers 1430-15\/03\/1491 au ch\u00e2teau de Brosse \u00e0 Chaillac), baron de Retz et seigneur de Machecoul (du chef de sa femme), vicomte de Brosse, qui suit Maison de Chauvigny 1473- 1481 : Fran\u00e7ois de Chauvigny (vers 1430-15\/03\/1491 au ch\u00e2teau de Brosse \u00e0 Chaillac), baron de Retz et seigneur de Machecoul (du chef de sa femme), vicomte de Brosse, mari de la pr\u00e9c\u00e9dente. Fran\u00e7ois de Chauvigny (vers 1430-15\/03\/1491 au ch\u00e2teau de Brosse \u00e0 Chaillac), baron de Retz et seigneur de Machecoul (du chef de sa femme), vicomte de Brosse, mari de la pr\u00e9c\u00e9dente x Catherine Martache \u2502 \u251c\u2500\u2500> Charles de Chauvigny (1475-????) \u2502 x (13\/04\/1457) Jeanne de Retz (avant 1456-apr\u00e8s 1473), baronne de Retz, dame de Machecoul, Challouyau, Chemill\u00e9, Falleron, Froidfond et La Suze-sur-Sarthe, qui pr\u00e9c\u00e8de \u2502 \u2514\u2500\u2500> Andr\u00e9 III de Chauvigny (????-04\/01\/1503), baron de Retz et seigneur de Machecoul, prince de D\u00e9ols, comte de Ch\u00e2teauroux, vicomte de Brosse, seigneur de Challouyau, Chemill\u00e9, Falleron et Froidfond, qui suit 1481 - 1503 : Andr\u00e9 III de Chauvigny (????-04\/01\/1503), baron de Retz et seigneur de Machecoul, prince de D\u00e9ols, comte de Ch\u00e2teauroux, vicomte de Brosse, seigneur de Challouyau, Chemill\u00e9, Falleron et Froidfond, fils des deux pr\u00e9c\u00e9dents. Andr\u00e9 III de Chauvigny (????-04\/01\/1503), baron de Retz et seigneur de Machecoul, prince de D\u00e9ols, comte de Ch\u00e2teauroux, vicomte de Brosse, seigneur de Challouyau, Chemill\u00e9, Falleron et Froidfond, fils des deux pr\u00e9c\u00e9dents x (1494) Anne d'Orl\u00e9ans-Longueville (1468-1499) \u2502 \u251c\u2500\u2500> Sans post\u00e9rit\u00e9 \u2502 x (26\/07\/1499 \u00e0 Saint-Pierre-le-Mo\u00fbtier) Louise de Bourbon-Montpensier (vers 1482-15\/07\/1562), duchesse de Montpensier, dauphine d'Auvergne, comtesse de Mortain \u2502 \u2514\u2500\u2500> Sans post\u00e9rit\u00e9 Maison Sauvage \u00c0 la mort d'Andr\u00e9 de Chauvigny en 1503, il n'y a plus d'h\u00e9ritiers directs. Des pr\u00e9tendants \u00e0 la baronnie de Retz et la ch\u00e2tellenie de Machecoul se font alors conna\u00eetre. Tanneguy Sauvage (1430-1503), descendant d'\u00c9on \u00ab Guillaume \u00bb Sauvage (mari de Marie \u00ab Jeanne \u00bb de Montmorency-Laval (vers 1325-????), petite-fille de G\u00e9rard III Chabot dit \u00ab G\u00e9rard III de Retz \u00bb \u00ab le Benoist \u00bb), prend le titre de baron de Retz et se fait rendre aveu en cette qualit\u00e9 d\u00e8s 1503. Les Sauvage sont apparent\u00e9s par les femmes aux Chabot (voir plus haut). 1503 \u2013 1503 : Tanneguy Sauvage (1430-1503), sire du Plessix-Guerrif, pr\u00e9tendant \u00e0 la succession de la baronnie de Retz, cousin \u00e9loign\u00e9 du pr\u00e9c\u00e9dent, arri\u00e8re-arri\u00e8re-arri\u00e8re-petit-fils de G\u00e9rard III Chabot dit \u00ab G\u00e9rard III de Retz \u00bb \u00ab le Benoist \u00bb. Maison de Tournemine Parmi les nombreux pr\u00e9tendants \u00e0 la succession d'Andr\u00e9 de Chauvigny, Georges de Tournemine (????-14\/05\/1524), baron de La Hunaudaye et du Hommet, fait \u00e9galement valoir ses droits \u00e0 la baronnie. Les Tournemine sont apparent\u00e9s par les femmes aux Chabot (voir plus haut). 1503 - 1524 : Georges de Tournemine (????-14\/05\/1524), baron de La Hunaudaye et du Hommet, conn\u00e9table h\u00e9r\u00e9ditaire de Normandie, pr\u00e9tendant \u00e0 la succession de la baronnie de Retz, cousin \u00e9loign\u00e9 des deux pr\u00e9c\u00e9dents, arri\u00e8re-arri\u00e8re-arri\u00e8re-petit-fils de G\u00e9rard III Chabot dit \u00ab G\u00e9rard III de Retz \u00bb \u00ab le Benoist \u00bb. Georges de Tournemine (????-14\/05\/1524), baron de La Hunaudaye et du Hommet, conn\u00e9table h\u00e9r\u00e9ditaire de Normandie, pr\u00e9tendant \u00e0 la succession de la baronnie de Retz, cousin \u00e9loign\u00e9 des deux pr\u00e9c\u00e9dents, arri\u00e8re-arri\u00e8re-arri\u00e8re-petit-fils de G\u00e9rard III Chabot dit \u00ab G\u00e9rard III de Retz \u00bb \u00ab le Benoist \u00bb x Ren\u00e9e de Villebranche \u2502 \u251c\u2500\u2500> Fran\u00e7oise de Tournemine, dame de La Hunaudaye, pr\u00e9tendante \u00e0 la succession de la baronnie de Retz, qui suit \u2502 x Anne de Montjean (????-apr\u00e8s 1543), dame de Montjean 1524 - ???? : Fran\u00e7oise de Tournemine, dame de La Hunaudaye, pr\u00e9tendante \u00e0 la succession de la baronnie de Retz, fille du pr\u00e9c\u00e9dent. Fran\u00e7oise de Tournemine, dame de La Hunaudaye, pr\u00e9tendante \u00e0 la succession de la baronnie de Retz, fille du pr\u00e9c\u00e9dent x (1516) Jacques de Montjean (????-21\/12\/1517), seigneur de Renac x (1520) Pierre de Montfort-Laval (01\/02\/1489-08\/11\/1521), seigneur de Montafilant x Ren\u00e9 de Montjean (????-septembre 1538 \u00e0 Turin), mar\u00e9chal de France, gouverneur du Pi\u00e9mont x (1525) Claude d'Annebault (ou Claude d'Ailly) (1495-02\/11\/1552 \u00e0 La F\u00e8re), seigneur d'Annebault et de Saint-Pierre, mar\u00e9chal de France et amiral de France, pr\u00e9tendant \u00e0 la succession de la baronnie de Retz (du chef de sa femme), qui suit Maison d'Annebault Le mari de Fran\u00e7oise de Tournemine, Claude d'Annebault, poursuit le proc\u00e8s intent\u00e9 par son beau-p\u00e8re Georges de Tournemine, pour finalement devenir d\u00e9tenteur de la baronnie de Retz, pour laquelle il fait hommage au roi en 1552. ???? - 1552 : Claude d'Ailly d'Annebault (1495-02\/11\/1552 \u00e0 La F\u00e8re), seigneur d'Annebault et de Saint-Pierre, mar\u00e9chal de France et amiral de France, pr\u00e9tendant \u00e0 la succession de la baronnie de Retz (du chef de sa femme), mari de la pr\u00e9c\u00e9dente. Claude d'Ailly d'Annebault (1495-02\/11\/1552 \u00e0 La F\u00e8re), seigneur d'Annebault et de Saint-Pierre, mar\u00e9chal de France et amiral de France, pr\u00e9tendant \u00e0 la succession de la baronnie de Retz (du chef de sa femme), mari de la pr\u00e9c\u00e9dente x (1525) Fran\u00e7oise de Tournemine, dame de La Hunaudaye, pr\u00e9tendante \u00e0 la succession de la baronnie de Retz, qui pr\u00e9c\u00e8de \u2502 \u251c\u2500\u2500> Jean III d'Annebault (????-1562 \u00e0 la bataille de Dreux), baron de Retz, seigneur de Machecoul, Annebault et La Hunaudaye, gentilhomme de la chambre de Charles IX, capitaine de Conches et d'\u00c9vreux, qui suit \u2502 \u2514\u2500\u2500> Marie Madeleine d'Annebault (????-03\/06\/1568), vicomtesse de Pont-Audemer x Gabriele de Saluces (????-juin 1548), marquis de Saluces x Jacques de Silly (????-1570), comte de La Rochepot, seigneur de La Roche-Guyon et de Montmirail 1552 - 1562 : Jean III d'Ailly d'Annebault (????-1562 \u00e0 la bataille de Dreux), baron de Retz, seigneur de Machecoul, Annebault et La Hunaudaye, gentilhomme de la chambre de Charles IX, capitaine de Conches et d'\u00c9vreux, fils des deux pr\u00e9c\u00e9dents. Jean III d'Ailly d'Annebault (????-1562 \u00e0 la bataille de Dreux), baron de Retz, seigneur de Machecoul, Annebault et La Hunaudaye, gentilhomme de la chambre de Charles IX, capitaine de Conches et d'\u00c9vreux, fils des deux pr\u00e9c\u00e9dents x Antoinette de La Baume-Montrevel (????-04\/09\/1572), comtesse de Ch\u00e2teauvillain \u2502 \u251c\u2500\u2500> Diane d'Annebault (????-23\/12\/1560) \u2502 x (1561) Claude Catherine de Clermont (1543 \u00e0 Paris - 18\/02\/1603 \u00e0 Paris), baronne puis duchesse de Retz et dame de Machecoul, baronne de Dampierre, pair de France, salonni\u00e8re fran\u00e7aise, dame d'honneur de Catherine de M\u00e9dicis, gouvernante des enfants de France, qui suit \u2502 \u2514\u2500\u2500> Sans post\u00e9rit\u00e9 Maison de Clermont La seconde \u00e9pouse de Jean d'Annebault, Claude Catherine de Clermont, acquiert en toute propri\u00e9t\u00e9 la baronnie de Retz de son mari \u00ab tant par composition de douaire que par donation et remboursement de deniers dotaux \u00bb. Elle va se remarier avec Albert de Gondi, qui va devenir le nouveau baron de Retz du chef de sa femme. Le roi de France Henri III \u00e9rige la baronnie de Retz en duch\u00e9-pairie de Retz en 1581, en faveur d'Albert de Gondi et de ses descendants. Le duch\u00e9 est constitu\u00e9 des pays, comt\u00e9 et baronnie de Retz, circonstances et d\u00e9pendances. Le Pays de Retz \u00e9tant lui-m\u00eame compos\u00e9 des ch\u00e2tellenies de Machecoul, Prigny, Bourgneuf, La B\u00e9nate, Les Hugueti\u00e8res, Pornic, Princ\u00e9, Le Coutumier, Veulx, Arthon, etc. 1562 - 1603 : Claude Catherine de Clermont (1543 \u00e0 Paris - 18\/02\/1603 \u00e0 Paris), baronne puis duchesse de Retz et dame de Machecoul, baronne de Dampierre, pair de France, salonni\u00e8re fran\u00e7aise, dame d'honneur de Catherine de M\u00e9dicis, gouvernante des enfants de France, seconde \u00e9pouse du pr\u00e9c\u00e9dent. Claude Catherine de Clermont (1543 \u00e0 Paris - 18\/02\/1603), baronne puis duchesse de Retz et dame de Machecoul, baronne de Dampierre, pair de France, salonni\u00e8re fran\u00e7aise, dame d'honneur de Catherine de M\u00e9dicis, gouvernante des enfants de France, seconde \u00e9pouse du pr\u00e9c\u00e9dent x (1561) Jean III d'Annebault (????-1562 \u00e0 la bataille de Dreux), baron de Retz, seigneur de Machecoul, Annebault et La Hunaudaye, qui pr\u00e9c\u00e8de \u2502 \u251c\u2500\u2500> Sans post\u00e9rit\u00e9 \u2502 x (04\/09\/1565) Albert de Gondi (Alb\u00e8rto Gondi) dit \u00ab le Mar\u00e9chal de Retz \u00bb (04\/11\/1522 \u00e0 Florence en Italie - 21\/04\/1602 \u00e0 Paris), baron puis duc de Retz et seigneur de Machecoul (du chef de sa femme), seigneur du Perron, comte puis marquis de Belle-\u00cele et des \u00celes d'Hy\u00e8res, pair de France, g\u00e9n\u00e9ral des Gal\u00e8res de France, mar\u00e9chal de France, qui suit Maison de Gondi 1565 - 1602 : Albert de Gondi (Alb\u00e8rto Gondi) dit \u00ab le Mar\u00e9chal de Retz \u00bb (04\/11\/1522 \u00e0 Florence en Italie - 21\/04\/1602 \u00e0 Paris), baron puis duc de Retz et seigneur de Machecoul (du chef de sa femme), seigneur du Perron, comte puis marquis de Belle-\u00cele et des \u00celes d'Hy\u00e8res, pair de France, G\u00e9n\u00e9ral des Gal\u00e8res de France, mar\u00e9chal de France, second mari de la pr\u00e9c\u00e9dente. Albert de Gondi (Alb\u00e8rto Gondi) dit \u00ab le Mar\u00e9chal de Retz \u00bb (04\/11\/1522 \u00e0 Florence en Italie - 21\/04\/1602 \u00e0 Paris), baron puis duc de Retz et seigneur de Machecoul (du chef de sa femme), seigneur du Perron, comte puis marquis de Belle-\u00cele et des \u00celes d'Hy\u00e8res, pair de France, G\u00e9n\u00e9ral des Gal\u00e8res de France, mar\u00e9chal de France, second mari de la pr\u00e9c\u00e9dente x (04\/09\/1565) Claude Catherine de Clermont (1543 \u00e0 Paris - 18\/02\/1603 \u00e0 Paris), baronne puis duchesse de Retz et dame de Machecoul, baronne de Dampierre, pair de France, salonni\u00e8re fran\u00e7aise, dame d'honneur de Catherine de M\u00e9dicis, gouvernante des enfants de France, qui pr\u00e9c\u00e8de \u2502 \u251c\u2500\u2500> Charles de Gondi (1569-22\/05\/1596 au Mont-Saint-Michel), marquis de Belle-\u00cele, g\u00e9n\u00e9ral des Gal\u00e8res de France \u2502 x (01\/03\/1588 \u00e0 Paris) Antoinette d'Orl\u00e9ans-Longueville (1574-25\/04\/1618 \u00e0 Poitiers), dame de Ch\u00e2teau-Gontier, religieuse sous le nom de S\u0153ur Antoinette de Sainte-Scholastique \u2502 \u2502 \u2502 \u2514\u2500\u2500> Henri de Gondi (1590-12\/08\/1659), duc de Retz et seigneur de Machecoul, duc de Beaupr\u00e9au, marquis de Belle-\u00cele et des \u00celes d'Hy\u00e8res, pair de France, qui suit \u2502 \u251c\u2500\u2500> Claude-Marguerite de Gondi (1570-26\/08\/1650) \u2502 x (07\/01\/1588) Florimond de Hallwin (????-1592), marquis de Piennes et de Maignelais \u2502 \u251c\u2500\u2500> Fran\u00e7oise de Gondi (????-1627) \u2502 x (26\/10\/1587) Lancelot Grognet de Vass\u00e9, seigneur d'Esguilly, Class\u00e9, Rouess\u00e9 et Courmenant \u2502 \u251c\u2500\u2500> Gabrielle de Gondi \u2502 x (11\/12\/1594) Claude de Bossut, seigneur d'Escry \u2502 \u251c\u2500\u2500> Hippolyte de Gondi (????-1646) \u2502 x (18\/01\/1607) L\u00e9onor de La Magdelaine, marquis de Ragny \u2502 \u251c\u2500\u2500> Henri de Gondi (1572 \u00e0 Paris - 13\/08\/1622), cardinal de Retz, \u00e9v\u00eaque de Paris \u2502 \u251c\u2500\u2500> Louise de Gondi (1572-29\/08\/1661), religieuse \u2502 \u251c\u2500\u2500> Madeleine de Gondi (????-08\/06\/1662), religieuse \u2502 \u251c\u2500\u2500> Philippe-Emmanuel de Gondi (1581-29\/06\/1662), comte de Joigny, marquis de Belle-\u00cele, baron de Montmirel, seigneur de Dampierre et de Villepreux, g\u00e9n\u00e9ral des Gal\u00e8res de France \u2502 x (11\/06\/1604) Fran\u00e7oise Marguerite de Silly (????-1625), dame de Commercy \u2502 \u2502 \u2502 \u251c\u2500\u2500> Pierre de Gondi dit \u00ab Pierre de Joigny \u00bb (1602 \u00e0 Paris - 29\/04\/1676 \u00e0 Machecoul), duc de Retz et seigneur de Machecoul, comte de Joigny, marquis de Belle-\u00cele, marquis de La Garnache, baron de Mortagne et de La Hardouinaye, pair de France, g\u00e9n\u00e9ral des Gal\u00e8res de France, qui suit \u2502 \u2502 \u2502 \u251c\u2500\u2500> Jean-Fran\u00e7ois Paul de Gondi dit \u00ab le Cardinal de Retz \u00bb (20\/09\/1613-24\/08\/1679 \u00e0 Paris), seigneur de Commercy, cardinal, archev\u00eaque de Corinthe, archev\u00eaque de Paris, \u00e9v\u00eaque de Langres, abb\u00e9 de Saint-Denis, abb\u00e9 commendataire des abbayes Saint-Aubin d'Angers, La Chaume et Buzay \u2502 \u2502 \u2502 \u2514\u2500\u2500> Henri de Gondi, marquis de Belle-\u00cele \u2502 \u2514\u2500\u2500> Jean-Fran\u00e7ois de Gondi (1584-21\/03\/1654 \u00e0 Paris), cardinal de Retz, premier archev\u00eaque de Paris 1596 - 1634 : Henri de Gondi (1590-12\/08\/1659), duc de Retz et seigneur de Machecoul, duc de Beaupr\u00e9au, marquis de Belle-\u00cele et des \u00celes d'Hy\u00e8res, pair de France, petit-fils des deux pr\u00e9c\u00e9dents. Henri de Gondi (1590-12\/08\/1659), duc de Retz et seigneur de Machecoul, duc de Beaupr\u00e9au, marquis de Belle-\u00cele et des \u00celes d'Hy\u00e8res, pair de France, petit-fils des deux pr\u00e9c\u00e9dents x (15\/05\/1610) Jeanne de Sc\u00e9peaux (????-20\/11\/1620), duchesse de Beaupr\u00e9au, comtesse de Chemill\u00e9 \u2502 \u251c\u2500\u2500> Catherine de Gondi (28\/12\/1612-18\/09\/1677) \u2502 x (ao\u00fbt 1633) Pierre de Gondi dit \u00ab Pierre de Joigny \u00bb (1602 \u00e0 Paris - 29\/04\/1676 \u00e0 Machecoul), duc de Retz et seigneur de Machecoul, comte de Joigny, marquis de Belle-\u00cele, marquis de La Garnache, baron de Mortagne et de La Hardouinaye, pair de France, g\u00e9n\u00e9ral des Gal\u00e8res de France, qui suit \u2502 \u2514\u2500\u2500> Marguerite Fran\u00e7oise de Gondi (18\/04\/1615-31\/05\/1670), duchesse de Beaupr\u00e9au, comtesse de Chemill\u00e9 x (03\/05\/1644) Louis de Coss\u00e9-Brissac (05\/09\/1625-26\/02\/1661), duc de Brissac \u2502 \u251c\u2500\u2500> Henri-Albert de Coss\u00e9-Brissac (1645-29\/12\/1698), duc de Brissac \u2502 x Gabrielle Louise de Rouvroy-Saint-Simon (1646-1684) \u2502 \u2502 \u2502 \u251c\u2500\u2500> Sans post\u00e9rit\u00e9 \u2502 \u2502 \u2502 x \u00c9lisabeth de Verthamon (1658-1721) \u2502 \u2514\u2500\u2500> Marguerite-Marie de Coss\u00e9-Brissac (1648-1708) x (28\/03\/1662) Fran\u00e7ois de Neufville-Villeroy (07\/04\/1644 \u00e0 Lyon - 18\/07\/1730 \u00e0 Paris), duc de Villeroy, mar\u00e9chal de France \u2502 \u251c\u2500\u2500> Louis Nicolas VI de Neufville-Villeroy (24\/12\/1663-22\/04\/1734), duc de Retz et seigneur de Machecoul, duc de Villeroy, duc de Beaupr\u00e9au, marquis d'Alincourt, qui suit \u2502 \u251c\u2500\u2500> Madeleine Th\u00e9r\u00e8se de Neufville-Villeroy (1666-1723), religieuse \u2502 \u251c\u2500\u2500> Camille de Neufville-Villeroy \u2502 \u251c\u2500\u2500> Catherine Anne de Neufville-Villeroy (1674-1715), religieuse \u2502 \u251c\u2500\u2500> Fran\u00e7ois Paul de Neufville-Villeroy (1677-1731), archev\u00eaque de Lyon \u2502 \u251c\u2500\u2500> Fran\u00e7ois-Catherine de Neufville-Villeroy (????-1700) \u2502 \u2514\u2500\u2500> Fran\u00e7oise Madeleine de Neufville-Villeroy x Jean de Sousa, comte de Prado En 1634, Henri de Gondi se d\u00e9met de son titre de duc de Retz en faveur de son cousin germain et gendre Pierre de Gondi. 1634 - 1676 : Pierre de Gondi dit \u00ab Pierre de Joigny \u00bb (1602 \u00e0 Paris - 29\/04\/1676 \u00e0 Machecoul), duc de Retz et seigneur de Machecoul, comte de Joigny, marquis de Belle-\u00cele, marquis de La Garnache, baron de Mortagne et de La Hardouinaye, pair de France, g\u00e9n\u00e9ral des Gal\u00e8res de France, cousin germain et gendre du pr\u00e9c\u00e9dent. Pierre de Gondi dit \u00ab Pierre de Joigny \u00bb (1602 \u00e0 Paris - 29\/04\/1676 \u00e0 Machecoul), duc de Retz et seigneur de Machecoul, comte de Joigny, marquis de Belle-\u00cele, marquis de La Garnache, baron de Mortagne et de La Hardouinaye, pair de France, g\u00e9n\u00e9ral des Gal\u00e8res de France, cousin germain et gendre du pr\u00e9c\u00e9dent x (ao\u00fbt 1633) Catherine de Gondi (28\/12\/1677-18\/09\/1677) \u2502 \u251c\u2500\u2500> Marie-Catherine Antoinette de Gondi (1637-01\/07\/1716), religieuse sous le nom de S\u0153ur Antoinette de Sainte-Scholastique \u2502 \u2514\u2500\u2500> Paule-Marguerite Fran\u00e7oise de Gondi (12\/03\/1655 \u00e0 Machecoul - 21\/01\/1716 \u00e0 Paris), duchesse de Retz et dame de Machecoul, marquise de La Garnache, comtesse de Joigny, baronne de Mortagne, qui suit 1676 - 1716 : Paule-Marguerite Fran\u00e7oise de Gondi (12\/03\/1655 \u00e0 Machecoul - 21\/01\/1716 \u00e0 Paris), duchesse de Retz et dame de Machecoul, marquise de La Garnache, comtesse de Joigny, baronne de Mortagne, fille du pr\u00e9c\u00e9dent. Paule-Marguerite Fran\u00e7oise de Gondi (12\/03\/1655 \u00e0 Machecoul - 21\/01\/1716 \u00e0 Paris), duchesse de Retz et dame de Machecoul, marquise de La Garnache, comtesse de Joigny, baronne de Mortagne, fille du pr\u00e9c\u00e9dent x (12\/03\/1675) Fran\u00e7ois Emmanuel de Blanchefort-Cr\u00e9quy (d\u00e9cembre 1645-03\/05\/1681), duc de Retz et seigneur de Machecoul (du chef de sa femme), comte de Sault, duc de Lesdigui\u00e8res et pair de France, qui suit Maison de Cr\u00e9quy 1676 - 1681 : Fran\u00e7ois Emmanuel de Blanchefort-Cr\u00e9quy (d\u00e9cembre 1645-03\/05\/1681), duc de Retz et seigneur de Machecoul (du chef de sa femme), comte de Sault, duc de Lesdigui\u00e8res et pair de France, mari de la pr\u00e9c\u00e9dente. Fran\u00e7ois Emmanuel de Blanchefort-Cr\u00e9quy (d\u00e9cembre 1645-03\/05\/1681), duc de Retz et seigneur de Machecoul (du chef de sa femme), comte de Sault, duc de Lesdigui\u00e8res et pair de France, mari de la pr\u00e9c\u00e9dente x (12\/03\/1675) Paule-Marguerite Fran\u00e7oise de Gondi (12\/03\/1655 \u00e0 Machecoul - 21\/01\/1716 \u00e0 Paris), duchesse de Retz et dame de Machecoul, marquise de La Garnache, comtesse de Joigny, baronne de Mortagne, qui pr\u00e9c\u00e8de \u2502 \u2514\u2500\u2500> Jean-Fran\u00e7ois de Blanchefort-Cr\u00e9quy (03\/10\/1678-06\/10\/1703 \u00e0 Mod\u00e8ne en Italie) x (1696) Louise-Bernardine de Durfort \u2502 \u2514\u2500\u2500> Sans post\u00e9rit\u00e9 Maison de Neufville-Villeroy \u00c0 la mort de Paule-Marguerite Fran\u00e7oise de Gondi en 1716, la famille de Neufville-Villeroy (une ancienne famille aristocratique fran\u00e7aise, issue d'un Secr\u00e9taire des Finances de Louis XII) acquiert les duch\u00e9s de Retz et de Beaupr\u00e9au, alors d\u00e9pourvus de titulaires. Les Neufville-Villeroy sont apparent\u00e9s par les femmes aux Gondi (voir plus haut). 1716 - 1734 : Louis Nicolas VI de Neufville-Villeroy (24\/12\/1663 \u00e0 Paris - 22\/04\/1734 \u00e0 Paris), duc de Retz et seigneur de Machecoul, duc de Villeroy, duc de Beaupr\u00e9au, marquis d'Alincourt, petit-cousin de Paule-Marguerite Fran\u00e7oise de Gondi et arri\u00e8re-petit-fils d'Henri de Gondi. Louis Nicolas VI de Neufville-Villeroy (24\/12\/1663 \u00e0 Paris - 22\/04\/1734 \u00e0 Paris), duc de Retz et seigneur de Machecoul, duc de Villeroy, duc de Beaupr\u00e9au, marquis d'Alincourt, petit-cousin de Paule-Marguerite Fran\u00e7oise de Gondi et arri\u00e8re-petit-fils d'Henri de Gondi x (23\/04\/1694) Marguerite Le Tellier de Louvois (????-1711) \u2502 \u251c\u2500\u2500> Louis-Fran\u00e7ois Anne de Neufville-Villeroy (13\/10\/1695-22\/03\/1766), duc de Retz et seigneur de Machecoul, duc de Villeroy, duc de Beaupr\u00e9au, qui suit \u2502 \u251c\u2500\u2500> Fran\u00e7ois Camille de Neufville-Villeroy (????-1732), duc d'Alincourt \u2502 x Marie-Jos\u00e8phe de Boufflers \u2502 \u2502 \u2502 \u2514\u2500\u2500> Gabriel Louis Fran\u00e7ois de Neufville-Villeroy (08\/10\/1731-28\/04\/1794 \u00e0 Paris sur l'\u00e9chafaud), duc de Retz et seigneur de Machecoul, marquis de Neufville, duc de Villeroy, duc de Beaupr\u00e9au et d'Alincourt, comte de Sault, qui suit \u2502 \u251c\u2500\u2500> Marguerite Louise Sophie de Neufville-Villeroy (1698-1716) \u2502 x (1716) Fran\u00e7ois d'Harcourt (1689-1750), mar\u00e9chal de France \u2502 \u2514\u2500\u2500> Madeleine Ang\u00e9lique de Neufville-Villeroy (1707-1787) x (1721) Joseph Marie de Boufflers (1706-1747), duc de Boufflers 1734 - 1766 : Louis-Fran\u00e7ois Anne de Neufville-Villeroy (13\/10\/1695-22\/03\/1766), duc de Retz et seigneur de Machecoul, duc de Villeroy, duc de Beaupr\u00e9au, fils du pr\u00e9c\u00e9dent. Louis-Fran\u00e7ois Anne de Neufville-Villeroy (13\/10\/1695-22\/03\/1766), duc de Retz et seigneur de Machecoul, duc de Villeroy, duc de Beaupr\u00e9au, fils du pr\u00e9c\u00e9dent x (15\/04\/1716) Marie Ren\u00e9e de Montmorency-Luxembourg \u2502 \u2514\u2500\u2500> Sans post\u00e9rit\u00e9 1766 - 1778 : Gabriel Louis Fran\u00e7ois de Neufville-Villeroy (08\/10\/1731-28\/04\/1794 \u00e0 Paris sur l'\u00e9chafaud), duc de Retz et seigneur de Machecoul, marquis de Neufville, duc de Villeroy, duc de Beaupr\u00e9au et d'Alincourt, comte de Sault, neveu du pr\u00e9c\u00e9dent. Gabriel Louis Fran\u00e7ois de Neufville-Villeroy (08\/10\/1731-28\/04\/1794 \u00e0 Paris sur l'\u00e9chafaud), duc de Retz et seigneur de Machecoul, marquis de Neufville, duc de Villeroy, duc de Beaupr\u00e9au et d'Alincourt, comte de Sault, neveu du pr\u00e9c\u00e9dent x (13\/01\/1747) Jeanne Louise Constance d'Aumont (1731-1816) \u2502 \u2514\u2500\u2500> Sans post\u00e9rit\u00e9 Maison de Brie-Serrant Mis en vente en 1778, le duch\u00e9 de Retz, qui n'a plus d'h\u00e9ritier, est rachet\u00e9 par le marquis Alexandre de Brie-Serrant, non-apparent\u00e9 aux pr\u00e9c\u00e9dents ducs de Retz. 1778 - 1790 : Cl\u00e9ment Alexandre de Brie-Serrant (19\/05\/1748-1814), marquis de Serrant, page du roi Louis XV, chevalier, sous-lieutenant au r\u00e9giment de Bourgogne, duc puis baron de Retz, seigneur de Machecoul. Alexandre de Brie-Serrant \u00ab d\u00e9mant\u00e8le \u00bb alors le duch\u00e9 de Retz : il ne garde pour lui que les"} +{"id":"RedPajamaWikipedia.0001","text":"Yaoi ( ; ), also known as and its abbreviation , is a genre of fictional media originating in Japan that features homoerotic relationships between male characters. It is typically created by women for women and so is distinct from , the genre marketed to gay men, but it does also attract a male audience and can be produced by male creators. It spans a wide range of media, including manga, anime, drama CDs, novels, video games, television series, films, and fan works. \"Boys' love\" and \"BL\" are the generic terms for this kind of media in Japan and much of Asia; though the terms are used by some fans and commentators in the West, yaoi remains more generally prevalent in English. The genre originated in the 1970s as a subgenre of sh\u014djo manga, or comics for girls. Several terms were used for the new genre, including , , and . The term yaoi emerged in the late 1970s and early 1980s in the context of culture as a portmanteau of yama nashi, ochi nashi, imi nashi (\"no climax, no point, no meaning\"), where it was used in a self-deprecating manner to refer to amateur fan works that focused on sex to the exclusion of plot and character development, and that often parodied mainstream manga and anime by depicting male characters from popular series in sexual scenarios. \"Boys' love\" was later adopted by Japanese publications in the 1990s as an umbrella term for male-male romance media marketed to women. Concepts and themes associated with yaoi include androgynous men known as bish\u014dnen; diminished female characters; narratives that emphasize homosociality and de-emphasize socio-cultural homophobia; and depictions of rape. A defining characteristic of yaoi is the practice of pairing characters in relationships according to the roles of seme, the sexual top or active pursuer, and uke, the sexual bottom or passive pursued. Yaoi has a robust global presence, having spread since the 1990s through international licensing and distribution, as well as through unlicensed circulation of works by yaoi fans online. Yaoi works, culture, and fandom have been studied and discussed by scholars and journalists worldwide. Etymology and terminology Multiple terms exist to describe Japanese and Japanese-influenced male-male romance fiction as a genre. In a 2015 survey of professional Japanese male-male romance fiction writers by Kazuko Suzuki, five primary subgenres were identified: While the term sh\u014dnen-ai historically connoted ephebophilia or pederasty, beginning in the 1970s it was used to describe a new genre of sh\u014djo manga (girls' manga) featuring romance between bish\u014dnen ( \"beautiful boys\"), a term for androgynous or effeminate male characters. Early sh\u014dnen-ai works were inspired by European literature, the writings of Taruho Inagaki, and the Bildungsroman genre. Sh\u014dnen-ai often features references to literature, history, science, and philosophy; Suzuki describes the genre as being \"pedantic\" and \"difficult to understand\", with \"philosophical and abstract musings\" that challenged young readers who were often only able to understand the references and deeper themes as they grew older. A subgenre that focuses on the worship of beauty, and on romance between older men and beautiful youths. Tanbi as a term and concept predates male-male romance manga that emerged in the 1970s, having been used to describe prose fiction authors with distinctive aesthetic styles such as Yukio Mishima and Jun'ichir\u014d Tanizaki. Tanbi works are typically defined by their poetic prose and unusual kanji, such as Chinese characters appropriated into Japanese script. Derived from the eponymous male-male romance manga magazine first published in 1978, the term was originally used to describe works that resembled the art style of manga published in that magazine. It has also been used to describe amateur works depicting male homosexuality that are original creations and not derivative works. By the 1990s, the term had largely fallen out of use in favor of \"boys' love\"; it has been suggested that publishers wishing to get a foothold in the June market coined \"boys' love\" to disassociate the genre from the publisher of June. Coined in the late 1970s by manga artists Yasuko Sakata and Akiko Hatsu, yaoi is a portmanteau of , which translates to \"no climax, no point, no meaning\". Initially used by artists as a self-deprecating and ironic euphemism, the portmanteau refers to how early yaoi works typically focused on sex to the exclusion of plot and character development; it is also a subversive reference to the classical Japanese narrative structure of introduction, development, twist, and conclusion. Typically written as the acronym , or alternately as \"boy's love\" or \"boys love\", the term is a wasei-eigo construction derived from the literal English translation of sh\u014dnen-ai. First used in 1991 by the magazine Image in an effort to collect these disparate genres under a single term, the term became widely popularized in 1994 after being used by the magazine . \"BL\" is the common term used to describe male-male romance media marketed to women in Japan and much of Asia, though its usage in the West is inconsistent. Despite attempts by researchers to codify differences between these subgenres, in practice these terms are used interchangeably. Kazumi Nagaike and Tomoko Aoyama note that while BL and yaoi are the most common generic terms for this kind of media, they specifically avoid attempts at defining subgenres, noting that the differences between them are ill-defined and that even when differentiated, the subgenres \"remain thematically intertwined.\" In Suzuki's investigation of these subgenres, she notes that \"there is no appropriate and convenient Japanese shorthand term to embrace all subgenres of male-male love fiction by and for women.\" While yaoi has become an umbrella term in the West for Japanese-influenced comics with male-male relationships, and it is the term preferentially used by American manga publishers for works of this kind, Japan uses the term yaoi to denote d\u014djinshi and works that focus on sex scenes. In both usages, yaoi and boys' love excludes gay manga (bara), a genre which also depicts gay male sexual relationships, but is written for and mostly by gay men. In the West, the term sh\u014dnen-ai is sometimes used to describe titles that focus on romance over explicit sexual content, while yaoi is used to describe titles that primarily feature sexually explicit themes and subject material. Yaoi can also be used by Western fans as a label for anime or manga-based slash fiction. The Japanese use of yaoi to denote only works with explicit scenes sometimes clashes with the Western use of the word to describe the genre as a whole, creating confusion between Japanese and Western audiences. History Before 1970: The origins of sh\u014dnen-ai Homosexuality and androgyny have a history in Japan dating to ancient times, as seen in practices such as and . The country shifted away from a tolerance of homosexuality amid Westernization during the Meiji Era (1868-1912), and moved towards hostile social attitudes towards homosexuality and the implementation of anti-sodomy laws. In the face of this legal and cultural shift, artists who depicted male homosexuality in their work typically did so through subtext. Illustrations by in the sh\u014dnen manga (boys' comics) magazine Nihon Sh\u014dnen formed the foundation of what would become the aesthetic of bish\u014dnen: boys and young men, often in homosocial or homoerotic contexts, who are defined by their \"ambivalent passivity, fragility, ephemerality, and softness.\" The 1961 novel A Lovers' Forest by tanbi writer Mari Mori, which follows the relationship between a professor and his younger male lover, is regarded as an influential precursor to the sh\u014dnen-ai genre. Mori's works were influenced by European literature, particularly Gothic literature, and laid the foundation for many of the common tropes of sh\u014dnen-ai and yaoi: western exoticism, educated and wealthy characters, significant age differences among couples, and fanciful or even surreal settings. In manga, the concept of emerged in the late 1950s, which sought to use manga to tell serious and grounded stories aimed at adult audiences. Gekiga inspired the creation of manga that depicted realistic human relationships, and opened the way for manga that explored human sexuality in a non-pornographic context. Hideko Mizuno's 1969 sh\u014djo manga (girls' comics) series Fire! (1969\u20131971), which eroticized its male protagonists and depicted male homosexuality in American rock and roll culture, is noted as an influential work in this regard. 1970s and 1980s: From sh\u014dnen-ai to yaoi Contemporary Japanese homoerotic romance manga originated in the 1970s as a subgenre of sh\u014djo manga. The decade saw the arrival of a new generation of sh\u014djo manga artists, most notable among them the Year 24 Group. The Year 24 Group contributed significantly to the development of the sh\u014djo manga, introducing a greater diversity of themes and subject material to the genre that drew inspiration from by Japanese and European literature, cinema, and history. Members of the group, including Keiko Takemiya and Moto Hagio, created works that depicted male homosexuality: In The Sunroom (1970) by Takemiya is considered the first work of the genre that would become known as sh\u014dnen-ai, followed by Hagio's The November Gymnasium (1971). Takemiya, Hagio, Toshie Kihara, Ryoko Yamagishi, and Kaoru Kurimoto were among the most significant sh\u014dnen-ai artists of this era; notable works include The Heart of Thomas (1974\u20131975) by Hagio and Kaze to Ki no Uta (1976-1984) by Takemiya. Works by these artists typically featured tragic romances between androgynous bish\u014dnen in historic European settings. Though these works were nominally aimed at an audience of adolescent girls and young women, they also attracted adult gay and lesbian readers. During this same period, the first gay manga magazines were published: Barazoku, the first commercially circulated gay men's magazine in Japan, was published in 1971, and served as a major influence on Takemiya and the development of sh\u014dnen-ai. The (self-published works) subculture emerged contemporaneously in the 1970s (see Media below), and in 1975, the first Comiket was held as a gathering of amateur artists who produce . The term yaoi, initially used by some creators of male-male romance to describe their creations ironically, emerged to describe amateur works that were influenced by and gay manga. Early yaoi produced for Comiket were typically derivative works, with glam rock artists such as David Bowie and Queen as popular subjects as a result of the influence of Fire!; yaoi were also more sexually explicit than sh\u014dnen-ai. In reaction to the success of sh\u014dnen-ai and early yaoi, publishers sought to exploit the market by creating magazines devoted to the genre. Young female illustrators cemented themselves in the manga industry by publishing yaoi works, with this genre later becoming \"a transnational subculture.\" Publishing house , which published the gay manga magazine , launched the magazine June in 1978, while launched Allan in 1980. Both magazines initially specialized in sh\u014dnen-ai, which Magazine Magazine described as \"halfway between tanbi literature and pornography,\" and also published articles on homosexuality, literary fiction, illustrations, and amateur yaoi works. The success of June was such that the term June-mono or more simply June began to compete with the term sh\u014dnen-ai to describe works depicting male homosexuality. By the late 1980s, the popularity of professionally published sh\u014dnen-ai was declining, and yaoi published as d\u014djinshi was becoming more popular. Mainstream sh\u014dnen manga with Japanese settings such as Captain Tsubasa became popular source material for derivative works by yaoi creators, and the genre increasingly depicted Japanese settings over western settings. Works influenced by sh\u014dnen-ai in the 1980s began to depict older protagonists and adopted a realist style in both plot and artwork, as typified by manga such as Banana Fish (1985\u20131994) by Akimi Yoshida and Tomoi (1986) by . The 1980s also saw the proliferation of yaoi into anime, drama CDs, and light novels; the 1982 anime adaptation of Patalliro! was the first television anime to depict sh\u014dnen-ai themes, while Kaze to Ki no Uta and Earthian were adapted into anime in the original video animation (home video) format in 1987 and 1989, respectively. 1990s: Mainstream popularity and yaoi rons\u014d The growing popularity of yaoi attracted the attention of manga magazine editors, many of whom recruited yaoi authors to their publications; Zetsuai 1989 (1989\u20131991) by Minami Ozaki, a yaoi series published in the sh\u014djo magazine Margaret, was originally a Captain Tsubasa created by Ozaki that she adapted into an original work. By 1990, seven Japanese publishers included yaoi content in their offerings, which kickstarted the commercial publishing market of the genre. Between 1990 and 1995, thirty magazines devoted to yaoi were established: Magazine Be \u00d7 Boy, founded in 1993, became one of the most influential yaoi manga magazines of this era. The manga in these magazines were influenced by realist stories like Banana Fish, and moved away from the sh\u014dnen-ai standards of the 1970s and 1980s. Sh\u014dnen-ai works that were published during this period were typically comedies rather than melodramas, such as Gravitation (1996\u20132002) by Maki Murakami. Consequently, yaoi and \"boys' love\" (BL) came to be the most popular terms to describe works depicting male-male romance, eclipsing sh\u014dnen-ai and June. An increasing proportion of sh\u014djo manga in the 1990s began to integrate yaoi elements into their plots. The manga artist group Clamp, which itself began as a group creating yaoi , published multiple works containing yaoi elements during this period, such as RG Veda (1990\u20131995), Tokyo Babylon (1991\u20131994), and Cardcaptor Sakura (1996\u20132000). When these works were released in North America, they were among the first yaoi-influenced media to be encountered by Western audiences. BL gained popularity in mainland China in the late 1990s; the country subsequently outlawed the publishing and distribution of BL works. The mid-1990s saw the so-called \"yaoi debate\" or yaoi rons\u014d (\u3084 \u304a \u3044 \u8ad6\u4e89), a debate held primarily in a series of essays published in the feminist magazine Choisir from 1992 to 1997. In an open letter, Japanese gay writer Masaki Satou criticized the genre as homophobic for not depicting gay men accurately, heterosexist by reinforcing the misogyny of Japanese society, and called fans of yaoi \"disgusting women\" who \"have a perverse interest in sexual intercourse between men.\" A years-long debate ensued, with yaoi fans and artists contending that yaoi is entertainment for women that does not seek to be a realistic depiction of homosexuality, and instead serves as a refuge from the misogyny of Japanese society. The scholarly debate that the yaoi rons\u014d engendered led to the formation of the field of \"BL studies\", which focus on the study of BL and the relationship between women and BL. It additionally impacted creators of yaoi: author Chiyo Kurihara abandoned yaoi to focus on heterosexual pornography as a result of the yaoi rons\u014d, while Hisako Takamatsu took into account the arguments of the genre's critics to create works more accommodating of a gay audience. 2000s\u2013present: Globalization of yaoi and BL The economic crisis caused by the Lost Decade came to affect the manga industry in the late 1990s and early 2000s, but did not particularly impact the yaoi market; on the contrary, yaoi magazines continued to proliferate during this period, and sales of yaoi media increased. In 2004, Otome Road in Ikebukuro emerged as a major cultural destination for yaoi fandom, with multiple stores dedicated to sh\u014djo and yaoi goods. The 2000s also saw an increase in male readers of yaoi, with a 2008 bookstore survey finding that between 25 and 30 percent of yaoi readers were male. The 2000s saw significant growth of yaoi in international markets, beginning with the founding of the American anime convention Yaoi-Con in 2001. The first officially-licensed English-language translations of yaoi manga were published in the North American market in 2003 (see Media below); the market expanded rapidly before contracting in 2008 as a result of the global financial crisis of 2007\u20132008, but continued to grow slowly in the following years. South Korea saw the development of BL in the form of manhwa, notably Martin and John (2006) by Park Hee-jung and Crush on You (2006) by Lee Kyung-ha. The 2010s and 2020s saw an increase in the popularity of yaoi-influenced media in China and Thailand in the form of web novels, live-action films, and live-action television dramas (see Media below). Though \"boys' love\" and \"BL\" have become the generic terms for this material across Asia, in Thailand, BL dramas are sometimes referred to as \"Y\" or \"Y series\" as a shorthand for yaoi. Thai Series Y explicitly adapts the content of Japanese BL to the Thai local context and in recent years has become increasingly popular with fans around the world who often view Thai BL as separate to its Japanese antecedents. Thai BL also deliberately borrows from K-pop celebrity culture in the development of its own style of idols known as khu jin (imaginary couples) who are designed to be paired together by Thai BL's predominantly female fans. For cultural anthropologist Thomas Baudinette, BL series produced in Thailand represent the next stage in the historic development of yaoi, which is increasingly becoming \"dislocated\" from Japan among international fans' understanding of the genre. While yaoi fandom in China traces back to the late 1990s as danmei (the Mandarin reading of the Japanese term tanbi), state regulations in China made it difficult for danmei writers to publish their works online, with a 2009 ordinance by the National Publishing Administration of China banning most danmei online fiction. In 2015, laws prohibiting depictions of same-sex relationships in television and film were implemented in China. The growth in streaming service providers in the 2010s is regarded as a driving force behind the production of BL dramas across Asia, as online distribution provides a platform for media containing non heterosexual material, which is frequently not permitted on broadcast television. Concepts and themes Bish\u014dnen The protagonists of yaoi are often , \"highly idealised\" boys and young men who blend both masculine and feminine qualities. Bish\u014dnen as a concept can be found disparately throughout East Asia, but its specific aesthetic manifestation in 1970s sh\u014djo manga (and subsequently in yaoi manga) drew influence from popular culture of the era, including glam rock artists such as David Bowie, actor Bj\u00f6rn Andr\u00e9sen's portrayal of Thaddeus in the 1971 film adaptation of Death in Venice, and kabuki onnagata Band\u014d Tamasabur\u014d. Though bish\u014dnen are not exclusive to yaoi, the androgyny of bish\u014dnen is often exploited to explore notions of sexuality and gender in yaoi works. The late 2010s saw the increasing popularity of masculine men in yaoi that are reminiscent of the body types typical in gay manga, with growing emphasis on stories featuring muscular bodies and older characters. A 2017 survey by yaoi publisher Jun\u00e9 Manga found that while over 80% of their readership previously preferred bish\u014dnen body types exclusively, 65% now enjoy both bish\u014dnen and muscular body types. Critics and commentators have noted that this shift in preferences among yaoi readers, and subsequent creation of works that feature characteristics of both yaoi and gay manga, represents a blurring of the distinctions between the genres; anthropologist Thomas Baudinette notes in his fieldwork that gay men in Japan \"saw no need to sharply disassociate BL from [gay manga] when discussing their consumption of 'gay media'.\" Seme and uke The two participants in a yaoi relationship (and to a lesser extent in yuri) are often referred to as and . These terms originated in martial arts, and were later appropriated as Japanese LGBT slang to refer to the insertive and receptive partners in anal sex. Aleardo Zanghellini suggests that the martial arts terms have special significance to a Japanese audience, as an archetype of the gay male relationship in Japan includes same-sex love between samurai and their companions. He suggests that the samurai archetype is responsible for age differences and hierarchical variations in power of some relationships portrayed in yaoi and boys' love. The seme is often depicted as restrained, physically powerful, and protective; he is generally older and taller, with a stronger chin, shorter hair, smaller eyes, and a more stereotypically masculine and \"macho\" demeanour than the uke. The seme usually pursues the uke, who often has softer, androgynous, feminine features with bigger eyes and a smaller build, and is often physically weaker than the seme. The roles of seme and uke can alternatively be established by who is dominant in the relationship; a character can take the uke role even if he is not presented as feminine, simply by being juxtaposed against and pursued by a more dominant and masculine character. Anal sex is ubiquitous in yaoi, and is typically rendered explicitly and not merely implied; Zanghellini notes that illustrations of anal sex almost always position the characters to face each other rather than \"doggy style\", and that the uke rarely fellates the seme, but instead receives the sexual and romantic attentions of the seme. Though McLelland notes that authors are typically \"interested in exploring, not repudiating\" the dynamics between the seme and uke, not all works adhere to seme and uke tropes. The possibility of switching roles is often a source of playful teasing and sexual excitement for the characters, indicating an interest among many genre authors in exploring the performative nature of the roles. , a shorthand for \"reversible\" (\u30ea\u30d0\u30fc\u30b7\u30d6\u30eb), is used to describe couples where the seme and uke roles are not strictly defined. Occasionally, authors will forego the stylisations of the seme and uke to portray both lovers as \"equally attractive handsome men\", or will subvert expectations of dominance by depicting the active pursuer in the relationship as taking the passive role during sex. In other instances, the uke is portrayed as the aggressor in the relationship; in these instances, the roles are sometimes referred to as and . Diminished female characters Female characters often have minor roles in yaoi, or are absent altogether. Suzuki notes that mothers in particular are often portrayed in a negative light; she suggests this is because the character and reader alike are seeking to substitute the absence of unconditional maternal love with the \"forbidden\" all-consuming love presented in yaoi. In yaoi parodies based on existing works that include female characters, the female's role is typically either minimized or the character is killed off. Yukari Fujimoto noted that when sh\u014dnen manga is used as inspiration for yaoi, that \"it seems that yaoi readings and likeable female characters are mutually exclusive.\" Nariko Enomoto, a yaoi author, argues that women are typically not depicted in yaoi as their presence adds an element of realism that distracts from the fantasy narrative. Since the late 2000s, women have appeared more frequently in yaoi works as supporting characters. Lunsing notes that early sh\u014dnen-ai and yaoi were often regarded as misogynistic, with the diminished role of female characters cited as evidence of the internalized misogyny of the genre's largely female readership. He suggests that the decline of these misogynistic representations over time is evidence that female yaoi readers \"overcame this hate, possibly thanks to their involvement with yaoi.\" Gay equality Yaoi stories are often strongly homosocial, giving men freedom to bond and pursue shared goals together (as in dojinshi adaptations of sh\u014dnen manga), or to rival each other (as in Embracing Love). This spiritual bond and equal partnership is depicted as overcoming the male-female gender hierarchy. As is typical in romance fiction, couples depicted in yaoi stories often must overcome obstacles that are emotional or psychological rather than physical. Akiko Mizoguchi notes that while early yaoi stories depicted homosexuality as a source of shame to heighten dramatic tension in this regard, beginning in the mid-2000s the genre began to depict gay identity with greater sensitivity and nuance, with series such as Brilliant Blue featuring stories of coming out and the characters' gradual acceptance within the wider community. Yaoi typically depicts Japanese society as more accepting of LGBT people than it is in reality, which Mizoguchi contends is a form of activism among yaoi authors. Some longer-form stories such as Fake and Kizuna: Bonds of Love have the couple form a family unit, depicting them cohabiting and adopting children. It is also possible that they marry and have children, as in Omegaverse publications. Fujimoto cites Ossan's Love (2016\u20132018) and other BL television dramas that emerged in the 2010s as a \"'missing link' to bridge the gap between BL fiction and gay people,\" arguing that when BL narratives are presented using human actors, it produces a \"subconscious change in the perception of viewers\" towards acceptance of homosexuality. Although gay male characters are empowered in yaoi, the genre rarely addresses the reality of socio-cultural homophobia. According to Hisako Miyoshi, vice editor-in-chief for Libre Publishing, while earlier yaoi focused \"more on the homosexual way of life from a realistic perspective\", over time the genre has become less realistic and more comedic, and the stories are \"simply for entertainment\". Yaoi manga often have fantastical, historical or futuristic settings, and many fans consider the genre to be escapist fiction. Homophobia, when it is presented as an issue at all, is used as a plot device to heighten drama, or to show the purity of the leads' love. Rachel Thorn has suggested that as yaoi is primarily a romance genre, its readers may be turned off by political themes such as homophobia. Yaoi author Makoto Tateno expressed scepticism that realistic depictions of gay men's lives would become common in yaoi \"because girls like fiction more than realism\". Alan Williams argues that the lack of a gay identity in yaoi is due to yaoi being postmodern, stating that \"a common utterance in the genre\u2014when a character claims that he is 'not gay, but just in love with a man'\u2014has both homophobic (or modern) temporal undertones but also non-identitarian (postmodern) ones.\" In 2019, BL manga magazine editors have stated that stories where a man is concerned about coming out as gay have become uncommon and the trope can be seen as outdated if used as a source of conflict between the characters. Rape Rape fantasy is a theme commonly associated with yaoi. Anal sex is understood as a means of expressing commitment to a partner, and in yaoi, the \"apparent violence\" of rape is transformed into a \"measure of passion\". Rape scenes in yaoi are rarely presented as crimes with an assaulter and a victim: scenes where a seme rapes an uke are not depicted as symptomatic of the violent desires of the seme, but rather as evidence of the uncontrollable attraction felt by the seme towards the uke. Such scenes are often a plot device used to make the uke see the seme as more than just a good friend, and typically result in the uke falling in love with the seme. While Japanese society often shuns or looks down upon women who are raped in reality, the yaoi genre depicts men who are raped as still \"imbued with innocence\" and are typically still loved by their rapists after the act, a trope that may have originated with Kaze to Ki no Uta. Kristy Valenti of The Comics Journal notes that rape narratives typically focus on how \"irresistible\" the uke is and how the seme \"cannot control himself\" in his presence, thus absolving the seme of responsibility for his rape of the uke. She notes this is likely why the narrative climax of many yaoi stories depicts the seme recognizing, and taking responsibility for, his sexual desires. Conversely, some yaoi stories such as Under Grand Hotel subvert the rape fantasy trope entirely by presenting rape as a negative and traumatic act. A 2012 survey of English-language yaoi fans found that just 15 percent of respondents reported that the presence of rape in yaoi media made them uncomfortable, as the majority of respondents could distinguish between the \"fantasy, genre-driven rape\" of yaoi and rape as a crime in reality. This \"surprisingly high tolerance\" for depictions of rape is contextualized by a content analysis, which found that just 13 percent of all original Japanese yaoi available commercially in English contains depictions of rape. These findings are argued as \"possibly belying the perception that rape is almost ubiquitous in BL\/yaoi.\" Tragedy Tragic narratives that focused on the suffering of the protagonists were popular early June stories, particularly stories that ended in one or both members of the central couple dying from suicide. By the mid-1990s, happy endings were more common; when tragic endings are shown, the cause is typically not an interpersonal conflict between the couple, but \"the cruel and intrusive demands of an uncompromising outside world\". Thorn theorizes that depictions of tragedy and abuse in yaoi exist to allow the audience \"to come to terms in some way with their own experiences of abuse.\" Subgenres and related genres , also known as or is a genre focused on male same-sex love, as created primarily by gay men for a gay male audience. Gay manga typically focuses on masculine men with varying degrees of muscle, body fat, and body hair, in contrast to the androgynous bish\u014dnen of yaoi. Graham Kolbeins writes in Massive: Gay Erotic Manga and the Men Who Make It that while yaoi can be understood as a primarily feminist phenomenon, in that it depicts sex that is free of the patriarchal trappings of heterosexual pornography, gay manga is primarily an expression of gay male identity. The early 2000s saw a degree of overlap between yaoi and gay manga in BDSM-themed publications: the yaoi BDSM anthology magazine had several male contributors, while several female yaoi authors have contributed stories to BDSM-themed gay manga anthologies or special issues, occasionally under male pen names. is a genre that depicts prepubescent or pubescent boys in a romantic or pornographic context. Originating as an offshoot of yaoi in the early 1980s, the subgenre was later adopted by male readers and became influenced by lolicon (works depicting prepubescent or pubescent girls); the conflation of shotacon in its contemporary usage with yaoi is thus not universally accepted, as the genre constitutes material that marketed to both male and female audiences. Omegaverse is a male-male romance subgenre that originated from the American series Supernatural and in the 2010s became a subgenre of both commercial and non-commercial yaoi. Stories in the genre are premised on societies wherein humans are divided into a dominance hierarchy of dominant \"alphas\", neutral \"betas\", and submissive \"omegas\". These terms are derived from those used in ethology to describe social hierarchies in animals. Ezaki, an editor from Magazine Be \u00d7 Boy, has expressed that the subgenre's popularity in Japan was because of the class system as well as the idea of heat and pregnancy. The dom\/sub universe subgenre was introduced in 2017 and gained popularity in 2021. The subgenre uses BDSM elements and also drew influences from Omegaverse, particularly the caste system. Media In 2003, 3.8% of weekly Japanese manga magazines were dedicated exclusively to BL. Notable ongoing and defunct magazines include Magazine Be \u00d7 Boy, June, Craft, Chara, Dear+, Opera, , and Gush. Several of these magazines were established as companion publications to sh\u014djo manga magazines, as they include material considered too explicit for an all-ages audience; Ciel was established as a companion to Monthly Asuka, while Dear+ was established as a companion to Wings. A 2008 assessment estimated that the Japanese commercial BL market grossed approximately annually, with novel sales generating per month, manga generating per month, CDs generating per month, and video games generating per month. A 2010 report estimated that the Japanese BL market was worth approximately in both 2009 and 2010. In 2019, editors from Lynx, Magazine Be \u00d7 Boy, and On BLUE have stated that, with the growth of BL artists in Taiwan and South Korea, they have recruited and published several of their works in Japan with expectations that the BL manga industry will diversify. Fan works () The (i.e., self-published fan works) subculture emerged contemporaneously with yaoi subculture and Western fan fiction culture in the 1970s. Characteristic similarities of fan works in both Japan and the West include non-adherence to a standard narrative structures and a particular popularity of science fiction themes. Early yaoi d\u014djinshi were amateur publications that were not controlled by media restrictions, were typically derivative works based on existing manga and anime, and were often written by teenagers for an adolescent audience. Several legitimate manga artists produce or produced d\u014djinshi: the manga artist group Clamp began as an amateur d\u014djinshi circle creating yaoi works based on Saint Seiya, while Kodaka Kazuma and Fumi Yoshinaga have produced d\u014djinshi concurrently with professionally-published works. Many publishing companies review yaoi d\u014djinshi to recruit talented amateurs; this practice has led to careers in mainstream manga for Youka Nitta, Shungiku Nakamura, and others. Typically, yaoi d\u014djinshi feature male-male pairings from non-romantic manga and anime. Much of the material derives from male-oriented sh\u014dnen and seinen works, which contain close male-male friendships perceived by fans to imply elements of homoeroticism, such as with Captain Tsubasa and Saint Seiya, two titles which popularized yaoi in the 1980s. Weekly Shonen Jump is known to have a large female readership who engage in yaoi readings; publishers of sh\u014dnen manga may create \"homoerotic-themed\" merchandise as fan service to their BL fans. Yaoi fans may ship any male-male pairing, sometimes pairing off a favourite character, or create a story about two original male characters and incorporate established characters into the story. Any male character may become the subject of a yaoi d\u014djinshi, including characters from non-manga titles such as Harry Potter or The Lord of the Rings, video games such as Final Fantasy, or real people such as actors and politicians. Amateur authors may also create characters out of personifications of abstract concepts (as in the personification of countries in Hetalia: Axis Powers) or complementary objects like salt and pepper. In Japan, the labeling of yaoi d\u014djinshi is typically composed of the two lead characters' names, separated by a multiplication sign, with the seme being first and the uke being second. Outside of Japan, the 2000 broadcast of Mobile Suit Gundam Wing in North America on Cartoon Network is noted as crucial to the development of Western yaoi fan works, particularly fan fiction. As yaoi fan fiction is often compared to the Western fan practice of slash, it is important to understand the subtle differences between them. Levi notes that \"the youthful teen look that so easily translates into androgyny in boys' love manga, and allows for so many layered interpretations of sex and gender, is much harder for slash writers to achieve.\" English-language publishing The first officially-licensed English-language translations of yaoi manga were published in the North American market in 2003; by 2006, there were roughly 130 English-translated yaoi works commercially available, and by 2007, over 10 publishers in North America published yaoi. Notable current English-language publishers of yaoi include Viz Media under their SuBLime imprint, Digital Manga Publishing under their 801 Media and Jun\u00e9 imprints, Media Blasters under their Kitty Media imprint, Seven Seas Entertainment, and Tokyopop. Notable defunct English-language publishers of yaoi include Central Park Media under their Be Beautiful imprint, Broccoli under their Boysenberry imprint, and Aurora Publishing under their Deux Press imprint. Among the 135 yaoi manga published in North America between 2003 and 2006, 14% were rated for readers aged 13 years or over, 39% were rated for readers aged 15 or older, and 47% were rated for readers age 18 and up. Restrictions among American booksellers often led publishers to label books conservatively, often rating books originally intended for a mid-teen readership as 18+ and distributing them in shrinkwrap. Diamond Comic Distributors valued the sales of yaoi manga in the United States at approximately US$6 million in 2007. Marketing was significant in the transnational travel of yaoi from Japan to the United States, and led to yaoi to attract a following of LGBT fans in the United States. The 1994 original video animation adaptation of Kizuna: Bonds of Love was distributed by Ariztical Entertainment, which specializes in LGBT cinema and marketed the title as \"the first gay male anime to be released on DVD in the US.\" The film was reviewed in the American LGBT magazine The Advocate, which compared the film to gay art house cinema. A large portion of Western fans choose to pirate yaoi material because they are unable or unwilling to obtain it through sanctioned methods. Scanlations and other fan translation efforts of both commercially published Japanese works and amateur dojinshi are common. Original English-language yaoi When yaoi initially gained popularity in the United States in the early 2000s, several American artists began creating original English-language manga for female readers featuring male-male couples referred to as \"American yaoi\". The first known commercially published original English-language yaoi comic is Sexual Espionage #1 by Daria McGrain, published by Sin Factory in May 2002. As international artists began creating yaoi works, the term \"American yaoi\" fell out of use and was replaced by terms like \"original English language yaoi\", \"global yaoi\", and \"global BL\". The majority of publishers creating original English-language yaoi manga are now defunct, including Yaoi Press, DramaQueen, and Iris Print. Digital Manga Publishing last published original English-language yaoi manga in 2012; outside of the United States, German publisher Carlsen Manga also published original yaoi works. Audio dramas Yaoi audio dramas, occasionally referred to as \"drama CDs\", \"sound dramas\", or \"BLCDs\", are recorded voice performances of male-male romance scenarios performed by primarily male voice actors. They are typically adaptations of original yaoi manga and novels. The first yaoi audio dramas were released in the 1980s, beginning with Tsuzumigafuchi in 1988, which was published as a \"June cassette\". With the introduction of CDs, yaoi audio dramas continued to proliferate, peaking at 289 total yaoi CDs released in 2008, which dropped to 108 CDs in 2013. Live action television and film Japan While Japanese BL manga has been adapted into live action films and television dramas since the early 2000s, these works were marketed towards a niche audience of BL fans rather than towards a general audience. When these works were adapted for a general audience, same-sex romance elements were typically downplayed or removed entirely, as in the live-action television adaption of Antique Bakery that aired on Fuji TV in 2001. The development of Japanese live-action television dramas that focus on BL and same-sex romance themes explicitly was spurred by the critical and commercial success of the TV Asahi television drama Ossan's Love (2016), which features an all-male love triangle as its central plot conceit. While Ossan's Love is an original series, it influenced the creation of live-action BL works adpated from manga that are marketed towards mass audiences; notable examples include the television dramas (2018) on Fuji TV, What Did You Eat Yesterday? (2019) on TV Tokyo, and Cherry Magic! Thirty Years of Virginity Can Make You a Wizard?! (2020) on TV Tokyo, and the live-action film adaptation of The Cornered Mouse Dreams of Cheese (2020). In 2022, Kadokawa Corporation employee Kaoru Azuma stated that while establishing Tunku, Kadokawa's label for publishing live-action boys' love drama series, she noticed that prejudice against boys' love has dwindled, and that many people have seemed to accept the genre as \"normal.\". Thailand The Thai romantic drama film Love of Siam (2007), which features a gay male romance storyline, found unexpected mainstream success upon its release and grossed over TH\u0e3f40 million at the box office. This was followed by Love Sick: The Series (2014\u20132015), the first Thai television series to feature two gay characters as the lead roles. Cultural anthropologist Thomas Baudinette argues that Love Sick: The Series represented a \"watershed moment\" in the depiction of queer romance in Thai media, exploring how the series adapted tropes from Japanese BL to create a new genre of media. While Japanese BL manga attracted an audience in Thailand as early as the 1990s, the success of Love of Siam and Love Sick kick-started the production of domestic BL dramas: between 2014 and 2020, 57 television series in the BL genre were produced and released in Thailand. Beginning in 2020, Thai BL dramas gained international recognition after the release of 2gether: The Series, which attracted widespread acclaim for its family-friendly themes, lighthearted plot, and positive depictions of gay men. Major producers of Thai BL include GMMTV, a subsidiary of GMM Grammy, which has produced 2gether, SOTUS: The Series (2016\u20132017), Dark Blue Kiss (2019), and Theory of Love (2019); and Line Corporation, which produces BL dramas in Thailand for distribution on its Line TV platform. The genre has seen some backlash from conservative elements in Thai society: in 2020, the National Broadcasting and Telecommunications Commission introduced new guidelines around material containing \"sexually explicit or suggestive\" scenes, while public broadcaster MCOT cancelled the BL series Love by Chance in 2018. Thai BL dramas are noted as having gained popularity in Indonesia, where LGBT representation in domestic television is less common; as well as in the Philippines, where many fans view BL as an originally Thai form of popular culture. It has been suggested that BL dramas could become a source of Thai cultural soft power in Southeast Asia and beyond. China Homosexuality is neither prohibited nor legally recognized in mainland China, and laws regarding the censorship of LGBT material are unevenly enforced; regardless, such content is \"deemed sensitive and is inconsistently but regularly removed\" from distribution. Addicted (2016), the first Chinese BL web series, accumulated 10 million views before being pulled from the streaming platform iQiyi. In reaction to state censorship, Chinese BL works typically depict male-male romance as homoerotic subtext: the web novel Guardian (2012) depicted a romance between its two lead male characters, though when it was adapted into a television drama on the streaming platform Youku in 2018, the relationship was rendered as a close, homoerotic friendship. The BL Xianxia novel Mo Dao Zu Shi (2015) was adapted into an animated series in 2018 and the live-action television series The Untamed in 2019, which similarly revise the nature of the relationship between the lead male characters. Despite this, The Untamed was praised for avoiding censorship while maintaining the \"slow-burn heat\" of the source material; fans of both Guardian and The Untamed discussed the series' gay content under the hashtag \"socialist brotherhood\" to avoid detection from state censors. Video games Boys' love and yaoi video games typically consist of visual novels or eroge oriented around male-male couples. The first yaoi game to receive an officially-licensed English-language release was Enzai: Falsely Accused, published by JAST USA in 2006. That same year, the company published Absolute Obedience, while Hirameki International licensed Animamundi; the later game, although already nonexplicit, was censored for US release to achieve a \"mature\" rather than \"adults only\" ESRB rating, removing some of both the sexual and the violent content. Compared to yaoi manga, fewer yaoi games have been officially translated into English; the lack of interest by publishers in licensing further titles has been attributed to widespread copyright infringement of both licensed and unlicensed games. Demography Suzuki notes that \"demographic analyses of BL media are underdeveloped and thus much needed in yaoi\/BL studies,\" but acknowledges that \"the overwhelming majority of BL readers are women.\" 80% of the yaoi audience is female, while the membership of Yaoi-Con, a now-defunct American yaoi convention, was 85% female. It is usually assumed that all female fans are heterosexual, but in Japan there is a presence of lesbian manga authors and lesbian, bisexual or questioning female readers. A 2008 survey of English-speaking readers of yaoi indicated that 50-60% of female readers self-identify as heterosexual. Although the genre is marketed to and consumed primarily by girls and women, there is a gay, bisexual, and heterosexual male readership as well. A 2007 survey of yaoi readers among patrons of a United States library found about one quarter of respondents were male; two online surveys found approximately ten percent of the broader English-speaking yaoi readership were male. Lunsing suggests that younger Japanese gay men who are offended by \"pornographic\" content in gay men's magazines may prefer to read yaoi instead. Some gay men, however, are put off by the feminine art style or unrealistic depictions of LGBT culture in Japan and instead prefer gay manga, which some perceive to be more realistic. Lunsing notes that some of the yaoi narrative elements criticized by homosexual men, such as rape fantasies, misogyny, and characters' non-identification as gay, are also present in gay manga. In the mid-1990s, estimates of the size of the Japanese yaoi fandom ranged from 100,000 to 500,000 people. By April 2005, a search for non-Japanese websites resulted in 785,000 English, 49,000 Spanish, 22,400 Korean, 11,900 Italian, and 6,900 Chinese sites. In January 2007, there were approximately five million hits for yaoi. Female fans of yaoi are often referred to as , a derogatory insult that was later reappropriated as a self-descriptive term. The male equivalent is or , both of which are puns of similar construction to fujoshi. Analysis Audience motivation Yaoi has received considerable critical attention, especially after translations of yaoi became commercially available outside Japan in the 21st century. In Manga! Manga! The World of Japanese Comics, the 1983 book by Frederik L. Schodt that was the first substantial English-language work on manga, Schodt observes that portrayals of gay male relationships had used and further developed bisexual themes already extant in manga to appeal to their female audience. Japanese critics have viewed boys' love as a genre that permits their audience to avoid adult female sexuality by distancing sex from their own bodies, as well as to create fluidity in perceptions of gender and sexuality and rejects \"socially mandated\" gender roles as a \"first step toward feminism\". Kazuko Suzuki, for example, believes that the audience's aversion to or contempt for masculine heterosexism is something which has consciously emerged as a result of the genre's popularity. Mizoguchi, writing in 2003, feels that BL is a \"female-gendered space\", as the writers, readers, artists and most of the editors of BL are female. BL has been compared to romance novels by English-speaking librarians. In 2004, Paul Gravett summarized the dominant theories for the popularity of with a female audience: that Japanese women were disillusioned or bored with classic male-female relationships in fiction, that the populating the genre were a backlash against male sex fantasies of a feminized ideal of adolescent girls, that the genre offered a safe space for sexual fantasies with the free choice of identification figure in the relationship, and the boys of are interpreted by female readers as girls, thus making the stories expressions of readers' same-sex fantasies. Other commentators have suggested that more radical gender-political issues underlie yaoi. Parallels have been noted in the popularity of lesbianism in pornography, and yaoi has been called a form of \"female fetishism\". While early approaches to the popularity of the genre often referred to the role of women in patriarchal Japanese society, to which the genre offers a resistance and escape, this approach has been rejected by others who note that yaoi and yaoi-like media became popular outside of Japan in other social circumstances, such as slash fiction in the west. Against this background, theories emphasizing pleasure gained support: yaoi could be compared to pornography or even considered a specifically female form of pornography, appealing to desires for eroticism, voyeurism, or a desire to push against established gender roles. Mariko \u014chara, a science fiction writer, has said that she wrote yaoi Kirk\/Spock fiction as a teen because she could not enjoy \"conventional pornography, which had been made for men\", and that she had found a \"limitless freedom\" in yaoi, much like in science fiction. In 1998, Shihomi Sakakibara asserted that yaoi fans, including himself, were gay transgender men. Sandra Buckley believes that bish\u014dnen narratives champion \"the imagined potentialities of alternative [gender] differentiations\", while James Welker described the bish\u014dnen character as \"queer\", commenting that manga critic Akiko Mizoguchi saw sh\u014dnen-ai as playing a role in how she herself had become a lesbian. Dru Pagliassotti sees this and the yaoi rons\u014d as indicating that for Japanese gay and lesbian readers, BL is not as far removed from reality as heterosexual female readers like to claim. Welker has also written that boys' love titles liberate the female audience \"not just from patriarchy, but from gender dualism and heteronormativity\". Criticism Some gay and lesbian commentators have criticized how gay identity is portrayed in BL, most notably in the yaoi rons\u014d or \"yaoi debate\" of 1992\u20131997 (see History above). A trope of yaoi that has attracted criticism is male protagonists who do not identify as gay, but are rather simply in love with each other, with Comiket co-founder Yoshihiro Yonezawa once describing yaoi d\u014djinshi as akin to \"girls playing with dolls\". This is said to heighten the theme of all-conquering love, but is also condemned as a means of avoiding acknowledgement of homophobia. Criticism of the stereotypically feminine behaviour of the uke has also been prominent. Much of the criticism of yaoi originally rendered in the Japanese yaoi debate has similarly been voiced in the English-language fandom. Rachel Thorn has suggested that yaoi and slash fiction fans are discontented with \"the standards of femininity to which they are expected to adhere and a social environment that does not validate or sympathize with that discontent\". Legal issues Yaoi has been the subject of disputes on legal and moral grounds. Mark McLelland suggests that BL may become \"a major battlefront for proponents and detractors of 'gender free' policies in employment, education and elsewhere\", while yaoi artist Youka Nitta has said that \"even in Japan, reading boys' love isn't"} +{"id":"RedPajamaWikipedia.0002","text":"The Phoenix Suns are an American professional basketball team based in Phoenix, Arizona. They compete in the National Basketball Association (NBA), as a member of the league's Western Conference Pacific Division. The Suns are the only team in their division not to be based in California, and play their home games at the Footprint Center. The Suns are one of four major league sports teams based in the Phoenix area, but are the only one to bill themselves as representing the city (the other teams - the Cardinals, Coyotes, and Diamondbacks - all bill themselves as representing the state of Arizona). The franchise began play in 1968 as an expansion team, and their early years were mired in mediocrity, but their fortunes changed in the 1970s after partnering Dick Van Arsdale and Alvan Adams with Paul Westphal; the team reached the 1976 NBA Finals, in what is considered to be one of the biggest upsets in NBA history. However, after failing to capture a championship, the Suns would rebuild around Walter Davis for a majority of the 1980s, until the acquisition of Kevin Johnson in 1988. Under Johnson, and after trading for perennial NBA All-Star Charles Barkley, and combined with the output of Tom Chambers and Dan Majerle, the Suns reached the playoffs for a franchise-record thirteen consecutive appearances and remained a regular title contender throughout the 1990s, and reached the 1993 NBA Finals. However, the team would again fail to win a championship, and entered into another period of mediocrity until the early part of the 2000s. In 2004, the Suns signed free agent Steve Nash (who had blossomed for the Dallas Mavericks after being traded from Phoenix six years earlier), and returned into playoff contention. With Nash, Shawn Marion, and Amar'e Stoudemire, and under head coach Mike D'Antoni, the Suns became renowned worldwide for their quick, dynamic offense, which led them to tie a franchise record in wins in the 2004\u201305 season. Two more top two Conference placements followed, but the Suns again failed to attain an NBA championship, and were forced into another rebuild. After ten consecutive seasons without a playoff berth, the Suns reached the 2021 NBA Finals after acquiring Chris Paul, forming a quartet with their young core of Devin Booker, Deandre Ayton and Mikal Bridges. Following a disappointing playoff exit in 2022, the Suns acquired 13-time All-Star and two-time NBA champion Kevin Durant. The Suns own the NBA's fifth-best all-time winning percentage, and have the second highest winning percentage of any team to have never won an NBA championship. 11 Hall of Famers have played for Phoenix, while two \u2014 Barkley and Nash \u2014 won NBA Most Valuable Player (MVP) while playing for the team. Additionally, their Hall of Fame radio announcer Al McCoy is the longest-tenured broadcaster in NBA history. Franchise history 1968\u20131976: Team creation and early years The Suns were one of two franchises to join the NBA at the start of the 1968\u201369 season, alongside the Milwaukee Bucks from Milwaukee. They were the first major professional sports franchise in the Phoenix market and in the entire state of Arizona, and remained the only one for the better part of 20 years (a Phoenix Roadrunners team played in the World Hockey Association from 1974 to 1977) until the Arizona Cardinals of the National Football League relocated from St. Louis in 1988. The Suns played their first 24 seasons at Arizona Veterans Memorial Coliseum, called the \"Madhouse on McDowell\", located slightly northwest of downtown Phoenix. The franchise was formed by an ownership group led by Karl Eller, owner of a public enterprise, the investor Donald Pitt, Don Diamond, Bhavik Darji, Marvin Meyer, and Richard L. Bloch. Other owners with a minority stake consisted of entertainers, such as Andy Williams, Bobbie Gentry and Ed Ames. There were many critics, including then-NBA commissioner J. Walter Kennedy, who said that Phoenix was \"too hot,\" \"too small,\" and \"too far away\" to be considered a successful NBA market. This was despite the fact that the Phoenix metropolitan area was growing rapidly, and the Suns would have built-in geographical foes in places like in San Diego, Los Angeles, San Francisco, and Seattle. After continual prodding by Bloch (who became president of the Phoenix Suns), in 1968 the NBA Board of Governors granted franchises to Phoenix and Milwaukee on January 22, 1968, with an entry fee of $2 million. The Suns nickname was among 28,000 entries that were formally chosen in a name-the-team contest sponsored by The Arizona Republic, with the winner awarded $1,000 and season tickets for the inaugural season. Suns was preferred over Scorpions, Rattlers, Thunderbirds, Wranglers, Mavericks, Tumbleweeds, Mustangs and Cougars. Stan Fabe, who owned a commercial printing plant in Tucson, designed the team's first iconic logo for a mere $200; this was after the team paid $5,000 to a local artist to design the team's logo. However, they were disappointed with the results. In the 1968 NBA expansion draft, notable Suns' pickups were future Hall of Famer Gail Goodrich and Dick Van Arsdale. Jerry Colangelo, then a player scout, came over from the Chicago Bulls, a franchise formed two years earlier, as the Suns' first general manager at the age of 28, along with Johnny \"Red\" Kerr as head coach. Unlike the first-year success that Colangelo and Kerr had in Chicago, in which the Bulls finished with a first-year expansion record of 33 wins and a playoff berth (plus a Coach of the Year award for Kerr), Phoenix finished its first year at 16\u201366, and finished 25 games out of the final playoff spot. Both Goodrich and Van Arsdale were selected to the All-Star Game in their first season with the Suns. Goodrich returned to his former team, the Lakers, after two seasons with the Suns, but Van Arsdale spent the rest of his playing days as a Sun and a one-time head coach for Phoenix. The Suns' last-place finish that season led to a coin flip for the number-one overall pick for the 1969 NBA draft with the expansion-mate Bucks. Milwaukee won the flip, and the rights to draft UCLA center Kareem Abdul-Jabbar (then known as Lew Alcindor), while Phoenix settled on drafting center Neal Walk from Florida. The 1969\u201370 season posted better results for the Suns, finishing 39\u201343, but losing to the eventual Western Conference champion Los Angeles Lakers in the first round of the playoffs. The next two seasons (1970\u201371 and 1971\u201372), the Suns finished with 48- and 49-win seasons, but did not qualify for the playoffs in either year, and did not reach the playoffs again until 1976. The major draw for the franchise in this era was the dramatic play of Connie Hawkins. This era was also marked by the arrival of longtime Suns play-by-play and Naismith Hall of Fame-awarded announcer Al McCoy, hired by Jerry Colangelo before the start of the 1972\u201373 NBA season. Soon locally renown as \"the Voice of the Suns\", his broadcasts were originally simulcast on both television and radio from 1972 onward, until 2003 when he became exclusive to the Suns Radio Network. He is still broadcasting Suns home games on radio as of the current 2022-2023 season, calling all three NBA Finals appearances for the franchise (in 1976, 1993, and 2021, respectively). Colangelo called Al McCoy \"the greatest salesman for the game of basketball in our entire state.\" \"He had as much to do with the success of the Suns as any player, coach or manager.\" 1975\u20131976: Trip to the NBA Finals The 1975\u201376 season proved to be a pivotal year for the Suns as they made several key moves, including the off-season trade of former All-Star guard Charlie Scott to the Boston Celtics in exchange for guard Paul Westphal, a member of Boston's 1974 championship team. They also drafted center and eventual fan favorite Alvan Adams from the University of Oklahoma and guard Ricky Sobers of UNLV. The Suns and Buffalo Braves made a midseason trade, with Phoenix sending forward\/center John Shumate to Buffalo in exchange for forward Garfield Heard. Phoenix had an inconsistent regular season, starting out at 14\u20139 (then the best start in team history), then went 4\u201318 during a stretch where the team sustained several injuries (including Dick Van Arsdale breaking his right arm in a February game). The Suns then went 24\u201313 in the final 37 games to finish 42\u201340, clinching their first playoff spot since 1970. The Suns faced the Seattle SuperSonics in the first round of the Western Conference playoffs, winning the series four games to two, and beat the defending NBA champion Golden State Warriors in the Western Conference Finals, four games to three, to advance to their first NBA Finals. The Suns faced an experienced Celtics team, led by eventual Hall of Famers Dave Cowens, John Havlicek and Jo Jo White. Game five of the 1976 NBA Finals took place at Boston Garden, where the Suns came back from a 22-point first-half deficit to force overtime. Havlicek made what was supposed to be a game-winning basket, but due to fans rushing the floor before time officially expired, officials put one second back on the clock with Phoenix having possession of the ball, but under their own basket. Instead of attempting a desperation heave, the Suns' Westphal intentionally called a timeout that they did not have, a technical foul, giving the Celtics a free throw, which Jo Jo White converted to put them up 112\u2013110. However, this advanced the ball to half-court, and once the Suns had possession, Garfield Heard made a buzzer-beating turnaround jump shot to force a third overtime. The Suns' hard-fought battle was short-lived, as Boston's reserve player Glenn McDonald scored six of his eight points in the third overtime to lead the Celtics to a 128\u2013126 win. Boston eventually won the series in six games, clinching the championship at the Coliseum, defeating Phoenix in game six, 87\u201380. 1976\u20131988: From success to scandals In the late 1970s and early 1980s, the Suns enjoyed several successful seasons including the 1981 Pacific Division title, making the playoffs eight seasons in a row including an appearance at the 1984 Western Conference Finals. Problems arose on and off the court in the mid-1980s. In 1987, the Maricopa County Attorney's Office indicted 13 people on drug-related charges, three of whom were active Suns' players James Edwards, Jay Humphries and Grant Gondrezick. These indictments were partially based on testimony from star player Walter Davis, who was given immunity. No defendants ever went to trial: two of the players went into a prosecution diversion program, while another received probation. Nevertheless, the scandal, although now perceived in many respects to be a witch hunt tarnished the reputation of the franchise both nationally and within the community. The scandal did provide an opening for general manager Jerry Colangelo to lead a group that bought the team from its owners for $44 million at the start of the 1987\u201388 season, a record at that time. With a drug scandal and the loss of promising young center Nick Vanos, who was killed in the crash of Northwest Airlines Flight 255, the franchise was in turmoil both on and off the court. 1988\u20131992: The Kevin Johnson\/Tom Chambers\/Dan Majerle era The Suns' luck began to turn around in 1988 with the acquisition of Kevin Johnson from the Cleveland Cavaliers, along with Mark West and Tyrone Corbin, for All-Star power forward Larry Nance and Mike Sanders. This was the beginning of a franchise-record 13 consecutive playoff appearances. All-Star Tom Chambers came over from the Seattle SuperSonics (the first unrestricted free agent in NBA history), 1986 second-round draft pick Jeff Hornacek continued to develop, and \"Thunder\" Dan Majerle was drafted with the 14th pick in the 1988 draft. Kurt Rambis was added from the Charlotte Hornets in 1989, and the team upset the Los Angeles Lakers in five games during the playoffs that season, before falling to the Portland Trail Blazers in the Western Conference Finals. In 1990\u201391, the Suns went 55\u201327 but lost in the first round to the Utah Jazz, 3\u20131. In 1991\u201392, the Suns went 53\u201329. Having sent four players to the All-Star Game in the previous two seasons (Chambers, Johnson, Hornacek, and Majerle), the Suns swept the San Antonio Spurs in three games in the first round of the 1992 NBA playoffs. The Suns then were defeated in five games to the Trail Blazers in the Conference Semifinals. The series was punctuated by a game four in which the Suns lost in double overtime 153\u2013151 (the highest-scoring game in NBA playoff history to date). That game was the last Suns game ever played at the Coliseum. 1992\u20131996: The Charles Barkley era In 1992, the Suns moved into their new arena in downtown Phoenix, the America West Arena. The arena is occasionally referred to as the \"Purple Palace\" due to its purple seats, one of the Suns' colors. All-Star power forward Charles Barkley was traded from the Philadelphia 76ers for Jeff Hornacek, Andrew Lang, and Tim Perry. Barkley went on to win the MVP award that 1992\u201393 season. In addition to Barkley, the Suns added key players to their roster, including Danny Ainge and draftees Arkansas center Oliver Miller and forward Richard Dumas (who was actually drafted in 1991 but was suspended for his rookie year for violating the NBA drug policy). Under rookie head coach Paul Westphal, a former Suns assistant and player with the 1976 Suns in the NBA Finals, the Suns won 62 games in 1992\u201393, setting a franchise record. In the first round of the playoffs, they defeated the eighth-seeded Lakers, coming back from a 0\u20132 deficit in the five-game series. The Suns then eliminated the Spurs and SuperSonics, advancing to the NBA Finals for the second time in franchise history. They eventually lost to the Chicago Bulls, led by eventual Hall of Famers Michael Jordan and Scottie Pippen. The series also included a triple-overtime game in game three, making this and their previous game five in the 1976 series the only triple-overtime games in the history of the NBA Finals. Approximately 300,000 fans braved the 105\u00b0 heat to celebrate the memorable season in the downtown streets of Phoenix after the Finals had ended. The Suns continued to be successful in the regular season, going 178\u201368 during the 1992\u201393, 1993\u201394, and 1994\u201395 seasons. They continued to bolster their roster by adding players such as A. C. Green, Danny Manning, Wesley Person, Wayman Tisdale, and Elliot Perry. Despite a Pacific Division title in 1995, the Suns were eliminated in consecutive Western Conference Semifinal rounds by the Houston Rockets, both series going a full seven games. Manning was rarely at full strength with the Suns, injuring his ACL in 1995 just before the All-Star break. In both years, the Suns led the series by two games at one point (2\u20130 in 1994, 3\u20131 in 1995) only to see the Rockets come back to win each series. At the end of the 1994\u201395 season, Phoenix general manager Bryan Colangelo, the son of Jerry, initiated an eventually costly trade, sending the All-Star Majerle and a first-round draft pick to the Cleveland Cavaliers in exchange for John \"Hot Rod\" Williams. Majerle was a fan favorite in Phoenix and in the Suns' locker room. The trade was made to address the Suns' need of a shot-blocking center but Majerle's presence was missed and Williams's production never met expectations. The 1995\u201396 season was a disappointing year for the Suns, despite drafting NBA All-Rookie First Team member Michael Finley, who became unavailable for the playoffs due to injury. The Suns posted a 41\u201341 record and were eliminated in the first round of the playoffs by the San Antonio Spurs. Westphal was fired midway through the season and replaced by Fitzsimmons, his third stint as head coach. A combination of front office unrest, along with the dwindling possibility of winning a championship, led to turmoil in Barkley's relationship with Jerry Colangelo, who both spurned each other publicly. This led to Barkley being traded to Houston for Sam Cassell, Robert Horry, Mark Bryant, and Chucky Brown. Three of the four players were not with the franchise one year later, and two of the most talented players (Horry and Cassell) constantly clashed with the coach and seemed to be a negative influence in the locker room. 1996\u20132004: Average times In the 1996 NBA draft, the Suns used their 15th pick for Santa Clara guard Steve Nash. Upon hearing the draft announcement, Suns fans booed in disapproval of the relatively unknown player, because he had not played in one of the major college conferences. During his first two seasons in the NBA, he played a supporting role behind star point guards Jason Kidd and Kevin Johnson. After the Barkley trade, the Suns began the 1996\u201397 season 0\u201313, a franchise record for the worst start. During the 13-game losing streak, Fitzsimmons stepped down as the coach and was replaced by former player Danny Ainge. After an on-the-court altercation between Ainge and Horry, Horry was traded to the Lakers for former Sun and NBA all-star Cedric Ceballos. Cassell was later traded to Dallas for all-star guard Jason Kidd. With a mostly small lineup, the Suns put together an 11-game win streak that put them in the playoffs as the seventh seed, in a series that almost upset the favored Sonics. Despite the loss in the playoffs, the Suns became one of the few NBA teams to make the playoffs after starting the season 0\u201310 or worse, and one of the few to make the playoffs after experiencing a 10-plus-game losing streak during the regular season. With Kidd starting at point guard, Nash was traded to the Mavericks in June 1998 in exchange for Martin M\u00fc\u00fcrsepp, Bubba Wells, the draft rights to Pat Garrity, and a future first-round draft pick (later used to select Shawn Marion). In the off-season prior to the 2000 NBA season, the Suns traded for perennial All-Star Anfernee \"Penny\" Hardaway, creating the tandem of Kidd and Hardaway called \"Backcourt 2000\". However, the combination of Hardaway and Kidd was never fully realized as Hardaway missed several games during the middle of the 1999\u20132000 season and Kidd broke his ankle going into the playoffs just as Hardaway returned to the court. As the Suns entered the 2000 playoffs, they beat the higher-seeded San Antonio Spurs 3\u20131 in the best-of-five series. The Spurs were without their best player Tim Duncan throughout the whole series. However, even with the return of Kidd in the next round, the Suns fell to the eventual champion Los Angeles Lakers in a 4\u20131 series. The Suns continued to make the playoffs until the 2001\u201302 season when they fell short for the first time in 14 years. That season marked the trade of Jason Kidd, partly due to a publicized domestic violence episode, to the New Jersey Nets for Stephon Marbury. With the resultant high draft pick, the Suns were able to draft Amar'e Stoudemire. The 2002\u201303 campaign saw the emergence of Stoudemire, a graduate of Cypress Creek High School (Orlando, Florida). He became the first high school-drafted player to win the NBA Rookie of the Year for the 2002\u201303 season, during which the Suns posted a record of 44\u201338 and returned to the playoffs. Marbury had a successful individual season, making the All-NBA Third Team and being selected for the 2003 NBA All-Star Game. The Suns were eliminated in the first round once again by the San Antonio Spurs; a six-game series with the eventual NBA champions. In the 2003\u201304 season, the Suns finished out of the playoffs with a 29\u201353 record. The Suns made a blockbuster mid-season trade sending Marbury and Hardaway to the New York Knicks for Antonio McDyess and a future first round pick that was later dealt to Denver. 2004\u20132012: The Steve Nash era 2004\u20132006: Nash wins back-to-back MVPs The beginning of 2004 saw the departure of the face of Suns management since the team's inception, when Jerry Colangelo announced that the Phoenix Suns were to be sold to an investment group headed by San Diego-based business executive and Tucson native Robert Sarver for $401 million. The 2004\u201305 season marked the Suns' return to the NBA's elite, finishing with the best record at 62\u201320, and tying a franchise record set by the 1992\u201393 team. They set a team record for greatest one-season improvement at 33 games. During the off-season, the Suns signed unrestricted free agent All-Star point guard Steve Nash from Dallas, who had formerly played for the Suns at the beginning of his career. Nash went on to win the MVP award that season. Amar'e Stoudemire and Shawn Marion were named All-Stars and first-year coach Mike D'Antoni was named NBA Coach of the Year. In the 2005 NBA playoffs, Phoenix was the first seed in the Western Conference. The Suns swept the Memphis Grizzlies, 4\u20130, and defeated the fourth-seeded Dallas Mavericks in the second round, 4\u20132, as Nash forced game six into overtime with a three-pointer in the closing seconds. In the Western Conference Finals, the Suns played the San Antonio Spurs, who won the series 4\u20131, ending Phoenix's season, partly due to Joe Johnson missing the first two games of the series. Johnson went on to start the remaining games where he averaged 40 minutes per game and 18.3 points per game. The Suns lost the first two at home, as well as the following game in San Antonio to fall behind 3\u20130 in the series, before winning game four at San Antonio 111\u2013106. The team then lost game five at home 101\u201395 to be eliminated from the playoffs. Stoudemire averaged 37.0 points per game during the series against the Spurs, the highest ever by a player in the Western Conference Finals. The 2005\u201306 NBA season began with Stoudemire undergoing microfracture surgery in his knee on October 18, 2005, missing all but three games that season. Shooting guard Joe Johnson also demanded a sign-and-trade deal to the Atlanta Hawks, in which the Suns got Boris Diaw and two future first-round picks. Other acquisitions included Raja Bell and Kurt Thomas. Despite the turnover in players, the Suns again won the Pacific Division, going 54\u201328 and capturing the second seed in the Western Conference. Nash was awarded a second consecutive NBA Most Valuable Player Award, becoming the second point-guard, after Magic Johnson, to win the award in consecutive seasons. Also, Diaw was named NBA Most Improved Player. The Suns began the 2006 Western Conference Playoffs as favorites against the Los Angeles Lakers. After winning the first game in Phoenix, they found themselves trailing in the series 3\u20131 after impressive performances by Lakers' shooting guard Kobe Bryant. However, the Suns went on to win three straight games. With 7:33 left in the fifth game, Suns guard Raja Bell grabbed Bryant around the neck and threw him down as the Lakers' star drove to the basket. Bell earned a technical foul, his second of the game, and an automatic ejection. The Suns took game six in overtime, their first overtime win all season, despite 50 points from Bryant and Bell out serving a one-game suspension with last-second help from mid-season acquisition Tim Thomas. On their home court, the Suns won game seven 121\u201390, eliminating the Lakers for the first time since 1993. The Suns are 1 of 9 teams in NBA history to win a playoff series after being behind 3\u20131. In the second round, the Suns faced the Los Angeles Clippers. The series was played closely, with both teams trading games on each other's courts. The series was 2\u20132 and the Suns were behind in game five before coming back and won in double overtime. After a game six loss, the Suns won the series in the seventh game on their home court at US Airways Center, winning by a margin of 20 with an NBA record fifteen 3-point FGs on May 22, 2006. They went on to play the Dallas Mavericks in the Western Conference Finals as underdogs. The Suns took game one in Dallas by a single point and their May 30 victory in game four marked the most wins for the franchise in a Conference Finals series since the 1993 season. The Suns lost games five and six by a combined 25 points and were eliminated from the series on June 3. 2006\u20132008: \"Seven seconds or less\" Under coach D'Antoni, the Suns popularized the fast break offense known as 7 seconds or less, which was later published in a book written by Sports Illustrated writer Jack McCallum. Though criticized for a supposed lack of defense, the Suns specialized an efficient offense designed to quickly get off shots that made regrouping on defense difficult for the opposing team. The Suns entered the 2006\u201307 season aiming to win the first championship in franchise history. From November 20 to December 22, the Suns posted a 15-game win streak, followed almost immediately with a 17-game win streak from December 29 to January 28. On March 14, the 49\u201314 Suns met the 52\u201310 Dallas Mavericks in a match-up where both teams were fighting for the top seed in the Western conference and Nash was going for his third consecutive MVP award against Dirk Nowitzki. Though the Suns won the game in double overtime, the Mavericks would finish with the West's top seed at 67\u201315, and Nowitzki would narrowly win the MVP award ahead of Nash. While the Mavericks were upset in the first round by the eight-seed Golden State Warriors, the 61\u201321 Suns defeated Kobe Bryant and the Lakers in five games in the opening round of the playoffs. This set up a rematch of the 2005 Western Conference Finals against the San Antonio Spurs. The series saw the Spurs defeat the Suns in six games, in what many called \"the real finals\" of the 2006\u201307 season. The Spurs went on to win the championship that year. On June 6, former TNT TV analyst and NBA three-point specialist, Steve Kerr, was appointed Suns' general manager and president of basketball operations. Kerr was also a part of the Sarver-led investment group that purchased the franchise from Jerry Colangelo. His first off-season signing was former Orlando Magic small forward Grant Hill on a one-year $1.8 million deal with a player option for a second season at $2 million. Hill, who was previously considered injury-prone, played in the majority of games over the next four seasons as a starter. The Suns finished 55\u201327 on the season, two games behind the Lakers who won the division. In the opening round of the playoffs, the Suns lost to the Spurs in five games, the first time they did not advance past the first round in the D'Antoni-Nash era. Some have attributed this to the mid-season acquisition of aging former MVP Shaquille O'Neal for four-time All Star Shawn Marion. Though O'Neal was brought in as a physical presence to match with the likes of the Spurs' Tim Duncan, the move all but ended their fast-paced offense which had brought them to the cusp of a Finals appearance. On May 11, 2008, Suns' head coach Mike D'Antoni left the team and signed with the New York Knicks. 2008\u20132010: Ups and downs On June 9, 2008, Terry Porter was named head coach of the Phoenix Suns, succeeding Mike D'Antoni. Porter was an assistant coach of the Detroit Pistons when he was let go after the Pistons were eliminated by the Boston Celtics in the 2008 NBA Eastern Conference Finals. During the off-season, the Suns had difficulties signing free agents because of being over the luxury tax. They made attempts to sign a backup point guard, Tyronn Lue; however, he decided to sign with the Bucks for more money. The Suns selected Robin Lopez (15th overall pick out of Stanford) in the 2008 NBA draft and acquired Goran Dragi\u0107, who was originally picked by the rival San Antonio Spurs. On February 16, 2009, the Suns fired Porter and he was succeeded by Alvin Gentry. The Suns were expected to make the transition back to the up-tempo style basketball nicknamed the \"7 Seconds or Less\" or \"Run and Gun\" style. On February 18, Gentry began his head coaching tenure with a 140\u2013100 blowout over the Clippers at home. Six Suns players scored in double digits, led by Leandro Barbosa's 24 points. The Suns led by as much as 50 points during the game and were without their swingman Jason Richardson who was serving a one-game suspension. However, this offense cost them their defense, allowing over 107 points per game, 27th in the league. The Suns scored 140 in the next two games. On February 20, Amar'e Stoudemire underwent eye surgery and was out for eight weeks. They went 18\u201313 under Gentry in the last 31 games. At the end of the season, the Suns missed the playoffs with a 46\u201336 record. During the 2009\u201310 season, the Suns played a far more balanced style of basketball and finished with a 54\u201328 record. The Suns advanced to the NBA's Western Conference Finals, eliminating the Portland Trail Blazers in six games and the San Antonio Spurs in four games, including an explosive performance by Goran Dragi\u0107 in game three against the Spurs, scoring 23 points in the fourth quarter. The Suns faced the Lakers in the Western Conference Finals but lost in six games. On June 15, 2010, Kerr resigned as general manager of the Suns and opted to return as an analyst for TNT effective June 30, 2010. In the wake of Kerr's decision to leave the club, senior vice president of basketball operations David Griffin told managing partner Robert Sarver he did not want to be a candidate to replace Kerr and left when his contract expired on June 30. The last moves of both Steve Kerr and David Griffin were drafting players Gani Lawal and Dwayne Collins with the second-round draft picks that they had in the 2010 NBA draft. 2010\u20132012: Slow decline without Amar'e The Suns re-signed Amar'e Stoudemire in the 2010 free agency period with a five-year contract for around $95 million, with $71 million guaranteed, and the rest of his salary coming only if certain conditions were held, such as getting guaranteed 4th and 5th-season money if he remained healthy enough to meet those conditions. However, during the summer of 2010, the Suns let Stoudemire go to the New York Knicks since they were guaranteeing him $100 million and hired player agent Lon Babby as president of basketball operations. The team then paid over $80 million to acquire Hedo T\u00fcrko\u011flu, Josh Childress, and Hakim Warrick to not only replace Stoudemire but also add bench depth. On August 5, 2010, the Suns hired Lance Blanks as general manager. On December 19, 2010, the Suns acquired Vince Carter, Micka\u00ebl Pi\u00e9trus, and Marcin Gortat from the Orlando Magic, along with a low draft pick and cash considerations. For this acquisition, the Suns traded Jason Richardson, Earl Clark, and the recently acquired Hedo T\u00fcrko\u011flu. On February 24, 2011, the Suns acquired point guard Aaron Brooks, trading first round (lottery-protected) draft pick and point guard Goran Dragi\u0107 to the Houston Rockets. The Suns ended the 2010\u201311 season with a losing record and missed the playoffs. In the 2011 NBA draft, the Suns used their 13th pick on Markieff Morris, a 6' 10\" power forward from the Kansas Jayhawks. Markieff is the twin brother of Marcus Morris, who played together for three years in Kansas. In the 2012 NBA draft, the Suns used their 13th pick to select Kendall Marshall, a 6' 4\" point guard from the North Carolina Tar Heels. Marshall was a prolific passer in his two seasons at North Carolina; setting the ACC and North Carolina season assist records, along with winning the Bob Cousy Award in his sophomore season with the Tar Heels. 2012\u20132015: Pre\u2013Booker and struggle years 2012: The departure of Steve Nash During the 2012 free agency period, the Suns traded Steve Nash to the Los Angeles Lakers in exchange for first-round picks in 2013 and 2015, as well as second-round picks in 2013 and 2014. After the trade, the Suns then re-acquired point guard Goran Dragi\u0107 from Houston, signed Minnesota Timberwolves forward Michael Beasley, and claimed Houston forward Luis Scola off amnesty waivers while also using the same amnesty clause (as codified in the 2011 collective bargaining agreement) to waive Josh Childress. They also did a three-way trade with the New Orleans Hornets and the Timberwolves by trading Robin Lopez and Hakim Warrick to the Hornets and a 2014 second-rounder to the Timberwolves in exchange for Wesley Johnson, a top 14-protected future first-rounder and the rights to Brad Miller and Jerome Dyson. The latter two players' rights were later waived and the Suns then signed Jermaine O'Neal for one year. The Suns also signed P. J. Tucker based on his performance with the Suns' Summer League team. On September 20, it was announced that Channing Frye had dilated cardiomyopathy and as a result, he missed the entire 2012\u201313 season, although he sometimes made special appearances to do the pre-game show for local Suns games with Tom Leander and Tom Chambers. On January 12, 2013, the Suns became the fourth-fastest NBA team to win 2,000 games with a 97\u201381 road victory against the Chicago Bulls, which also marked the last victory for Alvin Gentry as head coach for the Suns. On January 18, 2013, the day after a loss that broke a 24-home-game winning streak against the Milwaukee Bucks, Gentry agreed to leave the Phoenix Suns organization. Two days later, player development coach Lindsey Hunter was named interim head coach role for the remainder of the season. A few days later, assistant head coaches Dan Majerle and Elston Turner had also resigned from their positions. On February 21, 2013, the Suns had traded their 2013 second-round pick to the Houston Rockets in exchange for Marcus Morris, the twin brother of power forward Markieff Morris. A day later, the Suns traded point guard Sebastian Telfair to the Toronto Raptors in exchange for Iranian center Hamed Haddadi and a 2014 second-round pick. The Suns ended their first post-Steve Nash season with a 25\u201357 win\u2013loss record, their second-worst record in franchise history behind only their inaugural season. 2013: The arrival of Ryan McDonough On April 22, 2013, it was announced that the Suns had fired general manager Lance Blanks. On May 7, 2013, former Celtics assistant general manager Ryan McDonough was announced as the new general manager of the Suns. On May 26, 2013, the Suns hired Jeff Hornacek as their head coach to replace interim head coach Lindsey Hunter. The team also started the new season with new modified logos, replacing most of the purple on their logos with black, although purple would still be found on their jerseys. In the 2013 NBA draft on June 27, the Suns selected Ukrainian center Alex Len from Maryland with their 5th pick and power forward Alex Oriakhi from Missouri with their 57th pick. Although the Suns were expected to have a poor season, they began the season with a 19\u201311 record. Eric Bledsoe then went down against the Los Angeles Clippers with a torn meniscus and missed the following 33 games. The Suns went 17\u201316 during his absence led by Goran Dragi\u0107, keeping Phoenix in the playoff race with the Memphis Grizzlies and Dallas Mavericks. At 47\u201332, while Dallas and Memphis were both 48\u201332, Phoenix lost against both teams before they defeated the Sacramento Kings to finish the season 48\u201334. Dallas finished 49\u201333 and Memphis finished 50\u201332, resulting in Memphis finishing with the seventh seed, Dallas with the eighth, and Phoenix out of the playoffs. During the 2014 NBA draft, the Suns drafted sophomore forward T. J. Warren from NC State, Canadian freshman point guard Tyler Ennis from Syracuse, Serbian shooting guard Bogdan Bogdanovi\u0107, and senior center-power forward Alec Brown from Wisconsin-Green Bay. After trying to obtain players like LeBron James, Carmelo Anthony, and Chris Bosh, and losing Channing Frye to the Orlando Magic, the Suns decided to sign-and-trade for Sacramento Kings point guard Isaiah Thomas under a four-year contract worth $27 million in exchange for Alex Oriakhi, using a $7 million traded-player exception. On September 24, 2014, the Suns and Eric Bledsoe agreed on a five-year contract worth $70 million. A couple of days after, on September 29, 2014, they extended both Markieff and Marcus Morris to four-year deals that combine to $52 million, with Markieff earning $32 million and Marcus getting the remaining $20 million. Right before the trade deadline on February 19, 2015, the Suns made moves to change the roster. After demanding a trade due to lingering frustrations with the front office and direction of the team, Goran Dragi\u0107 and his brother Zoran were traded by the Suns to the Miami Heat for Danny Granger and Miami's 2017 and 2021 first round picks in a three-team trade with the New Orleans Pelicans. Immediately after the trade, the Suns replaced Dragi\u0107 by trading for Milwaukee Bucks guard Brandon Knight, sending Tyler Ennis and Miles Plumlee to Milwaukee and the Lakers' 2015 first round pick to the Philadelphia 76ers. Isaiah Thomas was then traded to the Boston Celtics for Marcus Thornton and the Cleveland Cavaliers' 2016 first round pick. 2015\u2013present: The Devin Booker era 2015\u20132020: The arrival of Devin Booker and further struggle years In the 2015 NBA draft, the Suns drafted Kentucky shooting guard Devin Booker with the 13th pick. He was the youngest player drafted at the time by the Suns at 18-years-old and debuted two days before his 19th birthday against the Dallas Mavericks. On July 1, 2015, the Suns retained the rights of Brandon Knight under an offer similar to that of Eric Bledsoe's, and signed Dallas Mavericks center Tyson Chandler to a four-year deal worth $52 million. A day later, the Suns traded Markieff's brother Marcus Morris, Reggie Bullock, and Danny Granger to the Detroit Pistons in exchange for their 2020 second-round selection. However, star player Eric Bledsoe sustained a season-ending injury on December 26, 2015. On February 1, 2016, the Suns relieved Jeff Hornacek of his duties as head coach. Former NBA player Earl Watson took on interim head coaching duties. The Suns traded the disgruntled Markieff Morris on February 19, 2016, to the Washington Wizards for Kris Humphries, DeJuan Blair, and the Wizards' first-round pick in the 2016 NBA draft. On March 14, 2016, the Suns were eliminated from playoff contention for a sixth straight season making it the longest drought in franchise history surpassing the five straight misses from the 1970\u201371 NBA season to the 1974\u201375 NBA season. However, rookie Devin Booker went from being a sixth-man off-the-bench player for Kentucky to future impact player after the injuries to Eric Bledsoe and Brandon Knight. He earned the team's first NBA All-Rookie Team honors since Amar'e Stoudemire back in 2003. Earl Watson officially became the full-time head coach on April 19, 2016, with his new assistant coaches Jay Triano, former Suns player Tyrone Corbin, Marlon Garnett, and Scott Duncan replacing most of the assistant coaches from the previous season. During the 2016 NBA draft, the Suns drafted the 18-year-old Bosnian-born Croatian forward-center Dragan Bender, Washington power forward Marquese Chriss, and Kentucky point guard Tyler Ulis; Chriss was acquired by trading the Suns' 13th and 28th selections, Bogdan Bogdanovic, and the Pistons' 2020 second-round pick to the Sacramento Kings. During the 2016 free agency period, the Suns regained former players and fan-favorites Jared Dudley and Leandro Barbosa under new deals. While the Suns ended the 2016\u201317 season with only a slight improvement from their previous record despite the return of Eric Bledsoe, Devin Booker continued to improve in his second season with the team, leading the team in points scored at 22.1 per game. Marquese Chriss was also named to the All-Rookie Second Team that season. In the 2017 NBA draft, the Suns dropped to the 4th pick in the draft and selected Josh Jackson from the University of Kansas. On October 22, 2017, head coach Earl Watson was fired after a 0\u20133 start that included two losses of 40+ point deficits, which led to Jay Triano being promoted to interim head coach. On November 7, Bledsoe was traded to the Milwaukee Bucks in exchange for Greg Monroe and a protected first- and second-round draft pick. The Suns ended the season with the second-worst record in franchise history at 21\u201361. After the season concluded, the Suns let go of interim head coach Triano and hired Igor Koko\u0161kov as the team's new head coach. The Suns earned their first no. 1 pick in the 2018 NBA draft lottery after ending the season with the league-worst record that year. With the first overall pick in the 2018 NBA draft, Phoenix selected Deandre Ayton. They would also trade up into the top 10 that year to take Mikal Bridges with the 10th pick from the Philadelphia 76ers, a draft pick the Suns already had from the Steve Nash trade before trading the pick to the 76ers in the Brandon Knight trade. In the off-season, Devin Booker signed a 5-year $158 million contract extension with the Suns. Before the start of the regular season and during preseason on October 8, 2018, owner Robert Sarver decided to relieve Ryan McDonough from the general manager position, and named vice president of basketball operations James Jones and assistant general manager Trevor Bukstein as the interim general managers. A highlight of the season was when a planned three-way trade with the Washington Wizards and Memphis Grizzlies fell apart through miscommunication of the players involved and being sent in the planned deal. The Suns would once again have another losing season as they missed the playoffs for the ninth straight season. At the end of the season, the Suns made James Jones the team's permanent general manager, with co-interim general manager Trevor Bukstein returning to his prior assistant general manager role. When the season came to an end, the coaching staff, including head coach Igor Koko\u0161kov, were fired on April 23, 2019. Former New Orleans Hornets\/Pelicans head coach and Philadelphia 76ers assistant coach Monty Williams was hired as the team's new head coach on May 3, and completed the rest of the new coaching staff on June 26. Phoenix finished with a 19\u201363 record, the worst in the Western Conference. Ayton made the All-Rookie First Team. The Suns had the third odds in the lottery but landed the sixth pick. During the day of the 2019 NBA draft, the Suns agreed to deal T. J. Warren to the Indiana Pacers and their second-round pick (which would become KZ Okpala) to the Miami Heat for cash considerations. During the draft, they agreed to swap their sixth pick (which would become Jarrett Culver), trading down for the Minnesota Timberwolves' 11th pick (which would become Cameron Johnson) and Dario \u0160ari\u0107, and also agreeing to deal the Milwaukee Bucks' future first-round pick to the Boston Celtics for Aron Baynes and the draft rights to point guard Ty Jerome, as well as agree to a deal with undrafted Jalen Lecque. In the off-season they signed veteran point guard Ricky Rubio to a three-year deal, and re-signed Oubre to a two-year deal, signed Frank Kaminsky and Cheick Diallo. The Suns played the Kings in their season opener on October 23, 2019, and won 124\u201395. On October 24, Ayton was suspended 25 games for failing a drug test. However, the Suns continued to play well, going 11\u201312 over their next 23 games. On January 22, 2020, Larry Fitzgerald purchased a minority stake in the Suns, becoming the second active (at the time) NFL player with an NBA ownership share. On February 13, 2020, NBA Commissioner Adam Silver announced that Devin Booker had been named as a reserve in the 2020 NBA All-Star Game, marking the first time since Steve Nash in 2012 that a Phoenix Suns player had been selected to the game. This later selection came as a result of an injury to Portland's Damian Lillard, who was unable to participate. Following the suspension of the 2019\u201320 NBA season, the Suns were one of the 22 teams invited to the NBA Bubble to participate in the final 8 games of the regular season. They went undefeated in the bubble, finishing 8\u20130, but failed to qualify for the playoffs for the 10th consecutive season. They finished the season with a record of 34\u201339. 2020\u20132022: The arrival of Chris Paul and return to the playoffs In the 2020 off-season, the Suns traded Kelly Oubre Jr., Ricky Rubio, Jalen Lecque, Ty Jerome, and a future first-round draft pick for 10-time All-Star, 10-time All-NBA, and nine-time All-Defensive point guard Chris Paul from the Oklahoma City Thunder. Phoenix also received small forward Abdel Nader. Both Devin Booker and Paul were named All-Star reserves for the 2020\u201321 NBA season. The Suns went on to have a 51\u201321 record (2nd best in the entire NBA), clinching the second seed in the Western Conference while head coach Monty Williams was named NBCA Coach of the Year. The Suns made the playoffs for the first time since 2010. The Suns faced the defending champions Los Angeles Lakers in the first round, defeating them in six games to win their first playoff series since 2010. The Suns then went on to sweep the Denver Nuggets, advancing the team to the Western Conference Finals. Prior to the Western Conference Finals, Paul entered into the NBA's COVID-19 health and safety protocols and missed the first two games of the series. On June 30, 2021, the Suns won the Conference Finals in six games against the Los Angeles Clippers to advance to the NBA Finals for the first time since 1993 after a 41-point performance by Paul. The Suns won the first two games of the Finals but ultimately lost the series 4\u20132 to the Milwaukee Bucks, led by two-time regular season MVP Giannis Antetokounmpo, who would be eventually named Finals MVP. Despite the loss, Booker set the NBA record for the most points scored by a player in his debut postseason. Paul was awarded All-NBA Second Team honors for his performance that season although he came up short in the finals. He was also the first player to lose all four playoff series in which his team led 2\u20130. On July 29, 2021, the day of the 2021 NBA Draft, the Suns traded guard Jevon Carter and the 29th pick to the Brooklyn Nets for guard Landry Shamet. In August, the Suns re-signed free agent center Frank Kaminsky and also signed veteran center JaVale McGee to a one-year deal. Starting point guard Chris Paul was re-signed to a partially guaranteed four year deal. After beginning the 2021\u201322 season with a 1\u20133 record, the Suns rattled off a winning streak that was capped off on December 2 with a 114\u2013103 victory over the Detroit Pistons, which gave the Suns their 18th consecutive win to best the team's previous record of 17 games set in the 2006-07 season. On February 3, 2022, starting guards Devin Booker and Chris Paul were selected to reserve spots for the 2022 NBA All-Star Game. On February 10, the Suns traded second-year big man Jalen Smith and a second-round pick to the Indiana Pacers to reacquire wing Torrey Craig and acquired guard Aaron Holiday from the Washington Wizards for cash considerations at the NBA trade deadline. On March 10, the Suns became the first team that season to clinch a playoff berth after defeating the Miami Heat 111\u201390 on the road to claim their 53rd win. On March 24, the Suns clinched the NBA's top overall record with a 140\u2013130 victory over the Denver Nuggets. In the 79th game of the season, the Suns set a new franchise record for wins with a 121\u2013110 victory over the Los Angeles Lakers to tally their 63rd win on April 5, eliminating the Lakers from playoff contention in the process. The Suns finished the regular season with a record of 64\u201318 with Devin Booker finishing 4th in MVP voting. In the first round of the 2022 NBA playoffs, the Suns would defeat the New Orleans Pelicans in six games, before falling to the Dallas Mavericks in seven games in the second round despite holding a 2\u20130 series lead. 2022\u2013present: Transition of ownership and the arrival of Kevin Durant On September 13, 2022, the NBA fined owner Robert Sarver $10 million and suspended him for one year after an independent investigation determined that he used the \"N-word\" multiple times in public, as well as conduct that included \"unequal treatment of female employees; sex-related statements and conduct; and harsh treatment of employees that on occasion constituted bullying.\" Both current and former NBA players, including LeBron James, Suns player Chris Paul, and Draymond Green, said that the punishment was too lenient, with Green requesting for a league vote to terminate Sarver as a league owner. On September 21, Sarver announced he would begin the process of selling both the Phoenix Suns and the Phoenix Mercury. Sarver eventually accepted the purchase of both teams to United Wholesale Mortgage's CEO Mat Ishbia and his brother Justin for a record-high $4 billion purchasing price on December 20,"} +{"id":"RedPajamaWikipedia.0003","text":"Der Intercity (kurz IC, fr\u00fchere Schreibweise InterCity) ist eine auch international verwendete Zuggattung des Fernverkehrs, die in Deutschland unterhalb des Intercity-Express (ICE) positioniert ist. In Deutschland wird der Intercity innerhalb der Deutschen Bahn AG durch die DB Fernverkehr AG mit Sitz in Frankfurt am Main betrieben. Er verkehrt fast ausschlie\u00dflich auf innerdeutschen Routen, sein Pendant f\u00fcr den grenz\u00fcberschreitenden Verkehr ist der EuroCity (EC). Geschichte Erste-Klasse-Angebot im Zweistundentakt ab 1971 Der InterCity-Verkehr der Deutschen Bundesbahn wurde am 26. September 1971 aufgenommen. Die Schreibweise war von Anfang an unterschiedlich. So k\u00fcndigte eine Werbeseite im Sommerkursbuch 1971 an: \"InterCity-Z\u00fcge: Deutschland im 2-Stunden-Takt \u2013 Intercity-Z\u00fcge fahren vom 26. September 1971 an\". Die InterCity-Z\u00fcge l\u00f6sten 1971 die langj\u00e4hrige Gattung Fernschnellzug (F) ab und fuhren im Gegensatz zu diesem in einem Taktfahrplan mit sogenannten \"Systemhalten\" auf vier Linien (siehe Streckennetz 1971), welche die wichtigsten Wirtschaftszentren der damaligen Bundesrepublik Deutschland (Bremen, Hamburg, Hannover, Rhein\/Ruhr, Rhein\/Main, Rhein\/Neckar, M\u00fcnchen und N\u00fcrnberg) und Basel miteinander verbanden. \"Systemhalt\" bedeutet dabei, dass an diesem Bahnhof jeder Zug dieser Linie einen planm\u00e4\u00dfigen Halt hatte. Dabei waren die Fahrpl\u00e4ne von Beginn an so gestaltet, dass in f\u00fcnf wichtigen Knotenbahnh\u00f6fen jeweils zwei Z\u00fcge verschiedener Linien gleichzeitig am selben Bahnsteig gegen\u00fcberstanden und so Umsteigeverbindungen mit minimalem Zeitaufwand, aber gr\u00f6\u00dftm\u00f6glicher Anschlusssicherheit boten. In den genannten Bahnh\u00f6fen warteten die IC-Z\u00fcge im Versp\u00e4tungsfalle in der Regel bis zu 10 Minuten aufeinander (sogenannte IC-Korrespondenz-Anschl\u00fcsse). Nach Angaben der DB war das InterCity-System das erste Fernzug-System der Welt, das in einem regelm\u00e4\u00dfigen Zwei-Stunden-Takt verkehrte. Die Fahrzeiten der Z\u00fcge waren allerdings sehr ambitioniert geplant, darum mussten sie im Sommerfahrplan 1972 gestreckt werden, um eine h\u00f6here P\u00fcnktlichkeit zu erreichen. Zu den weiteren Komfortmerkmalen z\u00e4hlten auch gr\u00f6\u00dfere, klimatisierte Abteile und h\u00f6here Geschwindigkeiten. Nachdem zur Bremsung der Konjunktur der Haushalt f\u00fcr den Oberbau reduziert wurde und zugleich der Verkehr zunahm, konnten die InterCity-Z\u00fcge zun\u00e4chst nicht mit der angestrebten H\u00f6chstgeschwindigkeit von 200 km\/h verkehren. Erst 1978 standen \u00fcber 100 Kilometer Ausbaustrecken zur Verf\u00fcgung, die mit 200 km\/h befahrbar waren, w\u00e4hrend die daf\u00fcr notwendigen Lokomotiven bereits Jahre zuvor vorhanden waren. Der InterCity unterlag einer besonderen Betriebs\u00fcberwachung f\u00fcr den InterCity-Verkehr (B\u00fc-IC) bei der neu geschaffenen Zentralen Transportleitung. Der InterCity-Verkehr mit 200 km\/h erforderte bis zum Mai 1991 Ausnahmegenehmigungen von der Eisenbahn-Bau- und Betriebsordnung, die bis dahin lediglich H\u00f6chstgeschwindigkeiten der Personenz\u00fcge bis 160 km\/h vorsah. Innerhalb von drei Monaten nach Einf\u00fchrung des InterCity-Systems nahm die Zahl der Reisenden im Fernverkehr um 40 Prozent zu, w\u00e4hrend im gleichen Zeitraum zehn Prozent weniger Reisende im D-Zug unterwegs waren. Die Einf\u00fchrung der Z\u00fcge wurde von einer Werbekampagne unter dem Motto Intelligenter Reisen begleitet. Anfangs handelte es sich um Z\u00fcge, die nur Wagen der ersten Wagenklasse sowie einen Speisewagen f\u00fchrten und im Zwei-Stunden-Takt verkehrten. Hierbei waren die (ebenfalls rein erstklassigen) TEE-Z\u00fcge auf den betreffenden Strecken in den IC-Takt integriert. Damit wurde eine \u00dcberlegung verwirklicht, die eine 1967 eingesetzte Arbeitsgruppe zur Weiterentwicklung des bestehenden Fernzugnetzes ausgearbeitet hatte. Diese Gruppe hat vermutlich auch den Begriff InterCity erstmals gepr\u00e4gt, in jedem Fall wurden zum Winterfahrplan am 29. September 1968 sechs neue F-Zug-Paare eingef\u00fchrt und neben ihrem \u00fcblichen Namen zus\u00e4tzlich (auch im Kursbuch) mit InterCity A bis F bezeichnet. Vier davon verkehrten mit TEE-Triebwagen der Baureihe 601, deren TEE-Emblem hierzu durch ein \"InterCity\"-Schild ersetzt wurde; die Zugpaare A und C verkehrten lokbespannt. Die Zusatzbezeichnung \"InterCity\" wurde bereits zum Sommerfahrplan am 1. Juni 1969 wieder aufgegeben, zumal diese Zugpaare auch kein zusammenh\u00e4ngendes Netz und erst recht keinen Taktfahrplan bildeten. Schon bald nach der Einf\u00fchrung 1971 zeigte sich, dass dieses auf die erste Klasse beschr\u00e4nkte Zugangebot im Zweistundentakt, welches sich eher an einen begrenzten Kundenkreis (\u00fcberwiegend Gesch\u00e4ftsreisende) wandte, nicht zu halten war, da dieser immer mehr zum Flugzeug wechselte. Auch das 1973 eingef\u00fchrte InterCity-Erg\u00e4nzungsnetz aus DC-Z\u00fcgen half hier nicht viel, zumal es selber nicht von Erfolg gekr\u00f6nt war. Besonders als die DB 1974 im Fernverkehr Verluste verbuchen musste, wurden Alternativen gesucht. Daher wurde eine Arbeitsgruppe eingesetzt, die neue L\u00f6sungsm\u00f6glichkeiten erarbeiten sollte und direkt dem Vorstand unterstand. Es wurde erkannt, dass der Zweiklassigkeit des Systems die Zukunft geh\u00f6ren k\u00f6nnte. Untersuchungen dieser Arbeitsgruppe ergaben, dass 80 Prozent aller Fernreisenden sich auf den vier Linien des bisherigen IC-Netzes bewegten, das aber nur 21 Prozent des gesamten Fernzug-Netzes umfasste. Diese Gruppe galt es f\u00fcr ein neues Angebot zu gewinnen. Nach erheblichen Widerst\u00e4nden aus dem Betriebsdienst, ein Exklusivangebot f\u00fcr eine gehobene Klientel aufzugeben, was einigen Kreisen zu weitgehend erschien, wurde am 4. Oktober 1977 vom DB-Vorstand beschlossen, die InterCity-Z\u00fcge k\u00fcnftig generell zweiklassig und im Stundentakt anzubieten. Die ersten zweiklassigen IC-Z\u00fcge fuhren bereits ab 1976 auf der weniger aufkommensstarken Linie Bremen \u2013 M\u00fcnchen. Es handelte sich aber nur um einzelne Z\u00fcge, deren Auslastung in der ersten Klasse unbefriedigend war und die daher zum Streichkandidaten wurden, was jedoch das Konzept eines jederzeit und \u00fcberall verf\u00fcgbaren Netzes zerst\u00f6rt h\u00e4tte. Dieser Versuch f\u00fchrte endg\u00fcltig zu der Erkenntnis, dass die Zukunft des IC im zweiklassigen System liegen k\u00f6nnte. Vor der generellen Einf\u00fchrung des neuen IC-Systems erfolgte zuvor ab dem Sommerfahrplan 1978 ein Test auf der Strecke Hamburg \u2013 K\u00f6ln mit IC-Z\u00fcgen erster und zweiter Klasse in einem angen\u00e4herten Stunden-Takt. Zweiklassiges Netz im Stundentakt ab 1979 Zum Beginn des Sommerfahrplans am 27. Mai 1979 wurde das Programm IC '79 mit den Slogans \"Jede Stunde, jede Klasse\" und \"nur die Stra\u00dfenbahn f\u00e4hrt \u00f6fter\" in allen Z\u00fcgen auch mit Wagen der zweiten Wagenklasse eingef\u00fchrt und der Takt auf einen exakten Stundenrhythmus verdoppelt. Allerdings entfielen daf\u00fcr auf den IC-Strecken insbesondere zu den Fahrplanwechseln 1979 und 1985 eine ganze Reihe der bisherigen tags\u00fcber verkehrenden D-Z\u00fcge. Vom wachsenden IC-Netz weitgehend unbeeinflusst blieben hingegen die als Nachtz\u00fcge verkehrenden D-Z\u00fcge; deren Anzahl ging erst sp\u00e4ter zur\u00fcck. W\u00e4hrend D-Z\u00fcge mit Fahrkarten \u00fcber 50 Kilometer Fahrtl\u00e4nge zuschlagfrei benutzbar waren, wurde bei IC-Z\u00fcgen von 1971 bis 1991 unabh\u00e4ngig von Fahrkarte und im IC zur\u00fcckgelegter Strecke ein pauschaler Zuschlag erhoben. In der zweiten Klasse betrug er \u00fcber viele Jahre hinweg 5 DM. F\u00fcr IC 79 wurde konsequent alles unternommen, um die Reisezeiten zu verk\u00fcrzen. Neben dem sukzessiven Ausbau der Strecken f\u00fcr eine H\u00f6chstgeschwindigkeit von 200 km\/h wurde seitens der Z\u00fcge weitestgehend auf Kurswagen und das damit verbundene zeitaufw\u00e4ndige Kuppeln und Rangieren verzichtet. Andererseits wurden Regionen, deren Fahrgastaufkommen f\u00fcr einen Stundentakt nicht ausreichte, dennoch mit einzelnen aus dem Kernnetz heraus weitergef\u00fchrten IC-Z\u00fcgen umsteigefrei angebunden, beispielsweise Kopenhagen, Amsterdam, Aachen, Saarbr\u00fccken, Garmisch-Partenkirchen, Wien, Genf und Mailand. Anfangs wurden diese Einzelz\u00fcge auf den Abschnitten au\u00dferhalb Deutschlands als D-Z\u00fcge klassifiziert. Um die Aufenthaltszeiten in den Unterwegsbahnh\u00f6fen zu minimieren, f\u00fchrten IC-Z\u00fcge \u2013 von wenigen Ausnahmen abgesehen \u2013 im Gegensatz zu den herk\u00f6mmlichen D-Z\u00fcgen weder Gep\u00e4ckwagen noch Bahnpostwagen, wodurch es kein zeitraubendes Ladegesch\u00e4ft mehr w\u00e4hrend der knapp bemessenen Halte gab. Au\u00dferdem wurden 1979 auf allen IC-Bahnsteigen wei\u00dfe Leuchtw\u00fcrfel mit gro\u00dfen Kennbuchstaben A bis (zun\u00e4chst) E im Abstand von 53 Metern (zwei Wagenl\u00e4ngen) aufgestellt, um den Reisenden ein m\u00f6glichst schnelles Einsteigen ohne lange Suche des Wagens mit den reservierten Pl\u00e4tzen zu erm\u00f6glichen. Zuvor standen hierzu allein die Wagenstandanzeiger auf dem Bahnsteig zur Verf\u00fcgung; eine exakte Positionsbestimmung eines Wagens am Bahnsteig war dem Fahrgast damit nicht m\u00f6glich gewesen. Waren im 1978er-Test die Wagen der ersten Klasse am s\u00fcdlichen Zugende eingereiht, wurde auf Wunsch der SBB die Wagenreihung so ge\u00e4ndert, dass sich zwischen Hamburg, K\u00f6ln und Basel die Wagen der ersten Klasse am n\u00f6rdlichen Zugende befanden (in Basel SBB m\u00fcssen Z\u00fcge aus Deutschland immer die Fahrtrichtung \u00e4ndern). Auf diese Weise standen die Wagen der ersten Klasse bei Ankunft im Kopfbahnhof Z\u00fcrich Hauptbahnhof am Bahnsteigende\/Querbahnsteig. Dies war ein Zugest\u00e4ndnis der DB an die SBB, damit letztere der F\u00fchrung von IC-Z\u00fcgen auf ihren Gleisen zustimmen. Damit wurde jedoch in Kauf genommen, dass sich die Wagen der ersten Klasse in den Kopfbahnh\u00f6fen von Frankfurt am Main oder M\u00fcnchen nicht am Querbahnsteig, sondern \"weit drau\u00dfen\" befanden. Neben dem Taktfahrplan zeichnete sich das IC-Netz von Anfang an dadurch aus, dass der Reisende in den Verkn\u00fcpfungsbahnh\u00f6fen Hannover Hauptbahnhof, Dortmund Hauptbahnhof, K\u00f6ln Hauptbahnhof, Mannheim Hauptbahnhof und W\u00fcrzburg Hauptbahnhof durch Korrespondenzhalte die M\u00f6glichkeit hatte, am gleichen Bahnsteig von einer Linie in den Zug der anderen Linie zu wechseln. Aus der Netzkonfiguration ergab sich, dass sich ab 1979 in allen Korrespondenzbahnh\u00f6fen die Wagen der ersten bzw. zweiten Klasse an den Bahnsteigen jeweils gegen\u00fcberstanden, wodurch die Umsteigezeiten von IC zu IC minimiert werden konnten. Da aber noch bef\u00fcrchtet wurde, dass die bisherigen Erste-Klasse-Reisenden die neuen Z\u00fcge meiden k\u00f6nnten, wurden nicht nur die erste und zweite Klasse in den InterCitys durch den dazwischen eingereihten Speisewagen getrennt, sondern auch insgesamt sieben rein erstklassige TEE-Zugl\u00e4ufe neu angeboten, welche auf wichtigen Strecken zeitlich vor den eigentlichen Taktz\u00fcgen verkehrten. Sp\u00e4ter wurden diese Z\u00fcge aber mangels Nachfrage wieder aufgegeben, das Potential f\u00fcr ein eigenes Premium-Angebot parallel zu den sich etablierenden doppelklassigen InterCitys erwies sich als zu gering. 1987 verkehrte in Deutschland der letzte TEE. Bereits 1985 (siehe Streckennetz 1985) wurde das IC-Netz von vier auf f\u00fcnf Linien erweitert, so dass zwischen Rhein\/Ruhr und Rhein\/Main nun drei statt zwei Z\u00fcge pro Stunde und Richtung verkehrten. Damit sollten \u00dcberbesetzungen der Z\u00fcge auf dem relativ kurzen, aber stark nachgefragten Abschnitt zwischen diesen beiden zentralen Ballungsr\u00e4umen vermieden oder wenigstens gemindert werden. Eine weitere markante Umstrukturierung erfolgte 1988, als der erste l\u00e4ngere Neubaustrecken-Abschnitt Fulda\u2013W\u00fcrzburg in Betrieb ging (siehe Streckennetz 1988). Abl\u00f6sung durch den ICE ab 1991 Kurz nach der Deutschen Wiedervereinigung 1990 gingen zum 2. Juni 1991 nach zwei Jahrzehnten Planungs- und Baut\u00e4tigkeit die Schnellfahrstrecken Hannover\u2013Fulda und Mannheim\u2013Stuttgart in Betrieb. Mit der gleichzeitigen Aufnahme des ICE-Verkehrs wurden neue IC-Linien eingerichtet und die Linie von Hamburg \u00fcber G\u00f6ttingen und Mannheim nach M\u00fcnchen von IC- auf ICE-Z\u00fcge umgestellt und dadurch beschleunigt. In den folgenden Jahren wurden weitere Linien neu geschaffen und\/oder auf ICE umgestellt, allerdings werden einige Strecken heute wieder konkurrierend bedient, da nach der Einstellung der Interregio-Z\u00fcge (IR) einige der ehemaligen IR-Linien zu IC-Linien \"aufgewertet\" wurden. So verkehren auf der Relation Rhein\/Ruhr \u2013 Rhein\/Main ICE-Z\u00fcge meist \u00fcber die Schnellfahrstrecke durch den Westerwald, w\u00e4hrend IC\/EC-Z\u00fcge die touristisch reizvollere Verbindung entlang des Rheins befahren, der Reisezeitunterschied betr\u00e4gt etwa eine Stunde. Im Jahr 2000 erbrachten die EC\/IC-Z\u00fcge eine Bef\u00f6rderungsleistung von 11,3 Milliarden Personenkilometern (Pkm), das waren 0,6 Milliarden Pkm weniger als im Vorjahr. Im Oktober 2001 begann eine umfassende Modernisierung des Wagenparks: Am 14. M\u00e4rz 2002 wurde ein erster erneuerter IC\/EC-Wagen vorgestellt. Insgesamt wurden 200 Millionen Euro investiert, um die 1198 Fahrzeuge der insgesamt rund 1750 IC\/EC-Wagen umfassenden Flotte f\u00fcr wenigstens zehn weitere Betriebsjahre zu ert\u00fcchtigen. Im Sommer 2012 begann ein weiteres Redesign-Programm, bei dem ein Gro\u00dfteil der IC-Wagen neue Sitze und weitere Detailmodernisierungen erh\u00e4lt. Rangierten IC-Z\u00fcge fr\u00fcher an der Spitze des nationalen Eisenbahnverkehrs, sind sie heute hinsichtlich Komfort, Service und Reisezeiten unterhalb der ICE-Z\u00fcge einzuordnen. So finden sich seit Abstellung der DB-Intercity-Bordrestaurantwagen Bordrestaurants nur noch in einzelnen Z\u00fcgen, die mit Wagenmaterial ausl\u00e4ndischer Eisenbahngesellschaften betrieben werden, ansonsten gibt es meist lediglich einen Bordbistro-Wagen mit gegen\u00fcber einem vollwertigen Bordrestaurant eingeschr\u00e4nktem Service. Die IC-Z\u00fcge der Linie 61 (Karlsruhe\u2013Stuttgart\u2013N\u00fcrnberg) verkehren seit dem Fahrplanwechsel im Juni 2011 g\u00e4nzlich ohne gastronomischen Service, nachdem der nach Wegfall der Bordbistros im Dezember 2010 als \"Ersatz\" eingef\u00fchrte Snack-Caddy-Service ebenfalls eingestellt wurde. Zudem halten die IC-Z\u00fcge auf Strecken mit konkurrierendem ICE-Verkehr bisweilen \u00f6fter oder verkehren \u00fcber andere (meist langsamere) Strecken. Auch sind bisweilen ehemalige Interregio-Wagen mit geringerem Komfort unterwegs, insbesondere sind nicht immer alle Wagen eines Zuges klimatisiert. W\u00e4hrend in der zweiten Klasse haupts\u00e4chlich Gro\u00dfraumwagen eingesetzt werden, sind in der ersten Klasse vielfach nur Abteilwagen oder nur Gro\u00dfraumwagen anzutreffen. Geplante Weiterentwicklung Am 18. M\u00e4rz 2015 gab die Deutsche Bahn unter dem Titel \"Mehr Bahn f\u00fcr Metropolen und Regionen \u2013 Die gr\u00f6\u00dfte Kundenoffensive in der Geschichte des DB Fernverkehrs\" ihr Zukunftskonzept f\u00fcr den Schienenfernverkehr bis 2030 bekannt. Nach diesem Konzept soll das Kernnetz des Fernverkehrs ausschlie\u00dflich durch den Intercity-Express bzw. vergleichbare Produkte der Eisenbahnen der Nachbarstaaten (zum Beispiel TGV und Railjet) bedient werden. Die Zuggattung Intercity soll auf einem erweiterten Liniennetz hingegen zus\u00e4tzliche Strecken in der Fl\u00e4che bedienen und Direktverbindungen aus Mittelzentren erm\u00f6glichen. Auch Strecken, auf denen bisher kein Fernverkehr angeboten wurde, sollen in das neue Intercity-Netz integriert werden und so f\u00fcr fast alle St\u00e4dte mit mehr als 100.000 Einwohnern einen Anschluss an das Fernverkehrsnetz der Deutschen Bahn erm\u00f6glichen. Alle Intercity-Linien sollen (mit Ausnahme einzelner Strecken mit \u00fcberwiegend touristischer Bedeutung) im Zweistundentakt bedient werden. Um die Ziele des Konzeptes zu erm\u00f6glichen, wird eine st\u00e4rkere Tarif-Integration Fern-\/Nahverkehr angestrebt. Dies wird zum Beispiel zwischen Stuttgart und Singen bereits umgesetzt, f\u00fcr die Anerkennung von Nahverkehrsfahrkarten ab Dezember 2017 erh\u00e4lt die Deutsche Bahn einen finanziellen Ausgleich f\u00fcr die Mindereinnahmen vom Land Baden-W\u00fcrttemberg. Im Gegenzug entf\u00e4llt f\u00fcr das Bundesland der Bedarf, auf dieser Strecke einen Regionalexpress zu bestellen. Daneben sollen im neuen Intercity-Netz vorwiegend Doppelstockz\u00fcge eingesetzt werden, die \u00fcber nur noch \"einfache Bordgastronomie\", also keine Bordbistros mehr verf\u00fcgen. Fahrzeugeinsatz Urspr\u00fcnglicher Wageneinsatz Ab 1971 wurden die vormals in TEE-Z\u00fcgen verwendeten Rheingold-Wagen nunmehr im IC-Dienst eingesetzt. Dies waren 99 klimatisierte erstklassige Gro\u00dfraumwagen mit 48 Pl\u00e4tzen, Typ Apmh-62 (Apmz121), und 266 Abteilwagen Avmh-62 (Avmz111) mit nur neun Abteilen mit den Baujahren 1962 bis 1975. Die letzte Lieferserie von 1975 der Avmz-Wagen war bis zum Umbau auf Drehfaltt\u00fcren bis zur Jahrhundertwende mit Schwenkschiebet\u00fcren ausgestattet. Als Verst\u00e4rker waren bis zur Lieferung von 100 Eurofima-Abteilwagen der ersten Klasse im Jahr 1977 blaue Schnellzugwagen des Typs Am203 des vorhergehenden F-Zug-Netzes erforderlich. Ab 1975 kam ein neuartiger Gro\u00dfraumwagen des Typs Apmz122 mit leicht ver\u00e4nderten Fenstern und ebenfalls neuen Schwenkschiebet\u00fcren (wie bei den Avmz) und nun 51 Pl\u00e4tzen hinzu. Viele der ehemaligen TEE-Wagen sind noch im IC-Einsatz zu finden. Zwischenzeitlich planten aber f\u00fcnf europ\u00e4ische Eisenbahnverwaltungen die gemeinsame Bestellung neuer Standardwagen, die in den Abmessungen den bisherigen IC-Wagen entsprachen. Diese Wagen wurden von der Eurofima finanziert. Nach ersten Prototypen 1972 und 1974 kamen ab 1976 europaweit 500 Wagen der Typen A9 (erste Klasse mit neun Abteilen) und B11 (zweite Klasse mit elf Abteilen) in die Produktion, wovon die DB 100 Wagen als Avmz207 (heute Avmz 108) im TEE-Anstrich als IC-Wagen einstellte. Nach Umbau der meisten Wagen auf druckdichte Ausf\u00fchrung wurden diese als Avmz107 eingereiht. Zu den im IC-Verkehr eingesetzten Wagen geh\u00f6ren auch Speisewagen der Bauarten WRmz132, WRmz135, der Quick-Pick-Wagen WRbumz139 und die Halbspeisewagen der Typen ARmz211, ARmz217 und ARmz218. Sp\u00e4ter wurden aus \"QuickPick\"-Wagen umgebaute druckdichte BordRestaurant-Wagen des Typs WRmz137 sowie ab 1991 DR-Wagen Bauart WRm130 ebenfalls in IC-Z\u00fcgen verwendet. Mit der Einf\u00fchrung von IC-Z\u00fcgen erster und zweiter Klasse ab 1976 bestand der A-Block in der Regel aus drei Wagen erster Klasse, der B-Block aus bis zu sieben ebenso f\u00fcr 200 km\/h umger\u00fcsteten Schnellzugwagen des Typs Bm234, die zur Unterscheidung von den bisherigen Wagen ab 1979 als Bm235 bezeichnet wurden. Bis 1985 konnten auf der IC-Linie 1 (Hamburg \u2013 Rhein\/Ruhr \u2013 M\u00fcnchen) bis zu vier Erste-Klasse-Wagen in einem Zug beobachtet werden. Auf der Linie 4 (Bremen \u2013 Hannover \u2013 M\u00fcnchen) kamen dagegen meist k\u00fcrzere Zuggarnituren mit nur zwei Erste- und f\u00fcnf bis sechs Zweite-Klasse-Wagen zum Einsatz. Anfang der 1980er Jahre weist eine Statistik \u00fcber die damals 150 IC-Z\u00fcge als h\u00e4ufigste Konfigurationen aus: 33 Z\u00fcge: 6 Wagen 2. Klasse \/ Speisewagen \/ 3 Wagen 1. Klasse 29 Z\u00fcge: 7 Wagen 2. Klasse \/ Speisewagen \/ 3 Wagen 1. Klasse 24 Z\u00fcge: 7 Wagen 2. Klasse \/ Speisewagen \/ 4 Wagen 1. Klasse Schnell wurde aber der Komfortunterschied der DB-IC-Wagen in der zweiten Klasse zu den Wagen der europ\u00e4ischen Nachbar-Bahnverwaltungen klar, die auch f\u00fcr den Zweite-Klasse-Teil klimatisiertes Material einsetzten, wie den Eurofima-B11-Wagen oder den franz\u00f6sischen Corail-Gro\u00dfraum- und Abteilwagen. Auf der Basis der Eurofima-Wagen wurde f\u00fcr den IC-Verkehr nunmehr ein Zweite-Klasse-Gro\u00dfraumwagen der Gattung Bpmz entwickelt. Die Bauartennummern reichten wegen unterschiedlicher Ausstattungen von 291 bis 296. Aufgrund nicht nachlassender Kundennachfrage wurden ab 1987 auch neue gemischte Gro\u00dfraum-\/Abteilwagen des Typs Bvmz185 angeschafft, die nur insgesamt f\u00fcnf echte Abteile aufwiesen, neben einem Gro\u00dfraumabteil mit 34 Pl\u00e4tzen in der Mitte des Wagens, das aus sechs \"Quasi-Abteilen\" mit vier Pl\u00e4tzen und zwei Sitzpl\u00e4tzen gegen\u00fcber dem Gang gebildet wurde. Diese Wagen wurden bereits ab Werk druckert\u00fcchtigt. Nach Ausdehnung des IC-Netzes auf die neuen Bundesl\u00e4nder ab 1990 wurden dort Zuggarnituren mit zwei Erste-Klasse-Wagen, dem Zugrestaurant, drei Abteil- und zwei Gro\u00dfraumwagen zum Standard. Da das vorhandene Wagenmaterial der Deutschen Reichsbahn den gestiegenen Erwartungen der Kunden nicht gerecht werden konnte, wurden 112 Abteilwagen der Bauart Bmz236 beschafft, die aus den UIC-Z-Wagen der Halberst\u00e4dter Bauart abgeleitet wurden. Somit verf\u00fcgte die DR \u00fcber Wagen mit je elf Abteilen, die zwar nicht klimatisiert waren, aber nun stoffbezogene Polster besa\u00dfen und dem damaligen Farbgeschmack entsprachen. W\u00e4hrend die (klimatisierten) Erste-Klasse-Wagen und die Gro\u00dfraumwagen der zweiten Klasse von der Deutschen Bundesbahn gestellt wurden, konnte die Deutsche Reichsbahn noch ihre nichtklimatisierten Speisewagen des Baujahrs 1984 einsetzen. In einzelnen IC-Z\u00fcgen, besonders in den Tagesrandlagen, wurden Bahnpostwagen f\u00fcr die Bundespost oder Gep\u00e4ckwagen f\u00fcr den DB-eigenen Expressgutverkehr mitgef\u00fchrt (Beispiel-Z\u00fcge siehe unter Post InterCity). Diese wurden extra f\u00fcr diesen Einsatz f\u00fcr die H\u00f6chstgeschwindigkeit von 200 km\/h ert\u00fcchtigt. Der Bahnpostverkehr in IC-Z\u00fcgen endete 1997. Wendez\u00fcge wurden erstmals 1988 im Intercity-Verkehr eingesetzt, hierbei handelte es sich um umgebaute Nahverkehrswagen. Diese hatten eine den \u00fcbrigen Intercity-Wagen entsprechende Gro\u00dfraumbestuhlung erhalten und dienten insbesondere der Anbindung Wiesbadens an das Intercity-Netz. Die Wagen stellten Splittergattungen im Intercityverkehr dar und wurden bis 1998 ausgemustert. Nachdem die Z\u00fcge der Baureihe 605 nach zahlreichen Problemen vorerst ausgemustert wurden, waren einige Zugeinheiten der Baureihe 612 mit einer Fernverkehrs-Lackierung versehen worden und bedienten ab Ende 2003 f\u00fcr einige Monate die vormalige ICE-Relation N\u00fcrnberg \u2013 Dresden als IC. Jedoch konnten die f\u00fcr den Nahverkehr konzipierten Z\u00fcge, haupts\u00e4chlich wegen der Ausstattung, dem IC-Standard nicht gerecht werden. Im August 2004 wurden sie durch lokbespannte Z\u00fcge ersetzt, und seit Dezember 2006 verkehren auf der Sachsen-Franken-Magistrale keine ICs mehr. Ersatzweise betrieb die DB Regio auf dieser Strecke bis Dezember 2014 den IRE Franken-Sachsen-Express im Auftrag der DB Fernverkehr \u2013 allerdings wieder mit Triebwagen der Baureihe 612. Von Juni bis Dezember 2005 sowie von Mai 2006 bis Dezember 2009 wurden auch die beiden Garnituren des 2004 eingestellten Metropolitan als Intercity-Z\u00fcge in einem eigenen Umlauf eingesetzt. Davor, dazwischen und danach verkehrten sie hingegen als ICE. Heutiger Wageneinsatz Einst\u00f6ckige Reisezugwagen Auch heute setzt die DB f\u00fcr ihre IC-Z\u00fcge verschiedene Wagentypen ein. Der klassische IC besteht aus Abteil- und Gro\u00dfraumwagen beider Wagenklassen, letztere f\u00fcr die zweite Klasse erst ab circa 1981. In der ersten Wagenklasse werden ausschlie\u00dflich klimatisierte Wagen eingesetzt. Mit der Neulieferung klimatisierter Bpmz-Gro\u00dfraumwagen \u00fcberwiegt seit Mitte der 1980er Jahre der Anteil von Wagen mit Klimaanlage auch in der zweiten Klasse, seit Ende der 1980er Jahre gibt es mit den Bvmz185 auch klimatisierte Abteile in der zweiten Wagenklasse. Die positiven Erfahrungen beim Einsatz von Steuerwagen in Kopf- und Endbahnh\u00f6fen bei den Interregio-Z\u00fcgen ab 1995 f\u00fchrten dazu, dass ab 1996 auch f\u00fcr Intercity-Z\u00fcge Steuerwagen beschafft wurden. Diese wurden \u2013 wie auch beim Interregio \u2013 aus ehemaligen Reichsbahn-Schnellzugwagen der Bauart Halberstadt umgebaut. Hier sind zwei Bauarten zu unterscheiden: Bimdzf269: Diese Wagen entsprechen weitgehend den f\u00fcr den Interregioverkehr (Kennbuchstabe \"i\") gebauten Steuerwagen. Seit Einstellung des Interregio-Verkehrs werden auch die Interregio-Steuerwagen umlackiert in Intercity-Z\u00fcgen eingesetzt. Diese Wagen besitzen keine Klimaanlage. Bpmbdzf297: Diese Wagen sind als Gro\u00dfraumwagen (Kennbuchstabe \"p\") mit behindertengerechter Zusatzausstattung (Kennbuchstabe \"b\") konzipiert. Sie entsprechen im Fahrgastraum weitgehend den Bpmz-Gro\u00dfraumwagen und sind ebenso wie diese Wagen klimatisiert. Alle Steuerwagen verf\u00fcgen \u00fcber Aufh\u00e4ngevorrichtungen zum Transport von Fahrr\u00e4dern (Kennbuchstabe \"d\"), deren Mitnahme ist heute in fast allen IC m\u00f6glich. Die nichtklimatisierten Zweite-Klasse-Abteilwagen der Bauarten Bm235 und Bmz\/Bomz236 sowie die aus den Vorg\u00e4nger-Bauserien entstandenen Interregio-Umbauten der Typen Bim(d)z werden nicht mehr eingesetzt. Die kostenintensiv zu bewirtschaftenden Speisewagen aller Typen wurden weitgehend durch die g\u00fcnstiger zu betreibenden BordBistros (ARkimbz) der fr\u00fcheren Interregios ersetzt. Nur noch in wenigen IC-Z\u00fcgen sowie in einigen von der DB gestellten EC-Z\u00fcgen waren noch Speisewagen (\"BordRestaurants\") der heutigen Bauart WRmz134 zu finden. In einzelnen IC-Garnituren wurden jedoch auch Wagen der Bauart WRmkz, einem vom Restaurant zum Bistro umgebauten Speisewagen sowie Wagen der Bauart Bvmkz, einem Abteilwagen mit K\u00fcchenbereich eingesetzt. In der Regel bestehen die IC-Z\u00fcge heute aus ein bis zwei und nur noch in Ausnahmef\u00e4llen drei Wagen der ersten Klasse, davon ein Gro\u00dfraumwagen (bei mehr als einem Wagen der ersten Klasse), einem aus dem Interregio \u00fcbernommenen \"Bordbistro\"-Wagen und bis zu neun Wagen der zweiten Klasse. Die meisten IC-Z\u00fcge werden heute als Wendezug gefahren, besitzen also einen Steuerwagen. Zwischen Mitte 2001 und Dezember 2004 wurden 1.198 klimatisierte IC-Wagen an das Erscheinungsbild der Intercity-Express-Z\u00fcge angepasst. Dazu wurden die Wagen mit einem Fahrgastinformationssystem (FIS) bestehend aus je zwei LED-Zuglaufschildern au\u00dfen, zwei TFT-Zuglaufschilder innen, sowie elektronischen Anzeigen f\u00fcr die Sitzplatzreservierung ausgestattet. Au\u00dferdem wurden die Wagen mit einer seitenselektiven T\u00fcrfreigabe ausger\u00fcstet. Die Steuerung der FIS und der seitenselektiven T\u00fcrfreigabe erfolgt \u00fcber einen ebenfalls neu eingebauten Wagenrechner, die \u00fcber den Wire Train Bus (WTB) mit dem Zentralrechner kommunizieren. Neben farblicher Auffrischung (neue Innenraumfarben und Sitzbez\u00fcge) und Umbau der Beleuchtung in den Gro\u00dfraumwagen (offen sichtbare Leuchtstofflampen-Leiste anstelle der vormaligen indirekten Beleuchtung an den Seiten) gab es vor allem bei den Bvmz185 gr\u00f6\u00dfere Umbauten. Viele Bvmz wurden zu Bvmsz umgebaut und dabei mit einem Service-Abteil f\u00fcr die Zugbegleiter und einem Mutter-Kind-Abteil ausgestattet. Durch diese Ma\u00dfnahmen sind Pl\u00e4tze verlorengegangen, allerdings wurden dabei die offenen Abteile in der Wagenmitte durch ein Gro\u00dfraumabteil im Stil der Bpmz-Wagen ersetzt, wodurch wieder Sitzpl\u00e4tze hinzugewonnen wurden. Einige wenige Bpmz wurden so umgebaut, dass auch in ihnen die Fahrradmitnahme m\u00f6glich ist. Diese werden allerdings meist in internationalen Zugl\u00e4ufen eingesetzt. Seit 2012 gab es ein neues Modernisierungsprogramm (als IC mod bezeichnet), das die Intercity-Wagen f\u00fcr einen weiteren Einsatz bis in die 2020er Jahre ert\u00fcchtigen soll. In der Zeit bis Ende 2014 wurden die Wagen in den Werken Neum\u00fcnster, Kassel und N\u00fcrnberg f\u00fcr 250 Millionen Euro umfassend modernisiert. Dies umfasste sowohl technische Ma\u00dfnahmen in den Bereichen Drehgestelle, Bremsen, T\u00fcren, Energieversorgung und Klimaanlagen zur Steigerung der Zuverl\u00e4ssigkeit der Fahrzeuge als auch Ma\u00dfnahmen im Innenraum. Dort wurden insgesamt rund 46.000 neue Sitze mit Haltegriffen, Platznummern in Blindenschrift und Steckdosen eingebaut. Die erste Klasse erhielt Ledersitze, weiter wurden Wandverkleidungen, Tische und 42.000 Quadratmeter Teppichboden ausgetauscht. Das Design orientiert sich an der Einrichtung der ICE. Au\u00dferdem wurden die Bistrowagen und die WCs \u00fcberarbeitet. Die Anzahl der Wagen mit Fahrradstellpl\u00e4tzen wurde von 129 auf insgesamt 163 erh\u00f6ht. Die IC-Linie Stuttgart\u2013K\u00f6ln\u2013Hamburg wird hierbei bevorzugt auf modernisierte Wagen umgestellt. Anfang Juni 2013 waren 250 von 770 Wagen umger\u00fcstet. Die Wagen sollen bis 2023 eingesetzt werden. In der ersten Klasse wurden die Wagen mit LTE-f\u00e4higen Repeatern ausger\u00fcstet. Zudem erhalten die IC-Wagen eine Ausr\u00fcstung mit WLAN in der 1. und 2. Klasse. Die Umr\u00fcstung sollte urspr\u00fcnglich Ende 2021 abgeschlossen sein, verz\u00f6gert sich jedoch durch die Auswirkungen der COVID-19-Pandemie nach Angaben der Bahn bis ins Jahr 2022. Doppelstockwagen (Intercity 2) Seit dem 12. Dezember 2015 verkehren auch Doppelstockz\u00fcge unter dem Namen \"Intercity 2\" (IC 2). Dazu wurden 135 neue Bombardier-Twindexx-Doppelstockwagen und 27 Lokomotiven der Baureihe 146.5 bei Bombardier Transportation bestellt. Die Doppelstockwagen, die aus einem Regionalverkehrs-Rahmenvertrag stammen, sind allerdings nur f\u00fcr 160 km\/h zugelassen. Die Intercity-2-Z\u00fcge verf\u00fcgen \u00fcber kein Bistro oder Restaurant, stattdessen erfolgt auf einzelnen Streckenabschnitten eine Bewirtung am Platz. Unter dem Namen IC Caf\u00e9-Team bieten Mitarbeiter von LSG Sky Chefs den Reisenden Kalt- und Hei\u00dfgetr\u00e4nke, Snacks und Backwaren an. Allerdings stie\u00dfen die neuen Z\u00fcge unter anderem wegen ihrer Laufeigenschaften \u2013 vor allem im Oberdeck wurden die Schwankungen als sehr massiv empfunden \u2013 auf heftige Kritik bei vielen Fahrg\u00e4sten, so dass ab Ende Januar 2016 in den Werkst\u00e4tten Nacharbeiten erfolgen sollen. Anfang des Jahres 2014 bestellte die Deutsche Bahn weitere 17 Doppelstockz\u00fcge f\u00fcr den Einsatz in Intercity-Z\u00fcgen zwischen Stuttgart und Z\u00fcrich. Dieser erfolgt seit Ende 2017. Doppelstocktriebz\u00fcge (Intercity 2) Im Juni 2019 schloss DB Fernverkehr mit der \u00f6sterreichischen WESTbahn einen Kaufvertrag \u00fcber 17 Doppelstocktriebz\u00fcge. Hierbei handelt es sich um bis zu 200 km\/h schnelle Doppelstock-Triebz\u00fcge des Typs Stadler KISS, die zuvor bei der WESTbahn im Fernverkehr zwischen Wien und Salzburg eingesetzt wurden. Der Erwerb umfasst zwei Tranchen. Die erste Tranche umfasst Einheiten aus dem Jahr 2017. Diese werden, wie bereits bei der WESTbahn, als Baureihe 4110 bezeichnet. Sie sind \u00fcberwiegend vierteilig und verf\u00fcgen \u00fcber etwa 300 Sitzpl\u00e4tze. Ihr Einsatzgebiet ist seit M\u00e4rz 2020 die neugeschaffene Intercity-Linie zwischen Dresden und Rostock \u00fcber Berlin. Die vierteiligen Triebz\u00fcge sollen bis sp\u00e4testens M\u00e4rz 2022 vom Hersteller Stadler um je zwei Mittelwagen erg\u00e4nzt werden. Die sp\u00e4tere zweite Tranche soll sechsteilige Triebz\u00fcge mit rund 500 Sitzpl\u00e4tzen umfassen. Die KISS-Doppelstockz\u00fcge werden von der Deutschen Bahn ebenfalls als Intercity 2 bezeichnet. Zuk\u00fcnftiger Wageneinsatz Weitere Planungen Das im M\u00e4rz 2015 ver\u00f6ffentlichte Fernverkehrskonzept der Deutschen Bahn sah vor, dass bis 2030 f\u00fcr das neue Intercity-Netz 120 Doppelstock-Intercity-Z\u00fcge beschafft werden sollten. Die Wagen sollen \u00fcber \"einfache Bordgastronomie\", also beispielsweise Snack-Caddys verf\u00fcgen und weiterhin die Fahrradmitnahme erm\u00f6glichen. Lokomotiven Nur auf einigen Streckenabschnitten (zum Beispiel Kassel\u2013Hamburg, M\u00fcnster(Westfalen)-Hamburg, Mannheim\u2013Offenburg, Leipzig\u2013Dresden, K\u00f6ln\u2013Duisburg, Augsburg\u2013M\u00fcnchen oder Dortmund\u2013Berlin) fahren die Z\u00fcge heute ihre zul\u00e4ssige H\u00f6chstgeschwindigkeit von 200 km\/h aus, dies galt umso mehr bei der Einf\u00fchrung 1971. Dennoch kamen von Anfang an auch bei den damals noch meist kurzen Erste-Klasse-Z\u00fcgen vor allem die f\u00fcr 200 km\/h geeigneten und \u00e4u\u00dferst stark motorisierten sechsachsigen Schnellzug-Lokomotiven der Baureihe 103 zum Einsatz. Dar\u00fcber hinaus verkehrten teilweise auch die aus den 1950er Jahren stammenden und f\u00fcr den TEE-Verkehr konstruierten aber weniger schnellen Dieseltriebwagen der Baureihen 601\/602 in IC-Diensten. Auf Strecken mit geringerem Verkehrsaufkommen (Bremen\u2013M\u00fcnchen) wurden ab 1974 auch die 200 km\/h schnellen neuen Triebwagen der damaligen Baureihe 403 eingesetzt, von denen es jedoch nur drei kurze Exemplare gab. Mit der Umstellung des Netzes 1979 auf beide Wagenklassen (damit erheblich l\u00e4ngere und schwerere Z\u00fcge) und eine Verdichtung auf einen nun ohne Taktabweichungen durchgehaltenen Stundentakt bestand f\u00fcr kurze oder langsame Triebwagen keine Einsatzm\u00f6glichkeit mehr, so dass nun die 103er-Lokomotiven das Bild des IC beherrschten. Lediglich auf wenigen Streckenabschnitten kamen auch Loks der Baureihen 111 und der damaligen 112 zum Einsatz. F\u00fcr die Baureihe 103 stellte das Bahnbetriebswerk Hamburg-Eidelstedt in der zweiten H\u00e4lfte der 1980er Jahre Umlaufpl\u00e4ne f\u00fcr 56 Lokomotiven auf, das Betriebswerk Frankfurt am Main teilte daf\u00fcr 58 Maschinen ein. Sp\u00e4ter wurden die genannten Baureihen sukzessive durch die ab 1987 in Serie gelieferten neuartigen Drehstromlokomotiven der Baureihe 120 ersetzt. Mit der Einf\u00fchrung der Baureihe 101 ab 1996 wurde die Baureihe 103 nach und nach fast vollst\u00e4ndig ausgemustert, die 111 wird nur noch im Regionalverkehr eingesetzt. Vor allen EC-Z\u00fcgen von und nach Frankreich (Stra\u00dfburg\u2013Stuttgart und Metz-Frankfurt\/Main) und bei IC-Z\u00fcgen von und nach Luxemburg kamen Zwei-System-Lokomotiven der Baureihe 181 zum Einsatz. Weiterhin verkehren \u00d6BB-Loks der Reihen 1016\/1116 vor IC-Z\u00fcgen auch im deutschen Binnenverkehr. Auf nicht elektrifizierten Strecken werden Dieselloks der Baureihe 218 eingesetzt, oft in Doppeltraktion, so zum Beispiel n\u00f6rdlich von Itzehoe bei Z\u00fcgen nach Westerland\/Sylt und ab Hamburg in Richtung Puttgarden. Nach der Wende in der DDR sind auch DR-Diesellokomotiven der Baureihen 119 (229), 132 (232) und Elloks der Reihe 243 (143) vor IC-Z\u00fcgen im Einsatz gewesen. Sp\u00e4ter kam die technisch gegen\u00fcber der 143\/243 ge\u00e4nderte 212 (112) dazu. Ab Dezember 2007 wurden wieder Lokomotiven der Baureihe 112 vor solchen IC eingesetzt, deren H\u00f6chstgeschwindigkeit 160 km\/h nicht \u00fcberschreitet. Ebenfalls planm\u00e4\u00dfig eingesetzt wurden Lokomotiven der Baureihen 110\/115 und 113. Zusammen mit den Doppelstockwagen werden seit Dezember 2015 Lokomotiven der Baureihe 146.5, seit 2018 auch die Nachfolgebaureihe Baureihe 147.5 eingesetzt. Diese sind im Gegensatz zu den bisherigen Loks im Intercity-Einsatz nicht verkehrsrot, sondern (wie die Wagen) lichtgrau mit einem roten Streifen lackiert. Die Loks der Baureihe 147.5 sind f\u00fcr den Einsatz in der Schweiz ausger\u00fcstet. Entwicklung des Streckennetzes Streckennetz 1971 Das urspr\u00fcngliche Netz, damals nur in der ersten Klasse und nur im Zweistundentakt, erstreckte sich auf vier Linien: Linie 1 (rot): Hamburg-Altona \u2013 Bremen \u2013 M\u00fcnster \u2013 Dortmund \u2013 Essen \u2013 Duisburg \u2013 D\u00fcsseldorf \u2013 K\u00f6ln \u2013 Bonn \u2013 Koblenz \u2013 Mainz \u2013 Mannheim \u2013 Heidelberg \u2013 Stuttgart \u2013 Ulm \u2013 Augsburg \u2013 M\u00fcnchen Linie 2 (blau): Hannover \u2013 Bielefeld \u2013 Hamm \u2013 Dortmund \u2013 Hagen \u2013 Wuppertal-Elberfeld \u2013 (Solingen-Ohligs \u2013) K\u00f6ln \u2013 Bonn \u2013 Koblenz \u2013 Wiesbaden \u2013 Frankfurt \u2013 W\u00fcrzburg \u2013 N\u00fcrnberg \u2013 Augsburg \u2013 M\u00fcnchen Linie 3 (gr\u00fcn): Hamburg-Altona \u2013 Hannover \u2013 G\u00f6ttingen \u2013 Fulda \u2013 Frankfurt \u2013 Mannheim \u2013 Karlsruhe \u2013 Freiburg \u2013 Basel Linie 4 (gelb): Bremen \u2013 Hannover \u2013 G\u00f6ttingen \u2013 Bebra \u2013 Fulda \u2013 W\u00fcrzburg \u2013 (Ingolstadt \u2013) M\u00fcnchen Zwischen 1973 und 1978 wurde das InterCity-Netz von City-D-Z\u00fcgen (DC) erg\u00e4nzt, die meist dreimal t\u00e4glich nicht an das InterCity-Netz angeschlossene Wirtschaftszentren als Zubringerz\u00fcge bedienten. Streckennetz 1979 Ab dem Sommerfahrplan 1979 fuhren dann auf allen Linien IC im Stundentakt und f\u00fchrten seitdem auch Wagen der 2. Wagenklasse. Beworben wurde das Angebot unter dem Motto \"Jede Stunde, jede Klasse!\". In f\u00fcnf Bahnh\u00f6fen hielten die Z\u00fcge zweier Linien zur gleichen Zeit am gleichen Bahnsteig, so dass dort ggf. ein leichteres Umsteigen m\u00f6glich war. Dabei hielten auch jeweils die Wagen der gleichen Wagenklasse gegen\u00fcber. Es gab immer h\u00e4ufiger Linient\u00e4usche (\"Nicht Sie steigen um, sondern Ihr Zug!\"), um auf diese Weise die Zahl der Direktverbindungen zu erh\u00f6hen. Hannover: Linie 3 und 4 Dortmund und K\u00f6ln: Linie 1 und 2 Mannheim: Linie 1 und 3 W\u00fcrzburg: Linie 2 und 4 Zum selben Fahrplanwechsel wurden die einklassigen Baureihen 403 und 601\/602 au\u00dfer Betrieb genommen. Im Jahr 1980 nahm die Verkehrsleistung auf den vier IC-Linien im Jahresvergleich um 18 % zu; der Gesamtverkehr wuchs im gleichen Jahr um 4,5 %. Streckennetz 1985 Im Jahr 1985 feierte die Deutsche Bundesbahn \"150 Jahre Eisenbahn in Deutschland\". Mit dem Konzept IC 85 sollten die Reisezeiten im Fernverkehr verk\u00fcrzt, zus\u00e4tzliche Bahnh\u00f6fe bedient, neue Anschl\u00fcsse geschaffen und der Service verbessert werden. Im Zuge umfangreicher Marketing-Ma\u00dfnahmen wurde auch der Intercity-Express beworben, der erst sechs Jahre sp\u00e4ter eingef\u00fchrt werden sollte. Die Zahl der Linien wurde von vier auf sechs erh\u00f6ht, die der Z\u00fcge von 157 auf 205 pro Tag. Zur Inbetriebnahme des IC-85-Systems wird auf insgesamt 440 Streckenkilometern eine H\u00f6chstgeschwindigkeit von 200 km\/h erreicht. Die durchschnittliche Reisegeschwindigkeit stieg von 100 auf 108 km\/h. Die Fahrzeit zwischen Hamburg und M\u00fcnchen reduzierte sich um fast eine Stunde. Auf internationalen Relationen wurden Fahrzeitverk\u00fcrzungen von bis zu 71 Minuten erreicht. Der Frankfurter Flughafen wurde im Stundentakt in das IC-Netz eingebunden. Neuerungen erfuhr auch das Servicekonzept mit der Einf\u00fchrung von IC-Chefs und IC-Betreuern. Auf der IC-Linie Hamburg\u2013Hannover\u2013W\u00fcrzburg\u2013M\u00fcnchen wurde versuchsweise ein Am-Platz-Service mit Speisen und Getr\u00e4nken f\u00fcr Reisende der ersten Klasse angeboten. Im Rahmen der feierlichen Er\u00f6ffnung der Westlichen Einf\u00fchrung der Riedbahn in den Mannheimer Hauptbahnhof erweiterte die DB das IC-Netz auf f\u00fcnf Haupt- und zwei Nebenlinien. Bei dieser Gelegenheit wurde die ehemals l\u00e4ngste Linie 1 zweigeteilt, um die h\u00e4ufigen Versp\u00e4tungen auf dieser abzumildern. Der S\u00fcdabschnitt Koblenz \u2013 Mannheim \u2013 M\u00fcnchen wurde neu von der Linie 2 bedient, deren bisheriger S\u00fcdabschnitt \u00fcber Frankfurt und W\u00fcrzburg nach M\u00fcnchen von der neuen Linie 5. Doch schon bald wurden die Z\u00fcge wieder \u00fcber ihren zwischenzeitlichen Endhalt Frankfurt (Main) hinaus verl\u00e4ngert, Zugl\u00e4ufe von Kiel \u00fcber Rhein\/Ruhr, Rhein\/Main, N\u00fcrnberg bis M\u00fcnchen oder Wien waren keine Seltenheit. Der Streckenabschnitt Dortmund\u2013Mainz\/Wiesbaden wurde \u00fcber die Linke Rheinstrecke von beiden neuen Linien bedient. Dabei f\u00fchrte die Linie 1 weiterhin ohne Zwischenhalt von Koblenz bis Wiesbaden (\u00fcber Mainz-Mombach und die Kaiserbr\u00fccke), w\u00e4hrend Linie 2 und Linie 5 \u00fcber Mainz Hbf verkehrten. Da nunmehr drei statt zwei ICs in einem 12-Minuten-Zeitfenster pro Stunde die Rheinschiene entlangfuhren, sollten durch die Verk\u00fcrzung auf zehn Wagen (drei Wagen erste Klasse, Restaurant und sechs Wagen zweite Klasse) und die damit verbundene Gewichtsreduzierung die Z\u00fcge leichter den Fahrplan einhalten k\u00f6nnen. Nur wenig sp\u00e4ter wurden allerdings wieder dem Bedarf entsprechend mehr Wagen der zweiten Klasse eingestellt, meist bis zu neun pro IC. Damit verbunden waren aber Probleme, den f\u00fcr zehn Wagen errechneten Taktfahrplan mit nunmehr dreizehn Wagen einzuhalten. Netzplan ab dem Fahrplanwechsel am 2. Juni 1985: Linie 1 (rot): Hamburg-Altona \u2013 Bremen \u2013 Osnabr\u00fcck \u2013 M\u00fcnster \u2013 Dortmund \u2013 Bochum \u2013 Essen \u2013 Duisburg \u2013 D\u00fcsseldorf \u2013 K\u00f6ln \u2013 Bonn \u2013 Koblenz \u2013 Wiesbaden \u2013 Frankfurt Linie 2 (braun): Hannover \u2013 Bielefeld \u2013 Hamm \u2013 Dortmund \u2013 Essen \u2013 Duisburg \u2013 D\u00fcsseldorf \u2013 K\u00f6ln \u2013 Bonn \u2013 Koblenz \u2013 Mainz \u2013 Mannheim \u2013 Heidelberg \u2013 Stuttgart \u2013 Ulm \u2013 Augsburg \u2013 M\u00fcnchen Linie 3 (gr\u00fcn): Hamburg-Altona \u2013 Hannover \u2013 G\u00f6ttingen \u2013 Fulda \u2013 Frankfurt \u2013 Mannheim \u2013 Karlsruhe \u2013 Freiburg \u2013 Basel (\u2013 Schweiz) Linie 4 (gelb): Hamburg-Altona \u2013 Hannover \u2013 G\u00f6ttingen \u2013 Bebra \u2013 Fulda \u2013 W\u00fcrzburg \u2013 Augsburg \u2013 M\u00fcnchen Linie 4a (grau): Oldenburg bzw. Bremerhaven \u2013 Bremen \u2013 Hannover Linie 5 (blau): Dortmund \u2013 Hagen \u2013 Wuppertal-Elberfeld \u2013 (Solingen-Ohligs \u2013) K\u00f6ln \u2013 Bonn \u2013 Koblenz \u2013 Mainz \u2013 Frankfurt Flughafen \u2013 Frankfurt \u2013 (Aschaffenburg \u2013) W\u00fcrzburg \u2013 N\u00fcrnberg \u2013 Augsburg \u2013 M\u00fcnchen Dazu kamen einzelne zus\u00e4tzliche IC, zum Beispiel auf der Strecke, die bis zu seiner Abschaffung auch der TEE Rheingold befuhr: Linie 3a: Amsterdam \u2013 Utrecht \u2013 Oberhausen \u2013 Duisburg \u2013 D\u00fcsseldorf \u2013 K\u00f6ln \u2013 Bonn \u2013 Koblenz \u2013 Mainz \u2013 (Mannheim \u2013 Karlsruhe \u2013 Freiburg \u2013 Basel) oder (Mannheim \u2013 Heidelberg \u2013 Stuttgart \u2013 Ulm \u2013 Augsburg \u2013 M\u00fcnchen \u2013 Salzburg) oder (Frankfurt Flughafen \u2013 Frankfurt \u2013 W\u00fcrzburg \u2013 Augsburg \u2013 M\u00fcnchen \u2013 Innsbruck) Daneben wurde wie zuvor der Tausch der Fahrtwege einzelner IC zwischen den Linien 4 und 5, 2 und 5 (\u00fcber Essen\/Duisburg oder Wuppertal) sowie 2 und 3 (nach Basel oder Stuttgart) praktiziert. Zwischen 1979 und 1986 stieg die Verkehrsleistung im InterCity-System um insgesamt 84 % an. Streckennetz 1988 Zu einer kleinen \u00c4nderung des Netzplanes kam es 1988 nach der Inbetriebnahme des ersten Teilst\u00fccks der Schnellfahrstrecke Mannheim\u2013Stuttgart zwischen Mannheim und Graben-Neudorf. Die Linie 1 wurde (von einzelnen Z\u00fcgen in Tagesrandlagen abgesehen) ab Koblenz statt \u00fcber Wiesbaden nach Frankfurt nunmehr \u00fcber Mainz und Mannheim und von dort unmittelbar nach Stuttgart gef\u00fchrt. Aus Mangel an Fahrplantrassen verkehrten die drei Linien der linken Rheinstrecke weiterhin im Abstand weniger Minuten hintereinander. Dies \u00e4nderte sich erst 1991 mit dem Umbau des Bonner Hauptbahnhofs. Im Fr\u00fchjahr 1988 war au\u00dferdem das Teilst\u00fcck Fulda-W\u00fcrzburg der Schnellfahrstrecke Hannover\u2013W\u00fcrzburg fertiggestellt worden. Die Z\u00fcge der Linie 4 befuhren ab Sommerfahrplan 1988 diesen Abschnitt, statt wie zuvor die Strecke \u00fcber Gem\u00fcnden und Jossa zu nutzen, was die Fahrzeit zwischen Fulda und W\u00fcrzburg um knapp 30 Minuten reduzierte. Die zwanzig Tunnel auf diesem Teilst\u00fcck erforderten jedoch der Einsatz von druckert\u00fcchtigtem Wagenmaterial. Auch die dort bisher eingesetzten Lokomotiven der Baureihe 103 mussten wegen fehlender Druckert\u00fcchtigung der F\u00fchrerr\u00e4ume von der Linie 4 abgezogen und durch die damals fabrikneuen Serienlokomotiven der Baureihe 120 ersetzt werden. Durch die um 30 Minuten zur IC-Linie 3 versetzt verkehrende Linie 4 wurde zwischen Hamburg und Fulda erstmals ein Halbstundentakt im Intercity-System angeboten. Zu den weiteren Neuerungen der \u00fcber die Schnellfahrstrecke gef\u00fchrten Linie 4 z\u00e4hlte der durchgehende Einsatz von klimatisierten Wagen auch in der zweiten Klasse und ein neues Farbkonzept (\"InterCity-Rot\" auf Lichtgrau). Zusammen mit den ersten beiden neu geschaffenen Interregio-Linien wurden im Fernverkehr auf acht Linien 325 Z\u00fcge pro Tag angeboten. Da Wiesbaden nun vom IC-Netz abgeh\u00e4ngt worden war, wurde die Linie 1a\/2a eingerichtet, auf der sogenannte \"Korrespondenz-IC-Z\u00fcge\" mit dem Namen \"Wiesbaden-City\" zweimal pro Stunde Wiesbaden mit Mainz verbanden. Diese bestanden aus einer Lokomotive der Baureihe 141 und zwei speziell f\u00fcr diese Strecke umgebauten Reisezugwagen. Um dabei den Lokwechsel viermal pro Stunde zu vermeiden, wurde an dieser Stelle neben einem gew\u00f6hnlichen Reisezugwagen der ersten Klasse \u2013 erstmals bei IC-Z\u00fcgen \u2013 ein Steuerwagen zweiter Klasse eingesetzt. Mangels Nachfrage wurde das Angebot in den folgenden Jahren ausged\u00fcnnt bzw. modifiziert, (Linie 1a zweist\u00fcndlich nach Frankfurt, Linie 2a st\u00fcndlich nach Mainz) und sp\u00e4ter ganz eingestellt. Abgesehen davon verkehrte der Lufthansa-Airport-Express ab dem Sommerfahrplan 1988 betrieblich nicht mehr als TEE, sondern ebenfalls als Intercity. Ansonsten wurde das Netz bis zur Er\u00f6ffnung der Neubaustrecken Hannover\u2013W\u00fcrzburg und Mannheim\u2013Stuttgart im Wesentlichen beibehalten. Ab Sommer 1990 fuhr mit dem IC 154\/155 \"Johann Sebastian Bach\" zwischen Frankfurt (Main) und Leipzig das einzige deutsch-deutsche IC-Zugpaar; es war damit das erste in die Neuen Bundesl\u00e4nder. Streckennetz 1991 Mit Aufnahme des ICE-Verkehrs erfuhr das Intercity-System wesentliche \u00c4nderungen und Erg\u00e4nzungen. Berlin wurde erstmals \u00fcber die Linien 3 und 5 in das IC-System integriert; die durchschnittliche Reisegeschwindigkeit auf den f\u00fcnf Linien betrug 107 km\/h. Mit dem Sommerfahrplan 1991 wurden im DB-Fernverkehr t\u00e4glich 613 Z\u00fcge in einem Taktsystem st\u00fcndlicher und zweist\u00fcndlicher Abfahrten angeboten. Nach der Deutschen Einheit erwies sich das haupts\u00e4chlich auf Nord-S\u00fcd-Verkehr ausgerichtete IC-Netz den neuen Anforderungen in keiner Weise gewachsen, aufgrund der maroden Gleisanlagen der Deutschen Reichsbahn waren aber vorerst nur kleinere Korrekturen m\u00f6glich: Netzplan ab dem Fahrplanwechsel am 2. Juni 1991: IC-Linie 1 (rot): Hamburg-Altona \u2013 Bremen \u2013 M\u00fcnster \u2013 Dortmund \u2013 Essen \u2013 Duisburg \u2013 D\u00fcsseldorf \u2013 K\u00f6ln \u2013 Bonn \u2013 Koblenz \u2013 Mainz \u2013 Frankfurt \u2013 Aschaffenburg \u2013 W\u00fcrzburg \u2013 N\u00fcrnberg \u2013 (Ingolstadt \u2013 M\u00fcnchen) oder (Regensburg \u2013 Passau \u2013 Linz \u2013 Wien) (zweist\u00fcndlich im Wechsel) IC-Linie 1a (lila): Wiesbaden \u2013 Frankfurt (zweist\u00fcndlich) IC-Linie 2 (braun): (Dortmund \u2013 Bochum \u2013) oder (M\u00fcnster \u2013 Recklinghausen \u2013 Gelsenkirchen \u2013) Essen \u2013 Duisburg \u2013 D\u00fcsseldorf \u2013 K\u00f6ln \u2013 Bonn \u2013 Koblenz \u2013 Mainz \u2013 Mannheim \u2013 Heidelberg \u2013 Stuttgart \u2013 Ulm \u2013 Augsburg \u2013 M\u00fcnchen (acht EC-Zugpaare \u00fcber Salzburg nach Budapest, Klagenfurt, Wien oder Zagreb) IC-Linie 2a (lila): Wiesbaden \u2013 Mainz IC-Linie 3 (gr\u00fcn): Berlin \u2013 Potsdam \u2013 Magdeburg \u2013 Helmstedt \u2013 Braunschweig \u2013 Hildesheim \u2013 G\u00f6ttingen \u2013 Kassel-Wilhelmsh\u00f6he \u2013 Fulda \u2013 Frankfurt \u2013 Mannheim \u2013 Karlsruhe (zweist\u00fcndlich, ein EC-Zugpaar \u00fcber Basel nach Z\u00fcrich) IC-Linie 4 (gelb): Hamburg-Altona \u2013 Hannover \u2013 G\u00f6ttingen \u2013 Kassel-Wilhelmsh\u00f6he \u2013 Fulda \u2013 W\u00fcrzburg \u2013 Augsburg \u2013 M\u00fcnchen (zweist\u00fcndlich \u00fcber N\u00fcrnberg) IC-Linie 5 (blau): (zweist\u00fcndlich Berlin \u2013 Potsdam \u2013 Magdeburg \u2013) Braunschweig \u2013 Hannover \u2013 Bielefeld \u2013 Hamm \u2013 Dortmund \u2013 Hagen \u2013 Wuppertal \u2013 Solingen-Ohligs \u2013 K\u00f6ln \u2013 Bonn \u2013 Koblenz \u2013 Mainz \u2013 Mannheim \u2013 Karlsruhe \u2013 Freiburg \u2013 Basel (neun EC-Zugpaare nach Brig, Chur, Genf, Interlaken, Mailand oder Sestri Levante) EC-Linie 5a (lila): Amsterdam \u2013 Utrecht \u2013 Emmerich \u2013 Oberhausen \u2013 Duisburg \u2013 D\u00fcsseldorf \u2013 K\u00f6ln (zweist\u00fcndlich, zwei EC-Zugpaare der Linie 5 nach Chur und Interlaken) ICE-Linie 6 (orange): Hamburg-Altona \u2013 Hannover \u2013 G\u00f6ttingen \u2013 Kassel-Wilhelmsh\u00f6he \u2013 Fulda \u2013 Frankfurt \u2013 Mannheim \u2013 Stuttgart \u2013 Ulm \u2013 Augsburg \u2013 M\u00fcnchen IC-Linie 6a (grau): Oldenburg oder Bremerhaven \u2013 Bremen \u2013 Hannover Dar\u00fcber hinaus gab es weitere Relationen, die nur von einzelnen Z\u00fcgen befahren wurden und im Kursbuch 1991\/92 noch keine eigene Liniennummer erhalten hatten: EC-Linie (grau): Kopenhagen \u2013 Puttgarden \u2013 L\u00fcbeck \u2013 Hamburg (drei Zugpaare pro Tag, ab 1992 zweist\u00fcndlich) IC-Linie (lila): Hamburg-Altona \u2013 Berlin (vier Zugpaare pro Tag, ab 1992 zweist\u00fcndlich und weiter nach Dresden, sp\u00e4ter IC-Linie 7) IC\/EC-Linie (grau): (Dresden \u2013) Leipzig \u2013 Weimar \u2013 Erfurt \u2013 Gotha \u2013 Eisenach \u2013 Bebra \u2013 Fulda \u2013 Frankfurt \u2013 Darmstadt \u2013 Mannheim \u2013 Neustadt \u2013 Kaiserslautern \u2013 Homburg \u2013 Saarbr\u00fccken \u2013 Metz \u2013 Paris (vier bis f\u00fcnf Zugpaare pro Tag, ab 1992 zweist\u00fcndlich zwischen Dresden und Saarbr\u00fccken, sp\u00e4ter IC\/EC-Linie 9) EC-Linie (lila): M\u00fcnchen \u2013 Kempten \u2013 Lindau \u2013 Z\u00fcrich \u2013 Bern (drei Zugpaare pro Tag) EC-Linie (grau): M\u00fcnchen \u2013 Kufstein \u2013 Innsbruck \u2013 Bologna, Mailand oder Rom (drei Zugpaare pro Tag, dazu zwei Zugpaare der IC-Linie 2) Bis auf sieben Zugpaare der Linien 1 und 5, die ihren Zuglauf zwischen Dortmund Hbf und K\u00f6ln Hbf tauschten, fuhren alle IC auf \"ihrer\" Linie, was das Netz wesentlich vereinfachte. Daneben wurde damit begonnen, ehemalige FD (FernExpress-Z\u00fcge) nunmehr als IC in den Taktfahrplan zu integrieren, zum Beispiel nach Oberstdorf, Mittenwald oder Berchtesgaden. Zu den Z\u00fcgen mit den l\u00e4ngsten fahrplanm\u00e4\u00dfigen Fahrzeiten geh\u00f6rten: 29 \"Prinz Eugen\": 15 h 44 min von Kiel nach Wien 107 \"Mont-Blanc\": 15 h 19 min von Berlin nach Genf 13 \"Paganini\": 15 h 19 min von Dortmund nach Bologna 25 \"Franz Liszt\": 15 h von Dortmund nach Budapest 823 \"Gorch Fock\": 14 h 13 min von Westerland nach Passau 725 \"Berchtesgadener Land\": 14 h von Hamburg-Altona nach Berchtesgaden Streckennetz 1992 Neben den in der obigen Aufz\u00e4hlung schon erw\u00e4hnten \u00c4nderungen kamen zum Fahrplanwechsel am 31. Mai 1992 noch hinzu: IC-Linie 1 (rot): zweist\u00fcndlich nur noch bis N\u00fcrnberg statt M\u00fcnchen IC-Linie 3 (gr\u00fcn): vier zus\u00e4tzliche Zugpaare Hamburg-Altona \u2013 Hannover \u2013 G\u00f6ttingen \u2013 Kassel-Wilhelmsh\u00f6he \u2013 Fulda \u2013 Frankfurt \u2013 Mannheim \u2013 Karlsruhe (\u2013 Basel \u2013 Z\u00fcrich) ICE-Linie 4 (gelb): zweist\u00fcndlich von Bremen statt Hamburg-Altona, st\u00fcndlich \u00fcber N\u00fcrnberg IC-Linie 6a (grau): zweist\u00fcndlich Bremen \u2013 Hannover IC-Linie 8 (hellgr\u00fcn): Berlin \u2013 Flughafen Berlin-Sch\u00f6nefeld \u2013 Leipzig \u2013 Naumburg \u2013 Jena \u2013 Saalfeld \u2013 Probstzella \u2013 Lichtenfels \u2013 Bamberg \u2013 Erlangen \u2013 N\u00fcrnberg \u2013 Ingolstadt \u2013 M\u00fcnchen (zweist\u00fcndlich) Zum gr\u00f6\u00dften Fahrplanwechsel in der Geschichte der Deutschen Reichsbahn wurde zum 31. Mai 1992 in den Neuen Bundesl\u00e4ndern ein durchgehender Zwei-Stunden-Takt im IC\/EC-Netz eingef\u00fchrt, die Zahl der t\u00e4glichen Z\u00fcge gegen\u00fcber dem Vorjahr von 46 auf 90 erh\u00f6ht. Streckennetz 1993 Nach der Er\u00f6ffnung weiterer Aus- und Neubaustrecken, insbesondere der Verkehrsprojekte Deutsche Einheit, wurden immer mehr IC-Linien durch ICE-Linien mit Hochgeschwindigkeitsz\u00fcgen ersetzt. Zun\u00e4chst wurden die frei werdenden IC-Z\u00fcge f\u00fcr den Verkehr in den neuen Bundesl\u00e4ndern bzw. f\u00fcr den Verkehr zwischen DB und DR ben\u00f6tigt. Mit der Einbeziehung Berlins ins ICE-Netz ab 1993 wurde das IC-Netz erneut ver\u00e4ndert. Die ICE-Linie 6 fuhr nunmehr zweist\u00fcndlich \u00fcber G\u00f6ttingen nach Berlin; die restlichen Z\u00fcge fahren entweder nach Hamburg oder nach Bremen, sp\u00e4ter wurden auch diese Z\u00fcge nach Berlin gef\u00fchrt. Um zwischen Hannover und Bremen zumindest einen Zwei-Stunden-Takt anzubieten, werden einzelne Z\u00fcge der ICE-Linie 4 statt wie bisher nach Hamburg nun auch nach Bremen gef\u00fchrt. Im Gegenzug wurde die IC-Linie 6a komplett eingestellt. Streckennetz von 1994 bis 2002 Ab 1996 wurde die IC-Linie 8 von Berlin nach Hamburg durchgebunden, womit gemeinsam mit der IC-Linie 7 zwischen der Hauptstadt und der Hansestadt bis 1998 der Stundentakt verwirklicht wurde. Die IC-Linie 5 wurde ab 1997 von Hannover aus \u00fcber Magdeburg und Leipzig nach Dresden statt Berlin gef\u00fchrt. Daf\u00fcr wurde neu die ICE-Linie 10 von Berlin nach K\u00f6ln\/Bonn eingerichtet. Gleichzeitig wurde der Ast nach Basel, der bislang von der IC-Linie 5 bedient wurde, aufgegeben. Linienziel war nun N\u00fcrnberg. Ab 1998 befuhren die Z\u00fcge der ICE-Linie 6 und ICE-Linie 10 dann die Neubaustrecke Berlin \u2013 Hannover. Streckennetz von 2002 bis 2014 Zum Jahresfahrplan 2002\/2003 wurden in Deutschland die bis dahin im Fernverkehr zuschlagfreien Interregio-Z\u00fcge abgeschafft und bei teilweise unver\u00e4ndertem Wagenmaterial und oft gleich gebliebener Reisegeschwindigkeit in zuschlagpflichtige Intercity-Z\u00fcge umgewandelt. Seither bedienen IC h\u00e4ufiger auch kleinere St\u00e4dte. Mit der Er\u00f6ffnung der Schnellfahrstrecke K\u00f6ln\u2013Rhein\/Main \u00fcbernahmen die IC-Z\u00fcge vermehrt einen gewissen Parallelverkehr zu den ICE der Schnellfahrstrecke auf der Rheinstrecke. Insgesamt wurde durch diese Ma\u00dfnahme das IC-Netz in Deutschland stark erweitert. Diese sind aber h\u00e4ufig nicht in getaktete Umsteigeverbindungen integriert. Gleichzeitig wurde das Fernverkehrsnetz mit Inbetriebnahme der Schnellfahrstrecke K\u00f6ln\u2013Rhein\/Main neu geordnet und es wurden neue zweistellige Liniennummern vergeben. Der Intercity \u00fcbernahm somit die Aufgaben der ehemaligen Schnellz\u00fcge (D), der FernExpress- (FD) und UrlaubsExpress-Z\u00fcge (UEx) sowie der Interregios (IR). Wie zu seiner Anfangszeit f\u00e4hrt er meist nur noch im Zweistundentakt, heute allerdings eher auf Strecken, f\u00fcr die der ICE (noch) nicht ausger\u00fcstet ist. Tonangebend und von wenigen \"Ausrei\u00dfern\" in Form von (gleich schnellen) ICEs abgesehen im Stundentakt verkehrend ist der IC heute nur noch auf der Strecke Hamburg \u2013 Bremen \u2013 Ruhrgebiet \u2013 K\u00f6ln \u2013 Rheinstrecke \u2013 Mainz. Im Folgenden sind alle IC-Linien dargestellt, welche von der Neuordnung der Liniennummern im Jahr 2002 bis zum aktuellen Fahrplan existierten, aber im aktuellen Fahrplan nicht mehr bedient werden. Es handelt sich hier zumeist um ehemalige Interregio-Verbindungen. Aktuelles Liniennetz Zuk\u00fcnftiges Liniennetz Die Deutsche Bahn k\u00fcndigte im M\u00e4rz 2015 an, im Rahmen eines neuen IC-Netzes (\"IC-neu\") bis 2030 bis auf Offenbach, Bremerhaven, Herne, Bottrop, Moers, Neuss, Remscheid und Bergisch Gladbach alle deutschen Gro\u00dfst\u00e4dte im Zwei-Stunden-Takt anzubinden. Dabei sollen 190 neue Direktverbindungen aus der Fl\u00e4che in die 50 gr\u00f6\u00dften St\u00e4dte angeboten werden. Zum Einsatz kommen sollen 120 neue Doppelstock-Z\u00fcge, die die bestehenden IC-Reisezugwagen komplett abl\u00f6sen sollen. J\u00e4hrlich sollen die Intercity-Z\u00fcge 42 Millionen Kilometer zur\u00fccklegen. Das zuk\u00fcnftige Liniennetz umfasst dabei viele ehemalige Interregio-Relationen. Auf mehreren Strecken des IC-neu-Netzes wurde zuletzt kaum oder kein Fernverkehr mehr angeboten. Nach Angaben der Deutschen Bahn erhalten durch die Umstrukturierung f\u00fcnf Millionen Einwohner eine Fernverkehrsanbindung. Auf dem Kernnetz sollen die Intercity-Linien in ICE-Linien umgewandelt werden. Diese Strecken sind in der nachfolgenden Tabelle kursiv gesetzt. Fahrplanprobleme Bundeswehr-InterCity An seine Grenzen kam das InterCity-System an Freitagen und Sonntagen, wobei besonders der Bundeswehr-Wochenendpendler-Verkehr zwischen Hamburg\/Schleswig-Holstein und K\u00f6ln (\u2013 Koblenz) gro\u00dfe Probleme verursachte. W\u00e4hrend der 1970er und 1980er Jahre dienten etwa 200.000 Wehrpflichtige, viele von ihnen waren n\u00f6rdlich und\/oder \u00f6stlich von ihren Wohnorten stationiert und hatten jedes Wochenende oft mehrere Hundert Kilometer zur\u00fcckzulegen, f\u00fcr die sie Freifahrscheine bekamen, so dass sich ein entsprechender Ansturm auf das Fernzugnetz der Bundesbahn ergab. Anfangs setzte die Bahn Entlastungsz\u00fcge ein \u2013 aus herk\u00f6mmlichem D-Zug-Wagenmaterial bis hin zu Silberlingen. Wegen der geringen H\u00f6chstgeschwindigkeit dieser Z\u00fcge (140 km\/h) wurden sie unterwegs von den regul\u00e4ren, aber \u00fcberf\u00fcllten InterCitys \u00fcberholt. Als Konsequenz daraus wurden an Freitagen in Nord-S\u00fcd- und an Sonntagen in S\u00fcd-Nord-Richtung zus\u00e4tzlich zu Regelz\u00fcgen und Bundeswehr-D-Z\u00fcgen spezielle Bundeswehr-InterCitys eingesetzt, die nur aus einem Avmz-Wagen, einem IC-Barwagen sowie einer gro\u00dfen Anzahl Wagen der zweiten Klasse bestanden, zumeist nicht klimatisierte Bm235, die in den regul\u00e4ren InterCitys durch Bpmz- und sp\u00e4ter Bvmz-Wagen ersetzt worden waren. Diese Z\u00fcge waren zwar auch f\u00fcr den allgemeinen Reiseverkehr freigegeben, wurden aber von manchen Fahrg\u00e4sten gemieden. F\u00fcr die Reisenden waren sie an ihrer Zugnummer erkennbar, anfangs im Bereich 1500\/1600, sp\u00e4ter 900, da die Zugnummern im Kernnetz damals immer unter 900 lagen, sowie oft auch an der Namensgebung (bevorzugt mit Bezug zur See oder Greifv\u00f6gel, so Seeadler, Kranich, Kormoran, Bussard, Sperber), ihren abseits der Gro\u00dfst\u00e4dte liegenden Zielbahnh\u00f6fen wie Kiel, Eckernf\u00f6rde, L\u00fcneburg, Hildesheim, Goslar, Munster\/\u00d6rtze und ab dem Sommer 1990 zus\u00e4tzlich in den Aushangfahrpl\u00e4nen durch den Hinweis \"Besonders geeignet f\u00fcr Bundeswehr-Familienheimfahrten\", der ab Sommer 1991 auch als Fu\u00dfnote 30 in den Kursbuchtabellen erschien. Anfang der 1980er Jahre wurde die Entwicklung im Bundeswehr-Wochenendverkehr wie folgt beschrieben: Zwischen Hamburg und K\u00f6ln fuhren die regul\u00e4ren Z\u00fcge f\u00fcr Bundeswehr-Reisende kontingentiert (zuerst zwei, kurze Zeit vier Wagen), hierzu mussten in den Standorten Berechtigungskarten zus\u00e4tzlich zu den Fahrkarten erbeten werden, die nach der Nutzung am Wochenende zur\u00fcckzugeben waren. Nach der deutschen Wiedervereinigung hatten sich die Probleme deutlich entspannt. In den 2000er Jahren wurden die Bundeswehr-Zusatzz\u00fcge vorwiegend mit ehemaligen IR-Wagen gefahren, sodass diese Z\u00fcge h\u00e4ufig aus acht bis neun Wagen der Gattung Bimz bestanden, teilweise erg\u00e4nzt um ein Bordbistro. Gro\u00dfraumwagen fand man selten, ebenso die erste Wagenklasse. Mit Aussetzung der allgemeinen Wehrpflicht 2011 wurden spezielle Bundeswehr-IC-Verbindungen weitgehend eingestellt bzw. durch regul\u00e4re Wochenend-Verst\u00e4rkerz\u00fcge ersetzt. Entlastungsz\u00fcge und Einzelverkehre Schon in den ersten Jahren des IC79-Konzepts bestand das Problem, dass die Z\u00fcge mit den zahlreichen Wagen der zweiten Klasse ohnehin schon recht lang waren und wegen der begrenzten Bahnsteigl\u00e4ngen nicht mehr einfach um einige Wagen verst\u00e4rkt werden konnten. An Tagen mit besonders gro\u00dfer Nachfrage (freitags und sonntags sowie zu Schulferienbeginn und -ende) wurden daher schon einige Wochen im Voraus Entlastungsz\u00fcge eingeplant und in den ersten Jahren auch in eigenen Fahrplanheften (\"Zus\u00e4tzliche Z\u00fcge zum Intercity-System\") und speziellen Aush\u00e4ngen auf den IC-Haltebahnh\u00f6fen bekanntgegeben. Als Zugnummern bekamen die Entlastungsz\u00fcge zumeist die (maximal dreistellige) Nummer des Stammzuges, die um 10000, 11000 oder 15000 erh\u00f6ht wurde. Ihr Laufweg konnte dabei durchaus nur die am st\u00e4rksten nachgefragten Abschnitte des Stammzug-Laufwegs umfassen. Weil die 200 km\/h schnellen Lokomotiven der Baureihe 103 f\u00fcr die Stammz\u00fcge verplant waren, wurden diese Z\u00fcge meist mit den etwas langsameren Loks der Baureihen 110 und 111 gefahren. Da diese Entlastungsz\u00fcge aber meist deutlich k\u00fcrzer und leichter waren als die Stammz\u00fcge (typischerweise circa 5 bis 7 Wagen gegen\u00fcber 11 bis 14 bei den Stammz\u00fcgen), konnten sie trotz schw\u00e4cherer Bespannung nahezu dieselben Fahrzeiten erreichen. Ihr Wagenmaterial war notgedrungen einfacher und entsprach nicht immer den aktuellen IC-Farben; Speisewagen und klimatisierte Wagen wurden in der Regel nicht mitgef\u00fchrt. Als Beispiel f\u00fcr besonders viele Entlastungsz\u00fcge sei an dieser Stelle Sonntag, der 3. Januar 1988 genannt: An diesem Tage verkehrten allein auf der Rheinstrecke zwischen K\u00f6ln und Mainz 14 IC-Entlastungsz\u00fcge, davon die meisten in S\u00fcd-Nord-Richtung. Im Laufe der Jahre wurden immer weniger Entlastungsz\u00fcge eingeplant, auch wurde die Verteilung der entsprechenden Fahrplanhefte eingestellt. Seit einigen Jahren werden von der Deutschen Bahn wieder vermehrt planm\u00e4\u00dfig Intercitys als Entlastungsz\u00fcge f\u00fcr den ICE eingesetzt, was eine Zeit lang nur an besonderen Sto\u00dftagen (zum Beispiel vor Weihnachten) mit Sonderfahrpl\u00e4nen \u00fcblich war. Dabei werden zus\u00e4tzliche Z\u00fcge, meist in zeitlicher N\u00e4he zu den planm\u00e4\u00dfigen Fahrten von ICEs eingesetzt, diese Z\u00fcge verkehren insbesondere an den starken Verkehrstagen Freitag und Sonntag sowie vor bzw. nach vielen Feiertagen (Ostern, Christi Himmelfahrt, Pfingsten etc.). Au\u00dferdem gibt es noch einige Zugpaare, die t\u00e4glich oder zumindest regelm\u00e4\u00dfig verkehren und vornehmlich dem umsteigefreien Urlaubsverkehr dienen (zum Beispiel Hamburg\u2013Berchtesgaden, Heidelberg\u2013K\u00f6ln\u2013Hamburg\u2013Westerland, Ruhrgebiet\u2013Oberstdorf). Diese Z\u00fcge nehmen aber durch Einbindung in bestehende Fahrplanlagen durchaus auch regul\u00e4re Taktfahrten mit wahr. Ferner verkehren wenige Nacht-Intercity, die zumeist f\u00fcr Fernpendler mit gegen\u00fcber dem Tagnetz abweichenden Wegen oder Halten unterwegs sind. Seit Dezember 2017 betreibt die luxemburgische CFL ein t\u00e4gliches Zugpaar zwischen Luxemburg und D\u00fcsseldorf \u00fcber Trier, Koblenz und K\u00f6ln. Von Trier bis Koblenz kann der Nahverkehrstarif und auch die Freifahrt genutzt werden, da der Zug hier als Regional-Express der Linie 11 verkehrt. N\u00f6rdlich von Koblenz handelt es sich um einen Intercity, weshalb auf diesem Abschnitt der teurere Fernverkehrstarif der DB gilt. Es werden doppelst\u00f6ckige Triebwagen der Baureihe Stadler KISS eingesetzt. P\u00fcnktlichkeit Die erste Fahrplanperiode des IC-Verkehrs in Deutschland war nicht \u00fcberall von P\u00fcnktlichkeit begleitet. Eine Untersuchung von sechs Z\u00fcgen, die w\u00e4hrend des Winterfahrplans 1971\/72 \u00fcber durchschnittlich jeweils etwa 100 Tage beobachtet wurden (TEE 32, TEE 33, IC 115, IC 117, IC 130 und IC 135) ergab, dass der grenz\u00fcberschreitende TEE 33 nur in 25 % der F\u00e4lle f\u00fcnf Minuten oder weniger versp\u00e4tet, nach heutiger DB-Definition also \"p\u00fcnktlich\" war. An vier der Beobachtungs-Tage hatte er sogar \u00fcber 30 Minuten Versp\u00e4tung, wobei allerdings an drei dieser Tage ein Ersatzzug (Baureihe 110 mit zwei nicht klimatisierten Erste-Klasse-Wagen) verkehrte. Klammert man den TEE 33 aus, so ergibt sich f\u00fcr die \u00fcbrigen f\u00fcnf Z\u00fcge nach heutiger DB-Definition eine P\u00fcnktlichkeit von immerhin 80 %. Im Einzelnen: 38 % auf die Minute p\u00fcnktlich 42 % Versp\u00e4tung 1 bis 5 Minuten 12 % Versp\u00e4tung 6 bis 10 Minuten 5 % Versp\u00e4tung 11 bis 15 Minuten 2 % Versp\u00e4tung 16 bis 30 Minuten 0,2 % Versp\u00e4tung \u00fcber 30 Minuten Die damalige Untersuchung kommt zu folgenden Aussagen: \"Versp\u00e4tungen von 20 Minuten und mehr im IC-Verkehr waren im Winterfahrplan 1971\/72 keine Seltenheit. Um nun wieder einen besseren P\u00fcnktlichkeitsgrad zu erreichen, wurden die Fahrpl\u00e4ne im Sommerfahrplan 1972 entspannt, was bei den Intercityz\u00fcgen zu Fahrzeitverl\u00e4ngerungen zwischen 10 und 20 Minuten und dar\u00fcber f\u00fchrte. (\u2026) Allgemein kann zur P\u00fcnktlichkeit dieser Z\u00fcge folgendes gesagt werden: im Winterfahrplan 1971\/72 waren die Z\u00fcge aus Hamburg und Hannover einigerma\u00dfen p\u00fcnktlich,"} diff --git a/sft/sft-v4.jsonl b/sft/sft-v4.jsonl new file mode 100644 index 0000000000000000000000000000000000000000..142fefe9c06fa695aae3b348babdbd5abf6d4a10 --- /dev/null +++ b/sft/sft-v4.jsonl @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:7135bd531288fd81fa85a8e8cdb5631baf71eed48580c01e84bfe2923b1a8ff4 +size 699390870 diff --git a/slimpajama/arxiv.json b/slimpajama/arxiv.json new file mode 100644 index 0000000000000000000000000000000000000000..aa8da045c0bef30b8be509f735bc8317e0e7c963 --- /dev/null +++ b/slimpajama/arxiv.json @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:c4c8db5b022ba2cc66b9803af061d47bc973c8fddee1981e82f9afd5c752f65f +size 6164790545 diff --git a/slimpajama/book.json b/slimpajama/book.json new file mode 100644 index 0000000000000000000000000000000000000000..6ea3b9e7d3586e73e38f9f916e3a1c1659b3549a --- /dev/null +++ b/slimpajama/book.json @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:9d958275109f7ba88328803cc7f8abf2e046375380f8d9c3460feffc9518c060 +size 7043770317 diff --git a/slimpajama/c4.json b/slimpajama/c4.json new file mode 100644 index 0000000000000000000000000000000000000000..4eaf233ad61bb9a51cf644d832d58510392ef925 --- /dev/null +++ b/slimpajama/c4.json @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:e336b3183844bb98ed1272b15a1e16fbe880f14b4522aa03076e384d1f9e518b +size 6087499666 diff --git a/slimpajama/commoncrawl.json b/slimpajama/commoncrawl.json new file mode 100644 index 0000000000000000000000000000000000000000..cc30ece1ad689efa50e07c382d6f60d49ec75099 --- /dev/null +++ b/slimpajama/commoncrawl.json @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:683172b923ca1654fb3966f01a64e43fd3b1e81138bac194aa3da44cfd1e9e7b +size 9105328419 diff --git a/slimpajama/config.json b/slimpajama/config.json new file mode 100644 index 0000000000000000000000000000000000000000..485785d43c3e406597387bd3758bbb1eb5b897cb --- /dev/null +++ b/slimpajama/config.json @@ -0,0 +1,20 @@ +{ + "mixture": { + "commoncrawl": 52.2, + "c4": 26.7, + "github": 5.2, + "book": 4.2, + "arxiv": 4.6, + "wiki": 3.8, + "stackexchange": 3.3 + }, + "num_tokens_avg": { + "commoncrawl": 1207, + "c4": 378, + "wiki": 393, + "stackexchange": 309, + "github": 436, + "book": 89373, + "arxiv": 7375 + } +} \ No newline at end of file diff --git a/slimpajama/github.json b/slimpajama/github.json new file mode 100644 index 0000000000000000000000000000000000000000..9406091a9641bb5771ba678e9e8946e6320db0ae --- /dev/null +++ b/slimpajama/github.json @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:bfe4927ffd22ee29d1c354a1dca41dbfb8c1c20cf228c6edcf401ec17d4de89f +size 7372230014 diff --git a/slimpajama/stackexchange.json b/slimpajama/stackexchange.json new file mode 100644 index 0000000000000000000000000000000000000000..92209d16ebe80b5ae8a163813b2c996c88ef320a --- /dev/null +++ b/slimpajama/stackexchange.json @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:37fa82572ab9e75e581050b9950f8c2d0fcf83035ec59619bb6969c0171bfd2d +size 4500748901 diff --git a/slimpajama/wiki.json b/slimpajama/wiki.json new file mode 100644 index 0000000000000000000000000000000000000000..482de229055169533537bbdd3948a0182cb3d014 --- /dev/null +++ b/slimpajama/wiki.json @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:67dad9fc9e82ed1e639a322998ba76f7f1908eb7b5690614824a01cf34f441fe +size 5212884589